Traffic Management of Third Party Applications
First Claim
1. A proxy server for routing traffic between a mobile device and a network, comprising:
- at least one processor;
a memory; and
a traffic monitoring application stored in the memory that, when executed by the at least one processor,monitors a plurality of mobile device installed applications that run on the mobile device and the mobile device installed applications'"'"' traffic;
analyzes traffic usage for the mobile device installed applications;
identifies the mobile device installed applications responsible for traffic that is excessive or unnecessary as determined by the mobile device'"'"'s service provider; and
blocks, delays, or reports the excessive and unnecessary traffic without interrupting the mobile device'"'"'s user communications.
6 Assignments
0 Petitions
Accused Products
Abstract
A proxy server for routing traffic between a mobile device and a network, comprising at least one processor, a memory, and a traffic monitoring application stored in the memory that, when executed by the at least one processor, monitors a plurality of mobile device installed applications that run on the mobile device and the mobile device installed applications'"'"' traffic, analyzes traffic usage for the mobile device installed applications, identifies the mobile device installed applications responsible for traffic that is excessive or unnecessary as determined by the mobile device'"'"'s service provider, and blocks, delays, or reports the excessive and unnecessary traffic without interrupting the mobile device'"'"'s communications.
53 Citations
20 Claims
-
1. A proxy server for routing traffic between a mobile device and a network, comprising:
-
at least one processor; a memory; and a traffic monitoring application stored in the memory that, when executed by the at least one processor, monitors a plurality of mobile device installed applications that run on the mobile device and the mobile device installed applications'"'"' traffic; analyzes traffic usage for the mobile device installed applications; identifies the mobile device installed applications responsible for traffic that is excessive or unnecessary as determined by the mobile device'"'"'s service provider; and blocks, delays, or reports the excessive and unnecessary traffic without interrupting the mobile device'"'"'s user communications. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for managing traffic of a mobile device communicating with a network, comprising:
-
monitoring by a traffic monitoring application executed on at least a processor a plurality of mobile device installed applications that run on the mobile device and traffic associated with the mobile device installed applications; analyzing traffic usage for the mobile device installed applications; identifying the mobile device installed applications responsible for traffic that is excessive or unnecessary according to the mobile device'"'"'s service carrier; and promoting the reduction of traffic for the identified mobile device installed applications that are not used by the user, that run without the user knowing, or both. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A traffic management server for promoting traffic management between a mobile device and a network, comprising:
-
at least one processor; a memory; and a traffic monitoring application stored in the memory that, when executed by the at least one processor, receives a plurality of reports from a plurality of mobile phones about a plurality of installed applications that run on the mobile phones and related traffic; aggregate the information in the reports from the mobile phones; analyze overall traffic usage for the installed applications based on the reports; determine whether one or more of the installed applications and related traffic should be considered for more analysis and traffic management; and send the mobile phones with the determined installed applications an option to join a traffic management service to optimize the traffic and network usage by controlling or limiting the traffic. - View Dependent Claims (19, 20)
-
Specification