throbber
MANAGING AND IMPROVING NETWORK RESOURCE UTILIZATION,
`
`PERFORMANCE AND OPTIMIZING TRAFFIC IN WIRE LINE AND WIRELESS
`
`NETWORKS WITH MOBILE CLIENTS
`
`In the art today there are performance-enhancing proxies, general standards for
`
`improvements of TCP performance in wired and wireless networks, content optimize
`
`some of which use clients and some of which are clientless. Many of these can look at
`
`network performance to enhance the optimization they provide. Many of these can have
`
`a client or operate clientless. Almost all, if not all, are focused on optimization based on
`
`only a one-sided view of the networks connected to such a platform — either outbound
`
`wired, inbound/outbound wireless or based solely on the cooperation with a client.
`
`Embodiments of the present invention provide a unique system that optimizes all
`
`aspects of the connection with wired and wireless through a complete view of activity
`
`including loading, current application needs on a client, controlling the type of access
`
`(push vs. pull or hybrid), location, concentration of users in a single area, time of day,
`
`and using this information to shape traffic to a cooperative client/server or
`
`simultaneously mobile devices without a cooperative client. Because the server is not
`
`tied to any specific network provider it has visibility into the network performance
`
`across all service providers enables optimizations to be applied to devices regardless of
`
`the operator or service provider enhancing the user experience and managing network
`
`utilization while roaming. Bandwidth has been considered the major issue in wireless
`
`networks today. More and more research has been done related to the need for
`
`additional bandwidth to solve access problems — many of the performance enhancing
`
`solutions and next generation standards, such as LTE and WiMAX are focused
`
`providing increased bandwidth. However, history has proven that this simply doesn't
`
`solve the problem. The problem is lack of bandwidth on the signaling channel more so
`
`than the data channel.
`
`Page 1 of 49
`
`GOOGLE EXHIBIT 1008
`
`

`

`Embodiments of the present invention align requests from multiple applications to
`
`minimize the need for several polling request; leverage specific content types to
`
`determine how to proxy/manage a connection/content; and apply specific heuristics
`
`associated with both device and network parameters.
`
`Embodiments of the present invention move recurring http polls done by various
`
`widgets, RSS readers etc. to a fixed internet (NOC), thus considerably lowering device
`
`battery and bandwidth usage. Additionally, embodiments of the present invention do
`
`this transparently so that existing applications do not need to be changed. This can be
`
`done by implementing a local proxy on the device which automatically detects recurring
`
`requests for the same content (RSS feed, Widget data set) that matches a specific rule
`
`(e.g. happens every 15 minutes) and automatically delegates the polling to the server.
`
`The server would then notify the mobile proxy if the content changes and if content has
`
`not changed the proxy provides the latest version in its cache (without need to utilize
`
`the radio at all). This way the handset does not need to open up or use data connection
`
`if the request is for content that we monitor and that our service has not flagged as
`
`new/changed.
`
`The logic for automatically adding URL's/content to be monitored can check for various
`
`things like -how often the content is the same, -how often the same request is made (is
`
`there a fixed interval/pattern) -which application is requesting the data. Similar rules to
`
`skip using the cache and request the data from the original source may also be used. For
`
`example, when the request comes at unscheduled/expected time (user initiated check),
`
`or after every n consecutive times the response has been provided from the cache etc.
`
`As more and more mobile applications base their features on easily available resources
`
`in the network this becomes increasingly important. Embodiments of the present
`
`invention also remove unnecessary chatter from the airwaves benefitting the operators
`
`trying to optimize the wireless spectrum usage.
`
`Page 2 of 49
`
`

`

`The present invention includes a distributed proxy for network traffic optimization. The
`
`main components include a proxy client running on a device, a proxy server running in
`
`the network, and an internal protocol between the proxy client and the proxy server.
`
`The proxy client includes connection management functionality, application protocol
`
`logic modules, a local database, and an interface to retrieve information on device
`
`properties (information on e.g. battery level, whether the device is being actively used or
`
`not, registered network). The proxy servers includes connection management
`
`functionality, application protocol logic modules, a connection and content metadata
`
`database, and a device information database.
`
`In general operation, the proxy client is art application independent proxy that 3rd party
`
`applications can use to open any TCP connection to any host. The proxy client will
`
`detect the type of traffic and utilize an appropriate application protocol module to
`
`process the traffic. With the chosen logic module, the proxy client may process the data
`
`locally and generate necessary talkback communication using its local database,
`
`communicate the processed data along with device properties to the proxy server using
`
`the internal protocol, modify or delay any data before sending it to the proxy server,
`
`detect usage patterns between similar connections and provide this to the proxy server
`
`as connection metadata, or any combination of the above.
`
`If the proxy server is contacted regarding processing the original connection, the proxy
`
`server will utilize art appropriate application protocol module to process the traffic.
`
`With the chosen logic module, the proxy server may contact the intended target of the
`
`connection and route the data from the proxy client to the target, generate talkback
`
`communication using its local database, modify or delay any talkback communication
`
`data based on the device properties, and based on the connection metadata, start
`
`background processing to gather data for later use with similar connections, as well as
`
`any combination of the above.
`
`Page 3 of 49
`
`

`

`Both the proxy client and the proxy server (in case involved) will continue to observe
`
`and process the data using the application protocol modules for the entire duration of
`
`the connection. After the original connection no longer exists, the proxy client and
`
`proxy server may still share information about the ceased connection and its properties
`
`for later use with similar connections. In this mode of operation, the proxy server may
`
`signal the proxy client that some data in its local database is no longer up to date.
`
`From the 3rd party applications' point of view, the proxy is transparent and no
`
`modifications are needed in the way the applications use the connections. 3rd party
`
`applications may provide additional information about the connection characteristics to
`
`the proxy client.
`
`The present invention offers benefits with respect to network usage in by serving
`
`requests from the local database, the proxy client reduces the number of requests that
`
`are done over the wireless network. Further, the proxy client and the proxy server may
`
`filter irrelevant data from the communicated data. The proxy client and the proxy
`
`server may also cumulate low priority data and send it in batches to avoid protocol
`
`overhead of sending individual data fragments. The proxy client and the proxy server
`
`may compress or transcode the traffic reducing the amount of data sent over wireless
`
`network. The signaling traffic in wireless network is reduced as the wireless network is
`
`used less often by optimizing small bursts away and the network traffic cart be
`
`synchronized among individual applications.
`
`With respect to battery life, by serving requests from the local database, the proxy client
`
`reduces the number of times the radio module is powered up. The proxy client and the
`
`proxy server may cumulate low priority data and send it in batches to minimize the time
`
`when the radio is powered up. The proxy client may synchronize the network usage by
`
`performing the batched data transfer for all connections simultaneously.
`
`Page 4 of 49
`
`

`

`The present invention may be used in the case of home screen widget polling for data
`
`using HTTP. In the normal flow of operation, the widget performs a HTTP request to
`
`the data provider server. If the data has been updated, the widget refreshes itself. The
`
`widget waits for a small period of time and starts over at the initial step. With respect to
`
`using a distributed proxy, the widget performs a HTTP request via the proxy client. The
`
`proxy client detects the connection type to be a HTTP GET request. The proxy client
`
`checks the local database for any previous information about the request.
`
`If the locally stored response is not available, the client updates all information about the
`
`request and the time it was made for later use. The client sends the request to the proxy
`
`server and the server performs the request and returns the results. The client stores
`
`information about the result and returns the result to the requestor. If the same request
`
`has occurred multiple times recently and it has often yielded same results, the client
`
`notifies the proxy server that the request should be monitored for result changes. If the
`
`request was marked for monitoring, the client will store the results into its local
`
`database. If the locally stored response is available, the client will return the response
`
`from the local database without performing communication over the wireless network.
`
`Independently of the widget or client operation, the server proxy will perform the
`
`requests marked for monitoring to see whether the response has changed. Whenever an
`
`unexpected response is received for some request, the server will notify the client that
`
`the response has changed and that the locally stored response on the client should be
`
`erased or replaced with new response. The benefit of using the distributed proxy in this
`
`case is that the wireless network is only used whenever the content for the widget has
`
`actually changed, the traffic required to check for the changes is not done over the
`
`wireless network. This reduces the amount of generated network traffic and shortens
`
`the total time and the number of times the radio module is powered up on the device
`
`thus saving battery.
`
`Page 5 of 49
`
`

`

`With respect to polling for changes in a mailbox, in the normal flow of operation, the
`
`mail client opens a connection to the mail server, the mail client authenticates with the
`
`server and queries for new email, and if new mail has arrived, a notification is shown.
`
`The mail client then closes the connection. The mail client waits for a period of time and
`
`starts over. A variation is to leave the connection open and start over at the second step
`
`after a predetermined period of time.
`
`In the context of a distributed proxy, the mail client opens a connection to the mail
`
`server via the proxy client, the proxy client detects the traffic type and the chosen
`
`application logic module simulates a mail server authentication, the proxy client looks
`
`up from the local database whether information about the particular mail connection is
`
`available. If the information is not available, the connection is routed to the proxy
`
`server, the proxy server establishes a connection to the mail server and performs
`
`authentication using the data from the mail client, the data between the mail client and
`
`the mail server is directly routed through the proxy connection, and when the mail client
`
`closes the connection, the proxy client may choose to leave the actual connection to the
`
`backend open and store information about the connection into the local database for
`
`later use if the same mail connection has been used frequently. If the information is
`
`available, the client proxy will continue to simulate mail server responses for the mail
`
`client for all queries that it has the data available. If the mail client performs any
`
`operation that cannot be simulated by the proxy client, the proxy client will route the
`
`data to the proxy server and the proxy server will pass the data to the mail server and
`
`route the data between the two. The proxy server may need to re-establish the
`
`connection to the mail server at this point. When the mail client closes the connection,
`
`the proxy client may choose to continue to store information about the connection for
`
`later use or it may request the proxy server to terminate the mail server connection and
`
`remove any information about the connection from the database.
`
`Page 6 of 49
`
`

`

`Independently of the mail client or the proxy client, the proxy server will query the mail
`
`server for any changes that the mail client has previously queried. If any information in
`
`the mail server has changed, the proxy server will notify the proxy client to stop
`
`simulating any responses based on locally cached data in order to let the mail client
`
`receive the changed data from the mail server.
`
`The present invention mitigates application protocol keep-alive traffic. Existing
`
`application protocols may provide long-lived connections that allow servers to push
`
`updated data to the client without the need of the client to periodically re-establish the
`
`connection or to periodically query for changes. However, the client needs to be sure
`
`that the connection remains usable by periodically sending some data, often called a
`
`keep-alive message, to the server and making sure the server is receiving this data.
`
`While the amount of data sent for a single keep-alive is not a lot and the keep-alive
`
`interval for an individual application is not too short, the cumulative effect of multiple
`
`applications performing this individually will amount to small pieces of data being sent
`
`very frequently. Frequently sending bursts of data in a wireless network results in high
`
`battery consumption due to the constant need of powering the radio module. Each
`
`burst will also require a significant amount of signaling traffic in a wireless network
`
`compared to the actual data being sent. By using the distributed proxy model, the proxy
`
`client can prevent the keep-alives from being sent over the network and the proxy server
`
`can generate independently the required keep-alive messages to maintain the actual
`
`backend connection.
`
`In alternative embodiments, the proxy client can be implemented directly into the
`
`TCP/IP stack of the device operating system. The proxy client can be bundled into a
`
`wireless modem to provide transparent use for the device operating system. The proxy
`
`client can also be bundled into a firewall or a router to provide transparent use for the
`
`device operating system.
`
`Page 7 of 49
`
`

`

`rre;
`
`/-(/
`A 4j /4/) 4 4.////: A (cid:9)
`
`%
`
`c4 A (cid:9)
`r (cid:9)
`
`d (cid:9)
`
`r* -v/ (cid:9)
`kill
`
`A
`
`d 1,A A A
`
`A
`
`The recent proliferation of smart device (iPhone, Android and
`others) have huge negative impact on the network, device and
`user
`
`• Inefficient data utilization (too many application, too much background
`data, video and connected social media)
`impacted s (cid:9)
`•
`g channels and limited access to data channels
`• Inefficient push implementations (e.g. Comet or Direct Push models) and
`too many application
`• decreased battery life.
`• Inefficient push implementations (e.g. Comet or Direct Push models) and
`too many application
`• Not enough bandwidth to service alt the users in a given location Mall,
`• Speeds are higher, but so is radio power consumption
`• WATS and UTE do not solve the problem, in fact they have the potential to make it worse
`
`C..,.. A, etc)
`
`Page 8 of 49
`
`(cid:9)
`

`

`f.74 r/ p.
`
`r,„„ r„,,, ,„.„ ir,„ ,
`7- (cid:9)
`7- (cid:9)
`iii
`
`%
`7 ./ (cid:9)
`, (cid:9)
`..• (cid:9)
`
`...", .4
`
`(cid:9) r (cid:9)
`„ .
`
`
`A fr". . ,,,,,, (cid:9)
`../..0 AO (cid:9) A A .4 .4 4 .4 (cid:9)
`.4
`
`„, n , ::::,///, ci„, , , , A , r r (cid:9)
`.,
`/ ,e, (cid:9)
`A ' z , Z, 4 Ad .4 A (cid:9)
`
`r (cid:9)
`ex-ff, .
`..,
`A •7AA 07 p045,;/////7
`A
`17 (cid:9)
`ii
`7 A 7 ir' ir'
`A/7/ rA (cid:9)
`... '',........ A A (cid:9)
`44T/ A A A
`..... (cid:9)
`
`Corporate
`Ernail
`
`07pangeS•eilderV,%7
`software
`
`Personal
`Email
`
`W0c>of 1
`Qma
`"'' Heiman
`,mg
`A %is 0,$,J
`
`TrafficCop Devices
`Any application
`r/C( r/C(
`A h A
`
`Device OS API
`... (cid:9)
`
`*
`
`mm mm m. (cid:9)
`..
`
`mm
`
`Device OS (Android, Symbian, WinMo
`
`TrafficCop TM
`
`Best Optimization
`
`01% !
`C15<0
`
`COMVERSE (cid:9)
`
`INN
`
`SMS, M MS,
`other
`Messaging
`
`Optimized TCP
`
`Ping TM
`
`And Traffic Management (cid:9)
`
`ogo
`
`A VA VA VA VA VA VA VA VA VA VA V/
`
`High Optimization
`
`Portals,
`Intranet
`
`Social
`networks,
`other services
`
`Statistics and Monitoring
`
`..,:./AVA VA VA VA vA, VA VA VA VA VA VA VA VA VA VA VA VA A' A VA VA VA Av
`
`Server Optimization
`
`Ex "sting
`SEVEN Clients
`
`ALL THE REST
`Any Device
`any application
`
`/1 (cid:9)
`
`Page 9 of 49
`
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`

`

`" r (cid:9) r
`d A A
`A (cid:9)
`
`r (cid:9)
`JAA (cid:9)
`
`,
`7 (cid:9)
`
`, (cid:9)
`
`(cid:9) , (cid:9)
`J A (cid:9) d (cid:9)
`
`7,
`
`„
`AAAAAA'ilAz. AA etZiA A
`
`
`
`• Wireline
`• TCP optimimtion by monitoring bandwidth, delays, Loading, etc.
`,
`• Cooperate Client/Server
`• Dynamic heuristic driven traffic shapmg and radio management based on a global view of
`traffic andfoal
`• Hybrid or True push instead of long poLl, DirecPush or background potting reduces power
`consumption, radio utilization and overall data payload
`Failsafeifail-off
`• Browsing and Video optimization
`Shared caching (client cached / server managed)
`• True application transparency
`• (cid:9) Ping TM enabled
`• Managed PUSH to reduce traffic, resources and power consumption through the use of
`TRUE and Hybrid Push.
`• Clientless
`• TCP optimization by monitoring bandwidth, delays, loading, etc. based on overall and
`global system performance
`• Browsing and Video optimization
`
`Page 10 of 49
`
`

`

`iiiii
`
`;"./21
`
`.; 7 Z. (cid:9)
`
`%
`
`rz (cid:9)
`
`(cid:9) A AAA/. (cid:9)
`
`/ A
`/5 (cid:9) A / (cid:9)
`
`, (cid:9)
`
`„7„,„ (cid:9)
`
`57/
`
`4,e, 4
`
`A A .; (cid:9)
`
`A A
`
` 0.7 „•;
`',We A A A (cid:9)
`
`A
`
`Corporate
`Ernail
`
`6iaangeS•eilder;:V
`
`software
`
`[
`
`Personal
`Email
`
`.., Hetroalr i
`4 g
`. , ,,
`Aor
`- - ,„
`
`SMS, MMS,
`other (cid:9)
`Messaging
`
`COANERSE (cid:9)
`
`01% ! ! (cid:9)
`C10 (cid:9)
`
`wiaati-1 01catei.i.vot (cid:9)
`
`Optimized TCP
`
`And Traffic Management (cid:9)
`
`h, e/
`/
`
`%
`
`Turbo Ping TM
`
`ogo
`
`Best Optimization , (cid:9)
`4
`
`TrafficCop TM DeviCi';'),
`
`Device OS API
`
`, (cid:9)
`
`V., 1/, leX, (cid:9)
`
`leX, (cid:9)
`
`01090 (cid:9)
`
`1,204 91109/ 1404
`/. r (cid:9)
`
`11
`
`,„ „,:
`, ,„1„.
`0 --
`Device OS (Android, Symbian, WinMo
`
`Portals,
`Intranet
`
`Social
`networks,
`other services
`
`[ f—rf. ,,, 4
`r7r4 ,M'/XM
`5Katz,ka
`
`,,
`
`flickr Linkedu
`
`hared
`Cache
`
`t
`
`Shared
`Cache
`
`• • • • • • •
`
`1Shared Cache
`VShared Proxy
`VGlobal Shared Awareness
`VWireless (cellular and WiFi) optimization
`VWireless Traffic (TCP) monitoring/optimization
`
`Statistics and Monitoring
`
`Shared
`:Performance
`Information
`
`,•
`•
`
`Page 11 of 49
`
`(cid:9)
`(cid:9)
`

`

`A (cid:9)
`
`A (cid:9)
`
`ir,„, (cid:9)
`
`7,A /
`
`r (cid:9)
`r (cid:9)
`,„
`
`, (cid:9)
`
`;.„„ (cid:9)
`
`..7:49' *V/ A A e'..% ee, (cid:9)
`
`, . (cid:9)
`
`r (cid:9)
`v
`Z.! 4 'II A A „en' , (cid:9)
`
`// A (cid:9)
`
`p
`r„"). r.: ArA71
`
`
`
`7 *
`
`
`
`A 4 A 4" , ..e A
`
`
`
`A7--q r" ? 7 '
`
`_. 4 A i ff ' ii i (cid:9)
`
`4 ,AAel
`
`• /A!„ A
`.1 (cid:9)
`
`•
`
` ft , ,
`SEVEN
`w ha t
`fror w ire less
` does
`-,,, i, e, / r
`-0„/- r e, . - r e, - an d more
`* (cid:9)
`
`i 6, . . e X (cid:9)
`• Any connected application
`4 corporate, personal, social
`End to end transparent and secure (does not vio ate security requirements)
`• Simultaneous Client/Server and Server Only modes
`• Any device, any time — —
`• All networks
`in Wireless and Wireline networks
`Optimizes tra (cid:9)
`Protocol level optimizations (TCP)
`Application teve optimizations (shared caching, dynamic access management,
`improved PUS! , PUSH instead of poll)
`• uynamicat V $t'whizes resources and access on a global view of traffic and
`coaoinu
`• Application Transparent
`• Enterprise friendly no security violation, even ActiveSync is transparent end to end
`
`
`did ft the
`,re-r, ,,,r
`
`VA/r d
`1
`
`
`
`A (cid:9)
`
`.
`
`• ;',4.;/„,
`
`„/
`
`Page 12 of 49
`
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`

`

`747
`4 (cid:9)
`
`w
`
`r ',//,
`
`//..z
`
`/// ////
`,%00/
`,A4#0,00 P4,7)
`
`ao!naci °Non
`
`>pels walsAs BuwJeclo
`
`(cid:9) (cid:9)
`
`abueLiox3
`
`J0100 U U00
`
`caL
`
`ONId 0LIAS0APV
`01 Pol!wrl
`
`0 UASONTOV
`
`caL
`
`OSV\IS
`
`iiiiiiiiiiiiiiiiiiiiiiiiiiih
`••
`
`- (cid:9)
`
`
`
`/>'"' (cid:9)1
`
`iii
`
`- — - - -
`idlgt uopp!idc gth
`
`SINS
`
`r;
`/A /A
`
`
`
`v re% e
`z/
`
`) .z Yr
`
`A (cid:9)
`
`/
`4( (cid:9)
`
`c (cid:9)
`
`1
`
`„ (cid:9)
`
`' - (cid:9)
`, , (cid:9)
`
`% e
`
`
`r iv•
`
`.
`
`rA
`
`cc,
`
`Page 13 of 49
`
`(cid:9)
`(cid:9)
`(cid:9)
`

`

`0
`
`X
`
`
`
`SENNNNNNNNNNNNNRNNNNNNNNNNNNNNRZ
`
`VIET
`
`SEEEERE
`
`s6ueyoxy10j}99UU0DJaNas7XSWAxOlg1YoHealddy
`
`0
`
`CO
`
`
`
`
`
`syIOAITEN
`
`
`
`82/Aagajiqoy
`
`D
`
`
`unGouleGUST)
`YhVlheGYGl“alaadGG
`@Clin4,“Wale@
`fnbiaE44YWEYYYGE”YY
`
`-%`•
`
`Yaywn,ben
`
`44YWyyoy4444%G468444DLO°%GIR%GCGGAOOTYIEUYG?0DPoCUWOUPGALLO?GELeChip“athe“cdl
`“obledelbUd“on,“aahGon"FYaableoyclUtaylhY‘allol“athan,“aaytall%yG&teia*GAGUA
`
`
`
`wa
`
`oi
`
`Page 14 of 49
`
`Page 14 of 49
`
`
`

`

`77/ r„,
`747 (cid:9)
`
`w
`6
`Z.% (cid:9)
`
`iii
`0/ (cid:9)
`
`// / /
`,0,0 (cid:9)
`p p
`
`abueLiox3
`
`_1010 0 U U 00
`
`caL
`
`0 UA S GA! 10 V
`
`
`
`7 V %A ) ,/„
`
`% e 'V V (cid:9)
`7
`%
`
`V
`
`" (cid:9)
`,7 (cid:9)
`
`ao!naci °Non
`
`>pels walsAs BuwJeclo
`
`"'Vvvv"""""•VVVVVV'VVVVVVV<<
`
`„„„.4.4.4./ • • • (cid:9)
`
`sv
`
`•
`........
`• • • • • • • •••••••••••••••••••••••••••
`
` ,
`/ 4,44
`
`
`'' />1-
`
`— — — — — —
`uopo!iddy
`
`dlL
`
`OSV\IS
`
`SINS
`
`7 ri vz
`
`' -
`
`Yi, / /d
`
`,
`,
`
` r7 (cid:9)
`
`% e
`
`„ (cid:9)
`
`ZA
`
`'
`
`
`7
`' (cid:9)
`,j%.%
`
`
`Page 15 of 49
`
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`

`

`0
`
`X
`
`
`
`SENNNNNNNNNNNNNRNNNNNNNNNNNNNNRZ
`
`VIET
`
`SEEEERE
`
`s6ueyoxy10j}99UU0DJaNas7XSWAxOlg1YoHealddy
`
`0
`
`CO
`
`
`
`
`
`syIOAITEN
`
`
`
`82/Aagajiqoy
`
`D
`
`
`unGouleGUST)
`YhVlheGYGl“alaadGG
`@Clin4,“Wale@
`fnbiaE44YWEYYYGE”YY
`
`-%`•
`
`Yaywn,ben
`
`44YWyyoy4444%G468444DLO°%GIR%GCGGAOOTYIEUYG?0DPoCUWOUPGALLO?GELeChip“athe“cdl
`“obledelbUd“on,“aahGon"FYaableoyclUtaylhY‘allol“athan,“aaytall%yG&teia*GAGUA
`
`
`
`wa
`
`oi
`
`Page 16 of 49
`
`Page 16 of 49
`
`
`

`

`Electronic Acknowledgement Receipt
`
`EFS ID:
`
`Application Number:
`
`8093665
`
`61367870
`
`International Application Number:
`
`Confirmation Number:
`
`6978
`
`Title of Invention:
`
`MANAGING AND IMPROVING NETWORK RESOURCE UTILIZATION,
`PERFORMANCE AND OPTIMIZING TRAFFIC IN WIRE LINE AND WIRELESS
`NETWORKS WITH MOBILE CLIENTS
`
`First Named Inventor/Applicant Name:
`
`Heikki Ylinen
`
`Customer Number:
`
`22830
`
`Filer:
`
`TamThanh Thi Pham/Colby Springer
`
`Filer Authorized By:
`
`TamThanh Thi Pham
`
`Attorney Docket Number:
`
`PA5309PRV
`
`Receipt Date:
`
`26-JUL-2010
`
`Filing Date:
`
`Time Stamp:
`
`Application Type:
`
`23:41:25
`
`Provisional
`
`Payment information:
`
`Submitted with Payment
`
`no
`
`File Listing:
`
`Document
`Number
`
`Document Description
`
`File Name
`
`File Size(Bytes)/
`Message Digest
`
`Multi
`Part /.zip
`
`Pages
`(if appl.)
`
`429525
`
`1
`
`Specification
`
`5309PRVSpecAsFiled.pdf
`
`no
`
`16
`
`43d40571887c8ed00ec15500965141.1433
`38911
`
`Warnings:
`
`Information:
`
`Page 17 of 49
`
`

`

`Total Files Size (in bytes) (cid:9)
`
`429525
`
`This Acknowledgement Receipt evidences receipt on the noted date by the USPTO of the indicated documents,
`characterized by the applicant, and including page counts, where applicable. It serves as evidence of receipt similar to a
`Post Card, as described in MPEP 503.
`
`New Applications Under 35 U.S.C. 111
`If a new application is being filed and the application includes the necessary components for a filing date (see 37 CFR
`1.53(b)-(d) and MPEP 506), a Filing Receipt (37 CFR 1.54) will be issued in due course and the date shown on this
`Acknowledgement Receipt will establish the filing date of the application.
`
`National Stage of an International Application under 35 U.S.C. 371
`If a timely submission to enter the national stage of an international application is compliant with the conditions of 35
`U.S.C. 371 and other applicable requirements a Form PCT/DO/E0/903 indicating acceptance of the application as a
`national stage submission under 35 U.S.C. 371 will be issued in addition to the Filing Receipt, in due course.
`
`New International Application Filed with the USPTO as a Receiving Office
`If a new international application is being filed and the international application includes the necessary components for
`an international filing date (see PCT Article 11 and MPEP 1810), a Notification of the International Application Number
`and of the International Filing Date (Form PCT/RO/105) will be issued in due course, subject to prescriptions concerning
`national security, and the date shown on this Acknowledgement Receipt will establish the international filing date of
`the application.
`
`Page 18 of 49
`
`

`

`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`APPLICATION NUMBER
`61/367,870
`
`FILING OR 371(C) DATE
`07/26/2010
`
`22830
`CARR & FERRELL LLP
`2200 GENG ROAD
`PALO ALTO, CA 94303
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address: COMMISSIONER FOR PATENTS
`PO. Box 1450
`Alexandria, Virginia 22313-1450
`www.uspto.gov
`
`FIRST NAMED APPLICANT
`
`ATTY. DOCKET NO./TITLE
`
`CONFIRMATION NO. 6978
`FORMALITIES LETTER
`
`000000004289723
`
`Date Mailed: 08/09/2010
`
`NOTICE TO FILE MISSING PARTS OF PROVISIONAL APPLICATION
`
`FILED UNDER 37 CFR 1.53(c)
`
`Filing Date Granted
`
`An application number and filing date have been accorded to this provisional application. The items indicated
`below, however, are missing. Applicant is given TWO MONTHS from the date of this Notice within which to file all
`required items and pay any fees required below to avoid abandonment. Extensions of time may be obtained by
`filing a petition accompanied by the extension fee under the provisions of 37 CFR 1.136(a).
`
`• The statutory basic filing fee is missing.
`Applicant must submit $220 to complete the basic filing fee for a non-small entity. If appropriate, applicant may
`make a written assertion of entitlement to small entity status and pay the small entity filing fee (37 CFR 1.27).
`• The provisional application cover sheet under 37 CFR 1.51(c)(1), which may be an application data sheet (37
`CFR 1.76), is required identifying either city and state, or city and foreign country, of the residence of each
`inventor and the name of each inventor.
`
`The applicant needs to satisfy supplemental fees problems indicated below.
`
`The required item(s) identified below must be timely submitted to avoid abandonment:
`
`• To avoid abandonment, a surcharge (for late submission of filing fee or cover sheet) as set forth in 37 CFR
`1.16(g) of $50 for a non-small entity, must be submitted with the missing items identified in this notice.
`
`SUMMARY OF FEES DUE:
`
`Total additional fee(s) required for this application is $270 for a non-small entity
`• $220 Statutory basic filing fee.
`• $50 Surcharge.
`
`page 1 of 2
`
`Page 19 of 49
`
`(cid:9)
`(cid:9)
`(cid:9)
`

`

`Replies should be mailed to:
`
`Mail Stop Missing Parts
`Commissioner for Patents
`P.O. Box 1450
`Alexandria VA 22313-1450
`
`Registered users of EFS-Web may alternatively submit their reply to this notice via EFS-Web.
`https://sportal.uspto.gov/authenticate/AuthenticateUserLocalEPF.html
`
`For more information about EFS-Web please call the USPTO Electronic Business Center at 1-866-217-9197 or
`visit our website at http://www.uspto.gov/ebc.
`
`If you are not using EFS-Web to submit your reply, you must include a copy of this notice.
`
`/mkanno/
`
`Office of Data Management, Application Assistance Unit (571) 272-4000, or (571) 272-4200, or 1-888-786-0101
`
`page 2 of 2
`
`Page 20 of 49
`
`

`

`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`I
`
`
`AP PLICATION
`NUMBER
`61/367,870
`
`G or (cid:9)
`FILIN
` DATE
`371(c)
`07/26/2010
`
`I G
` I
`
`
`UNIT IT (cid:9)
`
`FIL FEE RECD
`0.00
`
`I
`
`22830
`CARR & FERRELL LLP
`2200 GENG ROAD
`PALO ALTO, CA 94303
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address: COMMISSIONER FOR PATENTS
`P.O.Box 1450
`Alexandria, VirgLnia 22313-1450
`www.uspto.gov
`
`ATTY.DOCKET.NO (cid:9)
`
`ITOT CLAIMS I IND CLAIMS
`
`CONFIRMATION NO. 6978
`FILING RECEIPT
`Illoyoulilicill11011!0111111111111
`
`Date Mailed: 08/09/2010
`
`Receipt is acknowledged of this provisional patent application. It will not be examined for patentability and will
`become abandoned not later than twelve months after its filing date. Any correspondence concerning the application
`must include the following identification information: the U.S. APPLICATION NUMBER, FILING DATE, NAME OF
`APPLICANT, and TITLE OF INVENTION. Fees transmitted by check or draft are subject to collection. Please verify
`the accuracy of the data presented on this receipt. If an error is noted on this Filing Receipt, please submit
`a written request for a Filing Receipt Correction. Please provide a copy of this Filing Receipt with the
`changes noted thereon. If you received a "Notice to File Missing Parts" for this application, please submit
`any corrections to this Filing Receipt with your reply to the Notice. When the USPTO processes the reply
`to the Notice, the USPTO will generate another Filing Receipt incorporating the requested corrections
`Applicant(s)
`Power of Attorney: None
`
`If Required, Foreign Filing License Granted: 08/04/2010
`The country code and number of your priority application, to be used for filing abroad under the Paris Convention,
`is US 61/367,870
`Projected Publication Date: None, application is not eligible for pre-grant publication
`Non-Publication Request: No
`Early Publication Request: No
`Title
`
`MANAGING AND IMPROVING NETWORK RESOURCE UTILIZATION, PERFORMANCE AND
`OPTIMIZING TRAFFIC IN WIRE LINE AND WIRELESS NETWORKS WITH MOBILE CLIENTS
`
`PROTECTING YOUR INVENTION OUTSIDE THE UNITED STATES
`
`Since the rights granted by a U.S. patent extend only throughout the territory of the United States and have no
`effect in a foreign country, an inventor who wishes patent protection in another country must apply for a patent
`in a specific country or in regional patent offices. Applicants may wish to consider the filing of an international
`application under the Patent Cooperation Treaty (PCT). An international (PCT) application generally has the same
`effect as a regular national patent application in each PCT-member country. The PCT process simplifies the filing
`of patent applications on the same invention in member countries, but does not result in a grant of "an international
`patent" and does not eliminate the need of applicants to file additional documents and fees in countries where patent
`protection is desired.
`
`page 1 of 3
`
`Page 21 of 49
`
`(cid:9)
`(cid:9)
`

`

`Almost every country has its own patent law, and a person desiring a patent in a particular country must make an
`application for patent in that country in accordance with its particular laws. Since the laws of many countries differ
`in various respects from the patent law of the United States, applicants are advised to seek guidance from specific
`foreign countries to ensure that patent rights are not lost prematurely.
`
`Applicants also are advised that in the case of inventions made in the United States, the Director of the USPTO must
`issue a license before applicants can apply for a patent in a foreign country. The filing of a U.S. patent application
`serves as a request for a foreign filing license. The application's filing receipt contains further information and
`guidance as to the status of applicant's license for foreign filing.
`
`Applicants may wish to consult the USPTO booklet, "General Information Concerning Patents" (specifically, the
`section entitled "Treaties and Foreign Patents") for more information on timeframes and deadlines for filing foreign
`patent applications. The guide is available either by contacting the USPTO Contact Center at 800-786-9199, or it
`can be viewed on the USPTO website at http://www.uspto.gov/web/offices/pac/doc/general/index.html.
`
`For information on preventing theft of your intellectual p

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket