Abstract:
Embodiments of the present invention are directed to a tethering enforcement device controller and methods thereof. The tethering enforcement device controller (TEDC) is installed on a primary device, or otherwise known as the tethered device. The TEDC is configured to detect, control and block unauthorized or inappropriate tethering with a secondary device, or otherwise known as the tethering device, via either a native or a third-party tethering application, by retrieving a configuration file from a server associated with a wireless carrier. The configuration file typically includes customer profile and currently blacklisted package names of third-party tethering applications. The customer profile typically includes subscription information, including use of tethering services. If the customer is trying to tether and tethering is not allowed, then the TEDC will prevent the secondary device from tethering with the primary device. In some embodiments, the TEDC is an untethering application installed on the primary device.
Abstract:
Embodiments of the present invention are directed to an apparatus, system and method of aggregating address book sources. Contact entries from these sources are retrieved by a server. There can be multiple contact entries for the same contact. Without modifying the original contact entries, the server links together similar contact entries such that these similar contact entries are virtually aggregated but not physically merged. An aggregated address book at the server includes a distinct contact entry for each contact and can be viewed from one or more end-user devices either in a browser or in a client application. One or more address book sources are automatically updated based on changes made to the aggregated address book at the server from an end-user device. The aggregated address book is also automatically updated based on changes made at one or more of the address book sources.
Abstract:
Embodiments of the present invention are directed to a unified messaging proxy and a method thereof. The unified messaging proxy advantageously enables a user to be communicatively coupled with the same account on a messaging platform using multiple end user devices at the same time, allowing the user to read messages on a first end user device and send messages from a second end user device. The unified messaging proxy manages the multiple end user devices and intercepts all messages to and from the multiple end user devices and the messaging platform. From its perspective, the messaging platform only sees a single client messaging application.
Abstract:
Embodiments of the present invention relate to server controlled adaptive back off for overload protection. The server controls a back off period for each request, which indicates a retry time of when a request should be resent to the server. This back off approach relies on the server since the server has much more accurate information available on which to make back off decisions. The server changes the retry time based on how busy it is and its ability to handle the current load and/or its downstream dependent systems. This back off approach increases server stability during a very high load by spreading the load out over a longer time period. The server is able to turn a traffic spike into a constant load, which is easier and more efficient for the server to handle.
Abstract:
A computer implemented method and system for uniform, consistent, stateless, and deterministic consistent hashing for fixed size partitions. The method comprises receiving server information for a plurality of servers in a server pool; ordering the server information for the plurality of servers; calculating a mean number of partitions per server in the server pool; calculating a first maximum allowed number of partitions for a server by applying a floor function to the calculated mean number of partitions per server in the server pool; in the order of the ordered server information, assigning partitions to servers based on a hashing function, using the first maximum allowed number of partitions per server; calculating a second maximum allowed number of partitions for a server by applying a ceiling function to the calculated mean number of partitions per server in the server pool; in the order of the ordered server information, assigning partitions to servers based on a hashing function, using the second maximum allowed number of partitions per server; and assigning unassigned partitions wherein assigning comprises: for each unassigned partition, mapping the partition to a server with the least number of assigned partitions at a time of the mapping.
Abstract:
A computer implemented method and system for near field communication authentication sharing techniques is disclosed. The method comprises providing user credentials to access an application on a first device; sending a request to share the authentication with a second device; in response to the request, receiving an authentication code; and transmitting the authentication code to the second device, wherein sharing enables the second device to access the application on the second device without providing user credentials.
Abstract:
A computer implemented method and system for maximizing a number of connections that can be executed from a mobile application is disclosed. The method comprises determining whether a connection slot is available for a received call request; executing the call when a connection slot is available; processing the call request when a connection slot is not available, where processing comprises: determining a priority level for the request; when the determined priority level is a low priority, putting the request in a queue for later processing; and when the determined priority level is a high priority, when a low priority call is in progress, performing the steps of: canceling the in-progress low priority call; placing the cancelled low priority call in a queue for later processing; and executing the high priority call; and when no low priority call is in progress, placing the high priority call request in the queue.
Abstract:
A computer implemented method and system for maximizing a number of connections that can be executed from a mobile application is disclosed. The method comprises determining whether a connection slot is available for a received call request; executing the call when a connection slot is available; processing the call request when a connection slot is not available, where processing comprises: determining a priority level for the request; when the determined priority level is a low priority, putting the request in a queue for later processing; and when the determined priority level is a high priority, when a low priority call is in progress, performing the steps of: canceling the in-progress low priority call; placing the cancelled low priority call in a queue for later processing; and executing the high priority call; and when no low priority call is in progress, placing the high priority call request in the queue.
Abstract:
Systems and methods for providing secure offline file access utilizing information rights management (IRM) are provided herein. In some embodiments, the method may comprise storing one or more IRM-protected documents in a secure local storage on a user device; storing one or more consumption licenses associated with the one or more IRM-protected documents in the secure local storage on the user device, wherein the one or more consumption licenses is required to access one or more IRM-protected documents; detecting a loss of network connectivity on the user device; writing the one or more consumption licenses to an IRM location in memory on the user device; receiving a request to open a document of the one or more IRM-protected documents; reading the consumption license from the IRM location in memory; and enabling access to the requested IRM-protected document based on the consumption license.
Abstract:
A method and system for managing email or other messaging and attachments to messages which are forwarded to devices having limited processing and memory capacity. The method includes the steps of: receiving a user configuration categorizing messages for the user by elements of the message; accessing the user message datastore upon receipt of at least one new message for the user to a user data store; comparing said at least one new message to a set of user specific rules; rendering a message summary including at least one link accessible by the processing device, the link enabling action with respect to the message when selected by the user; and outputting the message summary to a user device.