최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0715801 (2012-12-14) |
등록번호 | US-8861354 (2014-10-14) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 3 인용 특허 : 574 |
Systems and methods for deploying and employing policies for wireless traffic optimization in a wireless network based on hierarchies are disclosed. One embodiment includes deploying a global policy set of the policies for wireless traffic optimization among mobile devices in the wireless network an
Systems and methods for deploying and employing policies for wireless traffic optimization in a wireless network based on hierarchies are disclosed. One embodiment includes deploying a global policy set of the policies for wireless traffic optimization among mobile devices in the wireless network and deploying a first policy set of the policies among a first subset of mobile devices among the mobile devices. In one embodiment, the first subset of mobile devices meet a device-based criteria including one or more of, device type, device platform, or device model and any policy of the first policy set overwrites any policy of the global policy set in case of conflict when deployed on any of the first subset of mobile devices.
1. A method of utilizing hierarchies for managing policies for wireless traffic optimization in a wireless network, the method, comprising: defining or identifying a first policy set among the policies for wireless traffic optimization as global policies without consideration of the device or its us
1. A method of utilizing hierarchies for managing policies for wireless traffic optimization in a wireless network, the method, comprising: defining or identifying a first policy set among the policies for wireless traffic optimization as global policies without consideration of the device or its user;defining or identifying a second policy set among the policies as device policies that is dependent upon device characteristics;defining or identifying a third policy set among the policies as user policies that are specific to a user or specific to a user group;detecting that a conflict exists between either of the device policy and user policy with the global policy; andin response to detecting a conflict, overwriting the global policy with the one of the device policy and user policy. 2. The method of claim 1, further comprising, deploying the policies to mobile devices in the wireless network and subsequently updating the policies to adjust for dynamic conditions in the wireless network. 3. The method of claim 1, wherein, the wireless traffic includes mobile wireless traffic and the wireless network includes a mobile wireless network. 4. The method of claim 1, wherein, the policies are specified and utilized by a traffic management system distributed between a client-side component including a local proxy on a mobile device and a server-side component including a proxy server remote from the mobile device, to optimize and manage traffic in the wireless network to and from the mobile device. 5. The method of claim 1, wherein, the policies are utilized to optimize the wireless traffic to and from multiple mobile devices in the wireless network. 6. The method of claim 1, wherein, the policies are utilized to optimize the wireless traffic for multiple wireless service carriers including multiple mobile operators. 7. The method of claim 1, wherein, the global policies are applicable independent of type, platform, or model of a mobile device. 8. The method of claim 1, wherein, the device policies are, one or more of, device type dependent, device platform dependent, or device model dependent. 9. The method of claim 1, wherein, the user policies include mobile application specific policies. 10. A method for deploying and employing policies for wireless traffic optimization in a wireless network based on hierarchies, the method, comprising: deploying a global policy set of the policies for wireless traffic optimization among mobile devices in the wireless network;deploying a first policy set of the policies among a first subset of mobile devices among the mobile devices;wherein, the first subset of mobile devices meet a device-based criteria including one or more of, device type, device platform, or device model;detecting that a conflict exists between the first policy and the global policy; andin response to detecting a conflict, overwriting the global policy with the first policy. 11. The method of claim 10, wherein, any policy of the first policy set overwrites any policy of the global policy set in case of conflict when deployed on any of the first subset of mobile devices. 12. The method of claim 11, wherein, the global policy set is independent of device and user; the first policy set includes device policies in the policies, and the second policy set includes user policies among the policies. 13. The method of claim 10, further comprising, deploying a second policy set of the policies among a second subset of mobile devices among the mobile devices; wherein, the second subset of the mobile devices meet a user-based criteria or user-group based criteria. 14. The method of claim 10, wherein, any policy of second first policy set overwrites any policy of the global policy set or the first policy set in case of conflict when deployed on any of the second subset of mobile devices. 15. The method of claim 14, wherein, the user-based criteria further include criteria specific to applications on the second subset of mobile devices. 16. The method of claim 10, wherein, the first subset of mobile devices meet a device-based criteria including one or more of, device type, device platform, or device model. 17. The method of claim 10, wherein, the policies include, one or more of, reporting policy settings, authentication policy settings, or logging component settings. 18. The method of claim 10, wherein, the policies include HTTP policy settings or HTTPS proxy policy settings. 19. The method of claim 10, wherein, the policies include pipelining policy settings or application handler policy settings. 20. The method of claim 10 further comprising, deploying updates to the policies based on a priority of a given update. 21. The method of claim 20, wherein, the updates are sent over an existing data connection with a mobile device; in the absence of an existing data connection with the mobile device, a policy update notification is sent via SMS such that the updates are retrieved or sent when a data connection is next established. 22. The method of claim 20, wherein, if the updates categorized as high priority, the data connection is activated in response to receiving the SMS having the policy update notification to retrieve or receive the updates. 23. A system for deploying and employing policies for wireless traffic optimization in a wireless network based on hierarchies, the system, comprising: a processor;a memory unit having stored there on instructions which when executed by the processor causes the system to:deploy a global policy set of the policies for wireless traffic optimization among mobile devices in the wireless network;deploy a first policy set of the policies among a first subset of mobile devices among the mobile devices;deploy a second policy set of the policies among a second subset of mobile devices among the mobile devices;detecting that a conflict exists between either of the first policy set and the second policy set with the global policy; andin response to detecting a conflict, overwriting the global policy with the one of the first policy set and the second policy set. 24. The system of claim 23, wherein, the second subset of the mobile devices meet a criteria specific to mobile applications on the second subset of mobile devices. 25. The system of claim 23, wherein the policies are updated on the mobile devices after deployment. 26. The system of claim 25, wherein, the policies are updated in response to occurrence or detection of, one or more of, application upgrades, network upgrades, new device types, or new user groups. 27. A mobile device which employs policies for wireless traffic mitigation and resource consumption based on policy hierarchy, the mobile device, comprising: a processor;a memory unit having instructions stored thereon which when executed by the processor, causes the mobile device to:receive and apply a global policy set of the policies for wireless traffic mitigation and device resource consumption at the mobile device;receive and apply a first policy set of the policies applicable to the mobile device based on device type, model or platform;receive and apply a second policy set of the policies applicable to the mobile device based on a user of the mobile device;detecting that a conflict exists between either of the device policy and user policy with the global policy; andin response to detecting a conflict, overwriting the global policy with the one of the device policy and user policy.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.