Optimizing keepalive and other background traffic in a wireless network
First Claim
1. A method of optimizing network transactions originating at a mobile device, comprising:
- categorizing a network transaction from an application as a safe or an unsafe network transaction, wherein a safe network transaction is a candidate for network transaction optimization and wherein categorizing the network transaction includes;
gathering a number of messages associated with the network transaction;
determining a rule set including one or more rules using rule learning to identify messages associated with a safe network transaction and messages associated with an unsafe network transaction;
calculating, for each rule in the rule set, a probability of success and a confidence probability threshold;
determining whether to apply each rule in the rule set based on the calculated probability of success compared with the confidence probability threshold;
blocking a safe network transaction from being transmitted to a server over a wireless network for network transaction optimization;
wherein blocking the safe network transaction includes blocking a port of the application or blocking the application until an unblocking event is detected;
wherein the unblocking event is not associated with the end of a defined duration of time; and
wherein blocking the safe network transaction includes applying the rule set to messages not used for rule learning.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for optimizing keepalives or other non-interactive or background traffic from applications on a mobile device are disclosed. A keepalive optimizer can detect keepalive and other background traffic and optimize such traffic by blocking keepalives, advancing or delaying execution of keepalives, delaying repeatable background requests based on radio state, device state or characteristics, policy, transaction characteristics, application characteristics, and/or the like. The disclosed keepalive optimization methods facilitate management of traffic and/or conservation of resources on the mobile device and the network. The keepalive optimization can be performed by an application sending the keepalives or by a local proxy on the mobile device.
38 Citations
21 Claims
-
1. A method of optimizing network transactions originating at a mobile device, comprising:
-
categorizing a network transaction from an application as a safe or an unsafe network transaction, wherein a safe network transaction is a candidate for network transaction optimization and wherein categorizing the network transaction includes; gathering a number of messages associated with the network transaction; determining a rule set including one or more rules using rule learning to identify messages associated with a safe network transaction and messages associated with an unsafe network transaction; calculating, for each rule in the rule set, a probability of success and a confidence probability threshold; determining whether to apply each rule in the rule set based on the calculated probability of success compared with the confidence probability threshold; blocking a safe network transaction from being transmitted to a server over a wireless network for network transaction optimization; wherein blocking the safe network transaction includes blocking a port of the application or blocking the application until an unblocking event is detected; wherein the unblocking event is not associated with the end of a defined duration of time; and wherein blocking the safe network transaction includes applying the rule set to messages not used for rule learning. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A mobile device implementing network transaction optimization, comprising:
-
a processor configured to categorize a network transaction from an application as a safe network transaction or an unsafe network transaction; wherein a safe network transaction is a candidate for network transaction optimization; the processor further configured to; wherein categorizing the network transaction includes gathering a number of messages associated with the network transaction, and determining a rule set including one or more rules using rule learning to identify messages associated with a safe network transaction and messages associated with an unsafe network transaction; calculating, for each rule in the rule set, a probability of success and a confidence probability threshold; determining whether to apply each rule in the rule set based on the calculated probability of success compared with the confidence probability threshold; block a safe network transaction from being transmitted to a server over a wireless network for network transaction optimization wherein blocking the safe network transaction includes blocking a port of the application or blocking the application until an unblocking event is detected; wherein the unblocking event is not associated with the end of a defined duration of time; and wherein blocking the safe network transaction includes applying the rule set to messages not used for rule learning. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer-readable storage medium storing instructions that when executed by a processor, causes the processor to:
-
categorize a network transaction from an application as a safe or an unsafe network transaction, wherein a safe network transaction is a candidate for network transaction optimization and wherein categorizing the network transaction includes; gathering a number of messages associated with the network transaction; determining a rule set including one or more rules using rule learning to identify messages associated with a safe network transaction and messages associated with an unsafe network transaction; calculating, for each rule in the rule set, a probability of success and a confidence probability threshold; determining whether to apply each rule in the rule set based on the calculated probability of success compared with the confidence probability threshold; block a safe network transaction from being transmitted to a server over a wireless network for network transaction optimization; wherein blocking the safe network transaction includes blocking a port of the application or blocking the application until an unblocking event is detected; wherein the unblocking event is not associated with the end of a defined duration of time and wherein blocking the safe network transaction includes applying the rule set to messages not used for rule learning.
-
Specification