摘要:
An apparatus or method integrates device policy and network policy in order to arbitrate a priority between packet data applications or services for a data connection. In response to a request, a data connection to a wireless network is established for a first application of a first type of application or service if no data session is in progress or if a second application of a second type of application or service can share an existing data session. A hybrid arbitrator performs hybrid arbitration between the first application and the second application in response to determining that the first type and the second type cannot share the existing data session, either based upon a network policy that specifies a difference in priority between the first type and the second type, or based upon a device policy if the network policy does not specify a difference in priority.
摘要:
Methods and apparatuses are provided that facilitate providing one or more profiles to an application executing on a device. The application can request one or more profiles, which can relate to an application type. The application type can be specified in the profile request, determined based on a profile indicated in the profile request, etc. Where the application type corresponds to an operator-specific application type, one or more operator identifiers in the profile request can be verified with one or more other operator identifiers in an identity module of the device. Where the operator identifiers match, the requested profile can be provided to the application. Where the operator identifiers do not match, an invalid profile, error code, etc. can be provided to the application. In this regard, operators can control utilization of specific profiles that can be defined by the operator.
摘要:
Methods, systems, and devices are described for intercepting requests from applications installed on a mobile device. The requests are system calls that establish communication channels for the mobile device. The requests are captured and held from reaching TCP/IP stack of an operating system executing on the mobile device. An intercepted request is aggregated with other intercepted requests. The aggregated requests are bundled together and released to the operating system upon the detection of a triggering event. The capture, holding, and aggregation of requests from applications occur when the mobile device is in a background mode.