The following relates generally to systems and methods for controlling connections to an application server.
Electronic communication devices may support client applications that, in order to communicate with other devices or entities in a communication network, are also operable to communicate with a respective backend infrastructure such as a server or other platform.
In order to provide reliable communication paths between devices and entities in the network, a connection between the device or entity and the backend infrastructure is often maintained, controlled, managed, etc. For example, in order to enable one device to participate in an exchange of data with another, individual connections between the devices and the backend infrastructure can be maintained such that the data is routed from the one device to the other device via the backend infrastructure.
Embodiments will now be described by way of example only with reference to the appended drawings wherein:
It will be appreciated that for simplicity and clarity of illustration, where considered appropriate, reference numerals may be repeated among the figures to indicate corresponding or analogous elements. In addition, numerous specific details are set forth in order to provide a thorough understanding of the example embodiments described herein. However, it will be understood by those of ordinary skill in the art that the example embodiments described herein may be practised without these specific details. In other instances, well-known methods, procedures and components have not been described in detail so as not to obscure the example embodiments described herein. Also, the description is not to be considered as limiting the scope of the example embodiments described herein.
Many communication-based applications such as instant messaging (IM) or other “chat” or conversational related applications allow a client application on a communication device, to specify, be given, or otherwise posses, various presence states or statuses, e.g., “ONLINE”, “OFFLINE”, “IDLE”, etc. In addition to enabling such states to be updated according to a user's interactions with the application, it has been found that by storing the state, if a device or application reset occurs, or a connection with an application server is disrupted or lost, upon a resumption of the application or device, the application can be restored to the previous state. In this way, the user does not need to access the application and update or otherwise change their state to have it restored.
In order to enable the user to be reachable via the communication-based applications, often a connection to a backend application server needs to be maintained or otherwise controlled. In addition to storing the application state for resuming operations and taking steps to maintain a connection during user inactivity, it has been found that an alternative communication channel, when available, can be used to enable the application to operate in a “hibernate” mode such that incoming messages can still be sent to, and received by, the device, even if a connection to the application server is not maintained, by having the backend configured to communicate via the alternative communications channel.
Although the principles discussed below are applicable to any electronic communication device, examples will be provided for a mobile communication device, which is one of many types of electronic communication devices.
For clarity in the discussion below, mobile communication devices may be commonly referred to as “mobile devices” for brevity. Examples of applicable mobile devices may include, without limitation, cellular phones, smart-phones, wireless organizers, pagers, personal digital assistants, computers, laptops, handheld or other wireless communication devices, wirelessly enabled notebook computers, portable gaming devices, tablet computers, or any other portable electronic device with processing and communication capabilities.
Turning to
The social network, which is associated with the social networking application 18, and which comprises or otherwise utilizes the backend 8, in this example, provides a chat feature (e.g., chat functionality within the social networking application 18 or a related chat-based application—not shown). The chat feature in this example is facilitated using a chat platform 14, which may comprise one or more servers or other components to enable users of the chat feature to communicate with each other using their respective devices 10, 12. The chat platform 14 facilitates normal or regular communications to and from mobile devices 10 connectable to the network 2, e.g., directly or via the communication server 4.
The backend 8 also comprises an alternative communication client 16 that is operable to communicate with mobile devices 10 connectable to the network 2, via the alternative communication service 6. In this example, the chat platform 14 can transfer or “hand off” communication responsibilities to the alternative communication client 16 to maintain a connection between the network 2 and the backend 8 without needing to maintain the normal connection between the mobile device 10 and the chat platform 14 (e.g., via a carrier or communication server 4, etc.). For example, when a particular user is not actively using the social networking application 18 on their mobile device 10, (e.g., no detected activity for a particular period of time), the connection between the mobile device 10 (e.g., via communication server 4) and the chat platform 14 can be closed, and messages or other data to be sent to that particular user can be routed to their mobile device 10 using the alternative communication client 16 and alternative communication service 6, until a resumption of activity by that particular is subsequently detected. For connections between the mobile device 10 and the chat platform 14 (e.g., via the communication server 4) that may consume relatively substantial resources on both the client side and the server side, the ability to maintain connectivity without keeping such a connection persistently alive can be particularly advantageous.
It can be appreciated that the chat platform 14 and alternative communication client 16 are shown separately in
The social networking application 18 comprises a chat UI component 24 for providing and managing one or more UIs; a data layer 26 for passing data obtained in a communication to the chat UI component 24, and enabling inputs detected via the chat UI component 24 to cause data to be created, edited, saved, communicated, etc.; a communication client 28 for communicating with the network 2 (e.g., via the communication server 4); and an alternative service listener 30 for detecting the existence of or otherwise “listening” for data inbound from the network 2 via the alternative communication service 6, as will be explained in greater detail below. The social networking application 18 in this example embodiment also stores a chat state 32 in a persistent data store 34, to enable the user's state to be restored following an application interruption such as an upgrade or other application reset, loss of power (e.g., device “power off”) or other device reset, socket connection error or other disruption, etc.
As discussed above, in order to enable a user of the social networking application 18 to at least appear to be online, whether or not they are actively using the social networking application 18, various measures can be taken to account for different circumstances. Such different circumstances may include, for example, active use of the social networking application 18, inactivity with respect to the social networking application 18, application or device resets connection errors, etc. Turning now to
At 36, the mobile device 10 enables the social networking application 18 to be used. This may include providing access to the social networking application 18 (e.g., via a link, icon, application “switch” function, etc.); active, user-related interactions with the chat UI 24 or other UIs within the social networking application 18; passive, user-related interactions with the social networking application 18 such as by providing the ability to view updates or notifications associated with the social networking application 18 (e.g., in a banner or other mobile device UI component); and passive, background interactions, such as sending and receiving data to and from the backend 8 (e.g., receiving messages from other devices 10, 12). In this example, one background interaction performed by the social networking application 18 is to store the chat state 32 at 37. For example, while the user is actively using the social networking application 18, i.e. ONLINE, or is available but IDLE, the chat state 32 can be set to ONLINE. On the other hand, if the social networking application 18 is set to be OFFLINE, the chat state 32 is set to be OFFLINE. As discussed above, by storing the chat state 32 and changes thereto while the social networking application 18 is available to be used, should an application reset, device reset, connection disruption, or any other interruption occur, upon completion of the reset or resolution of the disruption or interruption, the social networking application 18 can resume normal operation in the same state that is was prior to the reset, disruption, or interruption.
In order to enable the social networking application 18 to be used at 36 according to an “always on” model from the perspective of the backend 8 and those other devices 10, 12 connectable thereto, the mobile device 10 can monitor activity with respect to the social networking application 18, in order to determine whether operations are needed to maintain a connection since, for example, connection to components in the network 2 (e.g., communication server 4) and connections to the backend 8 may disconnect after particular periods of inactivity. Activity with respect to the social networking application 18 is determined at 38. If there is detected activity with respect to the social networking application 18, e.g., activation of a chat screen, detection of characters being entered into a chat screen, etc.; the mobile device 10 then determines at 39 if such activity is ongoing or a resumption of activity. As will be described below, measures may be taken to maintain a connection when no activity is detected with respect to the social networking application 18 and, in some circumstances, e.g., when using the alternative communication service 6, a reconnection to the chat platform 14 may be required to exit a hibernate mode. To provide a seamless transition and provide the impression that the social networking application 18 was continually connected or “always on”, upon detecting activity with respect to the social networking application 18, the mobile device 10 can initiate such a reconnection to the chat platform 14. If a reconnection is not needed, e.g., the activity detected is ongoing, the social networking application 18 may continue to be used at 36. If a reconnection is needed, a reconnection is initiated at 40 and the social networking application 18 may continue to be used at 36. It can be appreciated that the reconnection initiated at 40 may include various operations such as re-establishing a socket connection (e.g., with the communications server 4), re-establishing a connection with the chat platform 14 via a particular protocol such as XMPP, providing availability presence messages, etc. As such, reconnecting the mobile device 10 to the backend 8 at 40 may comprise any individual connection operation required to begin normal communications with the chat platform 14.
If no activity is detected at 38, the mobile device 10 may then determine at 41 if such inactivity is due to an interruption of the social networking application 18. For example, the social networking application 18 may be interrupted due to an application reset such as for upgrading or reinstalling the application, may be due to a device reset such as a restart or shut down or loss of power to the mobile device 10, may be due to a socket or other connection error, etc. If no interruption to the social networking application 18 is detected at 41, one or more operations may be performed at 42 to maintain a connection with the backend 8 while the inactivity continues. Maintaining such a connection can be done in various ways, examples of which will be explained in greater detail below.
It has also been found that in some scenarios, such as use of the alternative communication service 6 and alternative communication client 16 may have a timeout period established by the backend 8. In other words, the backend 8 may only allow use of the alternative communication client 16 to allow the mobile device 10 to operate in a hibernate mode for a predetermined period of time (e.g., a predetermined number of hours). In order to ensure that such a timeout does not occur, the mobile device 10 may determine at 39 if a reconnection is needed and, if so, a reconnection with the chat platform 14 can be initiated at 40. By maintaining a connection at 42 and, if necessary, performing periodic reconnections to the chat platform 14 at 40, the social networking application 18 can continue to be used at 36. As such, there are cases where the mobile device 10 can both maintain connections during inactivity and, if necessary, initiate reconnections with the chat platform 14. It can be appreciated that if a connection error such as a socket error occurs while maintaining the connection at 42, the mobile device 10 may automatically attempt to reconnect the social networking application 18 to the backend 8, e.g., a certain number of times before determining that a connection interruption has occurred. This may be done in addition to determining whether a reconnection is needed due to a timeout requirement by the chat platform 14.
If the mobile device 10 determines at 41 (or detects a connection error during 42) that an application interruption has occurred, the application interruption typically occurs for a period of time at 43, which may be determinate (e.g., during a reset) or indeterminate (e.g., due to a loss of power). In this example, it is assumed that the social networking application 18 resumes operation at 44, i.e. the interruption is resolved, corrected, expires, or otherwise ceases. Since the chat state 32 was stored while the social networking application 18 was available for use at 36, the mobile device 10 can restore the social networking application 18 to its previous state by determining the previous chat state 32 at 45 and having the social networking application 18 restored to that state at 46 for subsequent normal operation at 36.
For example, if the user had set themselves to be OFFLINE prior to a device upgrade or prior to turning off their mobile device 10, upon turning on their mobile device 10 subsequently, the social networking application 18 will resume operating in an OFFLINE state. If, on the other hand, the user was actively using the social networking application 18 and their state was set to ONLINE, or a connection was maintained during inactivity and their state was set to IDLE (or was otherwise “available” before the interruption), the social networking application 18 can resume operating in an ONLINE state and, if further inactivity is detected can revert to an IDLE state as will be discussed in greater detail below. In this way, the user does not have to remember to access the social networking application 18 upon an interruption being resolved to set their state or status to what it was previously.
Interactions between the mobile device 10, network 2, and backend 8 for updating the social networking application 18 state and maintaining a connection between the mobile device 10 and backend 8, are illustrated in
In addition to updating a user's state, inactivity can trigger the mobile device 10 to maintain a connection that would otherwise be dropped or disconnected after a certain period of time.
In embodiments wherein the mobile device 10 is not communicable with or otherwise does not utilize the alternative communication service 6, operations may be required to accommodate a timeout requirement by the chat platform 14 in the backend 8. For example, the chat platform 14 may close a connection with the mobile device 10 if it has not seen any activity or presence updates or other data from the mobile device 10 in a particular amount of time. To maintain the connection with the chat platform 14 (e.g., XMPP connection or via other protocol), in this example, a presence message is sent at 60 by the mobile device 10 to the backend 8 and the connection is maintained due to receipt of such a presence message at 62. Since the connection with the chat platform 14 is maintained even if there is no activity detected on the mobile device 10, upon detecting subsequent activity at 64, the user may continue to communicate via the chat platform 14 seamlessly and no further reconnections are needed.
In embodiments wherein the mobile device 10 is communicable with and utilizes the alternative communication service 6 to operate in a hibernate mode (as discussed in greater detail below), rather than sending a presence message to the chat platform 14 to maintain a connection, the mobile device 10 may send an instruction to the chat platform 14 at 60 to initiate the hibernate mode and thus hand over communications to the alternative communication client 16 and alternative communication service 6 until activity resumes. In such embodiments, the instruction is received by the backend 8 (e.g., by the chat platform 14 or alternative communication client 16) at 62. Entering hibernate mode may be performed in various ways, such as the example shown in
A resumption of the mobile device 10 and/or social networking application 18 is detected at 71. As noted above, by storing the chat state 32 the mobile device 10 can determine the previous chat state at 72 and determine at 73 if the user was previously ONLINE (e.g., ONLINE or IDLE). If the user was ONLINE or IDLE before the device or application reset, a connection can be established at 65 and 67 as discussed above. If the user was previously OFFLINE, the social networking application 18 state can be set to be OFFLINE at 74.
As discussed above, maintaining a connection between the mobile device 10 and the backend 8 at 42 can be achieved in various ways. One example 42a is shown in
In this example, once the mobile device 10 determines at 95 that a second amount of time Y has elapsed, the mobile device 10 can initiate a hibernate mode at 97 to hand off communications between the mobile device 10 and the backend 8 to the alternative communication service 6 during the inactive period. It can be appreciated that by utilizing one or more keep alive messages at 94, short periods of inactivity can be accommodated without reverting to the hibernate mode at 97. As discussed above, a timeout period may be imposed by the backend 8 during the hibernate mode. In such cases, the mobile device 10 determines, while in hibernate mode, whether or not a third amount of time Z has elapsed (e.g., 1 or more hours) since the mobile device 10 has entered the hibernate mode. If not, the mobile device 10 may continue to operate in hibernate mode at 97. If the amount of time Z has elapsed, to avoid the alternative communication channel being closed by the backend 8, the mobile device 10 initiates a reconnection with the chat platform 14 at 99. It can be appreciated that upon initiating a reconnection to the chat platform 14 at 99, the timer may be restarted at 91 and the normal communications channel again used, or, as shown in dashed lines, the mobile device 10 may continue to operate in hibernate mode at 97. By continuing to operate in hibernate mode, it can also be appreciated that additional operations may be required at 99 to have the alternative communication client 16 continue to operate rather than reverting to a normal connection via the chat platform 14.
It can also be appreciated that the example operations shown in
An example set of computer executable operations that may be executed upon initiating the hibernate mode at 97 is provided in
Upon detecting activity associated with the user of the mobile device 10 at 106, e.g., a message sent by another device 10, 12 to the mobile device 10 shown in
The mobile device 10 may then determine at 114 whether or not the social networking application 18 should be reconnected to the chat platform 14. A reconnection may be automatically established upon detecting new activity with respect to the social networking application 18 or may be initiated via user feedback, as shown by way of example below. If there is no reason to reconnect, the social networking application 18 may continue receiving messages via the alternative service listener 30 at 112, e.g., until the amount of time Z has elapsed as shown in
It can be appreciated that in addition to or rather than the prompt 124, other notifications may be provided indicative of receipt of new data related to the social networking application 18, via either the normal communication channel or the alternative communication channel.
Turning now to
In
The network 2 in the example shown in
The NOC 152 also hosts the push data service 156 which may be provided for other forms of communication, e.g., push email to and from the mobile device 10. A push client 166 is provided in the social network infrastructure 158 to enable messages destined for the mobile device 10 when that mobile device 10 is in hibernate mode, to be sent via the alternative communications channel.
In one example embodiment, the push data service 156 may be operable for continuously routing all forms of pushed information from both the push client 166 and the enterprise network 148 to the mobile device 10. One example of such a system will now be described making reference to
As can be seen in
Message C in
The mobile device 10 may be operable for communication within wireless network 170 via wireless links, as required by each wireless network 170 being used. As an illustrative example of the operation for a NOC 152 shown in
Although the above describes the enterprise network 148 as being used within a corporate enterprise network environment, this is just one embodiment of one type of host service that offers push-based messages for a handheld wireless device that is capable of notifying and preferably presenting the data to the user in real-time at the mobile device when data arrives at the enterprise network 148.
By offering a NOC 152 (sometimes referred to as a “router” or “relay”), there are a number of major advantages to both the enterprise network 148 and the wireless network 170. The enterprise network 148 in general runs a host service that is considered to be any computer program that is running on one or more computer systems. The host service is said to be running on a enterprise network 148, and one enterprise network 148 can support any number of host services. A host service may or may not be aware of the fact that information is being channelled to mobile devices 10. For example an e-mail or message program might be receiving and processing e-mail while an associated program (e.g., an e-mail wireless mobility agent) is also monitoring the mailbox for the user and forwarding or pushing the same e-mail to a mobile device 10. A host service might also be modified to prepare and exchange information with mobile devices 10 via the NOC 152, like customer relationship management software. In a third example, there might be a common access to a range of host services. For example a mobility agent might offer a WAP connection to several databases.
In data messaging environments, the NOC 152 may abstract the mobile device 10 and wireless network 170, offer push services to standard web-based server systems and allow a host service in a enterprise network 148 to reach the mobile device 10 in many countries.
The enterprise network 148 shown herein has many methods when establishing a communication link to the NOC 152. For one skilled in the art of data communications the enterprise network 148 could use connection protocols like TCP/IP, X.25, Frame Relay, ISDN, ATM or many other protocols to establish a point-to-point connection. Over this connection there are several tunnelling methods available to package and send the data, some of these include: HTTP/HTML, HTTP/XML, HTTP/Proprietary, FTP, SMTP or some other proprietary data exchange protocol. The type of enterprise networks 148 that might employ the NOC 152 to perform push could include: field service applications, e-mail services, IM services, stock quote services, banking services, stock trading services, field sales applications, advertising messages and many others. This wireless network 170 abstraction is made possible by the NOC 152, which implements this routing and push functionality. The type of user-selected data items being exchanged by the host could include: E-mail messages, instant messages, calendar events, meeting notifications, address entries, journal entries, personal alerts, alarms, warnings, stock quotes, news bulletins, bank account transactions, field service updates, stock trades, heart-monitoring information, vending machine stock levels, meter reading data, GPS data, etc., but could, alternatively, include any other type of message that is transmitted to the enterprise network 148, or that the enterprise network 148 acquires through the use of intelligent agents, such as data that is received after the enterprise network 148 initiates a search of a database or a website or a bulletin board.
The NOC 152 provides a range of services to make creating a push-based host service possible. These networks may comprise: (1) the Code Division Multiple Access (CDMA) network, (2) the Groupe Special Mobile or the Global System for Mobile Communications (GSM) and the General Packet Radio Service (GPRS), and (3) the existing and upcoming third-generation (3G) and fourth generation (4G) networks like Enhanced Data Rates for GSM Evolution (EDGE), Universal Mobile Telecommunications System (UMTS) and High-Speed Downlink Packet Access (HSDPA), Long Term Evolution (LTE), Wi-Max etc. Some older examples of data-centric networks include, but are not limited to: (1) the Mobitex Radio Network (“Mobitex”) and (2) the DataTAC Radio Network (“DataTAC”).
To be effective in providing push services for enterprise networks 148, the NOC 152 may implement a set of defined functions. It can be appreciated that one could select many different hardware configurations for the NOC 152, however, many of the same or similar set of features would likely be present in the different configurations.
Referring now to
The main processor 202 also interacts with additional subsystems such as a Random Access Memory (RAM) 206, a flash memory 208, a display 20, an auxiliary input/output (I/O) subsystem 212, a data port 214, a keyboard 216, a speaker 218, a microphone 220, GPS receiver 221, short-range communications subsystem 222 and other device subsystems 224.
Some of the subsystems of the mobile device 10 perform communication-related functions, whereas other subsystems may provide “resident” or on-device functions. By way of example, the display 210 and the keyboard 216 may be used for both communication-related functions, such as entering a text message for transmission over the wireless network 170, and device-resident functions such as a calculator or task list.
The mobile device 10 can send and receive communication signals over the wireless network 170 after required network registration or activation procedures have been completed. Network access is associated with a subscriber or user of the mobile device 10. To identify a subscriber, the mobile device 10 may use a subscriber module. Examples of such subscriber modules include a Subscriber Identity Module (SIM) developed for GSM networks, a Removable User Identity Module (RUIM) developed for CDMA networks and a Universal Subscriber Identity Module (USIM) developed for 3G networks such as UMTS. In the example shown, a SIM/RUIM/USIM 226 is to be inserted into a SIM/RUIM/USIM interface 228 in order to communicate with a network. The SIM/RUIM/USIM component 226 is one type of a conventional “smart card” that can be used to identify a subscriber of the mobile device 10 and to personalize the mobile device 10, among other things. Without the component 226, the mobile device 10 may not be fully operational for communication with the wireless network 170. By inserting the SIM/RUIM/USIM 226 into the SIM/RUIM/USIM interface 228, a subscriber can access all subscribed services. Services may include: web browsing and messaging such as e-mail, voice mail, SMS, and MMS. More advanced services may include: point of sale, field service and sales force automation. The SIM/RUIM/USIM 226 includes a processor and memory for storing information. Once the SIM/RUIM/USIM 226 is inserted into the SIM/RUIM/USIM interface 228, it is coupled to the main processor 202. In order to identify the subscriber, the SIM/RUIM/USIM 226 can include some user parameters such as an International Mobile Subscriber Identity (IMSI). An advantage of using the SIM/RUIM/USIM 226 is that a subscriber is not necessarily bound by any single physical mobile device. The SIM/RUIM/USIM 226 may store additional subscriber information for a mobile device as well, including datebook (or calendar) information and recent call information. Alternatively, user identification information can also be programmed into the flash memory 208.
The mobile device 10 is typically a battery-powered device and includes a battery interface 232 for receiving one or more batteries 230 (typically rechargeable). In at least some embodiments, the battery 68 can be a smart battery with an embedded microprocessor. The battery interface 232 is coupled to a regulator (not shown), which assists the battery 68 in providing power V+ to the mobile device 10. Although current technology makes use of a battery, future technologies such as micro fuel cells may provide the power to the mobile device 10.
The mobile device 10 also includes an operating system 234 and software components 236 to 246 which are described in more detail below. The operating system 234 and the software components 236 to 246 that are executed by the main processor 202 are typically stored in a persistent store such as the flash memory 208, which may alternatively be a read-only memory (ROM) or similar storage element (not shown). Those skilled in the art will appreciate that portions of the operating system 234 and the software components 236 to 246, such as specific device applications, or parts thereof, may be temporarily loaded into a volatile store such as the RAM 206. Other software components can also be included, as is well known to those skilled in the art.
The subset of software applications 236 that control basic device operations, including data and voice communication applications, may be installed on the mobile device 10 during its manufacture. Other software applications include a message application 238 that can be any suitable software program that allows a user of the mobile device 10 to send and receive electronic messages. Various alternatives exist for the message application 238 as is well known to those skilled in the art. Messages that have been sent or received by the user are typically stored in the flash memory 208 of the mobile device 10 or some other suitable storage element in the mobile device 10. In at least some embodiments, some of the sent and received messages may be stored remotely from the mobile device 10 such as in a data store of an associated host system that the mobile device 10 communicates with.
The software applications can further comprise a device state module 240, a Personal Information Manager (PIM) 242, and other suitable modules (not shown). The device state module 240 provides persistence, i.e. the device state module 240 ensures that important device data is stored in persistent memory, such as the flash memory 208, so that the data is not lost when the mobile device 10 is turned off or loses power.
The PIM 242 includes functionality for organizing and managing data items of interest to the user, such as, but not limited to, e-mail, contacts, calendar events, voice mails, appointments, and task items. A PIM application has the ability to send and receive data items via the wireless network 170. PIM data items may be seamlessly integrated, synchronized, and updated via the wireless network 170 with the mobile device subscriber's corresponding data items stored and/or associated with a host computer system. This functionality creates a mirrored host computer on the mobile device 10 with respect to such items. This can be particularly advantageous when the host computer system is the mobile device subscriber's office computer system.
The mobile device 10 may also comprise a connect module 244, and an IT policy module 246. The connect module 244 implements the communication protocols that are required for the mobile device 10 to communicate with the wireless infrastructure and any host system, such as an enterprise system, that the mobile device 10 is authorized to interface with.
The connect module 244 includes a set of APIs that can be integrated with the mobile device 10 to allow the mobile device 10 to use any number of services associated with the enterprise system. The connect module 244 allows the mobile device 10 to establish an end-to-end secure, authenticated communication pipe with a host system (not shown). A subset of applications for which access is provided by the connect module 244 can be used to pass IT policy commands from the host system to the mobile device 10. This can be done in a wireless or wired manner. These instructions can then be passed to the IT policy module 246 to modify the configuration of the device 10. Alternatively, in some cases, the IT policy update can also be done over a wired connection.
The IT policy module 246 receives IT policy data that encodes the IT policy. The IT policy module 246 then ensures that the IT policy data is authenticated by the mobile device 10. The IT policy data can then be stored in the flash memory 208 in its native form. After the IT policy data is stored, a global notification can be sent by the IT policy module 246 to all of the applications residing on the mobile device 10. Applications for which the IT policy may be applicable then respond by reading the IT policy data to look for IT policy rules that are applicable.
Other types of software applications or components 239 can also be installed on the mobile device 10. These software applications 239 can be pre-installed applications (i.e. other than message application 238) or third party applications, which are added after the manufacture of the mobile device 10. Examples of third party applications include games, calculators, utilities, etc.
The additional applications 239 can be loaded onto the mobile device 10 through at least one of the wireless network 170, the auxiliary I/O subsystem 212, the data port 214, the short-range communications subsystem 222, or any other suitable device subsystem 224. This flexibility in application installation increases the functionality of the mobile device 10 and may provide enhanced on-device functions, communication-related functions, or both. For example, secure communication applications may enable electronic commerce functions and other such financial transactions to be performed using the mobile device 10.
The data port 214 enables a subscriber to set preferences through an external device or software application and extends the capabilities of the mobile device 10 by providing for information or software downloads to the mobile device 10 other than through a wireless communication network. The alternate download path may, for example, be used to load an encryption key onto the mobile device 10 through a direct and thus reliable and trusted connection to provide secure device communication.
The data port 214 can be any suitable port that enables data communication between the mobile device 10 and another computing device. The data port 214 can be a serial or a parallel port. In some instances, the data port 214 can be a USB port that includes data lines for data transfer and a supply line that can provide a charging current to charge the battery 68 of the mobile device 10.
The short-range communications subsystem 222 provides for communication between the mobile device 10 and different systems or devices, without the use of the wireless network 170. For example, the subsystem 222 may include an infrared device and associated circuits and components for short-range communication. Examples of short-range communication standards include standards developed by the Infrared Data Association (IrDA), Bluetooth, and the 802.11 family of standards developed by IEEE.
In use, a received signal such as a text message, an e-mail message, or web page download may be processed by the communication subsystem 22 and input to the main processor 202. The main processor 202 may then process the received signal for output to the display 210 or alternatively to the auxiliary I/O subsystem 212. A subscriber may also compose data items, such as e-mail messages, for example, using the keyboard 216 in conjunction with the display 210 and possibly the auxiliary I/O subsystem 212. The auxiliary subsystem 212 may comprise devices such as: a touch screen, mouse, track ball, infrared fingerprint detector, or a roller wheel with dynamic button pressing capability. The keyboard 216 is an alphanumeric keyboard and/or telephone-type keypad. However, other types of keyboards may also be used, such as a virtual or “soft” keyboard rendered as images on a touch screen. A composed item may be transmitted over the wireless network 170 through the communication subsystem 22.
For voice communications, the overall operation of the mobile device 10 in this example is substantially similar, except that the received signals are output to the speaker 218, and signals for transmission are generated by the microphone 220. Alternative voice or audio I/O subsystems, such as a voice message recording subsystem, can also be implemented on the mobile device 10. Although voice or audio signal output is accomplished primarily through the speaker 218, the display 210 can also be used to provide additional information such as the identity of a calling party, duration of a voice call, or other voice call related information.
It will be appreciated that any module or component exemplified herein that executes instructions may include or otherwise have access to computer readable media such as storage media, computer storage media, or data storage devices (removable and/or non-removable) such as, for example, magnetic disks, optical disks, or tape. Computer storage media may include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data. Examples of computer storage media include RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by an application, module, or both. Any such computer storage media may be part of the mobile device 10, any component of or related to the network 2, backend 8, etc., or accessible or connectable thereto. Any application or module herein described may be implemented using computer readable/executable instructions that may be stored or otherwise held by such computer readable media.
It will also be appreciated that the example embodiments and corresponding diagrams used herein are for illustrative purposes only. Different configurations and terminology can be used without departing from the principles expressed herein. For instance, components and modules can be added, deleted, modified, or arranged with differing connections without departing from these principles.
The steps or operations in the flow charts and diagrams described herein are just for example. There may be many variations to these steps or operations without departing from the spirit of the invention or inventions. For instance, the steps may be performed in a differing order, or steps may be added, deleted, or modified.
Although the above has been described with reference to certain specific embodiments, various modifications thereof will be apparent to those skilled in the art without departing from the scope of the claims appended hereto.
Number | Name | Date | Kind |
---|---|---|---|
6732150 | Thrane | May 2004 | B1 |
7113803 | Dehlin | Sep 2006 | B2 |
7921214 | Da Palma et al. | Apr 2011 | B2 |
20040019695 | Fellenstein et al. | Jan 2004 | A1 |
20060009243 | Dahan et al. | Jan 2006 | A1 |
20080070697 | Robinson et al. | Mar 2008 | A1 |
20080147406 | Da Palma et al. | Jun 2008 | A1 |
20090209235 | Lawler et al. | Aug 2009 | A1 |
20100234018 | Lawler et al. | Sep 2010 | A1 |
20110047219 | Tripathi et al. | Feb 2011 | A1 |
Number | Date | Country |
---|---|---|
WO 2004057888 | Jul 2004 | WO |
WO 2008117116 | Oct 2008 | WO |
WO 2009049380 | Apr 2009 | WO |
Entry |
---|
Iapichino, G.; Search Report from corresponding European Application No. 11158739.0; search completed Jul. 26, 2011. |
Webster, Scott; “Facebook adds chat and push notifications to Android app”; Dec. 15, 2010; http://www.cnet.com/8301-19736—1-20025786-251.html#ixzz1lm13ppLp. |
“Integrating with Facebook Chat—Facebook Developers”; Apr. 6, 2011; http://developers.facebook.com/docs/chat/; Accessed online Feb. 8, 2011. |
“XMPP becoming common standard for real-time chat applications”; Sep. 12, 2010; http://www.anas.co.in/2010/09/xmpp-becoming-common-standard-for-real.html. |
“BeejivelM—Android Market”; Apr. 6, 2011; https://market.android.com/details?id=com.beejive.im; online at least as early as Feb. 2011. |
“BeejiveIM for Facebook Chat—Android Market”; Apr. 6, 2011; https://market.android.com/details?id=com.beejive.im.fbchat; online at least early as Feb. 2011. |
“eBuddy Messenger—Android Market”; Apr. 6, 2011 https://market.android.com/details?id=com.ebuddy.android; online at least early as Feb. 2011. |
“Chat on Facebook on BerryReview App Superstore”; Apr. 6, 2011; http://store.berryreview.com/product.asp?id=106906&n=Facebook-Chat-Pro; online at least early as Feb. 2011. |
“IM+iPhone application—AppStoreHQ”; Apr. 6, 2011; http://www.appstorehq.com/im--iphone-128/app; online at least as early as Feb. 2011. |
Number | Date | Country | |
---|---|---|---|
20120239817 A1 | Sep 2012 | US |