Abstract:
Systems and techniques are provided for restricting system calls using protected storage. A system call to a restricted system component may be received from an application. The application may be determined to have permission to make the system call to the restricted system component. A signature associated with the application may be verified using a public key from a protected storage. The public key may be sent to the protected storage by a computing device of a party authorized to modify data in the protected storage. The restricted system component may be permitted to perform a function indicated by the system call when the public key successfully verifies the signature associated with application.
Abstract:
An example method comprises receiving, by at least one computing device, a first notification from a first mobile computing device and a second notification from a second mobile computing device. The method may further comprise determining, based at least in part on a comparison of the first notification to the second notification, that the first mobile computing device has initiated a phone call with the second mobile computing device. The method may additionally comprise responsive to determining that the first mobile computing device has initiated the phone call with the second mobile computing device, sending, a first message to the first mobile computing device using a first data connection, and sending, a second message to the second mobile computing using a second data connection, wherein the first message and the second messages each indicate that the first and second mobile computing devices are able to exchange application data.
Abstract:
An example method comprises receiving, by at least one computing device, a first notification from a first mobile computing device and a second notification from a second mobile computing device. The method may further comprise determining, based at least in part on a comparison of the first notification to the second notification, that the first mobile computing device has initiated a phone call with the second mobile computing device. The method may additionally comprise responsive to determining that the first mobile computing device has initiated the phone call with the second mobile computing device, sending, a first message to the first mobile computing device using a first data connection, and sending, a second message to the second mobile computing using a second data connection, wherein the first message and the second messages each indicate that the first and second mobile computing devices are able to exchange application data.
Abstract:
An example method comprises receiving, by at least one computing device, a first notification from a first mobile computing device and a second notification from a second mobile computing device. The method may further comprise determining, based at least in part on a comparison of the first notification to the second notification, that the first mobile computing device has initiated a phone call with the second mobile computing device. The method may additionally comprise responsive to determining that the first mobile computing device has initiated the phone call with the second mobile computing device, sending, a first message to the first mobile computing device using a first data connection, and sending, a second message to the second mobile computing using a second data connection, wherein the first message and the second messages each indicate that the first and second mobile computing devices are able to exchange application data.
Abstract:
A system and method for accessing a carrier network by a client device. The method includes: receiving a selection of a first plan from a carrier marketplace that includes at least the first plan and a second plan, wherein the first plan corresponds to a first set of services provided by a first carrier network, and the second plan corresponds to a second set of services provided by a second carrier network; downloading a carrier profile from the server device to a multi-profile UICC (Universal Integrated Circuit Card) included in the client device, wherein the carrier profile is associated with the first plan; and storing the carrier profile in the multi-profile UICC.
Abstract:
A system and method are provided for collecting wireless network quality parameters. The wireless network quality parameters are collected from wireless networks by a client device in communication with the wireless network. The client device reports the wireless network quality parameters to a server. The server collects wireless network quality parameters from a plurality of client devices and analyzes the wireless network quality parameters from the plurality of client devices to determine a network quality for the particular wireless networks. The network quality is stored in a network quality database maintained by the server. The server provides access to the network quality for devices with permission to access the wireless network quality database.
Abstract:
An example method comprises receiving, by at least one computing device, a first notification from a first mobile computing device and a second notification from a second mobile computing device. The method may further comprise determining, based at least in part on a comparison of the first notification to the second notification, that the first mobile computing device has initiated a phone call with the second mobile computing device. The method may additionally comprise responsive to determining that the first mobile computing device has initiated the phone call with the second mobile computing device, sending, a first message to the first mobile computing device using a first data connection, and sending, a second message to the second mobile computing using a second data connection, wherein the first message and the second messages each indicate that the first and second mobile computing devices are able to exchange application data.
Abstract:
A system and method are provided for automatically shutting off or reducing power to certain radios in a client device based on collected wireless network quality parameters. The wireless network quality parameters are collected from wireless networks by various client devices in communication with the wireless networks. The client devices report the wireless network quality parameters to a server. The server collects wireless network quality parameters from a plurality of client devices and analyzes the wireless network quality parameters from the plurality of client devices to determine a network quality for the particular wireless networks. The network quality is stored in a network quality database maintained by the server. When it is determined that a device is in an area of weak signal coverage, power to its radio is automatically reduced or shut off until the device leaves the area.
Abstract:
A system and method are provided for collecting wireless network quality parameters. The wireless network quality parameters are collected from wireless networks by a client device in communication with the wireless network. The client device reports the wireless network quality parameters to a server. The server collects wireless network quality parameters from a plurality of client devices and analyses the wireless network quality parameters from the plurality of client devices to determine a network quality for the particular wireless networks. The network quality is stored in a network quality database maintained by the server. The server provides access to the network quality for devices with permission to access the wireless network quality database.