Background transfer service for applications on mobile devices

ABSTRACT

The subject disclosure is directed towards a background transfer service that provides platform-level support for third party applications to queue data transfers to run in the background, including when the application is not running in the foreground. Applications may thus perform downloading and uploading tasks in the background; however the background transfer service manages the data transfer requests so as to limit each background application&#39;s ability to interfere with foreground application operations, that is, by controlling resource usage according to one or more policies.

CROSS-REFERENCE TO RELATED APPLICATION

The present application claims priority to U.S. patent application No.13/164,678, filed Jun. 20, 2011, which is a non-provisional of U.S.provisional patent applications Ser. Nos. 61/442,701, 61/442,713,61/442,735, 61/442,740 and 61/442,753, each filed Feb. 14, 2011 andhereby incorporated by reference. The present application is related toU.S. patent applications attorney docket nos. 332297.02, 332320.02,332339.02 and 332340.02, assigned to the assignee of the presentinvention, hereby incorporated by reference.

BACKGROUND

Allowing applications (e.g., third party applications) to run in thebackground of mobile devices and perform tasks allows malicious orpoorly designed applications to drain the battery, consume bandwidth,and slow mobile phone/device performance. This is a problem on mobiledevices where system resources are limited and foreground experiencesare expected to run with full fidelity and responsiveness. In general,CPU, memory, and network bandwidth are limited system resources;moreover, bandwidth is highly variable in certain network conditions.

As a result, in one solution, application background processing iseffectively disabled, in that the moment an application is removed fromthe foreground, that application is ‘deactivated.’ This means thatapplications currently rely on the user keeping them in the foregroundto continue such tasks, including data transfers. This solution isgenerally undesirable.

SUMMARY

This Summary is provided to introduce a selection of representativeconcepts in a simplified form that are further described below in theDetailed Description. This Summary is not intended to identify keyfeatures or essential features of the claimed subject matter, nor is itintended to be used in any way that would limit the scope of the claimedsubject matter.

Briefly, various aspects of the subject matter described herein aredirected towards a technology by which a background transfer service isconfigured to run on a mobile device to control a transfer of networkdata communications for applications. The background transfer servicemanages application requests for data transfers based upon one or morepolicies that control resource usage of the background application datatransfers in a way that limits interference with foreground applicationoperations. In one implementation, the background transfer service iscoupled to a download manager that is configured to make the remoteconnections to transfer data to or from a remote source to satisfy atransfer request.

In one aspect, a data sharing service moves or copies data transferred(downloaded) from the remote source into local storage accessible by anapplication. The data sharing service moves or copies data from storageaccessible by an application for transferring (uploading) data to aremote source. In one aspect, an application instance manager providesnotifications related to uninstall status, license revocation orreinstatement status of an application to the background transferservice, which may respectively cancel, pause and/or resume each pendingtransfer request for that application.

The policies may be directed towards allowing only a maximum number ofoutstanding transfers at a time, a data size-based limitation,connection rules (e.g., Wi-Fi versus cellular), and/or a bandwidthlimitation. The policies may be based upon conditions, such as otherapplication data transfer requests, available cellular service, Wi-Fiavailability, desktop pass-through availability, power state, batterypower level, and/or charging state.

In one aspect, data is transferred on behalf of one or moreapplications. This includes receiving a data transfer request from eachapplication, and managing the data transfer request of each applicationto retain control of resource usage in transferring the data for thatapplication. Managing of the data transfer request may includedetermining whether one or more transfer conditions are met, and if not,moving the request to a waiting state until the one or more transferconditions are met. Managing of the data transfer request also mayinclude determining whether to allow the request based upon the size ofthe data to transfer, throttling the data transfer based upon availablebandwidth and/or the presence of streaming media in the foreground,prioritizing a foreground application data transfer over a backgroundapplication data transfer, and/or detecting for a slow transfer state bychecking whether a transfer rate is below a threshold, and if detected,waiting for a changed condition before resuming the transferring of thedata for that application. If the associated application is currentlyexecuting (either in the foreground or the background), it is made awareof the current transfer state via notifications commonly referred to as“events” and can also query the transfer service to determine thecurrent status of any of its requests (including those that havecompleted successfully or in error).

In one aspect, upon receiving information (e.g., a notification)indicating that an application is being uninstalled, managing the datatransfer request comprises canceling each data transfer requestcorresponding to that application. Upon receiving information indicatingthat a license of an application is revoked, managing the data transferrequest comprises pausing each data transfer request corresponding tothat application; upon receiving information indicating that the licenseof the application is reinstated, managing the data transfer requestcomprises resuming each paused data transfer request corresponding tothat application.

Upon receiving information indicating that an application has changedfrom a background application to a new foreground application, managingthe data transfer request comprises re-prioritizing at least one pendingdata transfer request of the new foreground application. Upon receivinginformation indicating that an application has changed from a foregroundapplication to a background application, managing the data transferrequest may comprise re-prioritizing at least one pending data transferrequest of the background application.

In one implementation, upon receiving a data transfer request comprisinga request to transfer data on behalf of an application, informationcorresponding to the request is queued in a request queue. Theinformation from the request queue is processed, comprising downloadingdata on behalf of the application into a file cache, including when theapplication is a background application. When downloaded, a service thathas access rights to storage associated with the application is used tomove or copy the data from the file cache to the isolated storage. Thedata can be moved or copied either incrementally while the transfer isin progress, or in a single operation once the transfer is complete; inone implementation, a move from the request store to the isolated storeis done only when transfer is complete with no errors. Uploadingoperates similarly, e.g., an upload request is queued and processed,including communicating with a service that has rights to access theapplication's storage that contains the data to upload, so as to uploadthe data on behalf of the application. If the associated application iscurrently executing (either in the foreground or the background) it isperiodically made aware of the transfer progress via notificationscommonly referred to as “events” and can also query the transfer servicefor the current progress of any of its requests.

Other advantages may become apparent from the following detaileddescription when taken in conjunction with the drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention is illustrated by way of example and not limitedin the accompanying figures in which like reference numerals indicatesimilar elements and in which:

FIG. 1 is a block diagram representing example components used inperforming background transfers of data for applications via abackground transfer service.

FIG. 2 is an example of applications using a background transfer serviceto download content.

FIG. 3 is a dataflow diagram representing example components and datacommunicated in performing background transfers of data.

FIG. 4 is an example timing sequence/dataflow diagram showing how anapplication establishes a connection to the background transfer service.

FIG. 5 is an example timing sequence/dataflow diagram showing how anapplication enqueues a background transfer request.

FIG. 6A and 68 comprise a flow diagram showing example steps forchecking conditions and based upon those conditions, delaying orrequesting transfer of data.

FIG. 7 is an example timing sequence/dataflow diagram showing callinginto the background transfer service to register for progress/completednotifications.

FIG. 8 is a timing sequence/dataflow diagram showing example operationsrelated to obtaining a transfer progress notification.

FIG. 9 is a timing sequence/dataflow diagram showing example operationsrelated to obtaining a completion notification.

FIG. 10 is a timing sequence/dataflow diagram showing example operationsrelated to canceling a background transfer request.

FIG. 11 is a timing sequence/dataflow diagram showing example operationsrelated to querying for background transfer request status.

FIG. 12 is a timing sequence/dataflow diagram showing example operationsrelated to pausing a background transfer.

FIG. 13 is a timing sequence/dataflow diagram showing example operationsrelated resuming a background transfer.

FIG. 14 is a timing sequence/dataflow diagram showing example operationsrelated to querying for background transfer service status.

FIG. 15 is a state diagram showing example states of a transfer requestin the background transfer service

FIG. 16 is a block diagram representing an exemplary non-limitingcomputing system or operating environment, e.g., in the example of amobile phone device, in which one or more aspects of various embodimentsdescribed herein can be implemented.

DETAILED DESCRIPTION

Various aspects of the technology described herein are generallydirected towards a background transfer service that providesplatform-level support for applications to queue transfers to run in thebackground. This ensures that applications can perform appropriate datatransfer tasks in the background, without offering applications completeflexibility to run whatever code they want. The background transferservice allows applications to queue requests, cancel requests, checkrequest status and continue transferring (upload/download) content whilethe application is not running in the foreground.

Applications can download content essentially in parallel, e.g., via around-robin fairness mechanism that provides resources to theapplications in a fair way. An application may specify transferpreferences, however policies associated with the background transferservice control what applications can do, e.g., an application may onlyhave some maximum number of outstanding transfers at a time, datatransfer may be limited to some size when over cellular and Wi-Fi isunavailable or if external power is absent, a background application maynot be allowed to use a 2G/EDGE cellular connection, different actionsmay be taken when on battery power, low power or when connected toAC/USB charging, and so forth.

Providing the transfer service at the platform-level thus enables theplatform to maintain control over what transfer-related tasksapplications can perform in the background, without providingapplications with the full flexibility to run arbitrary code.Additionally, the background transfer service allows for control byfirst and third party applications with respect to the amount ofbandwidth and/or other device resources being used, to preserve theforeground experience (where “first party” as used herein refers totrusted code such as provided by the operating system vendor, and thirdparty refers to applications from vendors, regardless of their source ortrustworthiness). Foreground applications can request additionalbandwidth if necessary for heavy-bandwidth utilization activities, andthe background transfer (depending on circumstances) may throttle thebandwidth to preserve the foreground experience so as to limit (e.g.,reduce or avoid) interference with foreground application operations.

It should be understood that any of the examples herein arenon-limiting. As such, the present invention is not limited to anyparticular embodiments, aspects, concepts, structures, functionalitiesor examples described herein. Rather, any of the embodiments, aspects,concepts, structures, functionalities or examples described herein arenon-limiting, and the present invention may be used various ways thatprovide benefits and advantages in computing and data transfer ingeneral.

In one implementation, as generally represented in FIG. 1, thebackground transfer service 102 (BTS) controls application data transferrequests according to one or more policies 103 associated with (e.g.,incorporated into or externally coupled to) the background transferservice 102. The background transfer service 102, via a BTS client API104, allows applications such as the application 106 to download/uploadcontent from/to a network endpoint, even when the application 106 is notin the foreground (e.g., when deactivated or dehydrated). This is alsoavailable when an application is tombstoned (moved to the backgroundrather than closed, with the operating system maintaining stateinformation for later when the application returns to the foreground).

In general, foreground applications can add requests to the backgroundtransfer service's request queue; foreground/background applications canfind requests in the background transfer service's request queue andremove requests from the background transfer service's request queue.These requests are subject to control by the background transfer service102 according to the one or more policies 103. Other functions may beprovided, such as to allow for status updates as described herein. Asalso shown in FIG. 1, tasks and/or services 107 (e.g., first partyapplications) may use the background service via a similar (or the same)API set, shown in FIG. 1 as API 105.

As described below, for security and the like, each application has itsown local storage 108 and 109, which in one implementation is accessedvia a data sharing service 110. Note that in FIG. 1, differentcomponents have different access rights represented by a chamber, e.g.,the background transfer service runs in a standard rights chamber,applications run in a low privilege chamber, the data sharing service110 runs in a standard chamber, and so on. The data sharing service 110has the right to access the application's local storage 108 or 109(restricted to only a particular folder in the storage), and thebackground transfer service 102 uses the data sharing service 110 to getdownloaded data in, or to get data out for uploading. Using the datasharing service 110 (with elevated rights) to transfer data to and fromthe isolated stores provides additional security.

As generally represented in FIG. 2, scenarios for background transferfrom the web 220 or other network source include an applicationdownloading extra levels or game content for games, media contentdownload/upload for applications such as video streaming (e.g.,application 206), e-readers (e.g., application 207), turn-by-turnnavigators, and so forth. Each application (e.g., 206 and 207) may haveits own isolated store, shown in FIGS. 2 as 208 and 209, respectively.

It should be noted that a foreground application may use the backgroundtransfer service 102. In such a situation, the background transferservice 102 may apply a different policy or have other rules, e.g., toprioritize the foreground application transfer requests over those ofbackground applications, use different limits (or even no limits) and soforth. This also applies when a background application is using theservice and gets changed to the foreground application; its queuedrequests are moved up in priority (other application requests may bepaused), limits may be changed or not enforced, and so forth.

As will be understood, transfers through the background transfer service102 may proceed in parallel with reasonable fairness, and withoutstarving one another, as controlled by the service 102. As a result, alarge transfer does not block further requests indefinitely, and thebackground transfer service 102 may enforce hard restrictions on atransfer's content sizes while minimizing disruption to background audiostreaming, foreground video streaming, gaming, and foreground activitiesthat use the network, for example. Note that audio streaming issensitive to resource starvation, and the background transfer serviceattempts to not interrupt this scenario, while not starvingresource-intensive applications nor degrading foreground experiencesthat require network bandwidth, e.g., music streaming, multiplayergaming scenarios, gaming scenarios, video streaming, a browser, socialnetworks, and so forth. At the same time, the service may adapt and/orotherwise operate to maximize battery life through efficient resourceuse, including battery and bandwidth. Cost awareness may be anotherconsideration, e.g., to not allow a rogue or poorly written applicationto use too much of a user's limited data plan on a cellular connection.

Returning to the example implementation/architecture generallyrepresented in FIG. 1, the background transfer service 102 (BTS) maycomprise a Windows® Phone service running inside servicesd.exe in thestandard rights chamber. In this example RPC (Remote Procedure Call) isused as the IPC (interprocess communication) mechanism betweenbackground transfer service clients 106, 107 and background transferservice 102. The service 102 thus offers an RPC interface that isaccessible by low privileged chamber BTS-aware (e.g., Yamanote)applications as well as other higher-privileged processes. Note thatlocal RPC, PSL (process server library) and IPC mechanisms are availablein the Windows® Phone platform.

The RPC interface exposes the APIs 104, 105 for queuing, canceling andquerying the status of an individual transfer. The RPC interface alsoexposes the APIs 104, 105 for RPC clients to get notifications regardingthe progress and completion of a transfer. The background transferservice 102 is persists a transfer request in its request store 112until the conditions are right to delete the request (e.g., the responsehas been successfully sent to the requestor). The request store 112comprises a persistent store in the file system where the backgroundtransfer service saves the application's transfer request.

In one implementation, the background transfer service 102 may use theservices of an entertainment download manager 114 (EDM) for managinghttp/https transfer requests such as starting, canceling and pausing arequest. While the entertainment download manager 114 is exemplifiedherein as a separate component, in an alternative implementation, theentertainment download manager 114 (e.g., its functionality) or partthereof may be incorporated into the background transfer service 102, orvice-versa. Thus, as used herein, the entertainment download manager 114may be a separate component (in whole or in part), or may be a sub-partof the background transfer service 102, (or vice-versa).

The entertainment download manager 114 is essentially a straightforwardqueuing service with round robin logic (e.g., dividing availableparallel slots among the one or more requesting applications) thatprocesses requests, provides for progress callbacks/notifications, andso forth. The entertainment download manager 114 has its own file cache115 and request queue, and in general maintains state data to handle theoperations of communicating with the endpoints to transfer the contentto and from the endpoints, using retry mechanisms as needed, and soforth. The entertainment download manager 114 also may watch fornotifications from a resource manager component to vary (e.g., in oneimplementation, pause certain ones of) the transfers when an applicationchanges from background to foreground. As instructed by the backgroundtransfer service 102, the data sharing service 110 moves/copies datafrom/to the file cache 115 to the corresponding isolated storage foreach application as appropriate via a transfer folder.

In addition, the background transfer service 102 uses an applicationinstance manager 116 (AIM) to receive notifications regardingapplication uninstall and license revocation and reinstatement. To thisend, the application instance manager 116 comprises a component thatsends notifications about application uninstall and licenserevoke/reinstatement to the background transfer service 102.

As generally represented in FIG. 1, the BTS-aware (e.g., third party)application 106 uses the managed APIs 104 provided by the platform. Atask/service 107 may be a headless task or another background servicethat is part of the platform. In one implementation, the backgroundtransfer service comprises a platform background service (e.g., hostedin servicesd.exe, a platform component process that hosts multipleservices), which comprises the RPC server side component implementingthe transfer APIs. The background transfer service client API may be aplatform-native DLL that exposes the native background transfer serviceAPIs, which uses local RPC to communicate with background transferservice.

Also shown in FIG. 1, in one implementation the data sharing service 110comprises a platform background service that serves as a secure brokerfor platform components to access the low privileged application'sisolated storage 108. The entertainment download manager 114 comprises abackground service used by platform components to transfer content. Onedesign of the background transfer service 102 uses the entertainmentdownload manager 114 for interfacing with wininet and performing theactual http file transfers.

The persistent store choice for the background transfer service maycomprise any suitable data structure/mechanism, including any suitabledatabase, the registry, or one file per request. In the platform, EDB(an embedded database engine) is used for such a mechanism, in partbecause it provides reasonable support for likely request patterns(e.g., hundreds of requests, creation/deletion over time), and becauseit supports transactions.

FIG. 3 provides a system overview along with a numbered flow ofoperations. The background transfer service client API 304 comprises alibrary that an application 306 references to gain access to thebackground transfer service 102. The client API 304 creates a temporaryfile (inside the application's isolated storage 308, shown within theapplication for convenience) for download requests, and renames/movesthis temporary file to the desired filename upon download completion.Note that in one implementation, moving is not a double-write on thefile system as long as it does not cross volumes and thus improvesperformance. P2 caching may be enabled to avoid flushing to flash/SDunless needed.

As represented in FIG. 3 by labeled arrows one (1) and two (2), theapplication 306 (via the client API 304) requests a token for a givenfile handle from the data sharing service 110 (via RPC), and enqueues(labeled arrow three (3)) or dequeues requests by providing the requestinformation (file handle's token, requestID) to the background transferservice (via RPC).

The data sharing service 110 provides a mechanism for creating a handleto a file within an application's isolated storage 308, and for grantingaccess to the aforementioned handle to the background transfer service102 through the exchange of a shared secret (token). These arerepresented in FIG. 3 by labeled arrows four (4) and five (5).

The background transfer service 102 is responsible for managing theapplication request queues, preserving the state of requests across thelifetime the of application (on the device), managing queue priority andmanagement, and interfacing with the data sharing service 110 forcopying from or moving file to application storage (by providing atoken), as described above. Also, the background transfer service 102via the client API 304 relays progress events/queries, such ascompletion, and fatal errors, as represented via labeled arrow six (6).

The application instance manager 116 provides an API or the like to getinformation about a task instance that a background service 102 may needto validate the identity of a task instance and to make policy decisionsabout whether to accept a request or not. The background transferservice 120 subscribes to and fulfills requests from the applicationinstance manager 116 for uninstall and revocation and other applicationlifecycle events. The application instance manager 116 informs thebackground transfer service 102 when an application registered by thebackground transfer service with it is uninstalled, its license revokedor reinstated. The background transfer service 102 cancels outstandingrequests of an application when the application is being uninstalled,and pauses the requests made by an application when the license of theapplication is revoked. The background transfer service 102 resumesthese requests when the application license is reinstated.

In one implementation, a resource manager may be used to control thepausing and resumption of the background transfer service 102. Theapplication instance manager 116 may disable the entertainment downloadmanager 114. Because requests are looked up using a combination of therequest! D and application ID, to ensure sandboxing of request look-upsand to ensure that the application ID is not provided by theapplication, the background transfer service has some means to determinethis information. The product id of the application may be obtained bycalling the security system, given the process ID of the application.

Turning to additional details of one example implementation, a firststep that the background transfer service client takes is to establishan RPC connection to the background transfer service server. This may bedone using the sequence in FIG. 4. The request ID is assumed to beunique to the system and is enforced by the background transfer service102. Note that the caller can specify whether the request ID is anexisting request, in which case the background transfer service willverify the product ID of the caller, (using the caller process IDobtained from RPC run time and use that to retrieve the product ID fromthe accounts database) and cross-check that with the existing requestID's product ID. The background transfer service 102 can also obtain theproduct ID of the RPC caller from the application instance manager usingan API call, e.g., the GetTaskInstanceInformation API, however thatrequires the task ID of the client process to be passed in to the API.The task ID can be passed in through the RPC forBtsCreateBackgroundTransferRequest from the background transfer serviceclient library. The background transfer service may independently verifythe validity of the task ID by comparing the process ID of the taskprocess obtained from GetTaskInstanceInformation with the caller processID obtained from RPC.

Enqueuing a background transfer request is generally represented in FIG.5. In one implementation, the background transfer service 102 supportsan application to queue a file transfer request using a combination of aunique request ID string, URI, a transfer file name and an HTTP verb.Supported verbs include GET (for download), and POST (for upload). Inaddition, the application can specify an allowed set of custom HTTPheaders to be added to the request). The application can also specifywhether the transfer requires the device to be plugged into AC power(including USB charging) and/or Wi-Fi.

An example sequence diagram for the enqueue request is shown in FIG. 5.In addition, the server side flow of the API is also shown. Thedifferent components shown in the diagram have been described above.

Note that the background transfer service client API 104 uses the RPCcontext handle obtained in FIG. 4 to communicate with the backgroundtransfer service 102. The background transfer service client API 104uses the data sharing service's API to translate the transfer file nameinto a file token ID string because the background transfer service(running in the standard rights chamber) cannot access the application'sisolated storage directly. The background transfer service API callsinto the background transfer service 102 through local (sync) RPCpassing in the RPC context handle created before and the transferparameters mentioned above, which includes the file token ID.

When the background transfer service 102 gets the RPC call, the servicechecks to see if the conditions are right to send the request to theentertainment download manager 114, or whether the background transferservice instead is to enqueue the request and send it to theentertainment download manager 114 later, when the conditions are right.

FIGS. 6A and 68 exemplify different conditions that may be checked. Forexample, step 602 validates the parameters, and only if validated isstep 604 performed for notifying the application instance manager 116.

To help optimize battery usage, the background transfer service allowsan application to specify that a transfer request be delayed until ACpower is available. In that case, the background transfer service onlystarts the transfer process with the entertainment download manager 114when the phone is on AC power (e.g., US8 powered). In addition, thebackground transfer service starts monitoring for a power state change,and if it turns to battery, the ongoing transfers may be paused in theentertainment download manager 114, until resumed when the phone returnsto AC power. Further, the background transfer service monitors for a lowbattery state, as well as checking the battery state at startup. If thebackground transfer service gets a low battery state notification, itwill pause transfers that it queued with the entertainment downloadmanager 114. The transfers are resumed when the battery statetransitions from low.

As represented via steps 606, 608, 610 and 612 if the, request is notdelayed and a low battery condition exists (also when a “battery savermode” is on), or the request is delayed and AC power is not available,the process branches to step 628 (entry point EP2) of FIG. 68 asdescribed below. Otherwise, step 614 represents preparing the downloadmanager and continuing to step 620 (entry point EP1) of FIG. 68.

Step 628 represents the successful branch of step 624 or the branch ofone of the above-described condition sets (steps 606, 608, 610 and 612).Step 628 enqueues the request to an in-memory queue, and persists therequest.

Step 628 represents the successful branch of step 624 or the branch ofone of the above-described condition sets (steps 606, 608, 610 and 612).Step 628 enqueues the request to an in-memory queue, preserves therequest and persists the request.

Returning to FIG. 5, the background transfer service calls into theapplication instance manager 116 to notify that a request has beenaccepted using NotifyRequestCreated( ) corresponding to step 604 of FIG.6A. This API may also return the license status of the application,which will be used to determine if the transfer can be started, bycalling into the entertainment download manager 114. If there arefailures in this background transfer service API further down, theapplication instance manager 116 is informed usingNotifyRequestCompleted( ), corresponding to step 626 of FIG. 6B.

The background transfer service calls into the entertainment downloadmanager 114 API, DownloadManagerCreate, to create a download ID. Thetransfer parameters may be passed through to the entertainment downloadmanager 114 API directly, e.g., with DM_TYPE_CONTENT |DM_PRIORITY_OPPORTUNISTIC | DM_PERSIST_LIBRARY | DM_FETCH_CACHED |DM_DONT_WANT_RESPONSE_STREAM flags set. The transfer parameters specifythe policies, namely allow 3G cellular transfers and Wi-Fi transfers orallow Wi-Fi only transfers. It also specifies the method of transfer,POST or GET. In addition, the application product ID (GUID) as well asmedia key (same as application request ID), may be specified. Theapplication product ID is used by the entertainment download manager 114to round-robin transfers across applications to mitigate starvation. Themedia key is used to have the entertainment download manager 114 store adownloaded file to the entertainment download manager 114 persistentcache as a unique file. The background transfer service 102 moves thefile from the cache to the application's store when the transfer issuccessful, e.g., using MoveFile support in the data sharing service110. Note that the MoveFile API does not copy the data when the move isnot across different logical volumes.

In response to DownloadManagerCreate, the entertainment download manager114 returns a download ID which the background transfer service saves inmemory (download IDs are not valid across reboots) together with therest of the transfer request parameters. The background transfer servicethen calls the entertainment download manager 114, DownloadManagerStart,and starts the transfer process.

Once the call to the entertainment download manager 114 for starting thetransfer is successful, the background transfer service saves therequest including the target file token ID associated with the requestto EDB (corresponding to step 628). Note that the data sharing service110 supports persisting file token IOs across reboots.

There may be a per-application limit of outstanding requests (e.g., adefault of five) which if present is enforced by the background transferservice. A registry setting or the like may override the default limit.This prevents one application from consuming too much of the systemresources, such as network bandwidth, battery, background transferservice memory, transfer file space and persistent store space.

A background transfer service client can optionally subscribe to receivetransfer progress notifications and an application callback will be madeat specific completion points of the transfer. The points at which thecallback will be made depend on the entertainment download manager 114'scallback into background transfer service, which occurs at intervalsdependent on the size of the file being transferred. As represented inFIG. 7, the background transfer service client may use the RPC contexthandle obtained in the creation step to make an RPC call into backgroundtransfer service to register for progress/completed notifications. ThisRPC may be an asynchronous RPC, since it is undesirable to have anydedicated threads blocked in the client or in the server. Note thatnotifications can arrive at a later point in time after the asynchronousRPC call is made.

FIGS. 8 and 9 represent the transfer progress and completionnotifications, respectively. Note that the background transfer service102 listens to the progress and completion notifications from theentertainment download manager 114. In the completion case, thebackground transfer service uses the services of the data sharingservice 110 to move the transfer file into the application's isolatedstorage in the case of a download. Once the request is delivered to theclient, the background transfer service 102 also deletes it from itspersistent store. The application instance manager 116 is also notifiedthat the request has been deleted, e.g., using NotifyRequestDeleted( ).

An application can cancel a transfer request that it queued at any pointin time; the sequence diagram for the cancel operation is shown in FIG.10. The request is identified using the opaque RPC context handle whichwas received as part of the creation step. Once the cancel request issuccessful, the transfer request is deleted from memory and thepersistent store. The application instance manager 116 is also notifiedthat the request has been completed using NotifyRequestCompleted( ).

An application may query the status of a transfer request (FIG. 11) thatit queued using the request handle received after calling theBtsCreateBackgroundTransferRequest API. The following information may bereturned from the latest cached result of the entertainment downloadmanager 114 state in background transfer service:

-   -   Request state.    -   Hr status of the transfer.    -   Http status of the transfer    -   Number of bytes received.    -   Total number of bytes expected to be received.    -   Number of bytes sent.    -   Total number of bytes expected to be sent.

An application can close the request handle at any point in time.Closing the request handle does not cancel the request but tears downthe RPC connection between the client process and the server process. Ifthe client process dies without closing the handle, the RPC run timenotifies the background transfer service 102 using context handlerundown callback.

An application can enumerate the outstanding requests queued by itselfthus far using an API (“BtsEnumBackgroundTransferRequests”). This isuseful when an application has queued a few requests with the backgroundtransfer service, got deactivated and comes back later on to find thestatus of the requests queued by it. The API only returns the requestinformation pertinent to the caller application product ID.

FIG. 12 is directed towards pausing the background transfer service 102.A platform component such as a resource manager can request that thebackground transfer service 102 be paused (e.g., if it detects that oneor more foreground networking applications are running). In response,the background transfer service enumerates the transfers that are queuedinto the entertainment download manager 114 usingDownloadManagerEnumDownloads API, with the task ID specified as part ofeach DownloadManagerCreate call. Once the transfers are enumerated, theymay be paused, e.g., one-by-one by calling the DownloadManagerPause API.A DownloadManagerPauseTaskDownloads API may be provided in theentertainment download manager 114 to make the above sequence doablewith one API call. Once the background transfer service has been paused,new enqueue requests are paused as well. They are resumed only after aspecific resume API call from a platform component.

In one implementation, there need not be a timer in the backgroundtransfer service 102 for automatic resumption from a pause. The resourcemanager ensures that the application is in the foreground, stillrunning, and is not under a lock screen. A crash of the resource managerreboots the mobile device because it is hosted in a shell program. Thebackground transfer service 102 ensures that only an appropriate chambercaller can call the pause API. Note that with a timer, an application isable to repeatedly call into the API, whereby a timer provides littlebenefit yet has some effect on battery life as well as other drawbacks.

FIG. 13 is directed towards resuming background transfer service 102.This resumes any transfers that background transfer service 102 hadpaused earlier, e.g., due to a pause API call. The background transferservice 102 ensures that only an appropriate chamber caller can call theresume API. The resumption order is the same as the request queue orderin background transfer service. This may be done using theDownloadManagerResume API; the entertainment download manager 114 mayprovide an API that makes the resume sequence doable with one API call.For a download, the entertainment download manager 114 will resume fromthe last paused point if the server supports HTTP range headers.

Querying the background transfer service state is represented in FIG.14. The background transfer service state may be active (meaning that itis running and not necessarily transferring), or paused and may bequeried using an API. In addition, the background transfer service mayalso return the count of the number of transfer requests that are intransferring and waiting/paused states.

In one implementation, a transfer request goes through the followingstates in the background transfer service, as represented in FIG. 15:

-   -   State 1501. Created: A background transfer service request has        been created by a background transfer service client using the        BtsCreateBackgroundTransferRequest API.    -   State 1502. Transferring: The background transfer service client        has queued the transfer request with the background transfer        service using the BtsEnqueueBackgroundTransferRequest API and        the background transfer service has passed on the request to the        entertainment download manager 114.    -   State 1503. Waiting: The transfer request is waiting in the        background transfer service queue since conditions for the        transfer have not been satisfied (e.g., for a delayed transfer,        the phone is not on AC power).    -   State 1504. Paused: The background transfer service was paused        by a first party application using the        BtsPauseBackgroundTransferService API request was paused due to        the application instance manager 116 notifying the background        transfer service 102 that the application's license has been        revoked. This will pause the transfers queued in background        transfer service thus far, including the waiting, transferring        and created transfer states. As opposed to using just the        waiting state, this state is useful for an application to        distinguish whether the delay of the transfer is deliberate        because a first party application (e.g., resource manager        application instance manager 116) paused the transfer or whether        it is accidental due to transfer conditions not being met.    -   State 1505. Completed: The transfer request has been completed        because it was canceled by the application using the        BtsCancelBackgroundTransferRequest API or it completed with        success or an error.

To optimize network bandwidth usage, the entertainment download manager114 may detect slow and hung transfers by checking whether the transferrate is below a threshold, so as to consider them as failed and applyretry policies on them. For example, if the transfer rate drops below xkbps on Wi-Fi, the transfer will be paused and resumed at a later time.The entertainment download manager 114 will fail transfers that are over20 MB if Wi-Fi is not available with a specific error. In that case, thebackground transfer service will monitor for Wi-Fi connectivity andrequeue the transfers with the entertainment download manager 114 whenWi-Fi is back up.

If the background transfer service detects that the expected file sizeis too large and the transfer request has not specified AC onlytransfer, then it may cancel the request with the entertainment downloadmanager 114 and return an error to the application. The callback willcarry both the expected total file size and currently transferred size.The entertainment download manager 114 may only allow a maximum numberof concurrent background transfers (e.g., limited to two or four or asimilar limit by default).

Further, the entertainment download manager 114 may throttle back themaximum number of concurrent transfers (default of one) if it detectsthat the media stack is streaming. Note that when there is no throttlingsupport exposed for clients (including the background transfer service)to use, the background transfer service 102 has to pause and resumetransfers automatically based on conditions in the system.

On loss of connectivity, the entertainment download manager 114 moves atransfer request to a waiting state and starts the transfer whenconnectivity comes back on. If connectivity does not come back on withina timeout, the transfer is canceled by the entertainment downloadmanager 114 and a connection timeout error reported to the backgroundtransfer service 102. In that case, the background transfer service willmonitor for connectivity and requeue the transfers with theentertainment download manager 114 when connectivity is back up. Aconnection manager chooses from available connections based uponbandwidth. Thus, in the absence of any specific preferences orrequirements (or mapping policy), it will select DTPT (DesktopPass-through), Wi-Fi, and cellular in that order. Note that in oneimplementation, once a transfer has started, the type of connection willnot change.

The background transfer service 102 performs monitoring in order toqueue requests into the entertainment download manager 114, includingwhether the device has connectivity or not. This is done because theentertainment download manager 114 fails a transfer if connectivity isnot available in a certain time, (e.g., 1 minute by default). Hence, thebackground transfer service monitors connection availability. Thebackground transfer service also monitors the device's power state(AC/battery, battery status).

The background transfer service may queue application requests with thesame priority with the entertainment download manager 114, e.g.,background priority (OM_TYPE_CONTENT, DM_PRIORITY_OPPORTUNISTIC), whichis the lowest of the three entertainment download manager 114priorities. This is to make sure that third party transfers do notinterfere much with first party transfers such as marketplace downloads.

The entertainment download manager 114 supports an application ID to bepassed along with each DownloadManagerCreate call as part of thetransfer parameters. The background transfer service passes theapplication product ID as the application ID when it creates thetransfer request with the entertainment download manager 114. Theentertainment download manager 114 will round robin using theapplication ID in each queue so that requests from one application IDcannot starve other application requests. Thus, if the entertainmentdownload manager 114 queue contains AppId0(0), AppId0(1),AppId1(0),AppId2(0), the scheduling algorithm picks these requests inorder: AppId(0),AppId1(0),AppId2(0),AppId0(1), where AppIdX(y) indicatesapplication X's yth request. The entertainment download manager 114 maylimit the maximum number of concurrent transfers for acceptable deviceperformance. In order to prevent one application from taking all thetransfer slots in the entertainment download manager 114 andtransferring large files, the entertainment download manager 114 maytime slice (e.g., two minutes) among applications in a round robin basisand forcibly pause transfers if needed. Note that the entertainmentdownload manager 114 marketplace downloads can take a while go into theopportunistic queue and will multiplex with the background transferservice applications and be included in the round-robin.

With respect to security, the background transfer service 102 may run inthe standard rights chamber and be co-hosted with other services inservicesd.exe. RPC security policy may be specified for the backgroundtransfer service to allow low privileged chamber applications to callinto background transfer service using RPC. As appropriate, thebackground transfer service cross checks the calling process's productID using the accounts database AP is and ensure that one applicationcannot call background transfer service APIs on behalf of anotherapplication. Note that because most background transfer service thirdparty application APIs use RPC context handles (not directly but as aside effect of using request handles are wrappers of RPC contexthandles), they should be protected from spoofing since RPC runtime ishardened against that. However, BtsCreateBackgroundTransferRequest doesnot take an RPC context handle and instead takes a request ID (which ispreferably a GUID) because it is the API that creates the contexthandle. That API may be hardened against spoofing.

The background transfer service 102 starts when the first call to theAPI is made by an application. It then checks if it needs to resume anypreviously incomplete transfers it can start up at boot. For performancereasons, processing immediately after service startup may be delayed,e.g., by using the RegisterDelayedBootWork API. The background transferservice 102 checks the persistent store looking for request items thathave been marked with the transferring, paused, or waiting states andthen sends them to the entertainment download manager 114 to start thetransfer process, or queues them in memory for conditions to be right(e.g., a delayed transfer request with the phone currently on battery)for the transfer process to start. After this is done, the backgroundtransfer service can enable its RPC interface and start receiving callsfrom clients. It also calls into the application instance manager 116 toindicate startup using NotifyBackgroundServiceStart( ) and callsNotifyRequestCreated( ) to inform the application instance manager 116that the background transfer service 102 has created a new request. Whena new request is created using BtsCreateBackgroundTransferRequest API,in one implementation, the background transfer service 102 calls intothe application instance manager 116 using NotifyRequestCreated onlyonce per request.

The background transfer service 102 may also check if its request queuehas been empty for more than some time (e.g., two minutes) and self-stopon idle. The background transfer service 102 can be reactivated by thebackground transfer service client using ActivateService( ). It willalso call into the application instance manager 116 to indicate stopusing NotifyBackgroundServiceStop( ).

With respect to reliability and error handling, the background transferservice 102 may depend on the entertainment download manager 114 tosurface transfer errors to it. Once a transfer error is reported by theentertainment download manager 114, or there are other backgroundtransfer service errors that prevent a request from completion, it willmove the request to the completed state but save the completed status,bytes transferred so far, total expected bytes, and http status alongwith the request in the persistent store so that an application canlater query it. The application deletes requests from the store when ithas acted on the result of the transfer appropriately.

With respect to application uninstall, the background transfer service102 authors an in-process COM server that implements theIBackgroundServiceProxy interface so that the application instancemanager 116 can notify the background transfer service when anapplication is uninstalled or its license revoked/reinstated. Thebackground transfer service notifies the application instance manager116 of the creation and deletion of each request as well as when thebackground transfer service 102 has started and is ready to acceptnotifications from the application instance manager 116

When an application is uninstalled, the background transfer servicedeletes the requests corresponding to the application. When theapplication license is revoked, the background transfer service changesthe request state to paused along with the status that indicates thatthe license has been revoked. In this state, APIs that change transferrequest state (BtsEnqueueBackgroundTransferRequest, etc.) are not madeand they will fail with a licensing error. When the license isreinstated, the request will follow the “transfer conditions are met”path (state 1503 to state 1502 in FIG. 15).

Only a small number of bytes per request need be saved in memory. Acandidate list (based on access rate) includes:

-   -   1. Fixed length request ID.    -   2. Fixed length application product ID.    -   3. Request state.    -   4. Number of bytes transferred.    -   5. Total number of bytes.    -   6. Status of a transfer.

If the data pertinent with the request is not available, the persistentstore is referenced. In one implementation, the background transferservice 102 does not park threads for rare events and instead usesthread pooling.

A background transfer service client can optionally subscribe totransfer progress notifications and an application callback will be madeat specific completion points of the transfer. The points at which thecallbacks are made depend on the entertainment download manager 114'scallback into the background transfer service, which occurs at arbitraryintervals. The background transfer service client may use the RPGcontext handle obtained in the creation step to make an RPG call intobackground transfer service to register for progress/completednotifications.

As can be seen, the background transfer service provides service tothird party applications for transferring files from/to theapplication's isolated storage in the background, e.g., by using thehttp/https protocol. The background transfer service provides a set ofAPIs to third party applications for submitting file transfer requests,checking request status, registering for complete and progressnotification or canceling the request. The background transfer servicemanages requests and processes them even when the application has beendehydrated, terminated or following device reboot. It reports the statusback to application.

Exemplary Operating Environment

FIG. 16 illustrates an example of a suitable mobile device 1600 on whichaspects of the subject matter described herein may be implemented. Themobile device 1600 is only one example of a device and is not intendedto suggest any limitation as to the scope of use or functionality ofaspects of the subject matter described herein. Neither should themobile device 1600 be interpreted as having any dependency orrequirement relating to any one or combination of components illustratedin the exemplary mobile device 1600.

With reference to FIG. 16, an exemplary device for implementing aspectsof the subject matter described herein includes a mobile device 1600. Insome embodiments, the mobile device 1600 comprises a cell phone, ahandheld device that allows voice communications with others, some othervoice communications device, or the like. In these embodiments, themobile device 1600 may be equipped with a camera for taking pictures,although this may not be required in other embodiments. In otherembodiments, the mobile device 1600 may comprise a personal digitalassistant (PDA), hand-held gaming device, notebook computer, printer,appliance including a set-top, media center, or other appliance, othermobile devices, or the like. In yet other embodiments, the mobile device1600 may comprise devices that are generally considered non-mobile suchas personal computers, servers, or the like.

Components of the mobile device 1600 may include, but are not limitedto, a processing unit 1605, system memory 1610, and a bus 1615 thatcouples various system components including the system memory 1610 tothe processing unit 1605. The bus 1615 may include any of several typesof bus structures including a memory bus, memory controller, aperipheral bus, and a local bus using any of a variety of busarchitectures, and the like. The bus 1615 allows data to be transmittedbetween various components of the mobile device 1600.

The mobile device 1600 may include a variety of computer-readable media.Computer-readable media can be any available media that can be accessedby the mobile device 1600 and includes both volatile and nonvolatilemedia, and removable and non-removable media. By way of example, and notlimitation, computer-readable media may comprise computer storage mediaand communication media. Computer storage media includes volatile andnonvolatile, removable and non-removable media implemented in any methodor technology for storage of information such as computer-readableinstructions, data structures, program modules, or other data. Computerstorage media includes, but is not limited to, RAM, ROM, EEPROM, flashmemory or other memory technology, CD-ROM, digital versatile disks (DVD)or other optical disk storage, magnetic cassettes, magnetic tape,magnetic disk storage or other magnetic storage devices, or any othermedium which can be used to store the desired information and which canbe accessed by the mobile device 1600.

Communication media typically embodies computer-readable instructions,data structures, program modules, or other data in a modulated datasignal such as a carrier wave or other transport mechanism and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, Bluetooth®, Wireless USB, infrared, Wi-Fi, WiMAX, andother wireless media. Combinations of any of the above should also beincluded within the scope of computer-readable media.

The system memory 1610 includes computer storage media in the form ofvolatile and/or nonvolatile memory and may include read only memory(ROM) and random access memory (RAM). On a mobile device such as a cellphone, operating system code 1620 is sometimes included in ROM although,in other embodiments, this is not required. Similarly, applicationprograms 1625 are often placed in RAM although again, in otherembodiments, application programs may be placed in ROM or in othercomputer-readable memory. The heap 1630 provides memory for stateassociated with the operating system 1620 and the application programs1625. For example, the operating system 1620 and application programs1625 may store variables and data structures in the heap 1630 duringtheir operations.

The mobile device 1600 may also include other removable/non-removable,volatile/nonvolatile memory. By way of example, FIG. 16 illustrates aflash card 1635, a hard disk drive 1636, and a memory stick 1637. Thehard disk drive 1636 may be miniaturized to fit in a memory slot, forexample. The mobile device 1600 may interface with these types ofnon-volatile removable memory via a removable memory interface 1631, ormay be connected via a universal serial bus (USB), IEEE 16394, one ormore of the wired port(s) 1640, or antenna(s) 1665. In theseembodiments, the removable memory devices 1635-1637 may interface withthe mobile device via the communications module(s) 1632. In someembodiments, not all of these types of memory may be included on asingle mobile device. In other embodiments, one or more of these andother types of removable memory may be included on a single mobiledevice.

In some embodiments, the hard disk drive 1636 may be connected in such away as to be more permanently attached to the mobile device 1600. Forexample, the hard disk drive 1636 may be connected to an interface suchas parallel advanced technology attachment (PATA), serial advancedtechnology attachment (SATA) or otherwise, which may be connected to thebus 1615. In such embodiments, removing the hard drive may involveremoving a cover of the mobile device 1600 and removing screws or otherfasteners that connect the hard drive 1636 to support structures withinthe mobile device 1600.

The removable memory devices 1635-1637 and their associated computerstorage media, discussed above and illustrated in FIG. 16, providestorage of computer-readable instructions, program modules, datastructures, and other data for the mobile device 1600. For example, theremovable memory device or devices 1635-1637 may store images taken bythe mobile device 1600, voice recordings, contact information, programs,data for the programs and so forth.

A user may enter commands and information into the mobile device 1600through input devices such as a key pad 1641 and the microphone 1642. Insome embodiments, the display 1643 may be touch-sensitive screen and mayallow a user to enter commands and information thereon. The key pad 1641and display 1643 may be connected to the processing unit 1605 through auser input interface 1650 that is coupled to the bus 1615, but may alsobe connected by other interface and bus structures, such as thecommunications module(s) 1632 and wired port(s) 1640. Motion detection1652 can be used to determine gestures made with the device 1600.

A user may communicate with other users via speaking into the microphone1642 and via text messages that are entered on the key pad 1641 or atouch sensitive display 1643, for example. The audio unit 1655 mayprovide electrical signals to drive the speaker 1644 as well as receiveand digitize audio signals received from the microphone 1642.

The mobile device 1600 may include a video unit 1660 that providessignals to drive a camera 1661. The video unit 1660 may also receiveimages obtained by the camera 1661 and provide these images to theprocessing unit 1605 and/or memory included on the mobile device 1600.The images obtained by the camera 1661 may comprise video, one or moreimages that do not form a video, or some combination thereof.

The communication module(s) 1632 may provide signals to and receivesignals from one or more antenna(s) 1665. One of the antenna(s) 1665 maytransmit and receive messages for a cell phone network. Another antennamay transmit and receive Bluetooth® messages. Yet another antenna (or ashared antenna) may transmit and receive network messages via a wirelessEthernet network standard.

Still further, an antenna provides location-based information, e.g., GPSsignals to a GPS interface and mechanism 1672. In turn, the GPSmechanism 1672 makes available the corresponding GPS data (e.g., timeand coordinates) for processing.

In some embodiments, a single antenna may be used to transmit and/orreceive messages for more than one type of network. For example, asingle antenna may transmit and receive voice and packet messages.

When operated in a networked environment, the mobile device 1600 mayconnect to one or more remote devices. The remote devices may include apersonal computer, a server, a router, a network PC, a cell phone, amedia playback device, a peer device or other common network node, andtypically includes many or all of the elements described above relativeto the mobile device 1600.

Aspects of the subject matter described herein are operational withnumerous other general purpose or special purpose computing systemenvironments or configurations. Examples of well known computingsystems, environments, and/or configurations that may be suitable foruse with aspects of the subject matter described herein include, but arenot limited to, personal computers, server computers, hand-held orlaptop devices, multiprocessor systems, microcontroller-based systems,set top boxes, programmable consumer electronics, network PCs,minicomputers, mainframe computers, distributed computing environmentsthat include any of the above systems or devices, and the like.

Aspects of the subject matter described herein may be described in thegeneral context of computer-executable instructions, such as programmodules, being executed by a mobile device. Generally, program modulesinclude routines, programs, objects, components, data structures, and soforth, which perform particular tasks or implement particular abstractdata types. Aspects of the subject matter described herein may also bepracticed in distributed computing environments where tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules may be located in both local and remote computer storage mediaincluding memory storage devices.

Furthermore, although the term server may be used herein, it will berecognized that this term may also encompass a client, a set of one ormore processes distributed on one or more computers, one or morestand-alone storage devices, a set of one or more other devices, acombination of one or more of the above, and the like.

Conclusion

While the invention is susceptible to various modifications andalternative constructions, certain illustrated embodiments thereof areshown in the drawings and have been described above in detail. It shouldbe understood, however, that there is no intention to limit theinvention to the specific forms disclosed, but on the contrary, theintention is to cover all modifications, alternative constructions, andequivalents falling within the spirit and scope of the invention.

1-20. (canceled)
 21. A system comprising: at least one processing unit;and a background transfer service implemented on the at least oneprocessing unit and configured to run on a mobile device at aplatform-level to control data transfers of a plurality of applications,the data transfers comprising data transfers from a first backgroundapplication and a second background application, the at least oneprocessing unit programmed to: manage application requests for the datatransfers based upon one or more policies that control resource usage ofbackground application data transfers to limit interference withforeground application operations; prioritize a first data transfer forthe first background application over a second data transfer for thesecond background application; receive information indicating that alicense of one or more of the first and second background applicationsis revoked; and pause one or more of the first and second data transferrequests corresponding to the one or more first and second backgroundapplications having the revoked license.
 22. The system of claim 21,wherein the at least one processing unit is further programmed to:generate one or more notifications associated with the data transferscurrent progress; and provide the one or more notifications to theplurality of applications that requested the data transfers.
 23. Thesystem of claim 22, further comprising a data sharing service configuredto one of move or copy one or more of the following: data transferredfrom the remote source into isolated storage associated with theapplication, and data from isolated storage associated with theapplication for transferring the data to the remote source.
 24. Thesystem of claim 21, further comprising an application instance managerconfigured to provide to the background transfer service a notificationrelated to one or more of the following: application uninstall status,and license revocation or reinstatement status.
 25. The system of claim21, wherein the at least one processing unit is further programmed to:receive information indicating that one or more of the first and secondbackground applications are being uninstalled; and cancel one or more ofthe first and second data transfer requests corresponding to the one ormore first and second background applications being uninstalled.
 26. Thesystem of claim 21, wherein the second background application istombstoned.
 27. In a computing environment, a method performed at leastin part on at least one processor, the method comprising: transferringdata on behalf of one or more applications including a foregroundapplication and a first background application and a second backgroundapplication that are in the background during at least part of thetransferring of the data, wherein transferring the data furthercomprises: receiving a first data transfer request from the firstbackground application and a second data transfer request from thesecond background application; prioritizing the first data transferrequest over the second data transfer request based upon one or morepolicies that control resource usage of background application datatransfers; queuing information corresponding to the first and seconddata transfer requests from the first background application and thesecond background application in a request queue based upon the one ormore policies that control resource usage of background application datatransfers; receiving information indicating that a license of one ormore of the first and second background applications is revoked; andpausing one or more of the first and second data transfer requestscorresponding to the one or more first and second backgroundapplications having the revoked license.
 28. The method of claim 27,further comprising managing one or more of the first and second datatransfer requests by determining whether one or more transfer conditionsare met, and if not, moving the one or more first and second datatransfer requests to a waiting state until the one or more transferconditions are met.
 29. The method of claim 27, further comprisingmanaging one or more of the first and second data transfer requests bydetermining whether to allow the one or more first and second datatransfer requests based upon a size of the data to transfer.
 30. Themethod of claim 27, further comprising managing one or more of the firstand second data transfer requests by detecting a slow transfer state bychecking whether a transfer rate is below a threshold, and in responseto detecting the slow transfer state, waiting for a changed conditionbefore resuming the transferring of the data.
 31. The method of claim27, further comprising: receiving information indicating that one ormore of the first and second background applications are beinguninstalled; and canceling one or more of the first and second datatransfer requests corresponding to the one or more first and secondbackground applications being uninstalled.
 32. The method of claim 27,wherein the second background application is tombstoned.
 33. The methodof claim 32 further comprising: receiving information indicating thatthe license of the one or more first and second background applicationsis reinstated; and resuming the paused one or more first and second datatransfer requests corresponding to the one or more first and secondbackground applications having the reinstated license.
 34. The method ofclaim 27 further comprising: receiving information indicating that oneor more of the first and second background applications has changed froma background application to a new foreground application; andre-prioritizing at least one pending data transfer request of the newforeground application.
 35. The method of claim 27 further comprising:receiving information indicating that an application has changed from aforeground application to a third background application; andre-prioritizing at least one pending data transfer request of the thirdbackground application.
 36. One or more computer storage devices havingcomputer-executable instructions, which on execution perform operations,comprising: receiving data transfer requests from a plurality ofapplications, the plurality of applications comprising a firstbackground application and a second background application, the datatransfer requests comprising a first data transfer request to downloaddata on behalf of the first background application and a second datatransfer request to download data on behalf of the second backgroundapplication; prioritizing the first data transfer request over thesecond data transfer request based upon one or more policies thatcontrol usage of background application data transfers; receivinginformation indicating that a license of one or more of the first andsecond background applications is revoked; and pausing one or more ofthe first and second data transfer requests corresponding to the one ormore first and second background applications having the revokedlicense.
 37. The one or more computer storage devices of claim 36 havingfurther computer-executable instructions comprising: receiving a requestfor status information from one or more of the first and secondbackground applications, the status information related to a status ofthe first and second data transfer requests associated with therequesting one or more of the first and second background applications;and returning status information in response to the request.
 38. The oneor more computer storage devices of claim 36 having furthercomputer-executable instructions comprising: receiving a third datatransfer request comprising an upload request to upload other data onbehalf of a third application of the plurality of applications; queuingother information corresponding to the upload request in the requestqueue; processing the other information from the request queue,including communicating with a service that has rights to access theother data in a second isolated storage associated with the thirdapplication; and uploading the other data on behalf of the thirdapplication.
 39. The one or more computer storage devices of claim 36,wherein the isolated storage associated with the first backgroundapplication comprises a local storage unique to the first backgroundapplication that provides different access rights represented by one ormore privilege chambers.
 40. The one or more computer storage devices ofclaim 35, wherein the second background application is tombstoned.