AU6721200A - Method and system for transmitting a chain of messages for database - Google Patents

Method and system for transmitting a chain of messages for database Download PDF

Info

Publication number
AU6721200A
AU6721200A AU67212/00A AU6721200A AU6721200A AU 6721200 A AU6721200 A AU 6721200A AU 67212/00 A AU67212/00 A AU 67212/00A AU 6721200 A AU6721200 A AU 6721200A AU 6721200 A AU6721200 A AU 6721200A
Authority
AU
Australia
Prior art keywords
chain
message
messages
memory
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
AU67212/00A
Other versions
AU771174B2 (en
Inventor
Michael John Hill
Christophe Nicolas
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nagravision SARL
Original Assignee
Nagravision SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nagravision SA filed Critical Nagravision SA
Publication of AU6721200A publication Critical patent/AU6721200A/en
Application granted granted Critical
Publication of AU771174B2 publication Critical patent/AU771174B2/en
Assigned to NAGRAVISION S.A. reassignment NAGRAVISION S.A. Alteration of Name(s) in Register under S187 Assignors: NAGRACARD S.A.
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/216Handling conversation history, e.g. grouping of messages in sessions or threads
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/418External card to be used in combination with the client device, e.g. for conditional access
    • H04N21/4181External card to be used in combination with the client device, e.g. for conditional access for conditional access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/65Transmission of management data between client and server
    • H04N21/654Transmission by server directed to the client
    • H04N21/6547Transmission by server directed to the client comprising parameters, e.g. for client setup
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating

Abstract

The invention concerns a method and a system for transmitting a chain of messages for updating a database between a management centre and a plurality of geographically distributed subscriber databases. Each message comprises a chain identifier (FM) and a chain index (FI) for identifying the message in the chain. If a message is not received following a disturbance in the connection, the processing of the next messages can block the databases. In order to remedy that inconvenience, the solution consists in assigning to each message a block status (CD) which determines whether said message is to be processed without referring to the members of the chain and what are the conditions concerning the prior processing of members of the chain.

Description

- 1 MESSAGE CHAINING TRANSMISSION PROCESS AND SYSTEM FOR DATA BASES. The present invention concerns a process and system of database updating, and in particular during the transmission of a chain of messages. 5 In a system comprising a management centre and a plurality of subscribers over a wide territory, the sending by telephone or hertz route of updating information of the database of these subscribers is known. These messages are addressed, either to all subscribers, or to one subscriber in particular, that is to say that it contains a subscriber module address. 10 These messages are for the administration of the system and are themselves superposed to the useful data such as video, audio or data. One understands that the place used by these messages is limited. Another limitation applies to the length of the message which is limited by the fact that the useful data cannot be interrupted but for a short moment. One understands that, in the example of an audio/video 15 transmission, the emission channel cannot be interrupted but for a short moment so that no visual impact will be perceptible. This is why, for transmission of a large amount of data, it has been necessary to divide them in a large number of messages. These messages are sent in sequence on the network, in a logic order, that is to say 20 one after the other, separated by a short interval, for example one second. As certain systems of this type do not use return towards the managing centre, as for example a modem, it is difficult for the managing centre to know if the sent data has arrived correctly. In this way, it is obliged to repeat these messages periodically so as to statistically ensure that each message has arrived at destination. 25 A subscriber module includes schematically a numerical, audio, video or data receiver, to see a combination of these three types, a decoder able to separate the management messages, these latter being directed towards a security module comprising the subscriber database. This security module can be directly installed in -2 the subscriber module or, for security and cost reasons, it can be as a detachable module such as an intelligent card or microchip card. The messages arriving at the security module are processed by the control-data reader. It is possible that the messages do not arrive in the emission order because 5 of interferences in the transmission or simply as the subscriber's unit was not engaged at the moment of the sending of previous messages. It is necessary to specify that prior to each processing, each message is first decrypted and controlled for its authenticity. A message which does not satisfy the control criteria is rejected. In this hypothesis, the security module will receive for example the sign message 3 10 before the sign messages 1 and 2. The execution of the sign message 3 without the prerequisite execution of two previous messages can lead to blocking of the database or to a certain error. A first solution consists in memorising all messages constituting a chain and, when it is complete, to proceed to its processing. This solution has the drawback to establish 15 the length of the maximum chain according to the memory available. The memory capacity of detachable intelligent cards is limited, which obliges the card to process each message at each arrival. The problem that the present invention proposes to solve, is to suppress on the subscriber's database the disastrous effects due to the execution of messages in an 20 order different to that initially foreseen. This aim is fully reached by a transmission process of a chain of subscriber's database management messages, a process consisting to associate a conditional block which determines if the message is to be processed without reference to all or part of others element of the chain or the conditions bound to the previous 25 processing of all or part of other elements of the chain. In fact, due to this new conditional block included in each message elements of a chain, it is possible to determine if this message can be processed separately or must satisfy the conditions of processing of the messages considered to be received first. It is obvious that this test allows also to determine if the message in evaluation 30 has already been processed.
-3 To reach this aim, the security module disposes of a memory organized under the form of table indicating, for each chain which are part of the messages of this chain already having been made object of a processing. After processing of all the elements of the chain, the table of this chain is maintained in order to avoid that the 5 returning of the same chain restarts its execution. It can be deleted on request of the management centre or after a predefined time. The conditional block contained in the message does not contain only a simple indication binding the processing of the message in progress to condition of having carried out the previous message, but also covers the more complex functions, such 10 as conditions on each element of the message chain. For example, it is possible to submit the processing of element 4 of the chain on the condition that both elements 1 or 2 are processed and that element 3 is categorically processed. We will thus have the function: F(4) = (1 or 2) and 3. 15 We take the example of the arrival to the security module of the message element of family 5, this message being element 4 of this family. The first operation will be to determine if its processing is submitted to other conditions. If this is not the case, it can be processed immediately. It should be noted that to chain messages does not mean that the processing must be made in the index order of the chain. One can 20 imagine the case where one loads a significant software, and for this reason, one divides it to transmit it in a chain of messages. Each of these messages contains a charging address and the corresponding data. This is why an element of the chain can be processed in a indifferent order. On the other hand, the last element of the chain starting this new software will contain a condition stating that all the elements 25 of the chain must have been carried out in order that this one can be carried out for its part. When this condition has been satisfied, the table correspondent to this family indicates that all messages have been carried out. According to a variant of the invention, the conditional block is divided in two parts, the one called "operation" to describe the type of logic function and the other called 30 "interested element" to describe on which other elements the operation must apply. The size of the part "interested element" corresponds to the size used in the table -4 stored in the database designating the state of processing the elements of the chain. In this way, the logic comparison is greatly facilitated. According to other embodiments, the conditional block refers not to all the other elements of the chain, but to some only. It would be for example possible referring to 5 three previous elements and not to all the elements. This allows to reduce the length of the conditional block and takes into account the fact that an interference rarely exceeds the time of three messages. According to another example, one could define a chain structure where only the last element contains a conditional block. This structure allows, unlike the solutions of the prior art, to reject only a minimum of 10 message. In fact, when a message is missed in a chain, all the following messages were rejected until the new passage of the missing message. The execution of a chain was in this way dependent upon the continuous receiving of elements of the chain, each element missing having as a consequence to reject all the index messages higher than missing message. 15 According to an embodiment of the invention, the subscriber module, besides sending the messages to the security module, includes a memory to memorise them as soon as they arrive. Therefore, it is possible that the absence of a message containing a condition on a preceding message leads to reject all the following messages. When this attended 20 message arrives, it is of course processed authorising the processing of other messages. It is possible on the other hand that a great deal of time elapses before these are present in the transmission with the risk that some are rejected, for example due to the bad quality of the connection between the managing centre and the subscriber module. 25 To minimize the number of repeated messages necessary for the chain is finally carried out in its entirety, the security module can accede to memory situated in the subscriber module because it contains all the messages in their arrival order. Thus, as soon as the arrival of the missing message and its processing has been accomplished, the security module asks the reading of the memory to process all the 30 messages which have been rejected because of the condition on the missing message.
-5 An important aspect of the invention lies in presenting each message to the security module together with the storage in memory in the subscriber module. This principle can include exceptions when some messages are not destined to the security module but only to the module of the subscriber. Thus, even if some messages are 5 rejected by the security module as the conditions are not fulfilled, this system knows that this message is contained in the memory of the subscriber module and can, when the condition is fulfilled, accede to memory to carry out these messages instead of awaiting a next passage of following messages. In an embodiment, the memory of the subscriber module is organised as a stack with 10 entry in series, each new entry causing the displacement of previous entry. The reading by the security module can be realised in different ways. It can ask the transmission of an exact address of the memory. Nevertheless, an important aspect of the security in this kind of application lies in the confidentiality of the organisation of data. For this reason, instead asking the transmission of a specific address, the 15 security module asks the subscriber module to submit all or part of messages contained in its memory. A loading of the security module remains to sort out between the messages already carried out and the messages to carry out. The invention will be better understood based on the following detailed description which refers to annexed drawings which are given by way of a non limitative 20 example, wherein: - Figure 1 represents a message such as that sent in the systems of prior art; - Figure 2 represents a message such as that sent according to the invention; - Figure 3 represents an example of updating the temporary memory of the subscriber module. 25 In Figure 1 the different blocks of a message which take part in the function of chaining are represented schematically. We find a first heading block HD, which describes the kind of message, and contains the information that this message is part of a chain. To form the chain, a second family block FM indicates to which family this message belongs. In fact, it is possible that several chains are transmitted 30 simultaneously and in this case the identification of the family is necessary. Now that -6 the family is defined, the subsequent block FI is used to identify each element of the family and its place in the chain. So, with these two data, each element of the family can be placed again end to end with the other elements of the same family if necessary. It is known to indicate in one or the other of control blocks FI or FM the 5 maximum number of the element of the family. This function can equally be obtained by a particular marking of last element of the family. In the example of figure 2, the message of Figure 1, starting the two blocks FM and Fl, one sees adjoining a supplementary block CD which determines a condition to carry out this message. According to a first embodiment of the invention, this block is 10 constituted by a bit which indicates if the previous message should or should not be executed. If this condition is requested, the interpreter in charge of operations on the database, will verify if the previous message has been executed properly and will execute this new message. In another embodiment, this conditional block CD is constituted by a field realised 15 with groups, a group for each element of the chain. Each group contains a condition on an element of the chain and can have several meanings, for example the condition "must have been executed", "can be executed" or "must not be executed". The latter condition generally corresponds to the first. We take the example of a chain of 6 elements, the element 3 should forcedly be 20 carried out before element 5. In this case, one can specify in message 3 that it should not be carried out if message 5 has been done. This condition can lead to a locking if one does not specify the inverted condition in message 5. In this case, message 5 will contain the condition "must be executed", on message 3 in order that if message 5 arrived before 3, it will be not processed. 25 In Figure 3, an implementation of the memory M of the subscriber module and the connection with the security module are represented. The incoming flux is firstly filtered by a module SEL, which has the scope to separate the managing messages of other data. These messages are then transmitted to the selection module SW which has the scope to send them to different modules that is to say the security 30 module SM, to the processing centre CTR of the subscriber module STB and to memory M of the subscriber module. The placing in memory of these messages -7 causes the increasing of the number of incoming messages so that no message will be lost, the oldest message being then eliminated from the memory. In the same way, these messages are transmitted to the security module, represented here as an intelligent card SM. This card SM contains a first memory managing module GM and 5 a control interpreter INT for managing the controls of the database BD. This memory manager GM can dialogue with the processing centre CTR by the connection 1/O and by this means, to influence the connections in the selection module SW. The dotted line represented in Figure 3 represents the subscriber module STB. All the managing messages addressed to the security module SM are directed by the 10 selector SW to the security module, in particular to the management of memory GM, then are transmitted to the control interpreter if the carrying out conditions are fulfilled. The memory manager GM updates the table of messages carried out to make the necessary comparisons at the moment of the arrival of a new message. The connection with the intelligent card SM is of in/out type and in this way 15 information and controls can be sent to destination of the subscriber module, connection represented by the line 1/O. As explained previously, the memory M is physically in the subscriber unit STB. This is why the card SM can, by the intermediate of the line 1/0, ask the availability of a memory section so as to be able to store the messages of a chain. In our example, the maximum number of elements 20 in a chain does not exceed 16. So, at the arrival of the first element of the chain, the card SM, by the line 1/O, requests the reservation of at least 16 memory places. If, during the transmission of this first chain, another chain is announced, the card will ask the reservation of 16 new places in order to assure the storage of a maximum number of the chain according to the receiving conditions. 25 In order to read the data contained in the memory M, for example the position M3, the card SM can order, through the selector SW, the address multiplexer AMUX to return the content of this memory position. In order to forward these data towards the card, a data multiplexer DMUX has the function to read the memory position required and to transfer it towards the card. These different transfers are directed by the 30 selector SW. When the carrying out of the chain has been interrupted by the lack of a interference on a message for example, the other messages continue to be stored in the memory -8 of the subscriber module. When the missing message is retransmitted by the managing centre, it is executed properly and the memory manager GM recalls all the other messages of the chain acceding the memory of the subscriber module. In this case, the entry of the intelligent card SM is not made any longer on the arrival of 5 messages but on the contents of the memory M. This access to memory M can be made in direct access specifying a memory address, or by sequential access reading the messages in their arrival order. In an embodiment, the memory M is organized as a memory buffer of a fixed length according to the availability of the free memory of the subscriber module. This 10 memory includes an entry number increased on each message introduced in the memory, and an exit number increased on each reading by the memory manager GM. The dialogue possibility between the card SM and the subscriber module STB, in particular the centre CTR, authorises more complex functions. One of problems 15 frequently met at the moment of the exchange of one or the other of elements of the system, both the card or the subscriber module, is to assure the compatibility of functions with the material of previous generations. For this, it is interesting to allow dialogue between the different elements in order to establish the functions available in each of them; this is the scope of the line 1/O which allows to send instructions of 20 the card to the subscriber module. These instructions can, for example, ask the subscriber module to communicate its audio, video or data functions, the generation of the module or the software version. To answer to this request, the module STB disposes of means to compose a managing message and to transmit it, in the memory M for further reading by the card, or directly to card, such as represented in 25 Figure 3. According to another embodiment of the invention, the module STB disposes of a connection by modem with the managing centre. In this case, the announcement of resources can be made by the module STB to the managing centre through the modem, on request of the security module SM. 30 As indicated in Figure 3, the module STB receives in the same way the managing messages coming from the managing centre. The messages arriving to the -9 processing centre CTR can contain a configuration request instruction. The response can be made by the modem or be transmitted to card SM. Some of these managing messages are only destined to the module STB and the processing centre CTR, responsible to the management of the module STB, will not transmit them to the 5 security module SM or to memory M.

Claims (15)

1. Method of transmission of chain of database managing messages between a management centre and a plurality of subscriber databases, each management message comprising a chain header (HD), a chain identifier (FM) allowing the simultaneous transmission of several chains and a chain index (Fl) allowing to identify the message in the chain, characterized in that it consists in adding to each message a conditional block (CD) which determines if this message is to be processed without references to all or part of elements of the chain or to be processed according to the conditions linked to the previous processing of all or part of elements of the chain.
2. Method of transmission according to claim 1, characterised in that it consists in determining according to the conditional block (CD) if all or part of elements of the chain can, or must, or must not have been processed first.
3. Method of transmission according to claim 1 or 2, characterized in that it consists in managing a table to the heart of the subscriber database containing a piece of information representing the processing state of each element of the chain, and to update said table every time that an element of the chain is processed, and to restart said table either on request of the managing centre, or after a predefined time.
4. Method of transmission according to claims 1 to 3, characterised in that the subscriber database is linked to a subscriber unit and in that it consists in memorising the management messages in a memory of the subscriber unit and to present them on request to the database.
5. Method of transmission according to claim 4, characterised in that it consists in memorising in series the incoming messages, each incoming message causing the increasing of a stack pointer of incoming messages, and to allow a direct access of the messages asked from the database.
6. Method of transmission according to claim 4, characterised in that it consists in using the memory of the subscriber unit working as a serial memory buffer in a fixed length. -11
7. Method of transmission according to claims 4 to 6, characterised in that it consists in receiving in the database, a message element of a chain, and to allocate in the subscriber unit, the memory necessary for receiving all the elements of the chain.
8. Method of transmission according to claims 4 to 7, characterised in that it consists, on request, to allow the composition by the subscriber module of a managing message describing its software and hardware resources and in sending said message, either to the database (SM), or to the management centre.
9. Method of transmission according to claim 8, characterised in that this request is transmitted, either by the management centre under the form of a management message, or by the database (SM) under the form of an instruction by the 1/O line.
10. Transmission system of chain of managing database messages comprising a management centre and a plurality of subscriber's unit, each unit comprising a database, each message comprising a header (HD), a chain identifier (FM) allowing the simultaneous transmission of several chains, and a chain index (FI) allowing to identify the message in the chain, characterised in that it includes a conditional block (CD) which determines if the message has to be processed without reference to all or part of the elements of the chain, or to be processed according to conditions linked to the previous processing of all or part of elements of the chain.
11. Transmission system of chain of messages according to claim 10, characterised in that the conditional block (CD) contains a condition determining if all or part of the elements of the chain can, or must, or must not have been processed first.
12. Transmission system of chain of messages according to claims 10 and 11, characterised in that the security module (SM) includes a message manager (GM) able to store in a memory the state of the processing of each message of the chain, and that it includes comparison means of this state with the conditions mentioned in the conditional block (CD) of the message in processing.
13. Transmission system of chain of messages according to claims 10 to 12, characterised in that the subscriber unit includes a memory (M) of messages, each -12 incoming message causing the displacement of the previous message in the memory (M), and in that the security module (SM) includes means to read and process these messages.
14. Transmission system of chain of messages according to claims 10 to 13, characterised in that the subscriber unit (STB) includes a connection line (1/0) towards the security module (SM) and that it includes means to determine the size of the memory (M) according to the instructions received from the security module (SM), and to answer about the composition and the sending of a managing message to the security module (SM).
15. Transmission system of chain of messages according to claims 10 to 13, characterised in that the subscriber unit (STB) includes a selection module (SW) allowing to connect the separator of management messages (SEL), the processing centre (CTR) of the subscriber module, the security module (SM) and the memory (M), and means to recognise the management messages destined only to the processing centre (CTR), and switching by the selection module (SW) these messages only towards the processing centre (CTR).
AU67212/00A 1999-09-17 2000-09-14 Method and system for transmitting a chain of messages for database Ceased AU771174B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CH171399 1999-09-17
CH1713/99 1999-09-17
PCT/IB2000/001301 WO2001022684A1 (en) 1999-09-17 2000-09-14 Method and system for transmitting a chain of messages for database

Publications (2)

Publication Number Publication Date
AU6721200A true AU6721200A (en) 2001-04-24
AU771174B2 AU771174B2 (en) 2004-03-18

Family

ID=4216867

Family Applications (1)

Application Number Title Priority Date Filing Date
AU67212/00A Ceased AU771174B2 (en) 1999-09-17 2000-09-14 Method and system for transmitting a chain of messages for database

Country Status (31)

Country Link
EP (1) EP1212879B1 (en)
JP (1) JP2003510707A (en)
KR (1) KR100662167B1 (en)
CN (1) CN100361480C (en)
AT (1) ATE284111T1 (en)
AU (1) AU771174B2 (en)
BG (1) BG64637B1 (en)
BR (1) BR0014064B1 (en)
CA (1) CA2385074C (en)
CO (1) CO5290348A1 (en)
CZ (1) CZ2002714A3 (en)
DE (1) DE60016430T2 (en)
EA (1) EA004078B1 (en)
EE (1) EE200200141A (en)
ES (1) ES2233424T3 (en)
HK (1) HK1049242A1 (en)
HR (1) HRP20020227A2 (en)
HU (1) HU224795B1 (en)
IL (2) IL148521A0 (en)
MX (1) MXPA02002863A (en)
MY (1) MY125246A (en)
NO (1) NO20021316D0 (en)
NZ (1) NZ517555A (en)
PA (1) PA8502401A1 (en)
PL (1) PL353796A1 (en)
PT (1) PT1212879E (en)
SK (1) SK3712002A3 (en)
TR (1) TR200200672T2 (en)
TW (1) TW513669B (en)
WO (1) WO2001022684A1 (en)
ZA (1) ZA200201818B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8296436B2 (en) 2004-03-22 2012-10-23 Nokia Corporation Conveying parameters for broadcast/multicast sessions via a communication protocol
JP4432087B2 (en) * 2006-12-26 2010-03-17 インターナショナル・ビジネス・マシーンズ・コーポレーション Database update management system, program and method
EP2747443B1 (en) 2012-12-20 2019-06-26 Nagravision S.A. Method to enforce processing of management messages by a security module
US9961384B2 (en) 2012-12-20 2018-05-01 Nagravision S.A. Method and a security module configured to enforce processing of management messages
CN107196900B (en) 2017-03-24 2020-04-24 创新先进技术有限公司 Consensus checking method and device
CN113282659A (en) * 2017-03-28 2021-08-20 创新先进技术有限公司 Data processing method and device based on block chain
CN108769116B (en) * 2018-04-19 2020-04-28 南京拙达科创加速器有限公司 Social service exchange platform of block chain
CN109191295A (en) * 2018-08-15 2019-01-11 深圳市元征科技股份有限公司 A kind of information processing method and its equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0491069A1 (en) * 1990-12-18 1992-06-24 International Business Machines Corporation Selective data distribution method using unidirectional broadcast or multicast transmission
FR2696854A1 (en) * 1992-10-09 1994-04-15 Kudelski Sa Fabrique Enreg Nag Information processing system using a set of memory cards.
US5666293A (en) * 1994-05-27 1997-09-09 Bell Atlantic Network Services, Inc. Downloading operating system software through a broadcast channel

Also Published As

Publication number Publication date
NO20021316L (en) 2002-03-15
BG64637B1 (en) 2005-09-30
EA200200354A1 (en) 2002-10-31
SK3712002A3 (en) 2002-09-10
CA2385074A1 (en) 2001-03-29
MY125246A (en) 2006-07-31
TW513669B (en) 2002-12-11
ATE284111T1 (en) 2004-12-15
MXPA02002863A (en) 2003-06-30
EP1212879A1 (en) 2002-06-12
AU771174B2 (en) 2004-03-18
CA2385074C (en) 2010-11-23
CN1373959A (en) 2002-10-09
WO2001022684A1 (en) 2001-03-29
PT1212879E (en) 2005-04-29
DE60016430D1 (en) 2005-01-05
PA8502401A1 (en) 2002-02-21
NZ517555A (en) 2003-11-28
BR0014064B1 (en) 2014-10-21
TR200200672T2 (en) 2002-06-21
KR20020027638A (en) 2002-04-13
NO20021316D0 (en) 2002-03-15
DE60016430T2 (en) 2005-12-15
CN100361480C (en) 2008-01-09
ZA200201818B (en) 2003-05-28
KR100662167B1 (en) 2006-12-27
BR0014064A (en) 2002-05-14
EE200200141A (en) 2003-04-15
CO5290348A1 (en) 2003-06-27
CZ2002714A3 (en) 2002-08-14
HU224795B1 (en) 2006-02-28
EA004078B1 (en) 2003-12-25
IL148521A0 (en) 2002-09-12
HUP0202806A2 (en) 2002-12-28
ES2233424T3 (en) 2005-06-16
BG106485A (en) 2002-10-31
HK1049242A1 (en) 2003-05-02
IL148521A (en) 2007-06-03
HRP20020227A2 (en) 2004-06-30
EP1212879B1 (en) 2004-12-01
JP2003510707A (en) 2003-03-18
PL353796A1 (en) 2003-12-01

Similar Documents

Publication Publication Date Title
CA1292077C (en) Broadcasting messages in a distributed processing system
CN1092579A (en) The control method that the switched circuit of the public data network of wide area network is connected
CN1156282A (en) Full distribution information storaging apparatus in distributive exchanging system
AU771174B2 (en) Method and system for transmitting a chain of messages for database
US5870400A (en) Methods and apparatus for exchanging messages between systems having partially incompatible communication
CN100538634C (en) The method and apparatus of the firmware on the network element that is installed in communication network of upgrading
CA1318409C (en) Multiprocessor load sharing arrangement
EP0734139A2 (en) A data transfer device with cluster control
US5428823A (en) Method for a communication unit to access and utilize information from an allocator
EP0249344B1 (en) Delay management method and device
EP1113600A2 (en) Device for broadcasting a programme with one or more receiving terminal identifiers which are transmitted with the programme for identifying a receiving terminal and receiving device for receiving this programme
NL7908281A (en) DISPLAY TEXT SYSTEM.
CA2358301A1 (en) Data traffic manager
US4860250A (en) Data packet shortening method and device
DE3733680C2 (en) Central unit for a messaging system
US5889760A (en) ATM switching system capable of equally distributing calls
US6055607A (en) Interface queue with bypassing capability for main storage unit
CN1076557C (en) Communication control method and apparatus
JP3071242B2 (en) Facsimile storage and exchange system and data storage device
JPH0965034A (en) Image communication equipment
JPH05244253A (en) Buffer management system
JPS6312423B2 (en)
JPS6093852A (en) Long packet transfer system

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)
MK14 Patent ceased section 143(a) (annual fees not paid) or expired