PRAVALA INC. Patent applications |
Patent application number | Title | Published |
20150026353 | REDUCING LOAD AT A PROXY SERVER - A method is described for reducing a load placed on an endpoint server acting as an endpoint of a tunnel from a client device across a network. The method, implemented at the client device, comprises the following steps. A request to establish a new network connection is received. A risk of establishing the new network connection outside of the tunnel is determined based on a plurality of predefined criteria. The determined risk is compared with a predefined risk threshold and, if the determined risk is less than or equal to the predefined risk threshold, the new network connection is established directly via the network. If the new network connection fails before it is completed it is re-established via the tunnel. If the determined risk is greater than the predefined risk threshold, the new network connection is established via the tunnel. A client device and computer-readable medium configured to implement the method is also described. | 01-22-2015 |
20140146807 | TRANSMITTING DATA OVER A PLURALITY OF DIFFERENT NETWORKS - A method for transmitting data from a mobile communication device to a remote server across a wireless network is described. The method comprising the following steps. Data is transmitted from an application executing on the mobile communication device using a standard reliable communication protocol. Prior to transmitting the data across the wireless network, receipt of the data is acknowledged, thereby simulating, to the application, receipt of the data by the remote server. Data is transmitted from the mobile communication device to the remote server using an intermediary communication protocol. A mobile communication device and a system implementing the method are also described. | 05-29-2014 |
20140092727 | SCALABLE RELIABLE FAILOVER IN A NETWORK - A method is provided for establishing a reliable communication channel between an encapsulation node and a cluster of decapsulation nodes across a communication network. The method is implemented at the encapsulation node and comprises the following steps. A primary session is initialized with a primary decapsulation node in the cluster of decapsulation nodes during which an assigned address is received. A redundant session is initialized with a redundant decapsulation node in the cluster of decapsulation nodes. Data is transmitted to and received from the decapsulation node until a failure is detected. Once the failure is detected, data is transmitted to and received from the redundant decapsulation node instead of the primary decapsulation node. | 04-03-2014 |
20140068104 | ACCESSING LOCAL NETWORK RESOURCES IN A MULTI-INTERFACE SYSTEM - A method is provided for selectively routing data packets on a client device having of plurality of network interfaces for communicating over a network. The method comprising the following steps. It is determined if the data packets should be routed to a network server accessible by a corresponding one of the network interfaces to access local resources offered thereon. If the data packets should be routed to the network server, the data packets are routed directly to the network server via the corresponding network interface. Otherwise, the data packets are routed via a default route. A client device configured to implement the method is also provided. | 03-06-2014 |
20130080612 | ENCAPSULATION SYSTEM FEATURING AN INTELLIGENT NETWORK COMPONENT - A network component is provided for facilitating communication of traffic between a destination server and a client over a network comprising the plurality of network paths. The network component comprising memory for storing computer-readable instructions and a processor configured to implement the computer-readable instructions. The computer-readable instructions operable to implement the following: exchange control parameters with the client via a control channel using one or more of the plurality of network control paths; encapsulate the traffic for transmission to the client; decapsulate the traffic received from the client; and schedule traffic to the client via one or more of the plurality of network paths using logic common with the client based on network parameters. A client configured to work with the network component is also described, as is a communication system including both the client and network component. | 03-28-2013 |
20120320748 | SCHEDULING DATA OVER MULTIPLE NETWORK INTERFACES - A scheduler is configured to schedule packets in a plurality of flows to a corresponding one of a plurality of interfaces. Each of the packets includes a flow identifier for identifying a corresponding one of the plurality of flows. The scheduler include memory having instructions for execution by the processor to implement a scheduling algorithm. The scheduling algorithm person as follows. Sections within a predefined range are assigned to corresponding ones of the plurality of interfaces. For each packet, a hash function is applied to the flow identifier to obtain a hash value that is evenly distributed within the predefined range. Additionally, for each packet, it is determined in which of the sections the hash value falls and the corresponding one of the plurality of interfaces is identified accordingly. | 12-20-2012 |
20120254464 | ACCESSING LOCAL NETWORK RESOURCES IN A MULTI-INTERFACE SYSTEM - A method is provided for selectively routing data packets on a client device having of plurality of network interfaces for communicating over a network. The method comprising the following steps. It is determined if the data packets should be routed to a network server accessible by a corresponding one of the network interfaces to access local resources offered thereon. If the data packets should be routed to the network server, the data packets are routed directly to the network server via the corresponding network interface. Otherwise, the data packets are routed via a default route. A client device configured to implement the method is also provided. | 10-04-2012 |
20120178487 | TRANSMITTING DATA OVER A PLURALITY OF DIFFERENT NETWORKS - A method for transmitting data from a mobile communication device to a remote server across a wireless network is described. The method comprising the following steps. Data is transmitted from an application executing on the mobile communication device using a standard reliable communication protocol. Prior to transmitting the data across the wireless network, receipt of the data is acknowledged, thereby simulating, to the application, receipt of the data by the remote server. Data is transmitted from the mobile communication device to the remote server using an intermediary communication protocol. A mobile communication device and a system implementing the method are also described. | 07-12-2012 |
20120144047 | REDUCING LOAD AT A PROXY SERVER - A method is described for reducing a load placed on an endpoint server acting as an endpoint of a tunnel from a client device across a network. The method, implemented at the client device, comprises the following steps. A request to establish a new network connection is received. A risk of establishing the new network connection outside of the tunnel is determined based on a plurality of predefined criteria. The determined risk is compared with a predefined risk threshold and, if the determined risk is less than or equal to the predefined risk threshold, the new network connection is established directly via the network. If the new network connection fails before it is completed it is re-established via the tunnel. If the determined risk is greater than the predefined risk threshold, the new network connection is established via the tunnel. A client device and computer-readable medium configured to implement the method is also described. | 06-07-2012 |
20120116886 | USING A FIRST NETWORK TO CONTROL ACCESS TO A SECOND NETWORK - A wireless communication device is configured to be able to communicate via both a first access point and a second access point for using the first access point to obtain validation credentials in order to permit use of the second access point to access a network. The wireless communication device comprises a processor; and a non-transitory computer readable medium having stored thereon computer executable instructions. The instructions are operable to: initiate communication with the second access point in order to access a network; obtain an access point identifier from the second access point, the access point identifier for identifying the second access point; transmit the access point identifier to a validation server via the first access point; receive validation credentials from the validation server via the first access point; the validation credentials including at identifier of a third party, the third party sponsoring access to the second access point; use the validation credentials to validate the wireless communication device with the second access point to obtain access to the network; and present advertising information on the wireless communication device, the advertising information pertaining to the third party. | 05-10-2012 |
20120113801 | SCALABLE RELIABLE FAILOVER IN A NETWORK - A method is provided for establishing a reliable communication channel between an encapsulation node and a cluster of decapsulation nodes across a communication network. The method is implemented at the encapsulation node and comprises the following steps. A primary session is initialized with a primary decapsulation node in the cluster of decapsulation nodes during which an assigned address is received. A redundant session is initialized with a redundant decapsulation node in the cluster of decapsulation nodes. Data is transmitted to and received from the decapsulation node until a failure is detected. Once the failure is detected, data is transmitted to and received from the redundant decapsulation node instead of the primary decapsulation node. | 05-10-2012 |