摘要:
Techniques for temporarily and/or partially offloading mobile applications to one or more remote virtual machines in a server include establishing an application copy of a mobile application installed on a mobile device at a remote virtual machine, suspending the mobile application on the mobile device and offloading operations of the mobile application to the application copy at the remote virtual machine for a period of time. Suspending the mobile application and offloading its operations to the remote virtual machine for the period of time reduces consumption of resources on the mobile device. The virtual machine executes the application copy in the same manner the mobile device would execute the mobile application and transfers data from the execution to the mobile application at the end of the period of time to allow the mobile application to update itself and resume its operation without any loss of data or functionality.
摘要:
A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.
摘要:
Systems and methods for deploying and employing policies for wireless traffic optimization in a wireless network based on hierarchies are disclosed. One embodiment includes deploying a global policy set of the policies for wireless traffic optimization among mobile devices in the wireless network and deploying a first policy set of the policies among a first subset of mobile devices among the mobile devices. In one embodiment, the first subset of mobile devices meet a device-based criteria including one or more of, device type, device platform, or device model and any policy of the first policy set overwrites any policy of the global policy set in case of conflict when deployed on any of the first subset of mobile devices.
摘要:
The subject matter described herein includes methods, systems, and computer program products for policy management for signaling optimization in a wireless network. According to one system, a policy control function (PCF) is configured to provide policy management in a communications network. The PCF includes a client services node (CSN) that provides front-end interfaces to a client device. An update target calculation engine (UTCE) is configured to asynchronously calculate updates to the client device without waiting for the client device to request the configuration updates. A generic update delivery system (GUDS) receives the updates from the UTCE and delivers the updates to client devices.
摘要:
Systems and methods described herein employ techniques for optimized and selective management of policy deployment/delivery to mobile clients in a congested network to, for example, prevent further aggravation of network congestion. In order to address mobile network congestion it is necessary to be able to enforce network management policies on the devices which are specifically in the congested areas. This presents a challenge as the process of knowing and keeping track of where a device is geographically located within the network actually consumes network resources. There is a tradeoff between the accuracy with which you know a given devices location and the amount of resources required to gain this knowledge. Thus, it is crucial to have a way to determine the location of a device in the network with sufficient accuracy such that congestion management policies can be applied effectively while not unduly taxing the network with additional traffic.
摘要:
A system includes a first mobile device configured to provide information concerning a physical location of the first mobile device and a second mobile device configured to receive the information concerning the physical location of the first mobile device. A contacts database is provided for the first mobile device based on input of a user of the first mobile device such that communication is allowed with the second mobile device based on the contacts database.
摘要:
System and method of detection and management of user interactions with foreground applications on a mobile device in distributed caching are disclosed. One embodiment includes a method of mimicking, remote from the mobile device, timing characteristics of user activity with the mobile client, polling a content source for the mobile application based on the timing characteristics of the user interaction, on behalf of the mobile device and allowing responses cached on the mobile device for the user activity to be used until a change at the content source is detected, remote from the mobile device.
摘要:
A method and system are for generating a report for delivery to or access or query by a network operator by determining, by a server-side proxy, optimization efficiency for traffic in a wireless network, tracking, by the server-side proxy, user-related information in the wireless network, generating, based on at least one of the optimization efficiency and the user-related information, a report for delivery to or access by an operator of the wireless network, the report including an alert of viral take-up of a new application, and performing, by the server-side proxy, traffic optimization functions alleviating traffic in the wireless network.
摘要:
A method for IP [=Internet Protocol] communication between a mobile terminal and its correspondent node in a mobile radio network. The method comprises establishing an IP connection between the mobile terminal and its correspondent node. After detecting a period of inactivity in the IP connection, keep-alive messages are sent via the IP connection at predetermined intervals, which are varied. The method comprises monitoring the lengths of several periods of inactivity at which the mobile radio network disconnects the IP connection. Based on the monitored lengths of periods of inactivity, a maximum interval (TINT) between keep-alive messages is determined such that the maximum interval meets a predetermined criterion of statistical confidence, and the interval between keep-alive messages is set to the maximum interval (TINT).
摘要:
A system for aggregating and managing PIM data from multiple sources is provided. By aggregating various sources of data, the present system allow for the bridging of networked communities and organizations. Limitations of data aggregation as a result of proprietary and/or protocol concerns are overcome through the development of trusted relationships amongst users of the data aggregation and management system.