Method and system for enabling data usage accounting
First Claim
1. A method for enabling data usage accounting, comprising:
- on a computing device that has secure applications and unsecure applications installed thereon, receiving through a secure application a request for a data session, wherein the secure application includes an encapsulated target application in which system calls of the target application are selectively overridden;
wherein the secure application performs or facilitates the following;
intercepting the request for the data session;
modifying the request for the data session to cause the request to be re-directed back to the secure application;
initiating a connection to enable retrieval of data in response to the request and to enable an accounting of the data session;
creating a listening socket and wherein modifying the request for the data session comprises re-writing the addressing information of the request for the data session to point to the listening socket;
determining that the computing device is connected to a Wi-Fi connection; and
activating a setting that prevents intercepting the request for the data session and modifying the request for the data session from occurring.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system for enabling data usage accounting are described herein. As an example, the method can be practiced on a computing device that has secure applications and unsecure applications installed thereon. Initially, a request for a data session can be received through a secure application. The request for the data session can be intercepted, and the request for the data session can be modified to cause the request to be re-directed back to the secure application. In addition, a connection can be initiated to enable retrieval of data in response to the request and to enable an accounting of the data session. In one arrangement, this process of modifying the request for a data session may be restricted to secure applications such that data usage of the secure applications is tabulated separately from data usage associated with the unsecure applications.
306 Citations
8 Claims
-
1. A method for enabling data usage accounting, comprising:
-
on a computing device that has secure applications and unsecure applications installed thereon, receiving through a secure application a request for a data session, wherein the secure application includes an encapsulated target application in which system calls of the target application are selectively overridden; wherein the secure application performs or facilitates the following; intercepting the request for the data session; modifying the request for the data session to cause the request to be re-directed back to the secure application; initiating a connection to enable retrieval of data in response to the request and to enable an accounting of the data session; creating a listening socket and wherein modifying the request for the data session comprises re-writing the addressing information of the request for the data session to point to the listening socket; determining that the computing device is connected to a Wi-Fi connection; and activating a setting that prevents intercepting the request for the data session and modifying the request for the data session from occurring. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computing device, comprising:
-
a display that is configured to display both secure and unsecure applications that are installed on the computing device, wherein a secure application includes an encapsulated target application in which system calls of the target application are selectively overridden; a processor that is communicatively coupled to the display, wherein the processor is configured to cause the secure application to perform or facilitate the following; receive a data access request through one of the secure applications; transparently redirect the data access request back to the secure application by intercepting the data access request and modifying the data access request to cause the data access request to be re-directed back to the secure application; initiate a connection of the secure application to enable an accounting of data associated with the data access request such that data usage of the secure application is tabulated separately from data usage associated with the unsecure applications; create a listening socket and modify the data access request by re-writing addressing information of the data access request to point to the listening socket; determine that the computing device is connected to a Wi-Fi connection; and activate a setting that prevents the interception of the data access request and the modification of the data access request from occurring. - View Dependent Claims (7, 8)
-
Specification