[미국특허]
Traffic management of third party applications
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-029/08
H04W-004/20
H04W-024/08
H04M-001/725
H04L-012/26
H04L-012/801
H04L-012/823
출원번호
US-0563709
(2012-07-31)
등록번호
US-9413839
(2016-08-09)
발명자
/ 주소
Annan, Brandon C.
Belser, John E.
Otten, Tammy M.
Sullivan, Ryan P.
출원인 / 주소
Sprint Communications Company L.P.
인용정보
피인용 횟수 :
11인용 특허 :
52
초록▼
A proxy server for routing traffic between a mobile device and a network, comprising at least one processor, a memory, and a traffic monitoring application stored in the memory that, when executed by the at least one processor, monitors a plurality of mobile device installed applications that run on
A proxy server for routing traffic between a mobile device and a network, comprising at least one processor, a memory, and a traffic monitoring application stored in the memory that, when executed by the at least one processor, monitors a plurality of mobile device installed applications that run on the mobile device and the mobile device installed applications' traffic, analyzes traffic usage for the mobile device installed applications, identifies the mobile device installed applications responsible for traffic that is excessive or unnecessary as determined by the mobile device's service provider, and blocks, delays, or reports the excessive and unnecessary traffic without interrupting the mobile device's communications.
대표청구항▼
1. A proxy server for monitoring and controlling data traffic transmitted to a mobile device from a network, comprising: at least one processor;a memory; anda traffic monitoring application stored in the memory that, when executed by the at least one processor, monitors information received from a p
1. A proxy server for monitoring and controlling data traffic transmitted to a mobile device from a network, comprising: at least one processor;a memory; anda traffic monitoring application stored in the memory that, when executed by the at least one processor, monitors information received from a processor on the mobile device, wherein the information comprises information for a plurality of applications installed on the mobile device and information regarding the data traffic transmitted to each of the plurality of applications on the mobile device;assigns a classification to each application of the plurality of applications based on the information received from the processor on the mobile device, wherein each classification includes a threshold for data traffic;analyzes the data traffic transmitted to each application of the plurality of applications;compares the data traffic for each application to a corresponding threshold for each application;in response to the comparison, identifies applications of the plurality of applications that have the data traffic exceeding the corresponding thresholds; andselectively blocks or delays the data traffic to the identified applications without interrupting traffic to other applications on the mobile device. 2. The proxy server of claim 1, wherein the identified applications execute in the background on the mobile device. 3. The proxy server of claim 1, wherein the threshold is based on a maximum data rate, a maximum data volume over a time period, or a maximum transmission frequency. 4. The proxy server of claim 1, wherein the traffic monitoring application further: monitors a plurality of second applications that run on a second mobile device and the second applications' traffic;assigns a classification to each of the plurality of second applications based on information received from a second processor on the second mobile device;identifies second applications of the plurality of second applications having data traffic exceeding corresponding thresholds; andselectively blocks, delays, or reports the data traffic to the identified second applications without interrupting traffic to other applications on the second mobile device. 5. The proxy server of claim 4, wherein the data traffic for the identified applications on the mobile device and the second identified applications on the second mobile device is blocked or delayed when the mobile device and the second mobile device elect to register with the proxy server for traffic management. 6. The proxy server of claim 1, wherein an Internet Protocol (IP) address is appended to Hypertext Transfer Protocol (HTTP) proxy settings of the mobile device to register the mobile device with the proxy server, and wherein the data traffic is transferred between the mobile device and the network at the proxy server using IP addresses that indicate the plurality of applications for the traffic. 7. A method for managing traffic of a mobile device communicating with a network, comprising: monitoring, by a traffic monitoring application executed on a processor, a plurality of applications installed on the mobile device and information regarding data traffic associated with the plurality of applications;analyzing, by the traffic monitoring application, the data traffic for the plurality of applications;comparing, by the traffic monitoring application, the data traffic for each application of the plurality of applications to a corresponding data traffic threshold for each application;in response to the comparison, identifying applications of the plurality of applications that have the data traffic exceeding the corresponding data traffic thresholds; andselectively reducing the data traffic for each identified application that is not initiated by the user or that runs in the background without interrupting traffic to other applications on the mobile device. 8. The method of claim 7, wherein the identified applications comprise third party applications provided by a plurality of developers other than a manufacturer of the mobile device or a service provider of the network. 9. The method of claim 7, wherein monitoring the plurality of applications comprises monitoring a number of running applications and an amount of outgoing and incoming data traffic of each of the plurality of applications. 10. The method of claim 7, wherein each of the plurality of applications are monitored during one or more monitored time periods that correspond to peak data traffic periods on the network. 11. The method of claim 7, wherein each of the plurality of applications are monitored during low activity operation conditions of the mobile device, wherein the low activity operation conditions comprise at least one time period when: the mobile device's display screen is turned off, the mobile device's accelerometer shows no movement, the mobile device's battery usage is relatively low, or the mobile device's Wireless Fidelity (WiFi) connectivity is turned off. 12. The method of claim 7, wherein analyzing the data traffic for the plurality of applications comprises: aggregating the data traffic for different applications and different monitored time periods to obtain average traffic usage patterns for the plurality of applications on the mobile device; anddetermining an impact of data traffic usage of the plurality of applications on the network. 13. The method of claim 7, wherein reducing the data traffic for the identified applications comprises blocking data traffic for applications on a list of blocked applications, data traffic for applications that do not correspond to a list of allowed applications, or both. 14. The method of claim 7, wherein reducing the data traffic for the identified applications comprises queuing and delaying transmission of the data traffic to reduce the frequency of transmitting the data traffic. 15. The method of claim 7, wherein reducing the data traffic for the identified applications comprises: contacting developers of the identified applications to work on improving performance of the identified applications to reduce the data traffic; andoffering the developers incentives, discouraging the developers, or both to improve the performance of the identified applications. 16. The method of claim 7, wherein the method is implemented by the traffic monitoring application that runs on the mobile device, and wherein the traffic monitoring application is part of an interface and applications pack. 17. The method of claim 7, further comprising: aggregating, by at least one server on the network, data traffic for a plurality of mobile devices and analyzing the data traffic usage for the plurality of mobile devices, wherein analyzing comprises evaluating a load on one or more cell towers. 18. A traffic management server for promoting traffic management between a mobile device and a network, comprising: at least one processor;a memory; anda traffic monitoring application stored in the memory that, when executed by the at least one processor, configures the processor to: receive a plurality of reports from a plurality of mobile phones about a plurality of applications that run on the plurality of mobile phones and information regarding data traffic for the plurality of applications;aggregate the information in the reports from the plurality of mobile phones;analyze overall data traffic usage for the plurality of applications based on the reports;determine that applications of the plurality of applications and related data traffic should be considered for more analysis and traffic management;in response to the determination that the applications and related traffic should be considered for further analysis and traffic management, send an invitation to the plurality of mobile phones associated with the applications to join a traffic management service to optimize data traffic and network usage by controlling or limiting the data traffic;in response to receiving an acceptance of the invitation, compare the data traffic for each application of the applications to a corresponding data traffic threshold for each application;in response to the comparison, identify one or more of the applications that have the data traffic exceeding the corresponding data traffic threshold; andselectively delay or block the data traffic for each identified application without interrupting traffic to other applications on the plurality of mobile phones. 19. The traffic management server of claim 18, wherein the data traffic for each identified application is managed to reduce data traffic usage without forcing the plurality of mobile phones to switch from a first selected connection into a less secure or more limited connection.
Cha, Tae-Woo; Landers, R. Brian; McMullen, Michael P.; Ochenas, Jonathan C.; Simeroth, Kristin L., Device experience adaptation based on schedules and events.
Cha, Tae-Woo; Landers, R. Brian; McMullen, Michael P.; Ochenas, Jonathan C.; Simeroth, Kristin L., Device experience adaptation based on schedules and events.
Delker, Jason R.; Hacking, Lars J.; Ng, Sei Y.; Stone, Jeffrey M.; Syromiatnikov, Peter S., Dynamic loading, unloading, and caching of alternate complete interfaces.
Dusse, Steve; King, Peter F.; Schwartz, Bruce V.; Martin, Jr., Bruce K., Method and system facilitating web based provisioning of two-way mobile communications devices.
Haldar,Debashis; Zhang,Baoquan; Sladek,Thomas M.; Woodson,Charles E.; Marsee,Mark; McConnell,Von K., Method and system for changing a service account profile from a station operated under another service account.
Lamb,Robert C.; Barbeau,Pierre, Method and system for customizing a wireless device's user-interface based on which vendor distributed the wireless device.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Davis, John Mark; Dryden, Daniel L.; McMullen, Michael P.; Ng, Sei Y.; Pennington, Susan J., Mirroring device interface components for content sharing.
Grechishkin, Alexander V.; Koryakin, Alexey B.; Dobrovolskiy, Nikolay N.; Omelyanchuk, Andrey A.; Tormasov, Alexander G.; Beloussov, Serguei M., Seamless integration and installation of non-host application into native operating system.
Grechishkin, Alexander V.; Koryakin, Alexey B.; Dobrovolskiy, Nikolay N.; Omelyanchuk, Andrey A.; Tormasov, Alexander G.; Beloussov, Serguei M., Seamless integration and installation of non-native application into native operating system.
Garbow, Zachary A.; Logan, Bryan M.; Nixa, Terrence T.; Paterson, Kevin G., Systems, methods and computer products to automatically complete a GUI task.
Bye, Stephen J.; Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C.; Shipley, Trevor D., Systems and methods for provisioning and using multiple trusted security zones on an electronic device.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.