CA2494122A1 - Contextual computing system - Google PatentsContextual computing system
- Publication number
- CA2494122A1 CA2494122A1 CA 2494122 CA2494122A CA2494122A1 CA 2494122 A1 CA2494122 A1 CA 2494122A1 CA 2494122 CA2494122 CA 2494122 CA 2494122 A CA2494122 A CA 2494122A CA 2494122 A1 CA2494122 A1 CA 2494122A1
- Grant status
- Patent type
- Prior art keywords
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0633—Workflow analysis
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
- G06Q30/0202—Market predictions or demand forecasting
- G06Q30/0203—Market surveys or market polls
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping
- G06Q30/0641—Shopping interfaces
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Exchange, e.g. stocks, commodities, derivatives or currency exchange
The system allows business logic and communication to be integrated into a single solution, providing for efficient communication and remarkable ease of use in a variety of possible deployments.
CONTEXTUAL COMPUTING SYSTEM
FIELD OF THE INVENTION
The present invention relates generally to computer systems and more specifically to a computer administration system for the customization of information provision.
BACKGROUND OF THE INVENTION
The evolution of the mobile phone and the development of handheld computers with wireless data capabilities has given rise to new challenges for managing content and services for mobile devices. Mobile devices have constrained resources such as memory, storage, and battery life, requiring sophisticated management of content io between devices, networks, and other storage devices. Within these limitations, individuals appreciate the ability to customize their devices by changing such features as screen backgrounds and ring tones and acquiring content such as music, games and applications, photos, and the like. Employees need the ability to provision for themselves the content they need to do their jobs while in the field, and consumers need is simple mechanisms for sharing content they originate, such as photos, with their family and friends.
Consumers' and employees' needs for simplicity and intuitiveness of use requires the use of personalization and context-dependent techniques in the delivery of content and services. The limited interaction, display, and bandwidth capabilities of mobile Zo devices require techniques for filtering and personalization of content to end-users to avoid the frustrating and lengthy process of searching for relevant information. The process of acquiring suitable or optimized content for end-users such as consumers and employees is further complicated by the existence of diverse device styles, functions, form factors, interaction methods, software platforms, and capabilities. In addition, is varying, intermittent, and simultaneous availability of differing networlc technologies (e.g., 2G, 2.SG, 3G, infrared, Bluetooth, wireless LAN, USB, etc.) having different costs, bandwidths, and qualities of service complicates the delivery of digital content and services and requires the use of technologies such as synchronization to ensure that content and services on intermittently connected devices are complete and up-to-date.
Other factors influence the difficulty of provisioning digital content and services to end-users. For example, the increasing complexity of wireless applications and data, the variety of media types, multiple content versions, competing digital rights mechanisms, and differing validation, certification, and ratings methods make it difficult s to choose which items are suitable for which devices.
Mobile network operators increasingly have a stake in the administration of mobile devices in order to ensure the availability of their networks and users' abilities to make phone calls. Further, mobile network operators are involved in the flow of information between enterprises and enterprises' mobile workers, and operators must io evolve new services to support and protect enterprises and enterprise assets.
The communications industry has seen incredible innovation in recent years.
Many new modes of communication and content formats have been developed, allowing users access to information in increasingly complex and useful ways. At the same time, the process of communication has become disjointed, with several sources of is information, such as telephones, fax machines, computers, and mobile devices, competing for users' attention, with little focus on the development of solutions that assure that the most relevant information is provided to users at the most opportune times.
Current approaches to the targeting, personalization, provisioning and zo management of mobile content and services have led to dissatisfaction among individual users, who find it difficult to receive data organized to fit their individual needs. In turn, communications providers face the loss of customers through "churn," because current communications systems make it very difficult for providers to differentiate themselves from competitors based on ease-of use and the pertinence and quality of delivered data.
zs As both end-users and system administrators deal with the complexities of emerging communication technologies, there exists a need for a comprehensive, easy-to-use system enabling the management and provisioning of digital content to a wide variety of different devices.
3o SUMMARY OF THE INVENTION
According to one embodirnent of the present invention, a computing system is provided which allows for delivery of relevant content to system users.
According to another embodiment of the present invention, a complete communications solution is provided, allowing for a variety of communications providers, such as telecommunications providers and enterprises, to implement communications throughout a system in a highly customizable manner.
s According to still another embodiment of the present invention, a computing system is implemented using a layer methodology, with components within layers providing features to a variety of actor types within the computing system, such that actors have access to the tools theyneed to perform computing and communication tasks.
The above summary of the present invention is not intended to represent each io embodiment, or every aspect, of the present invention. This is the purpose of the figures and the detailed description which follow.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing and other advantages of the invention will become apparent upon is reading the following detailed description and upon reference to the drawings.
FIG. 1 is an architectural overview showing a computing system according to one embodiment of the present invention;
FIG. ~ is an architectural view showing the interactions between actors according to one embodiment of the present invention;
ao FIG. 3 is an architecture model showing the implementation of data storage and viewing according to one embodiment of the present invention;
FIG. 4 is a layer view showing the separation of layers according to one embodiment of the present invention;
FIG. 5 is a more comprehensive architectural view showing layers and Zs components within a computing system according to one embodiment of the present invention;
FIG. 6 is an architectural view of a data layer and a business logic layer according to one embodiment of the present invention;
FIG. 7 is an architectural view of a business logic layer according to one 3o embodiment of the present invention;
FIG. 8 is an architectural view showing the interaction of presentation and client layers according to one embodiment of the present invention;
FIG. 9 is an architectural view showing the interaction of components and actors according to one embodiment of the present application;
FIG. 1 Q is a data view showing data access according to one embodiment of the present invention;
s FIG. 11 is a data view showing data types within a database according to one embodiment of the present invention;
FIG. 12 is an object model of a catalog component according to one embodiment of the present invention;
FIG. 13 is a flow chart showing the process of warehouse item creation according io to one embodiment of the present invention; , , FIG. 14 is a flow chart showing the process of finding a warehouse item according to one embodiment of the present invention;
FIGS. 15a and b show a a flow chart showing the process of modifying a warehouse item according to one embodiment of the present invention;
is FIG. 16 is a screen view of a device detail page according to one embodiment of the present invention;
FIG. 17 is a screen view of a device maintenance page according to one embodiment of the present invention;
FIG. 18 is a screen view of a device deletion page according to one embodiment Zo of the present invention;
FIG. 19 is a screen view of a rule maintenance page according to one embodiment of the present invention;
FIG. 20 is a screen view of a mleset list page according to one embodiment of the present invention;
as FIG. 21 is a screen view of a rule selection page according to one embodiment of the present invention;
FIG. 22 is a screen view of a ntleset creation p age according to one embodiment of the present invention;
FIG. 23 is a screen view of a rule view page according to one embodiment of the 3o present invention;
FIG. 24 is a software architecture view of a rules engine according to one embodiment of the present invention;
FIG. 25 is a screen view of an administrator home page according to one embodiment of the present invention;
FIG. 26 is a screen view of a user maintenance page according to one embodiment of the present invention;
FIG. 27 is a screen view of a user profile page according to one embodiment of the present invention;
FIG. 2g is a screen view of a warehouse maintenance page according to one embodiment of the present invention;
FIG. 29 is a screen view of a warehouse.item details page according to one i o embodiment of the present invention;
FIG. 30 is a screen view of an end-user home page according to one embodiment of the present invention;
FIG. 31 is a screen view of an end-user profile page according to one embodiment of the present invention;
i s FIG. 32 is an architectural overview showing communication between components according to one embodiment of the present invention;
FIG. 33 is an architectural view of a general IT deployment according to one embodiment of the present invention; and FIG. 34 is a screen view of a message page according to one embodiment of the ~o present invention.
While the invention is susceptible to various modifications and alternative forms, specific embodiments have been shown by way of example in the drawings and will be described in detail herein. It should be understood, however, that the invention is not intended to be limited to the particular forms disclosed. Rather, the invention is to cover as all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the appended claims.
DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
The computing system of the present invention is directed to providing an easy-so to-use, scalable, and integrated solution to those in need of a comprehensive approach to managing the provisioning of multiple types of information to multiple types of devices.
FIG. 1 is an architectural overview of a computing system 10 according to one embodiment of the present invention. The computing system 10 of the present invention is distributed among many components and enables the interaction of a number of types of actors. Actors shown in FIG. 1 include service providers 12 which serve as central actors enabling the useful interaction of other actors such as content developers 14 and s catalog aggregators 16, who create and organize data, and end-users 18 and enterprises 20 who make use of the data and may also perform data creation roles. Other actor types may access or provide content to the computing system 10, including ratings agents, validation agents, wholesalers, retailers, advertisers, and payment servers.
As shown in FIG. 1, the computing system 10 enables the use of multiple types of io hardware as needed by each actor, including computers, servers, database storage devices, mobile devices, and mobile phones. As shown by the "integrators"
block 22, the computing system 10 according to the present invention allows for the provision of several integrators, or features which allow for seamless functionality for different operations, such as billing, performance management, user authentication, trouble ticket is generation and resolution, order management, and customer relationship management (CRM). Thus, for example, a service provider 12 using the computing system 10 has a number of integrator tools available to enhance the experience of an end-user or enterprise beyond provision of high-quality service, including the more intangible aspects of customer relationship management and resolution of customer concerns. As shown in ao FIG. 1, the present invention contemplates the provision of services directly from a service provider 12 to an end user 18, from a service provider 12 to an enterprise 20, and from the enterprise 20 to end-users 18 within the entezprise.
Turning novv to FIG. 2, an arclutecture actors diagram shows the more general classifications into which actors using the computing system 10 of the present invention as are grouped. In addition to the end-users 18, actors are classified into system operators 24, application developers 26, and administrators 28. Each of the actor types may include several types of individuals or entities, and each actor type fulfills certain functions using the computing system 10.
System operators 24 may include service providers 12, application service 3o providers, or enterprises 20. System operators 24 perform the general functions of system administration, process control, and operational support. Examples of system operators include companies such as mobile network operators, managed service providers, application service providers, digital goods retailers, and enterprise service providers. Application developers 26 may include software developers, content aggregators and developers, and catalogs, and serve to provide content to administrators andlor system operators. Examples of content developers include independent software s vendors, eBook publishers, Java application developers, ring tone creators, photographic publishers, game creators, and text message authors. Administrators 28 may include a variety of types of administrators, including application developer administrators, catalog administrators, end-user administrators, digital goods process administrators, and rules administrators, located at enterprises 20 or at service providers 12 serving as enterprises io 20. Examples of administrators include system operators, network operations center (NOC) staff, chief information officers, IT services managers, help desk administrators, and service provisioning administrators. Administrators are in charge of content, including catalogs, rules, users, application developers, and marketing management.
End-users 18 may include general use end-users and enterprise employees as end-users, is and they use devices to access content such as data and applications using the computing system 10. The computing system 10 may be divided into "domains" for certain implementations, with administrator activities taking place within an administrator domain and system operations taking place within a system operator domain.
According to one embodiment of the computing system 10, end-users 18 use zo devices to communicate with other components of the computing system 10 via synchronization events during which data flows between end-users' devices and other components of the computing system 10. Synchronization events include such events as wired synchronizations, such as synchronization of a mobile device using a cradle or synchronization of a wired computer, and wireless synchronization of wireless devices or as computers using a wireless networking system. While FIG. 2 shows the computing system 10 as an individual component to which other actors are connected, it is to be understood that the computing system 10 may be implemented as a distributed system, removing the need for a centralized location for every system component. It is preferred to implement the computing system 10 using a distributed architecture in which each so actor is provided with the components it needs to complete its tasks, and is not burdened with additional complexities that are unrelated to the actor's goals. Further, the connection lines shown in FIG. 2 include wired and wireless means fox distributing content, such as applications and data bundles, among the actors.
The computing system 10 of the present invention enables the use of several types of content on a device-agnostic basis, allowing users maximum flexibility in accessing s the content they require. FIG. 3 is an architecture diagram showing the interaction of actors, views, and data warehouses according to one embodiment of the present invention. The arrows and lines of FIG. 3 represent pathways for movement of content between data sources and actors. External warehouses 30 serve as outside data storage areas, with data from the external warehouses, 30 being forwarded to a system warehouse io 32 and a local warehouse 34 when necessary for a particular implementation of the computing system 10. Application developers 26 have access to information at the system warehouse 32 and the local warehouse 34 through the use of an application developer view 36, and may use the application developer view 36 to add content to the system warehouse 32 and the local warehouse 34.
is Similarly, a system operator 24 has access to the system warehouse 32 using a system warehouse view 38, through which the system operator 24 can monitor and alter system settings. The system warehouse view 38 may include an entitlement warehouse view, indicating which users are entitled to which digital goods without requiring that the digital goods be stored within the computing system 10. An administrator 28 may access ao information at the local warehouse 34 via an administrator view 40, and may use the administrator view 40 to build catalogs 42. Catalogs represent views of digital items contained in the local warehouse 34 and represented by catalog items. A
catalog is thus the standard mechanism for users to browse warehouse items, or digital goods, in the computing system 10. In addition to being created a.nd managed by administrators, is catalogs 42 may be assembled automatically and directly from content at the local warehouse 34. Catalogs 42 may be accompanied by meta-catalogs, serving as overarching collections of suitable individual catalogs. The administrator view 40 allows administrators 28 to create catalogs 42 and to monitor the use of catalogs 42 by end users 18. The end-users 18 have access to the catalogs 42 through catalog views 44.
so According to one embodiment of the computing system 10, end-users 18 are given the opportunity to create end-user catalogs of items to which the end-user is entitled, and an end-user catalog may further contain items which the end-user wishes to allow other end-users to access.
As shown by the divisions 45 of the architecture of FIG. 3, a single deployment of the computing system 10 may incorporate several different domains which make use of a s single system warehouse 32 and are all controlled by a single system operator 2~1., while allowing distribution of domain-level decisions among domain administrators.
Thus, multiple administrators or accounts with administrator privileges may be provided in a single deployment of the computing system 10. In such a deployment, parameters of the computing system 10-for example within the configuration component, described i o below-may impact multiple domains, or they may be specific to each domain, with one instance of a parameter for each domain.
The computing system 10 of the present invention is preferably implemented using a layered architecture as shown in FIG. 4. According to one embodiment of the present invention, the computing system 10 contains four layers: a data layer 46, a is business logic layer 48, a presentation layer 50, and a client layer 52.
The data layer 46, business logic layer 48, and presentation layer 50 may be grouped into an authentication layer 54, indicating that for security purposes any access to these layers may only occur via an authenticated transaction. As indicated by the arrows of FIG. 4, each layer has an interface to its bordering layer or layers. According to the embodiment shown in FIG. 4, ao commuiucations between the client layer 52 and the presentation layer 50 take place over the Internet 56, though it is to be understood that communications between the client layer 52 and the presentation layer 50 may be carried out without requiring the transfer of data over the Internet 56. As will be explained in more detail below, additional layers may be incorporated into the computing system 10 to enable additional functionality as 25 desired, depending on particular deployments of the computing system 10.
The features and functions of each of these layers will now be described. A more detailed depiction of the layer-based architecture of the computing system 10 is shown in FIG. 5, and FIGS. 6-8 show individual layers and interactions between the layers in greater detail.
The data layer 46 provides all data store services to the business logic layer 48 in so a robust environment. The data layer 46 serves to abstract the actual composition of data in the computing system 10, with a data access component of the business logic layer 48 serving to store and retrieve data from the data layer 46. Within the data layer, data is preferably represented using a relational schema. According to one embodiment of the present invention, all data is represented using Extensible Markup Language (XMh), with components in the business logic layer 46 able to access and manipulate the data regardless of the format of the data. Thus, different database servers may be deployed s depending on the particular requirements of individual customers, as shown in FIG. 6.
FIG. 6 shows that data from a number of different data formats, including, for example, data in Commerce Extensible Markup Language (CXML) 58, Common Interchange Format (CIF) 60, Oracle Open Applications Group (OAG) 62 databases, and spreadsheetlflat file data 64. Data from each of these and other sources may be to integrated into an aggregated product catalog 66, accessible using a database server 68.
The aggregated product catalog 66 provides persistent data storage, and the database server 68 provides data management services and clustering. The data layer 46 may employ a Java Database Connectivity (JDBC) bridge so that it can be used with any JDBC compliant database, including the data formats shown in FIG. 6.
is Data stored in the data layer 46 includes profile data for all actors in the computing system 10, rules definitions for all actors and entities in the computing system 10 (described in further detail below), catalog content for all aggregations and meta-catalogs, operational measurements, including statistical data for report generation on various aspects of the computing system 10, component configuration information for ao proper tuning of components of the computing system 10, and logs for tracking and review of system data and error handling. According to one embodiment of the present invention, the data layer 46 allows for Structured Query Language (SQL) access to data, supports XML representation of data, and enables the use of several interchangeable databases and data storage foxrnats. Further, data objects can be used to provide an is application program interface (API), and data may be mirrored. As shown in FIG. 5, the data layer 46 uses XML Document Type Definitions (DTDs) 67 combined with a proper database schema 69 to enable access to and proper formatting of data in the aggregated product catalog or database 66 _ As shown in FIG. 6, the business logic layer 48 interacts with the data layer 3o primarily through the use of administration logic, data objects, and automated processes.
The business logic layer 48 serves as a bridge between the data layer 46 and the presentation layer 50, and it incorporates. the application logic of the computing system 10. Logic may be represented as Enterprise Java Beans (EJB) within EJB
containers, where required. According to one embodiment, the business logic layer 48 uses an object-based approach to compartmentalize the operating logic of the computer system 10. The business logic layer 48 performs actions, but does not generate views relating to s those actions-the generation of views is delegated to the presentation layer 50.
According to one embodiment of the present invention, the business logic layer 48 is only accessible via the presentation layer 50 and not directly from the client layer 52.
This provides an additional element of security, so that the exposed Java Bean methods cannot be used maliciously. Further, each Java Bean in the business logic layer 48 can io expose an application program interface (API) of a public method to developers at the presentation layer 50, allowing extensible customization of the presentation layer 50 based on existing components in the business logic layer 48.
As shown in FIG_ 7, an Enterprise Java Bean (EJB) approach to implementing the business logic layer 48 allows critical business logic to be assembled into several is portable beans 70 that reside within an EJB container 72. Using this methodology, each bean 70 exposes an API that fulfills its business intent. The exposed API, in turn, can be accessed from other objects, as well as from the presentation layer 50.
Objects for presentations, business logic, and data manipulation may all be incorporated into the business logic layer 48.
2o Referring back to FIG. 5, components contained within the business logic layer 48 include: an application server 74 which provides the EJB container 72, and allows for load balancing and clustering; a device management component 76, which allows management of end-users' OS enabled devices; an administration component 78 permitting administration of business objects; a personalization component 80 allowing is for the personalization of the user experience and profile management; an operational measurement component 82 gathering system metrics for multiple aspects of the computing system 10 and providing statistical information for report generation; a configuration component ~4 allowing for customization and tuning of system configurations for deployments of the computing system 10; a rules engine 86 allowing so for event-driven business object control; a "miscellaneous" component 88, which may be a collection of versatile components including logging components and XML
a catalog component 90 allowing for content aggregation and administration;
and a data access component 92 enabling generic manipulation of data from the data layer 46. The business logic layer preferably uses extensible and scalable architecture with cross-platform capabilities.
Turning now to FIG. 8, a diagram of data flow and components within the s presentation layer 50 is shown. The presentation layer 50 receives XML data from the business logic layer 48 and delivers the content to end-users 18. The presentation layer 50 is designed to be device-agnostic. That is, the presentation layer 50 is preferably capable of forwarding to the client layer 52 properly-formatted data that is ready for display on any type of device, including computers, mobile phones, and personal digital io assistants (PDAs), utilizing a variety of browser types such as full-featured PC browsers, compact HTML (cHTML), and wireless markup language (WML). The end-user content may be custom-rendered depending on the device used to view the content.
According to one embodiment of the presentation layer, views presented to the end-user are highly customizable, allowing the use of "skins" or presentation means that appeal to individual is end-users or that are custom-selected by enterprises, for example, in a re-branding or co-branding deployment of the computing system 10. Further, communication between the presentation layer 50 and the client layer 52 is preferably designed for easy delivery through firewalls. The presentation layer 50 is preferably implemented using a Java Server Pages (JSP) methodology.
ao A translation layer 96 serves as a sub-layer of the presentation layer 50, and is responsible for accepting XML data 94 from the business logic layer 48 and translating it into an acceptable format fox the target device at the client layer 52. It is preferable to implement a management fixnction in the presentation layer 50 which acts in concert with Extensible Stylesheet Language (XSL) style sheets that serve to customize content as presentation in real time.
To achieve a customizable look and feel for the presentation of content, the presentation layer 50 may be designed for maximum flexibility under control of a system operator's user interface team. Support for real-time changes and modifications is preferably provided in the presentation layer 50 to allow for similar content to be so rendered in multiple manners, depending on the desired loolc and feel of the target device at the client layer 52. For example, information retrieved from a data catalog about an application may be enhanced using an HTML 4.0 translator 98 for Internet Explorer browsers 100, presented using an HTML 3.2 translator 102 for Netscape 4.x browsers 104, or simplified using a Wireless Markup Language (WML) translator 106 for rendering on a WML browser such as Palm Clipper 108. As described above, the Internet 56 is the preferred method of communication between the presentation layer 50 s and the client layer 52.
Control of output rendering from the presentation layer 50 is preferably managed through the use of style sheets 110, requiring limited programming knowledge by a user interface team. Java Server Pages (JSP) may be used to access content in the business logic layer 48, providing the logical scripting aspects of the content. The use of style i o sheets 110 in the translation layer 96 further allows for rapid cosmetic changes to be made to the views available at the client layer 52, with such changes being available dynamically without interruption in service, recompilation of code, or unwanted downtime. This implementation of the translation layer 96 allows the business Logic layer 48 to remain independent and insulated from presentation changes. A
combination i s of JSP controls 112 and servlets 114 further enables the functionality of the translation layer 96.
Referring back to FIG. 5, the presentation layer 50 includes an HTTP server which serves content and provides an HTTP access point to the client layer 52.
Device-specific content 118 may be incorporated into the presentation layer 50, along with Zo modules 120 for presenting data in a variety of markup languages. The presentation layer 50 further may include a servlet container 122 for providing access to servlet logic, a JSP
interpreter 124 enabling server-side parsing and execution of JSP scripts located on the HTTP server 116, and stylesheets 126 describing the method of rendering raw XML data for specific views at the client layer 52. View controls 128 are also included in the as presentation layer 50 to enable server-side manipulation of views by administrators.
The client layer 52 provides the access point to the computing system 10, and supports personalization via a web-accessible user interface and device management via a synchronization event. As shown in FIG. 5, the client layer 52 may include several types of wired and wireless devices that interact with the presentation layer 50, including 3o PCs, cradled PDAs, wireless Palm-style PDAs, operating system-enabled mobile phones, and mobile email devices.
According to one embodiment of the client layer 52, a personalization feature is implemented by a user connecting to a web interface and accessing the personalization services via a device's browser. End-users l8 wishing to personalize their experiences with the computing system 10 then select administrative actions, allowing the end-users s 18 to predetermine which actions will occur on their devices on the next synchronization with the presentation layer 50.
Device management at the client layer 52 involves both data management and device auditing. Data management at the client layer 52 includes updating, backing up, restoring, installing, and removing applications from an end-user's device.
Device io auditing. involves retrieval of system metrics pertaining to an end-user's device.
According to one embodiment of the present invention, device management occurs when an end-user 18 performs a synchronization event, such as wirelessly synchronizing with the presentation layer 50, or synchronizing a PDA using the PDA's cradle.
According to one embodiment of the computing system 10, the client Iayer 52 makes use of a client is stub component 130, a program resident on a end-user device, to enable device management.
Refernng to FIG. 5, to summarize the architecture view shown, each layer makes use of a number of components to fulfill the necessary functions of the layer_ According to the embodiment shown in FIG. 5, the data layer uses the database server component 20 68; the business logic layer 48 uses the application server 74, device management 76, administration 78, personalization 80, operational measurements 82, configuration 84, rules engine 86, miscellaneous 88, catalog 90, and data access 92 components;
the presentation layer 50 employs the HTTP server 116, style sheets 126, and view controls 128 components; and the client layer 52 employs the client stub component 130.
as FIG. 9 shows the relationships between the components and actors as enabled by the computing system 10 of the present invention. The HTTP server component serves as a central access point for end-users 18, system operators 24, application developers 26, and administrators 28. End-users 18 may also interact directly with the client stub 130, which communicates with the HTTP server 116. The HTTP server 116, so in turn, is in communication with the style sheets component 126 and the view controller components 128 to ensure proper formatting of content to users. The view controller 128 is in communication with the application server 74, which serves as a central server for handling requests from the presentation layer 50, accessing data in the data layer 46, and carrying out the business logic within the business logic layer 48. This functionality of the application server component 74 is enabled through its connections with the device management component 76, administration component 78, personalization component s 80, operational measurement component 82, configuration component 84, rules engine component 86, miscellaneous component 88, catalog component 90, and data access component 92. The data access component 92, in turn, communicates with the database server component 68. The structure and operations of each of these components will now be described, starting with components at the data layer 46 and working up to Io components in the client layer 52.
Database Server and Data Access Components The base component of the data layer 46 is the database server component 68, which may be any of a number of types of database servers, given adherence to certain desired server qualities. According to one embodiment of the computing system 10, it is is preferred that the database server be indexed for rapid data retrieval and able to fulfill normal queries within 150 ms per query. According to other embodiments of the computing system 10, simple queries into cached data may resolve as quickly as within 10 ms per query, while more complicated queries involving more than lookups, such as update or modification actions, may take as long as 5000 ms. The database server is ao preferably able to support at least 5,000 queries per second, and must have a very large maximum size restriction, preferably in the terabyte range. The database 66 preferably has a native code API allowing optimized direct access by the database server component 68, further employing user and group policies to protect data access. Further, the database 66 should have a Simple Network Management Protocol (SNMP) agent, and if as no SNMP agent is employed, then the database should not be adversely impacted by adding an agent as a service on the same database server 68. The database 66 is preferably provided with real-time remote administration capability and is preferably able to automatically detect and recover from data corruption. Furthermore, data access may be enhanced via the use of distributed network caches.
3o FIG. 10 shows a data view illustrating the interaction of the data access component 92 and the database server component 68 in providing data at the business logic layer 48 (i.e., to the application server 74) according to one embodiment of the present invention. Data Access Objects (DAOs) are used at the business logic layer 48 to provide abstract data access to the data layer 46. This allows the data layer 46 to use any data solution without impacting the storage methodology of the logic components. As shown at block 132, data access begins when a client at the business logic layer 48, such s as a JSP or a servlet, makes a request, initiating the creation of a session EJB as shown at block 134. The session EJB accesses a DAO factory as shown at block 136, which in turn uses a DAO implementor as shown at block 138 to make an SQL request to a data source 140 accessible by the database server 68. The DAOs are thus used by the data access component 92 to facilitate the transfer of value objects, or digital goods, between i o the data layer 46 and the business logic layer 48.
The database server component 68 is designed for access to a number of categories of data in the database 66. FIG. 11 is a data diagram showing categories into which data may be grouped in the database 66. Profile data 142 includes data related to the actors using the computing system 10. Data stored as profile data 142 may include i s user profile information, privilege and authority information, authentication information, secure data relating to billing, and miscellaneous solicited personal information.
Rules data 144 may include data such as rule XML DTDs, rules settings, rule sets, and rule defnutions. According to one embodiment of the present invention, rules data 134 is stored as XML representations.
~o Catalog data 146 may include aggregated data content for catalogs. Data which may be stored as catalog data 146 includes catalog obj ect such as applications and bundles, pertinent attributes, attribute mappings for imported source catalogs, historical change data, state of object data, access authorities, and references to remote data.
According to one embodiment of the computing system 10, data stored as catalog data as 146 is stored in the XML format, mapping to an XML DTD standard for catalog representation.
Operational measurement data 148 may include statistical information about software events (for example, bytes transferred, logins, non-fatal errors, and the like) that can be used to generate technical and marketing reports about system usage and so performance. According to one embodiment, data stored as operational measurement data 148 is represented as a set of incremental/decremental registers.
Configuration data 150 includes configuration data for some or all components of the computing system 10. Data stored as configuration data 150 may include data such as configuration XML DTDs, information specific to individual components, system and component version information, essential startup parameters, and current and historical s configurations and state information.
Log data 152 includes log information output by system components. Data stored as log data 152 may include web sex-Ver logs, error logs, information logs, debug logs, component specific outputs, and the like;
According to one embodiment of the computing system 10, the database server io component 68 is the central point of access to the shared back-plane of the computing system 10, and the database server host must be highly optimized to enable efficient handling of all read and update queries, of varying levels of complication.
Thus, it is preferred that the database server host be a secured server, such that access to data is restricted to declared users and user groups using a privilege model. Further, the is database server host is optimally provided with a large amount of RAM for caching common queries and for performing readlwrite caching on updates. For example, hosts having sixteen to thirty-two gigabytes of RAM are acceptable for use as database server hosts in one embodiment of the computing system 10. It is further preferred for the database server host to have multiple processors to handle the constant flow of ao transactions, with four- to eight-processor hosts being used in some embodiments.
Further it is preferred for the database server host to support clustering and to have high bandwidth capability through network interfaces to handle high traffic loads.
Bandwidths from 100 Mbps to 400 Mbps are used according to some embodiments of the computing system 10. Further, it is preferred for a database server host to have as significant amounts of easily-expanded, redundant storage space, and 500 gigabyte to multi-terabyte redundant arrays of independent disks (RAIDS) are used in one embodiment of the present invention. It is further preferred to use two database server hosts: a first host for primary access, and a second host for data integrity (including a real time mirror), redundancy, and potential spillover access fox read queries.
3o According to one embodiment of the computing system 10, a data integrity component is incorporated into the computing system, allowing the computing system to track specific versions of data objects within the computing system 10 and to prevent overwriting of other users' or administrators' changes to data obj ects.
Further, data manipulation within the computing system 10 may be made more efficient through the use of "dirty bit checking." In dirty bit checking, a data object s meant to replace an existing data obj ect within the computing system 10 is evaluated to determine which portions of the new data object are different from an existing data obj ect. This enables transfer and updating only of the changed elements in the data object. For example, if an administrator chooses to update profile data for a user, but only alters information dealing with user entitlements, dirty bit checking enables the io computing system 10 to identify that only a small portion of the profile data is being changed and to transmit and change only that portion, thereby reducing bandwidth necessary to effect changes to data objects.
Catalog Component The catalog component 90 enables the holding of data at a warehouse level and is the creation of views of warehouse items without the need for duplication of data. The catalog component 90 resides within the business logic layer 4~ and consists of the business logic for feature activation, a web-based interface for feature access, and a catalog database storing content. According to one embodiment of the computing system 10, catalog data within the catalog component 90 is separated into two partitions: the 2o system warehouse 32 and the local warehouse 34. The system warehouse 32 is alterable by the system administrator of the deployment domain, and the local warehouse is alterable by the administrator of the administrative domain, which may vary based on particular deployments of the computing system 10. For the purposes of describing the operation of the catalog component 90, a catalog obj ect is an entry in a warehouse, and zs may be content such as an application, a bundle, or another type of data.
Catalog data views are provided to all actors, and display active catalog objects from selected objects in the system warehouse 32 and the local warehouse 34.
The catalog component 90 supports the administration of catalog views, and further supports the creation, addition, removal and deletion of catalog objects to and 3o from the catalog views and the warehouses. Further, in one embodiment of the present invention, the catalog component 90 provides an import capability to map external data sources to the catalog schema used within the warehouses, and uses XML or an XML
variant for catalogs to represent data.
According to one embodiment of the present invention, digital goods within the warehouses axe submitted by application developers 26 via a recognized workflow and s organized into catalogs by administrators 28 for eventual presentation to end-users 18.
The workflow may specify further steps, such as the certification of the digital good, virus testing, prepackaging for a target device, or other steps. End-users 18 can search catalogs for a desired product via catalog category browsing or via a full-text search facility. Further, the catalog component 90 may support end-user ratings and comments io on digital goods within the warehouses, such that end-users may fulfill the roles of ratings agents. According to one embodiment of the computing system 10, the computing system 10 allows trusted actors, such as end-users, to create their own personal catalogs. Furthermore, catalogs may be dynamically generated based on the context of a browsing actor.
is FIG. 12 shows an object model diagram for the catalog component 90. To add an item to a warehouse, a user creates the warehouse item. A warehouse item 154 may be created by an application developer 26 or by an administrator 28. A warehouse item 154 can be associated with one or more binaries 156, which contain any uploadable file (such as .exe, .prc, or .pdb files). Users can comment on and rate items using warehouse item zo comment 158 and warehouse item rating 160 components. Administrators can create one or more views of a warehouse, and these views are handled using a catalog object 162.
The catalog component 90 further includes catalog items 164, which are views of individual warehouse items 154. Warehouse items 154 and catalog items 164 may exist in a number of states, including "new item" states, which allow administrators to find, as view, verify, modify, and delete newly submitted items and to enable the newly-submitted items to be active or visible to users.
States for warehouse items 154 may include active and inactive states, and states for catalog items 164 may include visible and invisible states. A warehouse object 166 is resident within a warehouse and represents the digital good being manipulated in the so catalog component 90. Verification of catalog objects 162 and warehouse objects 166 may be accomplished using a catalog verification object 168 and a warehouse verification object 170, respectively. Fiuther, either a warehouse administrator or a catalog administrator may perform a verification process manually, with the administrators configuring the list of verification criteria using an interface. The catalog component 90 can manage the verification criteria for each warehouse and catalog. Each of the models within the catalog component 90 uses a clean value object 172, which is s gleaned from a value object 174 in a database. The two-tier system of catalog items and warehouse items allows warehouse items and catalog items to represent two different item views for one digital good. For example, the price of an item at the catalog level may be the same as the price specified at the warehouse level, or the warehouse level may be overridden in certain catalog views to optimize prices for certain users.
io Further, the catalog views available to certain user groups may be different from catalog views available to other user groups. For example, a user group for "preferred customers" may have access to catalog views having lower prices or other advantages over "standard customers." Thus, though the base binary file may be stored at only one place in the computing system 10, or even outside the computing system 10, several is different views of the item can be provided within the computing system 10, with the views easily changeable and customizable.
Similar grouping of users to enable customized catalog views may include separation of users into "gold memberships" and "silver memberships." In this example, users having a gold membership and a silver membership may both have access to ao catalogs which hold the same products, with the "gold catalog" holding items with prices 20% lower than the prices listed in the "silver catalog." Similarly, some users of the computing system 10 might want to have their catalogs available in German with prices in Euros, while other users might want catalogs available in Japanese with the prices in Yen. Both catalogs may refer to the same items in a warehouse, but the details may be as replaced in the catalog views to suit specific markets of users. Temporal catalog view changes may also be employed, such as decreasing prices by 20% on weekends to encourage weekend use of the computing system 10.
FIGS. 13-17 show flow diagrams illustrating the performance of various functions in the catalog component 90. FIG. 13 shows the steps involved in creating a so warehouse item. To create a warehouse item, an administrator 28 first accesses a "create warehouse item" page as shown at block 174. This page may be accessed using the computing system's web tier, described in greater detail below. Next, the administrator inputs the item attributes as shown at block 176. Item attributes may include such fields as an item name, version, short description, long description, suggested search keywords, an image or screenshot, category, an operating system for a file, file size, minimum system requirements, license type (for security purposes), price, item type, and an enable s or disable flag. After reviewing the attributes, the administrator commits to the warehouse item as shown at block 178. Next, as shown at decision block 178, the web tier determines whether the initial creation of the warehouse item was a success. If the initial creation is unsuccessful, the administrator receives a "create error"
message as shown at block 182. The administrator is given a choice of whether to continue io attempting to create the item at this point, as shown at decision block 184. If the administrator chooses to attempt to create the warehouse item again, the administrator inputs the item's attributes again, as shown at block 176. If the administrator chooses not to attempt to create the warehouse item again, the creation terminates as shown at termination block 186.
is If the creation of a warehouse item at decision block 180 is successful, the web tier creates the warehouse item and sends a "create success" message to the administrator as shown at block 188. At this point, the administrator is asked whether he wishes to upload a binary associated with the warehouse item, as shown at decision block 190. If the administrator does not wish to upload a binary associated with the warehouse item, zo the warehouse item creation terminates at termination block 186. If the administrator chooses to upload a binary associated with the warehouse item, the administrator inputs the binary's attributes as shown at block 192. Next, the administrator uploads the binary to the warehouse as shown at block 194. The system then determines at decision block 196 whether the binary upload is successful. If the binary upload is not successful, the zs system sends an "upload error" message as shown at block 198, and the administrator is given a choice to continue uploading the binary as shown at block 200. If the administrator chooses to continue to attempt to upload the binary, the administrator next inputs the binary's attributes again as shown at block 192. If the administrator chooses not to continue attempting to upload the binary, the creation of the warehouse item 3o terminates at termination block 186.
If the binary upload is a success at block 196, the system sends the administrator an "upload success" message as shown at block 202, and then the administrator is asked whether he wants to upload another binary associated with the warehouse item.
If the administrator chooses to upload another binary, the administrator inputs the additional binary's attributes at block 192. If the administrator chooses not to upload another binary, the creation .of the warehouse item terminates as shown at termination block 186.
s ' The catalog component 90 also supports user searching for warehouse items, as shown in FIG. 14. To begin searching for a warehouse item, an administrator first accesses a "find warehouse 'item" page using the system's web tier as shown at block 206. Next, the user inputs search criteria as shown at block 248. The system then searches the warehouse items based on the search criteria, as shown at block 210 and to generates a collection of results as shown at block 212. The result collection may be displayed as a selectable search~result list as shown at block 214. Next, as shown at decision block 216, the user is asked whether he wishes to continue searching.
If the another search is desired, the user once again inputs find criteria as shown at block: 208. .
If no other search is desired at decision block 216, the warehouse item search terminates is as.shown at termination block 218.
The catalog component 90 further supports administrator modification of warehouse items, as shown in FIGS. 15a and 15b. To modify warehouse items, a user first accesses a "modify warehouse item" page as shown at block 220. Next, the administrator finds the warehouse item using the search technique shown at FIG. 14, as ao shown at block 222. After the administrator has selected the warehouse item to modify, as shown at block 224, the system displays the warehouse item for the administrator at block 226. The administrator is then asked if he wishes to modify binary items associated with the warehouse item, at decision block 228. If the administrator wishes to modify binary items, the system displays the binaries to the administrator at block 230, as ~ and the administrator selects the binary item to modify at block 232.
After being shown the binary item to be changed at block 234, the administrator edits the binary fields at block 236 and the binary fields are verified as shown at block 238. The system then determines whether the changes to the binary are acceptable, as shown at decision block 240. If the changes are unacceptable, the system sends the administrator a "verify so changes" error message as shown at block 242, and the administrator is asked whether he wishes to continue modifying the warehouse item at decision block 244. If the administrator chooses not to continue modifying the warehouse item, the warehouse modification terminates at termination block 245. If the administrator chooses to continue modifying the warehouse item at block 244, the system displays the warehouse item again at blocl~
If the binary changes are determined to be acceptable at block 240, the system s attempts to commit to the changes as shown at block 246. If the changes are committed successfully, as shown at decision block 248, the system sends the achninistrator a "changes successful" message as shown at block 252 and asks the administrator whether he wishes to continue modifying the warehouse item at block 244. If the changes are not committed successfully at decision block 248, the system sends the administrator a io "commit error" message at block 250 and asks whether the administrator wishes to continue to modify the warehouse item at decision block 244.
Upon completion of attempted modifications of binary items or upon an administrator's determination not to modify any binary items associated with the warehouse item at block 228, the administrator is given the opportunity to edit is descriptive fields associated with the warehouse item as shown at block 254 and the fields are verified as shown at block 256. Next, as shown at decision block 258, the system determines whether the field changes are appropriate by checking, for example, formatting and value ranges. If the changes are not appropriate, the system sends the administrator a "verify changes error" message as shown at block 260, and gives the ao administrator a choice of whether to continue with the modification of the warehouse item at block 244. If the changes are appropriate, the changes are committed to as shown at block 262 and the system determines whether the changes are correctly committed at decision block 264. If the changes are not correctly committed at block 264, the system sends a "commit error" message to the administrator as shown at block 266 and allows is the administrator to choose whether to continue modifying the warehouse item at decision block 244. If the committed changes are successful at decision block 264, the system sends a "changes successful" message to the administrator as shown at block 268, then gives the administrator the option to continuing modifying the warehouse item at decision block 244. Once the administrator determines no more changes are necessary to 3o the warehouse item, item modification terminates at termination bloclc 245.
Other functions supported by the catalog component 90 include the deletion and verification of warehouse items. The deletion of warehouse items includes the deletion of associated binary items and associated catalog items, along with deletions of user ratings and comments. Verification of warehouse items includes a step of determining whether a user wishing to verify a warehouse items has sufficient access privileges for accessing and verifying the warehouse items and performing verifications based on verification criteria.
According to one embodiment of the computing system 10, the catalog component 90 enables end-users, administrators, and system operators to page, sort, filter, and search listed items. Paging enables the grouping of items into page views, with navigation through the pages via number inputs, arrows, or both.
According to one to embodiment of the computing system 10, paging allows both sequential and random access to pages of results by a combination of numerical inputs and icon selection.
Sorting allows users to display lists in orderly ways. Sorting maybe used in combination with paging to allow users to intelligently surmise which pages of a list contain the objects they are interested in. Ascending and descending sorts according to a is number of item attributes, such as item names, item sizes, and item types are enabled in one embodiment of the computing system 10.
Filtering enables users to restrict the number of objects in a list. Filters may be chosen to closely match the types of tasks that a user, such as an administrator, is performing. For example, an administrator may wish to view a list of all the users who ao have not logged into the computing system 10 for a certain amount of time.
Such a filter may be entitled "dormant," because it identifies users believed to be dormant.
Keyword searching may also be used by system operators, administrators, and end-users to restrict the number of objects in a list. In keyword searching, an administrator provides the text the computing system 10 should search for. For example, 2s an administrator may wish to view a specific warehouse item that they know contains a certain game title in the name. Using the game title keyword in a search will return a very limited list of objects, one of which will be the desired object.
Application Server Component The application server component 74 provides an EJB container at the business so logic layer 48 and performs load balancing and clustering operations to enable efficient workflows in the computing system 10. The application server component 74 may be the device through which other components, such as the device management component 76, personalization component 80, rules engine component 86, and catalog component are implemented.
It is preferred to use a host for the application server component 74 that is capable of handling thousands of concurrent processes, thousands of open sockets, and several s megabytes of data. The application server host must have enough processing power to handle multiple concurrent tasks, and four-CPU systems are preferred as application server hosts according to one embodiment of the computing system 10. The application server host also needs sufficient RAM to process a large amount of media and textual data per transaction, as well as to meet caching database requirements. The application io server host should have sufficient disk space to store an operating system and required software, perform patches and updates, cache information from databases when the information is not in RAM, and to store server logs and error reports.
According to one embodiment, the application server host is provided with 20 gigabytes of disk space.
It is preferred for the computing system 10 to be agnostic to application servers, is such that a variety of different types of servers may be used as application servers. This server agnosticism contributes to the ability of the computing system 10 to utilize a distributed architecture and to facilitate redundancy, scalability, and clustering in different types of deployments of the computing system 10.
Device Management Component ao The device management component 76 enables data management and device auditing by end-users and administrators on OS-enabled devices. According to one embodiment of the invention, the device management component 76 uses an EJB
server layer, a web presentation layer, a conduit Simple Object Access Protocol (SOAP) servlet layer, a desktop conduit, and the device client stub 130 to perform its functions.
as Alternatively, the device management component 76 may operate without a conduit, depending on the specifications of the particular mobile devices being used in particular deployments of the computing system 10. The device management component 76 may also be implemented via XML, packaged with SOAP.
In more detail, the device management component 76 provides the tools so necessary for end users and administrators to manage digital goods on devices.
According to one embodiment, the device management component 76 focuses on the management of digital goods on mobile OS-enabled devices. In one embodiment of the device management component 76, end-users have collections of digital goods that they are entitled to. In this usage, "entitlement" to a digital good means having the ability to install the digital good on a device. Entitlement may be acquired by an end-user, for example, through end-users purchasing items or by an administrator "pushing"
the item s to end-users. Users may also acquire digital goods from other sources, such as from other end-users or from other data sources. According to one embodiment of the computing system 10, the open-ended nature of item sources is enabled because physical content is not stored within the computing system 10. Rather, in this embodiment, the computing system 10 provides information content specifications and location to users io and enables content acquisition without requiring storage of content within the computing system 10.
As described above, digital goods are maintained in warehouses 32 and 34 (see FIG. 3) that can be visible at the system domain, administrator domain, or end-user level.
Catalogs 42 are used to exposed views on digital goods in a more organized fashion.
is End-users maybe allowed to manage multiple devices in their profiles and may independently maintain each device. End-users may also update which items they are entitled to by acquiring items from warehouses or downloading items from other sources.
End-users can then determine which of their "entitled" items should be installed on their devices and indicate which items they wish to have removed from their devices.
ao Administrators can also control which items users are entitled to. The administrators further have the option to mark items as mandatory, with mandatory items being pushed to end-users' devices without the end-users' control.
Turning to FIG. 16, a device details page 270 accessible by an administrator using the device management component 76 is shown. The device details page allows as administrators to manage devices supported by the computing system 10. As new devices are introduced into the network or enterprise environment, administrators can add new devices to enable their users to take advantage of the latest products and technology or delete devices that are no longer supported. The device details page 270 shows the fields which an administrator may populate in describing a newly-supported 3o device, or checlc on to confirm that a device is specified correctly.
According to one embodiment, required fields 272 represent the absolute minimum information that must be inputted for a device to work on the computing system 10. Types of devices which may be specified for use with the computing system 10 include pagers, handheld computers or PDAs, including palm-sized PDAs, mobile phones, smart phones, workstations, and servers. A supported device may maintain information about the domain it belongs to (for example, a system operator domain or an administrator s domain). Further, it is preferred for supported devices to track information about expansion capabilities, such as the number of expansion slots, supported cards, and expansion media types. To further illustrate the interface used by administrators to maintain devices in the device management component 76, FIG. 17 is a screen shot of a device maintenance page 274 allowing an administrator to access a number of device to types for maintenance, and FIG. 18 is a screen shot of a device deletion page 276, which informs an administrator about a device before the administrator finally deletes the device from the computing system 10.
User devices may be defined as classes of devices used to model physical OS-enabled devices owned by users. User devices preferably contain a reference to the is owning user and have reference to the proper supported device that describes the common attributes of the device type. According to one embodiment of the computing system 10, user devices are adapted to track dynamically configured binary large objects (BLOBs), allowing synchronization business logic to track device-specific information and any other data required to affect synchronizations properly. User devices should zo further allow for dynamically defined extensions of the device, similarly to the "Ext"
element of Synchronization Markup Language (SyncML). Further, it is preferred for user devices to be capable of tracking supported Multi-Purpose Internet Mail Extension (MIME) types and associated "player" applications, such as e-book readers.
Tracking of MIME types and player applications may be done using SyncML content type as capabilities in XML format.
Digital goods resident on user devices are termed "device items." Thus, a device item may be any type of digital good, such as an application or an electronic book. When a user device is a PalmOS-enabled device, for example, a digital good is a database.
According to one embodiment of the present invention, device items are provided with a 3o number of attributes. Device items preferably track which devices the items belong to and which digital goods are being represented by the device items. Further, device items preferably track their current known states, including information on whether the device items are installed, and map to an identification marker local to the device.
For example, on a PalmOS-enabled device, the identification marker is the Creator m/type combination. In addition, a device item preferably tracks an action status indicating actions that need to performed during the next synchronization event. Action statuses s may include values for no action, where an item is installed and does not need any updating, values for items to be installed, values for items to be removed (including soft and hard deletion capabilities), values for items to be backed up, and values for items to be restored. A device item preferably has its current state updated once an action is successfully completed and verified during the synchronization event. The action status io may be updated to "no action" once any desired action has been verified as completed successfully or failed and canceled. Further, it is preferred for device items to track the timestamp for a completed action, including such timestamps as an installed date, a removed date, a backed-up date, and a restored date. Synchronization of devices may be accomplished through the use of a conduit, software that communicates between a is synchronization agent on a desktop machine and a device (such as a cradle or a mobile device) connected by wire line to the desktop machine. Alternatively, synchronization may be accomplished without the use of a conduit, such as via direct wire line or wireless communication between mobile devices and components of the computing system 10.
According to one embodiment of the computing system 10, administrators zo manage devices through the use of a device management session interface having such options as: finding a device item by a device item key, finding device items by related entitled items, confirming device compatibility based on external rules (including the provision of full error and status information back to the administrator for proper diagnosis of results), finding user devices by user, finding user devices by keys, finding zs user devices by supported devices (including filtering of supported devices by type, OS
type, and the like), finding user devices by users and/or groups, finding device items by searching based on user devices, creating device items for specific user devices (including providing reference to entitled items which may be referenced to an internal catalog or to a user warehouse), removing device items from specified user devices, 3o performing actions such as installation and removal of device items (including indicating whether an action is an administrator-instigated action such as a "push"), and retrieving, adding, removing, and updating Ext items, CTCap items, log items, BLOBs, and attribute items for user devices.
The device management component 76 may work in concert with the rules engine component 86 to enable automatic device management once rules have been established s in the rules engine component 86. According to one embodiment of the computing system 10, the device management component 76 allows for virtual storage of digital goods such that digital goods are only resident on devices when they are necessary. This functionality allows bulky digital goods to be stored outside the computing system 10 and accessed and installed on devices only when the digital goods are necessary for a io particular device in a particular context.
Rules Engine Component According to one embodiment of the computing system 10, administrators and system operators may incorporate basic business logic into the system by creating rules and rulesets in plain language using the rules engine component 86. The rules engine is component 86 allows the definition of policies such that a combination of events and profiles can be used to generate appropriate actions within the computing system 10, and further allows for the declaration of flexible policies that are not necessarily embedded within the computing system 10 and can be defined by administrators in real-time.
Rules, when grouped as policies, allow event-triggered actions to be governed by user ao profiles. A business rule is a statement that describes how a business is organized, how a business decision is made, or how a business process works. Examples of business rules include: a) "if an order exceeds $325 and the customer has a good credit history, then discount the order by 15%"; and b) "if the user is trying to install an application and a newer version of the application exists on their device, then do not perform the zs installation and alert the user of the problem."
Other rules may have a more direct effect on user devices. For example, a rule may be implemented which detects the current level of a user device's backup battery and informs the user when the backup battery is low. Such a rule may be phrased, "if the amount of charge left in a user device's backup battery is less than 30%; push a message 3o to the user informing the user to change the backup battery." Further, rules may be nested or provided with interdependencies. An example of this type of rule would be the determination of whether to install a software application on a user device based on the amount of memory available on the user device. Such a rule could have two parts: a first part stating, "the total memory required for the software application is the sum of the software application memory required and the memory required to run the OS,"
and a second part stating, "if the total memory required is greater than the total device memory, s then do not install the software application; otherwise, install the software application."
Rules may be grouped together into rulesets. Rulesets may be grouped based on a number of qualities, such as rule functionality, similarities of triggering events, and user groups upon which rules act. Rules within rulesets may be dependent upon each other, or they may operate independently of each other, according to the needs of business logic.
io It is preferred to allow users such as administrators and system operators to access the rules engine component 86 using a web-based interface, as shown in FIGS. 19 through 23. The rules engine component 86 is integrated into the entire computing.
system 10, so that any events within the computing system 10 can serve as triggers for carrying out specified rules. Rules allow "cause-and-effect" operations within the computing system is 10, and it is preferred to utilize a rule system which allows for precedence and chaining of rules, as well as real-time reaction to rule triggers. To enhance data portability within the rules engine component 86, it is preferred to use XML DTDs and to implement the rules system using a web-based interface.
FIG. 19 shows a rule maintenance interface page 278 which presents a user with a ao starting point from which to view, create, delete, and rearrange rule sets and view, create, delete, and modify rules. The rule maintenance interface page 278 shows a user categories of rulesets. When an administrator chooses a particular category of rulesets to interact with, a ruleset list page 280, containing a list of rulesets and, optionally, summary information about the rulesets as shown in FIG. 20, is displayed. To work with as a particular ruleset, the user chooses a ruleset from the ruleset list page 280, accessing a rule selection page 282, shown in FIG. 21. The rule selection page 282 of FIG.
21 shows only one rule regarding the deactivation of a user named "Thane." The rule selection page 282 includes such information as the rule name, the rule summary, information on whether or not the rule is active, and the priority of the rule. According to the so embodiment shown in FIG. 21, the rule selection page 282 allows the user to access the functions of adding ntles, editing rules, deleting rules, applying status changes to rules, and editing rule priority.
A user may create a new ruleset using the ruleset creation page 284 shown in FIG.
22. When a user enters a ruleset name and, optionally, a ruleset summary, the new ruleset is added to the ruleset list page 280, ready for rules to be added.
Rulesets may similarly be deleted by using the "delete ruleset" function shown on the ruleset list page s 280.
Users may select rules for viewing and editing from the rule selection page 282, entering a rule view page 286 as shown in FIG. 23. The rule view page 286 includes a plain language view of the rule as well as a logical view of the rule, allowing for easy recognition of the rule and rule behavior by the user.
i o Certain embodiments of the computing system 10 have specific requirements for the rules engine component 86. In some embodiments of the computing system 10, system rules are modifiable only by developers of the computing system 10 or by professional services providers. In some implementations, it is preferable to have rules specific to individual domains (for example, administrator domains and system operator i s domains) such that they are visible and modifiable only by domain admiustrators or system operators. It is also possible to specify rules that apply to every domain of the computing system 10. Rules can be either synchronous or asynchronous.
Synchronous rule processing means that a workflow is paused when a transaction in the system 10 awaits rule execution. Asynchronous rule processing means that rule actions are carried ao out without pausing further execution of other actions or other rules.
Batch rule updating, asynchronous rule actions (pertaining to email and logging, for example), and the ability of the system 10 to continue operation following the removal of a rule are fiu ther preferred.
Turning now to FIG. 24, an architecture view of the rules engine component 86 is as shown. According to one embodiment of the rules engine component 86, a rule includes events or triggers 288, actions 290, conditions 292, and business objects 294.
Events 288 are the circumstances that need to be met in order to request a rule set evaluation from the rules engine component 86. Actions 290 are the reactions taken depending on the result of a rule evaluation. Conditions 282 are the questions answered during the rule so evaluation, and business objects 294 are the items that are being accessed in conditions and actions. In the embodiment shown in FIG. 24, conditions 292 and business objects 294 reside in a rules engine EJB 296 on a Java 2 Platform, Enterprise Edition (J2EE) application server 298. The rules engine EJB 296 communicates using XML data with a rules repository 302, using XML DTDs_ One implementation of the rules engine component 86 is the automation of digital goods submission workflows within the computing system 10. Complex rules can easily s be added to automate a number of workflows within the computing system 10.
Rules may be implemented at different levels of the computing system 10. For example, some rules may apply to an entire system, while other rules may apply only to smaller domains within a particular deployment. According to one embodiment of the computing system 10, the rules engine component 86 is made accessible to end-users such that end-users io may be allowed to develop rules for business logic or for interactions with their devices that are particular to their individual needs. Further, in one embodiment of the computing system 10, the rules engine component 86 allows rules to be "hot-swappable,"
such that adding new rules or changing existing rules does not require the entire system to be reset.
is Within the rules engine component 86, administrators are given the opportunity to define scopes of contexts for the implementation of rules. This guards against rules becoming obsolete by incorporating the ability to alter context definitions over time. For example, memory capabilities of mobile devices may change over time. Thus, while at one time less sixteen megabytes of memory may be considered a small amount of ao memory and a device having more than sixteen megabytes of memory. would be considered to fall within a "high memory" context for mobile devices, at a later time it may be more useful to classify devices having up to 128 MB of memory within a "low memory" group and to group devices having more than 128 MB of memory into a "high memory" group. Thus, allowing the definition of context scopes to change over time zs ensures that rules implemented in the computing system 10 will not grow obsolete with advances in computing technology.
Configuration Component The configuration component 84 resides in the business logic layer 48 and provides generic management of configuration data for all parts of the computing system so 10, including EJB components, servlets, and standalone applications. The configuration component 84 thus allows for fine-tuning of a deployment of the computing system 10 for optimum performance. According to one embodiment, the configuration component 84 is an EJB itself and provides a generic system configured via XML for managing configuration data. Further, the configuration component 84 may be implemented using managed Java beans, allowing for integration with Java Management Extensions.
Certain embodiments of the present invention have specific requirements for the s configuration component 84. According to one embodiment of the computing system 10, required configuration information is retrieved from a primary database upon startup to initialize the system. Further, it is preferred to have default values for all configuration items to enable easy startup of the system 10. Configuration data is preferably represented using AML, and an XML DTD describing configuration data formatting. may io be used. Further, it is preferred for the configuration component 84 to validate its XML
DTD each time it is initialized, because the DTD may change over time. It is also preferred for the configuration component 84 to be one of the first components of the computing system to start, as other components of the computing system 10 may be provided with dependencies on the configuration component 84.
is According to one embodiment of the computing system 10, configuration information is handled using a distributed approach, because components resident on different devices will require access to configuration data 150 (shown in FIG.
According to some embodiments of the present invention, the configuration management component 84 is required to dynamically configure applications at runtime. An example zo of this is an application loading database connection parameters- during startup of the computing system 10. These configurable parameters are typically stored in configuration files or a database and can be managed through a user interface.
More advanced configuration management schemes may use expiry timeouts (through polling) and update events to allow for "hot" updates of configuration parameters in applications zs without the need for restarts.
Another aspect of configuration management relates to the propagation of updates throughout the computing system 10. According to one embodiment of the present invention, applications on the computing system 10 receive notifications of updates as they are submitted to the system 10. Using this updating system, the computing system so 10 uses Java Messaging Service (JMS) topics to publish update notifications to system users. Application components that require update notifications as they happen can register as subscribers to these notification topics to receive updates as they happen.
These components then implement the code to react to changes as required.
According to one embodiment of the configuration component 84, configuration data is described using the standard Java data types (e.g., String, Integer, Double, Date, s etc.). Configuration parameters are commonly referenced using a unique name within the context, e.g., a properties file. This commonality allows for a generic data management scheme to be easily developed. XML templates can define the meta information for a configuration context. This template would define the parameters to manage, referenced by a name unique to the context. According to one embodiment, the io data type is specified (String, Integer, etc.) for each parameter, along with default values, data restrictions such as ranges, enumerated lists, and the like. Other configuration information may include expiry time intervals and "hot" update queue information. Itser interfaces can use a template to generate the management user interface on the fly, as required. The configuration component 86 may further use a template to validate is configuration data updates.
Client applications accessing the configuration component EJB may include several types of applications, such as EJB components or web clients. The configuration component EJB may be used by configuration client applications to manage the configuration data.
Zo Configuration parameters are utilized within the computing system using configuration parameter definition objects. A configuration parameter definition object defines the name and type of the configuration parameter, along with any additional data restriction information. Configuration parameters are applied within certain "contexts"
of devices within the computing system 10. Contexts may include a variety of types of zs information about devices within the computing system, such as device types, named users of the devices, device location, device capabilities, information about devices, data, and applications to which a particular device has access, information about connection bandwidth available to a device, information about network type (such as wireless versus wire line networks), information on whether a user has a device while travelling or while 3o at a particular event, and a variety of other types of information about a device or user.
Types of information that may be included in a configuration parameter definition obj ect may include: the name of the parameter, a descriptive label for the parameter, the data type for the parameter, minimum and maximum values for parameters, information on whether a value can be nulled, security role information (for determining what roles are allowed to maupulate the value), scope information (describing whether the configuration parameter is global or specific to a domain, or specific to a physical server s machine), and a default value for the parameter.
Certain contexts can be given configuration sets termed "configuration contexts."
Examples of configuration contexts include context information such as maximum transfer size of digital goods, and maximum binary sizes for digital goods, defining the amount of room that is available on a device for receiving a digital good or the amount of io bandwidth that is available. Thus, configuration parameters may be segregated by context, while having the same name. For example, two different EJB components may define a parameter called "timeout." By defining a configuration context for each component, the parameters are unique to each context. Examples of information which may be included within a particular configuration context include the name of the is configuration context, a description of the configuration context, a list of configuration parameter definition objects, and any message topic or queue information allowing users to receive notifications when parameter values change in the context.
Parameters across different contexts may be grouped using fiulctional grouping objects, which include descriptive labels, descriptions, and references to configuration parameter definition 20 obj ects that are being grouped. According to one embodiment, configuration contexts can be defined separately for separate domains of a single deployment of the computing system 10.
The configuration component 48 is preferably managed using a web-based interface which allows a number of fimctions to be performed by an aclininistrator. Using as the configuration interface, it is preferred to allow administrators to:
find configuration parameter values using logical key sets (including context names, parameter names, domain ms, and server IDs); find configuration parameter values using physical keys (including information on parameter value locations); retrieve all configuration parameter values by context names and domain ms; insert new configuration parameter values;
3o delete configuration parameters; issue update events on specified event queues when parameters are inserted and updated; retrieve, insert, update, and delete configuration contexts and their associated configuration parameter definitions using XML
representations; manage configuration parameters using XML representations;
and create, edit, and find functional grouping objects in addition to finding all configuration parameter definition objects referenced by a grouping.
Operational Measurement Component The operational measurement component 82 allows developers and administrators to monitor and tune the computing system 10, and provides the data necessary to determine where performance bottlenecks are and how applications can be tuned to best suit particular deployments of the computing system 10.
According to one embodiment of the computing system 10, the operational measurement component io . provides real-time information about the performance and statistics of the computing system 10. Operational measurement in the present invention may be performed in a number of ways, including exposing methods to management software allowing for real-time querying of specified measurements and writing measurement values to persistent storage as they change. According to one embodiment of the present invention, is measurement values are written to persistent storage as they change, with management software then querying the data store to get "snapshots" of the measurements being tracked, as necessary. Reporting tools which import data and provide meaningful presentations of operational measurements may be utilized with the operational measurement component 82.
zo Data throughput, connection statistics, message statistics, and resource usage are among the operational measurements recorded by the operational measurement component 82. It is preferred to allow system operators and administrators to configure which operational measurements are tracked. According to one embodiment of the operational measurement component 82, operational measurement data 148 is forwarded zs to the database 66 on a regular basis. In one embodiment of the computing system 10, operational measurement snapshots are recorded once every ten seconds, though shorter or longer time values may be implemented in particular deployments of the computing system 10. It is preferred for operational measurement data to be collected using a schema that is exposed via an API to allow third-party tools to mine the operational 3o measurement data 148 and generate reports based on the data.
According to one embodiment of the operational measurement component 82, three subcomponents interact within the operational measurement component 82.
The first of the three sub-components, an operational measurement EJB, provides interfaces to retrieve and set measurements. The second subcomponent, an operational measurement methods-driven EJB, provides the management to accept JMS messages that contain updates to measurements. The third subcomponent, an operational s measurement managed bean (MBean) provides the interface to standard Java Management Extensions (JMX) agents and managers to enable access to and manipulation of measurement data. This design allows components to quickly issue updates in an asynchronous fashion while allowing processing of the updates to happen in a low-priority manner, helping to reduce the resource impact of the operational io measurement component 82.
Administration Comuonent The administration component 78 is preferably implemented as a distributed component through the interaction of other components, such as the device management component 76, the operational measurement component 82, the configuration component is 84, the rules engine 86, and the catalog component 90. The administration component 78 may be implemented using a web-based interface, enabling administrators to maintain users, devices, warehouses, catalogs, and rules and to send messages to users using the other components of the computing system 10. According to one embodiment of the computing system 10, both administrators and system operators have access to the zo functions enabled by the administration component 78.
. FIG. 25 is a screen shot of an administrator home page 304 from which an administrator rnay access options such as: viewing the administrator profile (where personal information and passwords can be changed), maintaining users (including creating and maintaining user groups), maintaining devices, maintaining warehouses, zs maintaining catalogs, and maintaining rules. To maintain users, an administrator accesses a user list page 306 as shown in FIG. 26. The user list page 306 shows user IDs, whether or not the user is active, the users' roles within the computing system 10, and the user names. To modify a user's settings, an administrator selects a name from the user list page 306 to access a user profile page 308, shown in FIG. 27. The user profile page 30 308 allows an administrator to access and alter user information, including personal information and information about users' devices. Information on the user's role within the computing system may also be entered into a user's profile. Additional interface pages may be provided to allow an administrator to add new users, (including specifying users' roles), delete users from the computing system, add new devices, and delete supported devices.
Warehouse and catalog maintenance are also enabled by the administration s component. The warehouse maintenance function allows administrators and operators to validate new warehouse items and manage items within warehouses. FIG. 28 is a screen shot of a warehouse maintenance page 310, where an administrator can view warehouse items, create new items, delete items, and view comments associated with items. The warehouse maintenance page 310 includes item information such as names of items, io version numbers of items, the number of binaries associates with items, item sizes, and the last date on which items were updated. To view and edit a warehouse item, an administrator selects an item from the warehouse maintenance page 310 to access a warehouse item details page 312, as shown in FIG: 29.
The warehouse item details page 312 allows an administrator to view an item in is detail and specify item information. In addition to viewing and updating item names and version numbers, administrators can add descriptions of items, provide suggested keywords to associate with items, specify operating system and operating system version numbers for items, define minimum system requirements, and insert information on license types and prices for items using the warehouse item details page 312_ The ao administrator may also manage binary items by accessing the "manage binary items"
function of the warehouse item details page 312. Managing binary item types may similarly be performed using a web-based interface into which an administrator enters information such as binary system requirements, binary license types, and the like.
Similar web-based interface pages may be provided for creating new warehouse items, zs deleting warehouse items, and maintaining catalogs (including creating new catalogs, adding items to catalogs, viewing catalogs and catalog items, modifying catalog properties, and deleting catalogs and catalog items).
Personalization Component According to one embodiment of the computing system 10, the personalization 3o component 80 includes a set of subcomponents used to collect users' information and tailor the user experience according to implicit and explicit profiles. End-users 18, system operators 24, application developers 26, and administrators 28 may employ the personalization component 80 to enhance the experience of using the computing system 10. According to one embodiment of the personalization component 80, the component is implemented using EJBs, with an authentication manager being responsible for processing login requests and checking user privileges and a user manager being s responsible for retrieval, updating, insertion, and deletion of user information.
Personalization may be enhanced through a user interface similar to the interface used in the administration component 78. For example, end-users 1 S may access a home page 316, as shown in FIG. 30. The home page serves as an initial page from which an end-user may select options including accessing the use's profile, accessing the user's io library, and viewing catalogs that are available to the user. If users v~ish to review or edit profile information, they access a profile page 318 as shown in FIG. 31. The profile page 318 allows the user to update personal information as well .as information on which devices the user has. The profile page 318 may be used to add new email addresses and devices to a user profile. ' is User libraries serve as end-users' personal repositories of items they have downloaded from catalogs. Users may customize their libraries using a library page from which users may view items within their libraries (including items details such as item sizes and requirements), add and delete items to and from their libraries, and view and submit item comments.
zo Users may also use a web-based interface for viewing, catalogs, where users may access digital goods that particularly appeal to them. For example, if an end-user is interested in games produced especially for the Palm OS, the user may browse through a "Palm Games" catalog to find particularly appealing games. Using a catalog interface, users can acquire items from catalogs and add them to their own libraries, for example by zs purchasing the items and gaining sufficient authorization to install the items in their libraries. Users may also use the catalog interface to review and add comments and ratings for catalog items.
The personalization component 80 may be further adapted to provide more thorough personalization of a user's experience. For example, personalization may 3o extend to allowing a user to implement favorite user interfaces or appearances for data on users' devices. The personalization component 80 may further include the ability for a user to use messaging capabilities of the computing system 10. Messaging may be implemented from a user's home page 316, and the users or user groups to which individuals may direct emails may be controlled by a system operator or administrator.
Another feature of the computing system 10 which may be implemented using the personalization component 80 is an implicit profiling feature. In implicit profiling, a s user's activities within the computing system 10 are used to add information to a user profile. Thus, a user profile may be built based on a user's interaction with the computing system 10 without requiring the user to make direct profile choices.
For example, a particular user may access the computing system 10 several times to find out information about games and to acquire digital goods related to games. This user would to be implicitly profiled as a user focused on games, and this information can be used in targeted advertising to the user by concentrating on game advertisements.
Client Stub Component and Sync Engine The client stub component 130 acquires required device information through device OS APIs and creates and updates databases on devices. According to one is embodiment of the computing system 10, the client stub serves as the interface between an end-user device and other components of the computing system 10. According to one embodiment of the computing system 10, the client stub component 130 activates automatically upon any synchronization between an end-user device and the computing system 10. Alternatively, the client stub component may be started manually by an end-Zo user during a synchronization event. The client stub component 130 works with other components, including the device management component 76 and the operational measurement component 82 to integrate device information into the computing system 10. According to one embodiment, the databases on the devices store unique computing system device IDs along with metrics acquired by the stub from the device. The client zs stub component 130 may be launched by a conduit, which acquires attributes and values from the device database. Information acquired by the client stub component 130 may include unique device IDs, battery types, and the percentage and amount of power remaining in the device battery. The client stub may alternatively be implemented without the need for a conduit, where devices have the capability for communication so with other components of the computing system 10 without an intermediate conduit.
The client stub component 130 further enables context-based forwarding of information to user devices, such that information may be tailored to specific contexts for specific users. For example, if a user's context indicates that the user is in the office, the client stub component 130 can record and forward this information to other components in the computing system 10, allowing the other components to provide information to the device that is particularly pertinent to the office environment. This functionality allows s limited device memory. and other resources to be dedicated to relevant tasks, rather than burdening devices with unnecessary information at inopportune times.
FIG. 32 shows the client stub component 130 resident on a user's handheld device. According to one embodiment of the invention, the client stub communicates with a personal computer using a conduit 322, which, in turn, communicates over the to Internet 56 with a presentation server 324. Alternatively, the conduit may be omitted, allowing direct communication between the Internet 56 and the client stub. The presentation server 324 and the HTTP server component 116 may be implemented on a single physical server. The presentation server 324 has access to the application server component 74, which, in turn, has access to the database 66 via the database server is component 68. Through this series of communication links, the client stub component 130 enables syncing of a device with the computing system 10:
According to one embodiment of the computing system 10, communication with the sync engine is done via the HTTP server component 116.
Device syncing in the computing system may be accomplished through the use of ao a sync engine. According to one embodiment of the present invention, a sync engine contains two layers: a servlet, seated on the presentation layer 50 and an EJB
seated at the application server component 74 and interacting with other system components, including the device management component 76. According to one embodiment of the computing system 10, Hypertext Transfer Protocol over Secure Socket Layer, or HTTPS, zs is utilized for system security, while still retaining the ability to use SSL via HTTP.
HTTP Server, View Controllers, and Stylesheets Components The HTTP server component 116 serves as a central component for allowing web-based access to the other system components. The HTTP server component supports the presentation layer 50. It is preferred for the HTTP server component 116 to 3o support Java Server Pages and to provide a servlet container. Further, it is preferred for the HTTP component 116 to be HTTP/1.1 compliant and to support advanced optimization features such as static data cashing. For security purposes, it is preferred for the HTTP server component 116 to support 128 bit encryption over the Secure Sockets Layer (SSL), and to have a certificate with a key installed. It is further preferred for the HTTP server component 116 not to have direct access to the database 66, to prevent the possibility of unauthorized database access by hackers. According to one embodiment of s the computing system 10, the HTTP server component 116 works in conjunction with the view controllers component 128 and the stylesheets component 126 to support the presentation layer 50.
These components work together to enable the retrieval of data from databases and to provide data in a form available to any view type. According, to one embodiment io of the computing system 10, JSPs are used to reference data from Java Beans as needed.
An XML document may be used to control the flow of the interface, and the XML
document may be altered without recompiling and without restarting the computing system 10. Such an implementation allows for action handlers which act before and after data transfer events, allowing data validation to happen on Java Beans. Action handlers is may be used to define which pages are accessed, while the XML page defines how to access individual pages. Using this methodology, components dealing with data presentation in the computing system 10 rnay be kept physically separate from components dealing with the storage and access to physical data files.
System Deployments Zo The computing system 10 of the present invention is scalable for optimum resource allocation in a number of types of deployments. Deployments may be specialized for enterprises, telecommunications carriers, general information technology locations (such as central offices or corporate laboratories), and for a wide variety of other entities requiring a comprehensive communications solution. According to one zs embodiment of the computing system 10, the system is deployed such that different legal entities or enterprises have their digital goods stored in physically distributed locations, reducing the likelihood of improper access to proprietary digital goods. FIG.
33 shows an architecture view of a general IT deployment of the computing system 10 according, to one embodiment of the present invention. The data layer 46 is implemented via a data so server 326, a mirror data server 328, and a database cluster 330. The business logic layer 48 is implemented using two application servers 332 and 334. The presentation layer SO
is implemented using three HTTP servers 336, 338, and 340, along with a primary load balancer/firewall 342 and a fail-over load balancer/firewall 344.
Communication between the presentation layer 50 and the client layer 52 takes place over the Internet 56, using first and second switches 346 and 348 on the presentation layer side, and an ISP
gateway 350 on the client side. As shown in FIG. 33, communication between a mobile s device 352 may take place wirelessly or via wire line communication directly between the ISP gateway and the mobile devices 352, or via wireless or wire line communication wherein a mobile device 352 is further connected to a personal computer. The deployment of FIG. 33 is an example deployment, and it is to be understood that the hardware supporting the data layer 46, the business logic layer 48, and the presentation io layer 50 may take a variety of forms, including all three layers being supported on a single server, each layer being supported on a separate server, and combinations of two layers on one server and a third layer on a second server.
System Functions and Facilitators A number of functions and features may be incorporated into the computing is system 10 to increase the ease of use and functionality of the system for all actors.
Community grouping is one feature that enhances the usability of the computing system 10 by allowing administrators and system operators to group system actors, allowing administration, maintenance, and operations to be carried out more efficiently on a larger scale rather than addressing individual users for all cases.
Community ao grouping may be implemented by using an EJB server layer along with appropriate interfaces. Examples of community groups include groups for pushing a digital good or message to a set of end-users, groups for allowing a set of end-users to access particular catalogs, groups for allowing a set of administrators and end-users to receive group emails, and groups to allow a set of administrators to maintain a catalog or restrict as maintenance abilities to the ability to add items, rather than the ability to delete or modify items.
Messaging allows users, including administrators and system operators, to send messages to other users. Messaging may be useful, for example, when an administrator wishes to send an update message to users regarding new catalogs available to them or to 3o alert them of viruses or upgraded operating systems. Messaging may be implemented through a web-based interface with a messaging page 326 allowing a user to edit a message and specify recipients, as shown in FIG. 33. Messaging may be tracked through the use of message fields, including information on message type, message priority, information on whether and when the message was accessed and read, and information on whether a message has been deleted. Messaging may be implemented as a "push"
function in the computing system 10.
A dictionary mechanism may also be employed in the computing system 10. A
dictionary is useful because each system obj ect, such as a warehouse item or catalog item, has multiple attributes associated with it. Some of these attributes.
may only have a constrained number of possible values (for example, the OS type of a warehouse item may be limited to Palm OS, Windows PocketPC OS, Symbian, RIM OS, and others).
In io . order to effectively and flexibly manage the possible attribute values, the dictionary serves as a centralized mechanism to capture attributes and their associated constrained list of values. A data dictionary allows an administrator to have full control over item attribute values and enables the addition, deletion, and modification of values when necessary. The dictionary may be implemented as an EJB in the business logic layer 48.
is Security within the computing system 10 may be handled using a Role-Based Access Control (RBAC) system. In the RBAC system, users are assigned to roles, and access permissions are assigned to particular roles. Users acquire permissions by belonging to roles. According to one embodiment of the computer system 10, users can belong to any of four roles: end-users, application developers, administrators, and zo system operators. These roles may be considered "master roles," with administrators having the option to develop other roles within the master roles. RBAC is implemented so that users only have access to those computer system items that the user is entitled to, and RBAC works in combination with the system components described above to allow access only where entitlement has been purchased or given by administrators or system as operators. Actors within the computing system 10 who have been verified as proper users of the system may be considered "trusted" actors as part of a trusted chain of supply, while actors who have not been verified as proper users may be considered "unfrosted" actors as part of an unfrosted chain of supply.
While the present invention has been described with reference to one or more so particular embodiments, those skilled in the art will recognize that many changes may be made thereto without departing from the spirit and scope of the present invention. Each of these embodiments and obvious variations thereof is contemplated as falling within the spirit and scope of the claimed invention, which is set forth in the following claims.
one or more data warehouses containing a plurality of digital goods;
means for identifying one or more of said contexts of use for a specified one of said end-user devices; and means for identifying, presenting, packaging, delivering, and managing selected digital goods from said data warehouses to said specified one of said end-user devices, said system being managed by one or more administrators and allowing access to one or more end-users.
means defining contexts for individual end-user devices; and means for tailoring digital goods to be delivered from said data warehouse to a specified end-user device according to the context of that specified device.
a data layer having access to a main database;
a business logic layer in communication with said data layer and having components for implementing business operations;
a presentation layer in communication with said business logic layer and having components for translating digital goods; and a client layer in communication with said presentation layer and having components for formatting and displaying digital goods received from the presentation layer on user devices.
a plurality of devices accessible by users, the devices including means for collecting status information about the devices and means for transmitting the status information to a first server having a data display and translation component, said devices further including means for receiving digital goods from said first server;
means for editing and implementing business logic rules defining allowed interactions between said devices based on said status information, said business logic rules being implemented by a second server in communication with the first server;
wherein said second server is adapted to forward business logic rules as digital goods to the first server, and the data display and translation component on the first server is adapted to receive the digital goods and translate the digital goods for use by the users.
providing one or more data warehouses having catalogs therein;
inputting business logic rules into an application server;
providing a plurality of devices with access to a web server, the web server being in communication with the application server; and allowing access to certain ones of the catalogs by certain ones of the devices through the web server based on business logic rules in the application server.
providing access to said computing system to system operators, application developers, administrators, and end-users via devices;
providing catalogs in data warehouses within the computing system;
populating the catalogs with digital goods from the application developers;
receiving business logic rules from the system operators and administrators and storing the business logic rules in a database;
providing. client stubs on the devices, the client stubs collecting status information about the devices and storing the status information on the devices and in the database;
providing access to certain digital goods in certain ones of the catalogs by certain ones of the devices based on the status information and further based on the business logic rules; and providing the administrators and system operators with data describing which of the digital goods are being accessed by which of the devices.
Priority Applications (3)
|Application Number||Priority Date||Filing Date||Title|
|PCT/IB2003/003045 WO2004013782A1 (en)||2002-07-31||2003-07-31||Contextual computing system|
|Publication Number||Publication Date|
|CA2494122A1 true true CA2494122A1 (en)||2004-02-12|
Family Applications (1)
|Application Number||Title||Priority Date||Filing Date|
|CA 2494122 Abandoned CA2494122A1 (en)||2002-07-31||2003-07-31||Contextual computing system|
Country Status (4)
|US (2)||US7930215B2 (en)|
|EP (1)||EP1530769A1 (en)|
|CA (1)||CA2494122A1 (en)|
|WO (1)||WO2004013782A1 (en)|
Families Citing this family (183)
|Publication number||Priority date||Publication date||Assignee||Title|
|US20020188694A1 (en) *||2001-06-07||2002-12-12||Allen Yu||Cached enabled implicit personalization system and method|
|US8590013B2 (en)||2002-02-25||2013-11-19||C. S. Lee Crawford||Method of managing and communicating data pertaining to software applications for processor-based devices comprising wireless communication circuitry|
|US7885974B2 (en)||2002-11-18||2011-02-08||Aol Inc.||Method and apparatus providing omnibus view of online and offline content of various file types and sources|
|US8868553B2 (en) *||2003-03-11||2014-10-21||Bank Of America Corporation||System and method to acquire information from a database|
|US7376671B2 (en) *||2003-04-15||2008-05-20||Bea Systems, Inc.||Method for common management model for distributed server network|
|US7784047B2 (en) *||2003-04-15||2010-08-24||Bea Systems, Inc.||Common management model for distributed server network|
|WO2004104786A3 (en) *||2003-05-19||2005-12-29||Business Objects Americas||Apparatus and method for accessing diverse native data sources through a metadata interface|
|US7203696B2 (en) *||2003-08-29||2007-04-10||Microsoft Corporation||Dynamic registry partitioning|
|US20050101311A1 (en) *||2003-10-15||2005-05-12||Vernon Weitzman||Data driven engine and system for wireless communications|
|US7421437B2 (en) *||2003-11-10||2008-09-02||Sap Ag||System and method for a data dictionary cache in a distributed system|
|US7587487B1 (en) *||2003-12-10||2009-09-08||Foundry Networks, Inc.||Method and apparatus for load balancing based on XML content in a packet|
|US7370100B1 (en) *||2003-12-10||2008-05-06||Foundry Networks, Inc.||Method and apparatus for load balancing based on packet header content|
|US7496191B1 (en)||2003-12-17||2009-02-24||Sprint Communications Company L.P.||Integrated privacy rules engine and application|
|US7853786B1 (en) *||2003-12-17||2010-12-14||Sprint Communications Company L.P.||Rules engine architecture and implementation|
|US8756487B2 (en) *||2004-01-06||2014-06-17||International Business Machines Corporation||System and method for context sensitive content management|
|US7257583B2 (en) *||2004-01-09||2007-08-14||Microsoft Corporation||System and method for updating an on-device application catalog in a mobile device receiving a push message from a catalog server indicating availability of an application for download|
|US7496925B2 (en) *||2004-01-14||2009-02-24||International Business Machines Corporation||Information kit objects for publish/subscribe integration architecture|
|US20050187912A1 (en) *||2004-02-24||2005-08-25||International Business Machines Corporation||Management of configuration data using extensible markup language|
|US7500226B2 (en) *||2004-03-02||2009-03-03||Microsoft Corporation||Efficient checking of state-dependent constraints|
|US7827294B2 (en)||2004-05-06||2010-11-02||American Express Travel Related Services Company, Inc.||System and method for dynamic security provisioning of computing resources|
|US8266670B1 (en) *||2004-05-06||2012-09-11||American Express Travel Related Services Company, Inc.||System and method for dynamic security provisioning of data resources|
|US7529818B2 (en) *||2004-05-20||2009-05-05||Bea Systems, Inc.||System and method for performing validation of a configuration|
|US7660824B2 (en) *||2004-05-20||2010-02-09||Bea Systems, Inc.||System and method for performing batch configuration changes|
|US7552420B1 (en) *||2004-09-01||2009-06-23||Intuit Inc.||Externally defined application configuration|
|US9552599B1 (en) *||2004-09-10||2017-01-24||Deem, Inc.||Platform for multi-service procurement|
|FI122213B (en) *||2004-09-28||2011-10-14||Capricode Oy||Method and device arrangement for managing a terminal profile|
|US7711835B2 (en) *||2004-09-30||2010-05-04||Citrix Systems, Inc.||Method and apparatus for reducing disclosure of proprietary data in a networked environment|
|US7769747B2 (en) *||2004-12-02||2010-08-03||International Business Machines Corporation||Method and apparatus for generating a service data object based service pattern for an enterprise Java beans model|
|US7792851B2 (en) *||2004-12-02||2010-09-07||International Business Machines Corporation||Mechanism for defining queries in terms of data objects|
|US20060168259A1 (en) *||2005-01-27||2006-07-27||Iknowware, Lp||System and method for accessing data via Internet, wireless PDA, smartphone, text to voice and voice to text|
|DE112006000618T5 (en)||2005-03-15||2008-02-07||Trapeze Networks, Inc., Pleasanton||System and method for distributing keys in a wireless network|
|US7769859B1 (en) *||2005-04-15||2010-08-03||Cisco Technology, Inc.||Controlling access to managed objects in networked devices|
|US9330134B2 (en) *||2005-05-31||2016-05-03||Fairwarning Ip, Llc||User identity mapping system and method of use|
|KR100697973B1 (en) *||2005-09-05||2007-03-23||주식회사 케이티||Evaluation Apparatus and Method of Intangible Loss Caused by Ubiquity Effect|
|US7912458B2 (en)||2005-09-14||2011-03-22||Jumptap, Inc.||Interaction analysis and prioritization of mobile content|
|US8027879B2 (en)||2005-11-05||2011-09-27||Jumptap, Inc.||Exclusivity bidding for mobile sponsored content|
|US20090240569A1 (en) *||2005-09-14||2009-09-24||Jorey Ramer||Syndication of a behavioral profile using a monetization platform|
|US8156128B2 (en) *||2005-09-14||2012-04-10||Jumptap, Inc.||Contextual mobile content placement on a mobile communication facility|
|US20070061198A1 (en) *||2005-09-14||2007-03-15||Jorey Ramer||Mobile pay-per-call campaign creation|
|US20070073718A1 (en) *||2005-09-14||2007-03-29||Jorey Ramer||Mobile search service instant activation|
|US20070073719A1 (en) *||2005-09-14||2007-03-29||Jorey Ramer||Physical navigation of a mobile search application|
|US20070061303A1 (en) *||2005-09-14||2007-03-15||Jorey Ramer||Mobile search result clustering|
|US20080214155A1 (en) *||2005-11-01||2008-09-04||Jorey Ramer||Integrating subscription content into mobile search results|
|US20070061335A1 (en) *||2005-09-14||2007-03-15||Jorey Ramer||Multimodal search query processing|
|US20070061317A1 (en) *||2005-09-14||2007-03-15||Jorey Ramer||Mobile search substring query completion|
|US9201979B2 (en)||2005-09-14||2015-12-01||Millennial Media, Inc.||Syndication of a behavioral profile associated with an availability condition using a monetization platform|
|US9703892B2 (en)||2005-09-14||2017-07-11||Millennial Media Llc||Predictive text completion for a mobile communication facility|
|US8805339B2 (en)||2005-09-14||2014-08-12||Millennial Media, Inc.||Categorization of a mobile user profile based on browse and viewing behavior|
|US20070198485A1 (en) *||2005-09-14||2007-08-23||Jorey Ramer||Mobile search service discovery|
|US7660581B2 (en) *||2005-09-14||2010-02-09||Jumptap, Inc.||Managing sponsored content based on usage history|
|US8364540B2 (en)||2005-09-14||2013-01-29||Jumptap, Inc.||Contextual targeting of content using a monetization platform|
|US8688671B2 (en)||2005-09-14||2014-04-01||Millennial Media||Managing sponsored content based on geographic region|
|US20070168354A1 (en) *||2005-11-01||2007-07-19||Jorey Ramer||Combined algorithmic and editorial-reviewed mobile content search results|
|US8302030B2 (en)||2005-09-14||2012-10-30||Jumptap, Inc.||Management of multiple advertising inventories using a monetization platform|
|US20080214153A1 (en) *||2005-09-14||2008-09-04||Jorey Ramer||Mobile User Profile Creation based on User Browse Behaviors|
|US8364521B2 (en) *||2005-09-14||2013-01-29||Jumptap, Inc.||Rendering targeted advertisement on mobile communication facilities|
|US8509750B2 (en)||2005-11-05||2013-08-13||Jumptap, Inc.||System for targeting advertising content to a plurality of mobile communication facilities|
|US7676394B2 (en) *||2005-09-14||2010-03-09||Jumptap, Inc.||Dynamic bidding and expected value|
|US7577665B2 (en)||2005-09-14||2009-08-18||Jumptap, Inc.||User characteristic influenced search results|
|US20070192318A1 (en) *||2005-09-14||2007-08-16||Jorey Ramer||Creation of a mobile search suggestion dictionary|
|US8131271B2 (en) *||2005-11-05||2012-03-06||Jumptap, Inc.||Categorization of a mobile user profile based on browse behavior|
|US8311888B2 (en)||2005-09-14||2012-11-13||Jumptap, Inc.||Revenue models associated with syndication of a behavioral profile using a monetization platform|
|US7769764B2 (en)||2005-09-14||2010-08-03||Jumptap, Inc.||Mobile advertisement syndication|
|US9058406B2 (en)||2005-09-14||2015-06-16||Millennial Media, Inc.||Management of multiple advertising inventories using a monetization platform|
|US8832100B2 (en) *||2005-09-14||2014-09-09||Millennial Media, Inc.||User transaction history influenced search results|
|US8238888B2 (en)||2006-09-13||2012-08-07||Jumptap, Inc.||Methods and systems for mobile coupon placement|
|US20080242279A1 (en) *||2005-09-14||2008-10-02||Jorey Ramer||Behavior-based mobile content placement on a mobile communication facility|
|US7860871B2 (en) *||2005-09-14||2010-12-28||Jumptap, Inc.||User history influenced search results|
|US7603360B2 (en) *||2005-09-14||2009-10-13||Jumptap, Inc.||Location influenced search results|
|US7702318B2 (en)||2005-09-14||2010-04-20||Jumptap, Inc.||Presentation of sponsored content based on mobile transaction event|
|US8103545B2 (en)||2005-09-14||2012-01-24||Jumptap, Inc.||Managing payment for sponsored content presented to mobile communication facilities|
|US20070073722A1 (en) *||2005-09-14||2007-03-29||Jorey Ramer||Calculation and presentation of mobile content expected value|
|US20090029687A1 (en) *||2005-09-14||2009-01-29||Jorey Ramer||Combining mobile and transcoded content in a mobile search result|
|US8660891B2 (en)||2005-11-01||2014-02-25||Millennial Media||Interactive mobile advertisement banners|
|US8503995B2 (en)||2005-09-14||2013-08-06||Jumptap, Inc.||Mobile dynamic advertisement creation and placement|
|US8290810B2 (en) *||2005-09-14||2012-10-16||Jumptap, Inc.||Realtime surveying within mobile sponsored content|
|US20070100653A1 (en) *||2005-11-01||2007-05-03||Jorey Ramer||Mobile website analyzer|
|US20080214151A1 (en) *||2005-09-14||2008-09-04||Jorey Ramer||Methods and systems for mobile coupon placement|
|US9076175B2 (en) *||2005-09-14||2015-07-07||Millennial Media, Inc.||Mobile comparison shopping|
|US7752209B2 (en) *||2005-09-14||2010-07-06||Jumptap, Inc.||Presenting sponsored content on a mobile communication facility|
|US20070061245A1 (en) *||2005-09-14||2007-03-15||Jorey Ramer||Location based presentation of mobile content|
|US9471925B2 (en) *||2005-09-14||2016-10-18||Millennial Media Llc||Increasing mobile interactivity|
|US8209344B2 (en)||2005-09-14||2012-06-26||Jumptap, Inc.||Embedding sponsored content in mobile applications|
|US8819659B2 (en)||2005-09-14||2014-08-26||Millennial Media, Inc.||Mobile search service instant activation|
|US20070061211A1 (en) *||2005-09-14||2007-03-15||Jorey Ramer||Preventing mobile communication facility click fraud|
|US8175585B2 (en)||2005-11-05||2012-05-08||Jumptap, Inc.||System for targeting advertising content to a plurality of mobile communication facilities|
|US20070061246A1 (en) *||2005-09-14||2007-03-15||Jorey Ramer||Mobile campaign creation|
|US8666376B2 (en) *||2005-09-14||2014-03-04||Millennial Media||Location based mobile shopping affinity program|
|US8195133B2 (en)||2005-09-14||2012-06-05||Jumptap, Inc.||Mobile dynamic advertisement creation and placement|
|US20070239724A1 (en) *||2005-09-14||2007-10-11||Jorey Ramer||Mobile search services related to direct identifiers|
|US20080214152A1 (en) *||2005-09-14||2008-09-04||Jorey Ramer||Methods and systems of mobile dynamic content presentation|
|US8989718B2 (en)||2005-09-14||2015-03-24||Millennial Media, Inc.||Idle screen advertising|
|US8615719B2 (en)||2005-09-14||2013-12-24||Jumptap, Inc.||Managing sponsored content for delivery to mobile communication facilities|
|US8229914B2 (en) *||2005-09-14||2012-07-24||Jumptap, Inc.||Mobile content spidering and compatibility determination|
|US7548915B2 (en) *||2005-09-14||2009-06-16||Jorey Ramer||Contextual mobile content placement on a mobile communication facility|
|US20070100650A1 (en) *||2005-09-14||2007-05-03||Jorey Ramer||Action functionality for mobile content search results|
|US20070061334A1 (en) *||2005-09-14||2007-03-15||Jorey Ramer||Search query address redirection on a mobile communication facility|
|US20070061242A1 (en) *||2005-09-14||2007-03-15||Jorey Ramer||Implicit searching for mobile content|
|US20070100806A1 (en) *||2005-11-01||2007-05-03||Jorey Ramer||Client libraries for mobile content|
|US20110143731A1 (en) *||2005-09-14||2011-06-16||Jorey Ramer||Mobile Communication Facility Usage Pattern Geographic Based Advertising|
|US20070060173A1 (en) *||2005-09-14||2007-03-15||Jorey Ramer||Managing sponsored content based on transaction history|
|US20070100805A1 (en) *||2005-09-14||2007-05-03||Jorey Ramer||Mobile content cross-inventory yield optimization|
|US20070100652A1 (en) *||2005-11-01||2007-05-03||Jorey Ramer||Mobile pay per call|
|US20080214154A1 (en) *||2005-11-01||2008-09-04||Jorey Ramer||Associating mobile and non mobile web content|
|US20080214204A1 (en) *||2005-11-01||2008-09-04||Jorey Ramer||Similarity based location mapping of mobile comm facility users|
|US20080215623A1 (en) *||2005-09-14||2008-09-04||Jorey Ramer||Mobile communication facility usage and social network creation|
|US20080270220A1 (en) *||2005-11-05||2008-10-30||Jorey Ramer||Embedding a nonsponsored mobile content within a sponsored mobile content|
|US8812526B2 (en)||2005-09-14||2014-08-19||Millennial Media, Inc.||Mobile content cross-inventory yield optimization|
|US20090234745A1 (en) *||2005-11-05||2009-09-17||Jorey Ramer||Methods and systems for mobile coupon tracking|
|US20070061247A1 (en) *||2005-09-14||2007-03-15||Jorey Ramer||Expected value and prioritization of mobile content|
|US20080215429A1 (en) *||2005-11-01||2008-09-04||Jorey Ramer||Using a mobile communication facility for offline ad searching|
|US20070100651A1 (en) *||2005-11-01||2007-05-03||Jorey Ramer||Mobile payment facilitation|
|US20070064477A1 (en) *||2005-09-20||2007-03-22||Battelle Memorial Institute||System for remote data sharing|
|US7573859B2 (en)||2005-10-13||2009-08-11||Trapeze Networks, Inc.||System and method for remote monitoring in a wireless network|
|WO2007044986A3 (en)||2005-10-13||2007-10-18||Trapeze Networks Inc||System and method for remote monitoring in a wireless network|
|US7724703B2 (en)||2005-10-13||2010-05-25||Belden, Inc.||System and method for wireless network monitoring|
|US8638762B2 (en)||2005-10-13||2014-01-28||Trapeze Networks, Inc.||System and method for network integrity|
|US8250587B2 (en) *||2005-10-27||2012-08-21||Trapeze Networks, Inc.||Non-persistent and persistent information setting method and system for inter-process communication|
|US8571999B2 (en)||2005-11-14||2013-10-29||C. S. Lee Crawford||Method of conducting operations for a social network application including activity list generation|
|US8185819B2 (en)||2005-12-12||2012-05-22||Google Inc.||Module specification for a module to be incorporated into a container document|
|US7558266B2 (en)||2006-05-03||2009-07-07||Trapeze Networks, Inc.||System and method for restricting network access using forwarding databases|
|US9117005B2 (en) *||2006-05-16||2015-08-25||International Business Machines Corporation||Statistics collection using path-value pairs for relational databases|
|US7613682B2 (en) *||2006-05-16||2009-11-03||International Business Machines Corporation||Statistics collection using path-identifiers for relational databases|
|US8966018B2 (en)||2006-05-19||2015-02-24||Trapeze Networks, Inc.||Automated network device configuration and network deployment|
|US7682961B2 (en) *||2006-06-08||2010-03-23||International Business Machines Corporation||Methods of forming solder connections and structure thereof|
|US8818322B2 (en)||2006-06-09||2014-08-26||Trapeze Networks, Inc.||Untethered access point mesh system and method|
|US9258702B2 (en)||2006-06-09||2016-02-09||Trapeze Networks, Inc.||AP-local dynamic switching|
|US9191799B2 (en)||2006-06-09||2015-11-17||Juniper Networks, Inc.||Sharing data between wireless switches system and method|
|US8185830B2 (en) *||2006-08-07||2012-05-22||Google Inc.||Configuring a content document for users and user groups|
|US8340110B2 (en)||2006-09-15||2012-12-25||Trapeze Networks, Inc.||Quality of service provisioning for wireless networks|
|US8078643B2 (en) *||2006-11-27||2011-12-13||Sap Ag||Schema modeler for generating an efficient database schema|
|US7873061B2 (en)||2006-12-28||2011-01-18||Trapeze Networks, Inc.||System and method for aggregation and queuing in a wireless network|
|CA2578466A1 (en) *||2007-01-12||2008-07-12||Truecontext Corporation||Method and system for customizing a mobile application using a web-based interface|
|US20080177878A1 (en) *||2007-01-22||2008-07-24||Jeffrey Scott Pierce||Multi-device communication method and system|
|US20100005102A1 (en) *||2007-03-22||2010-01-07||Arinc Incorporated||Method and apparatus for managing document/message content for distribution to subscribers|
|US8082553B2 (en) *||2007-06-25||2011-12-20||International Business Machines Corporation||Client management of java management extensions (JMX) Mbean state|
|US8902904B2 (en)||2007-09-07||2014-12-02||Trapeze Networks, Inc.||Network assignment based on priority|
|US8238942B2 (en)||2007-11-21||2012-08-07||Trapeze Networks, Inc.||Wireless station location detection|
|US8150357B2 (en)||2008-03-28||2012-04-03||Trapeze Networks, Inc.||Smoothing filter for irregular update intervals|
|US7487183B1 (en) *||2008-04-03||2009-02-03||International Business Machines Corporation||Grouped filter rules for workflow application update notifications|
|EP2311233A1 (en)||2008-05-21||2011-04-20||Uniloc Usa, Inc.||Device and method for secured communication|
|US8978105B2 (en)||2008-07-25||2015-03-10||Trapeze Networks, Inc.||Affirming network relationships and resource access via related networks|
|US8238298B2 (en) *||2008-08-29||2012-08-07||Trapeze Networks, Inc.||Picking an optimal channel for an access point in a wireless network|
|US8285674B2 (en) *||2008-10-22||2012-10-09||Research In Motion Limited||Method and apparatus for managing synchronization configuration files|
|US8898267B2 (en)||2009-01-19||2014-11-25||Netapp, Inc.||Modifying information lifecycle management rules in a distributed system|
|US8560941B2 (en) *||2009-04-08||2013-10-15||Microsoft Corporation||Schema based user interface mechanisms|
|US8612951B2 (en) *||2009-04-21||2013-12-17||Oracle International Corporation||Method of determining which computer program functions are changed by an arbitrary source code modification|
|US20100269106A1 (en) *||2009-04-21||2010-10-21||Ksplice, Inc.||Method of finding a safe time to modify code of a running computer program|
|US20100285818A1 (en) *||2009-05-08||2010-11-11||Crawford C S Lee||Location based service for directing ads to subscribers|
|US20100323790A1 (en) *||2009-06-19||2010-12-23||Etchegoyen Craig S||Devices and Methods for Auditing and Enforcing Computer Game Licenses|
|US8452960B2 (en) *||2009-06-23||2013-05-28||Netauthority, Inc.||System and method for content delivery|
|US20100321208A1 (en) *||2009-06-23||2010-12-23||Craig Stephen Etchegoyen||System and Method for Emergency Communications|
|US8903653B2 (en) *||2009-06-23||2014-12-02||Uniloc Luxembourg S.A.||System and method for locating network nodes|
|US8736462B2 (en) *||2009-06-23||2014-05-27||Uniloc Luxembourg, S.A.||System and method for traffic information delivery|
|US20100321207A1 (en) *||2009-06-23||2010-12-23||Craig Stephen Etchegoyen||System and Method for Communicating with Traffic Signals and Toll Stations|
|US9754224B2 (en) *||2009-06-26||2017-09-05||International Business Machines Corporation||Action based to-do list|
|US20110054977A1 (en) *||2009-08-27||2011-03-03||Oracle International Corporation||Customer relationship management using text messages|
|EP2299277B1 (en) *||2009-09-17||2015-10-21||F. Hoffmann-La Roche AG||Analysis system for analysing biological samples, methods and computer program product|
|US8868617B2 (en) *||2009-12-23||2014-10-21||International Business Machines Corporation||Common connection definitions for database clients|
|US8458519B2 (en) *||2010-01-07||2013-06-04||International Business Machines Corporation||Diagnostic data set component|
|US8543568B2 (en) *||2010-07-16||2013-09-24||Sap Ag||Data entry management|
|US9501293B2 (en) *||2010-08-03||2016-11-22||Sap Se||Automatic context passing during management application navigation|
|US9584949B2 (en)||2011-01-27||2017-02-28||Microsoft Technology Licensing, Llc||Cloud based master data management architecture|
|US9128768B2 (en)||2011-01-27||2015-09-08||Microsoft Technology Licensing, LCC||Cloud based master data management|
|US20120198018A1 (en) *||2011-01-27||2012-08-02||Microsoft Corporation||Securely publishing data to network service|
|US9424018B2 (en) *||2011-03-21||2016-08-23||Microsoft Technology Licensing, Llc||Filtering and promoting application store applications|
|US9449288B2 (en)||2011-05-20||2016-09-20||Deem, Inc.||Travel services search|
|US9201709B2 (en)||2011-05-20||2015-12-01||Citrix Systems, Inc.||Shell integration for an application executing remotely on a server|
|CN103649936B (en) *||2011-05-20||2016-03-16||西里克斯系统公司||On the mobile device integration for remote execution of shell application on the server|
|US20130085785A1 (en) *||2011-09-30||2013-04-04||Bloom Insurance Agency Llc||Meeting monitoring and compliance assurance system|
|US8813096B2 (en) *||2011-10-11||2014-08-19||International Business Machines Corporation||Predicting the impact of change on events detected in application logic|
|US8972578B2 (en) *||2011-12-16||2015-03-03||Microsoft Corporation||Master data management system for monitoring cloud computing|
|US8635529B2 (en) *||2012-02-29||2014-01-21||Anusha Shanmugarajah||Page turning in electronic document readers|
|JP5732419B2 (en) *||2012-03-13||2015-06-10||株式会社野村総合研究所||Integrated access control system|
|US9898766B2 (en) *||2012-05-04||2018-02-20||Microsoft Technology Licensing, Llc||Payment processing for client devices|
|US20130332486A1 (en) *||2012-06-08||2013-12-12||Business Objects Software Ltd.||System and method for simplifying data access between tiers in a multi-tier system|
|US9170828B2 (en) *||2013-05-16||2015-10-27||Microsoft Technology Licensing, Llc.||Extraction of operating system-specific characteristics via a communication interface|
|US9440143B2 (en)||2013-07-02||2016-09-13||Kabam, Inc.||System and method for determining in-game capabilities based on device information|
|US9415306B1 (en)||2013-08-12||2016-08-16||Kabam, Inc.||Clients communicate input technique to server|
|US9459604B2 (en) *||2013-08-19||2016-10-04||Digi International Inc.||Methods and system for joining a smart energy device to a zigbee network|
|US9623322B1 (en)||2013-11-19||2017-04-18||Kabam, Inc.||System and method of displaying device information for party formation|
|US9295916B1 (en)||2013-12-16||2016-03-29||Kabam, Inc.||System and method for providing recommendations for in-game events|
|US9667491B2 (en) *||2014-08-22||2017-05-30||Spectralink Corporation||Distributed configuration management system and method|
Family Cites Families (87)
|Publication number||Priority date||Publication date||Assignee||Title|
|US6006277A (en) *||1987-11-06||1999-12-21||Bea Systems, Inc.||Virtual software machine for enabling CICS application software to run on UNIX based computer systems|
|US5513332A (en) *||1988-05-31||1996-04-30||Extended Systems, Inc.||Database management coprocessor for on-the-fly providing data from disk media to all without first storing data in memory therebetween|
|US5054095A (en) *||1988-08-23||1991-10-01||U.S. Philips Corp.||Method of recognizing a pattern in a field having a multi-valent amplitude, and device for performing such a method|
|US5054096A (en) *||1988-10-24||1991-10-01||Empire Blue Cross/Blue Shield||Method and apparatus for converting documents into electronic data for transaction processing|
|US5748891A (en) *||1994-07-22||1998-05-05||Aether Wire & Location||Spread spectrum localizers|
|US5680548A (en) *||1994-12-02||1997-10-21||Xcellenet, Inc.||Systems and methods for work assignment and distribution from a server to remote/mobile nodes|
|US5664207A (en) *||1994-12-16||1997-09-02||Xcellenet, Inc.||Systems and methods for automatically sharing information among remote/mobile nodes|
|US5675743A (en) *||1995-02-22||1997-10-07||Callisto Media Systems Inc.||Multi-media server|
|US5809415A (en) *||1995-12-11||1998-09-15||Unwired Planet, Inc.||Method and architecture for an interactive two-way data communication network|
|US6216151B1 (en) *||1995-12-13||2001-04-10||Bea Systems, Inc.||Saving connection time by obtaining result of request at later reconnection with server supplied associated key|
|US5801689A (en) *||1996-01-22||1998-09-01||Extended Systems, Inc.||Hypertext based remote graphic user interface control system|
|WO1997043717A1 (en) *||1996-05-13||1997-11-20||Corporation For National Research Initiatives||Identifying, managing, accessing, and tracking digital objects and associated rights and payments|
|US6115744A (en) *||1996-07-30||2000-09-05||Bea Systems, Inc.||Client object API and gateway to enable OLTP via the internet|
|US6006229A (en) *||1996-08-19||1999-12-21||Extended Systems, Inc.||Xbase transaction processing system|
|US5812857A (en) *||1996-08-28||1998-09-22||Extended Systems, Inc.||Field configurable embedded computer system|
|US5892900A (en) *||1996-08-30||1999-04-06||Intertrust Technologies Corp.||Systems and methods for secure transaction management and electronic rights protection|
|US6301474B1 (en) *||1996-09-27||2001-10-09||Openwave Technologies Inc.||Mobility extended telephone application programming interface and method of use|
|US6181935B1 (en) *||1996-09-27||2001-01-30||Software.Com, Inc.||Mobility extended telephone application programming interface and method of use|
|US6330568B1 (en) *||1996-11-13||2001-12-11||Pumatech, Inc.||Synchronization of databases|
|US6070199A (en) *||1996-11-13||2000-05-30||Extended Systems, Inc.||Apparatus to connect a client computer to a computer data network|
|US5926537A (en) *||1997-04-29||1999-07-20||Ericsson Inc||Generating a distinctive ring tone for a calling party subscriber within a telecommunications network|
|US6119167A (en) *||1997-07-11||2000-09-12||Phone.Com, Inc.||Pushing and pulling data in networks|
|US6253257B1 (en) *||1997-07-31||2001-06-26||Bea Systems, Inc.||Software Interface for dynamic API mapping|
|US5884317A (en) *||1997-08-20||1999-03-16||Bea Systems, Inc.||Service interface repository|
|US5960421A (en) *||1997-08-20||1999-09-28||Bea Systems, Inc.||Service interface repository internationalization|
|US5926637A (en)||1997-08-20||1999-07-20||Bea Systems, Inc.||Service interface repository code generation data|
|US6360279B1 (en)||1997-10-14||2002-03-19||Bea Systems, Inc.||True parallel client server system and method|
|US6065120A (en) *||1997-12-09||2000-05-16||Phone.Com, Inc.||Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices|
|US6282294B1 (en) *||1998-01-07||2001-08-28||Microsoft Corporation||System for broadcasting to, and programming, a motor device in a protocol, device, and network independent fashion|
|US6128742A (en) *||1998-02-17||2000-10-03||Bea Systems, Inc.||Method of authentication based on intersection of password sets|
|US6304881B1 (en) *||1998-03-03||2001-10-16||Pumatech, Inc.||Remote data access and synchronization|
|US6353839B1 (en) *||1998-04-30||2002-03-05||Openwave Systems Inc.||Method for inline variables management in a hypermedia display language|
|US6247048B1 (en) *||1998-04-30||2001-06-12||Openwave Systems Inc||Method and apparatus for transcoding character sets between internet hosts and thin client devices over data networks|
|US6314108B1 (en) *||1998-04-30||2001-11-06||Openwave Systems Inc.||Method and apparatus for providing network access over different wireless networks|
|US6292657B1 (en) *||1998-07-13||2001-09-18||Openwave Systems Inc.||Method and architecture for managing a fleet of mobile stations over wireless data networks|
|US6304753B1 (en) *||1998-07-16||2001-10-16||Openwave Technologies Inc.||Integration of voice and data services provided to a mobile wireless device|
|US6292833B1 (en) *||1998-07-17||2001-09-18||Openwave Systems Inc.||Method and apparatus for providing access control to local services of mobile devices|
|US6356964B1 (en) *||1998-08-31||2002-03-12||International Business Machines Corporation||Method and apparatus for enabling location-independent and location-transparent interaction between a program and a user|
|US6289212B1 (en) *||1998-09-16||2001-09-11||Openwave Systems Inc.||Method and apparatus for providing electronic mail services during network unavailability|
|US6317831B1 (en) *||1998-09-21||2001-11-13||Openwave Systems Inc.||Method and apparatus for establishing a secure connection over a one-way data path|
|US6370518B1 (en) *||1998-10-05||2002-04-09||Openwave Systems Inc.||Method and apparatus for displaying a record from a structured database with minimum keystrokes|
|US6230190B1 (en) *||1998-10-09||2001-05-08||Openwave Systems Inc.||Shared-everything file storage for clustered system|
|US6397345B1 (en) *||1998-10-09||2002-05-28||Openwave Systems Inc.||Fault tolerant bus for clustered system|
|US6393269B1 (en) *||1998-10-14||2002-05-21||Openwave Systems Inc.||Signaling system and method for network-based pre-paid wireless telephone service|
|US6301471B1 (en) *||1998-11-02||2001-10-09||Openwave System Inc.||Online churn reduction and loyalty system|
|US6236999B1 (en) *||1998-11-05||2001-05-22||Bea Systems, Inc.||Duplicated naming service in a distributed processing system|
|US6385643B1 (en) *||1998-11-05||2002-05-07||Bea Systems, Inc.||Clustered enterprise Java™ having a message passing kernel in a distributed processing system|
|US6341270B1 (en) *||1998-11-10||2002-01-22||Aether Systems, Inc.||Method for providing vendor notification marketing in an electronic commerce network environment|
|US6288718B1 (en) *||1998-11-13||2001-09-11||Openwave Systems Inc.||Scrolling method and apparatus for zoom display|
|US6304746B1 (en) *||1998-11-17||2001-10-16||Aether Systems, Inc.||Method and system for providing formatted information via a two-way communications system|
|US6243676B1 (en) *||1998-12-23||2001-06-05||Openwave Systems Inc.||Searching and retrieving multimedia information|
|US6377922B2 (en) *||1998-12-29||2002-04-23||At&T Corp.||Distributed recognition system having multiple prompt-specific and response-specific speech recognizers|
|US6363419B1 (en) *||1999-04-05||2002-03-26||Openwave Systems Inc.||Method and apparatus for generating idle loop screen displays on mobile wireless computing devices|
|US20020052781A1 (en) *||1999-09-10||2002-05-02||Avantgo, Inc.||Interactive advertisement mechanism on a mobile device|
|US7392308B2 (en) *||1999-09-10||2008-06-24||Ianywhere Solutions, Inc.||System, method, and computer program product for placement of channels on a mobile device|
|US6839744B1 (en) *||1999-09-10||2005-01-04||Ianywhere Solutions, Inc.||System, method, and computer program product for administering channels, content, and data for mobile devices|
|US6360252B1 (en) *||1999-09-20||2002-03-19||Fusionone, Inc.||Managing the transfer of e-mail attachments to rendering devices other than an original e-mail recipient|
|US7630986B1 (en) *||1999-10-27||2009-12-08||Pinpoint, Incorporated||Secure data interchange|
|US6347095B1 (en) *||1999-11-15||2002-02-12||Pango Networks, Inc.||System, devices and methods for use in proximity-based networking|
|US6779120B1 (en)||2000-01-07||2004-08-17||Securify, Inc.||Declarative language for specifying a security policy|
|US20020035605A1 (en) *||2000-01-26||2002-03-21||Mcdowell Mark||Use of presence and location information concerning wireless subscribers for instant messaging and mobile commerce|
|US20020046299A1 (en)||2000-02-09||2002-04-18||Internet2Anywhere, Ltd.||Method and system for location independent and platform independent network signaling and action initiating|
|US7203663B1 (en)||2000-02-15||2007-04-10||Jpmorgan Chase Bank, N.A.||System and method for converting information on paper forms to electronic data|
|US20020032750A1 (en) *||2000-05-16||2002-03-14||Kanefsky Steven T.||Methods and systems for searching and managing information on wireless data devices|
|US7260638B2 (en) *||2000-07-24||2007-08-21||Bluesocket, Inc.||Method and system for enabling seamless roaming in a wireless network|
|US8751248B2 (en) *||2000-07-28||2014-06-10||Visual Telecommunications Network, Inc.||Method, apparatus, and medium using a master control file for computer software interoperability between disparate operating systems|
|US20020052207A1 (en) *||2000-08-07||2002-05-02||Hunzinger Jason F.||Context tags for context-aware computer programs|
|WO2002015438A1 (en) *||2000-08-15||2002-02-21||Lockheed Martin Corporation||Infrared data communication system|
|US20020042831A1 (en) *||2000-08-16||2002-04-11||Jeffrey Capone||System and method for building applications that adapt for multiple device and protocol standards|
|CA2420215A1 (en) *||2000-08-23||2002-06-27||Neurogen Corporation||High affinity small molecule c5a receptor modulators|
|US7143181B2 (en) *||2000-08-31||2006-11-28||Yohoo! Inc.||System and method of sending chunks of data over wireless devices|
|GB0305477D0 (en) *||2000-09-11||2003-04-16||Avantgo Inc||Method, system, and computer program product for synchronization of similar data objects with event information|
|US20020069263A1 (en) *||2000-10-13||2002-06-06||Mark Sears||Wireless java technology|
|GB0026052D0 (en) *||2000-10-24||2000-12-13||Pace Micro Tech Plc||Mobile telephone control|
|CN1489736A (en) *||2000-11-28||2004-04-14||第四传递公司||Method and system for maintaining and distributing wireless applications|
|US20020073196A1 (en) *||2000-12-07||2002-06-13||Westervelt John P.||Integrated communication and geographic positioning system and method of using same|
|US20020073163A1 (en) *||2000-12-12||2002-06-13||Fuji Xerox Co., Ltd.||Systems and methods for supporting document centered discussion across heterogeneous devices and displays|
|CA2431762C (en) *||2000-12-18||2011-11-01||Kargo, Inc.||A system and method for delivering content to mobile devices|
|US7069295B2 (en) *||2001-02-14||2006-06-27||The Escher Group, Ltd.||Peer-to-peer enterprise storage|
|WO2002076077A1 (en) *||2001-03-16||2002-09-26||Leap Wireless International, Inc.||Method and system for distributing content over a wireless communications system|
|CA2344074A1 (en) *||2001-04-17||2002-10-17||George Wesley Bradley||Method and system for cross-platform form creation and deployment|
|US20030220879A1 (en) *||2001-11-21||2003-11-27||Gaughan Breen P.||System and method for electronic document processing|
|US7088995B2 (en) *||2001-12-13||2006-08-08||Far Eastone Telecommunications Co., Ltd.||Common service platform and software|
|US20040003341A1 (en) *||2002-06-20||2004-01-01||Koninklijke Philips Electronics N.V.||Method and apparatus for processing electronic forms for use with resource constrained devices|
|US7233790B2 (en) *||2002-06-28||2007-06-19||Openwave Systems, Inc.||Device capability based discovery, packaging and provisioning of content for wireless mobile devices|
|US20040128342A1 (en) *||2002-12-31||2004-07-01||International Business Machines Corporation||System and method for providing multi-modal interactive streaming media applications|
|US7556776B2 (en) *||2005-09-08||2009-07-07||President And Fellows Of Harvard College||Microfluidic manipulation of fluids and reactions|
Also Published As
|Publication number||Publication date||Type|
|US6996778B2 (en)||User interface for managing multiple network resources|
|US8316005B2 (en)||Network-accessible database of remote services|
|US6185555B1 (en)||Method and apparatus for data management using an event transition network|
|US6842782B1 (en)||Method and apparatus for tracking functional states of a web-site and reporting results to web developers|
|US6421717B1 (en)||System, method, and computer program product for customizing channels, content, and data for mobile devices|
|US6934687B1 (en)||Computer architecture and method for supporting and analyzing electronic commerce over the world wide web for commerce service providers and/or internet service providers|
|US6029174A (en)||Apparatus and system for an adaptive data management architecture|
|US7496960B1 (en)||Tracking and reporting of computer virus information|
|US6721747B2 (en)||Method and apparatus for an information server|
|US7774791B1 (en)||System, method and computer program product for data event processing and composite applications|
|Eirinaki et al.||Web mining for web personalization|
|US20020035501A1 (en)||A personalized product report|
|US20080091774A1 (en)||Customer relationship management system and method|
|US20040254938A1 (en)||Computer searching with associations|
|US20100057677A1 (en)||Solution search for software support|
|US20030212654A1 (en)||Data integration system and method for presenting 360° customer views|
|US7069271B1 (en)||Methods and apparatus for implementing internet storefronts to provide integrated functions|
|US7673340B1 (en)||System and method for analyzing system user behavior|
|US6839680B1 (en)||Internet profiling|
|US20040187111A1 (en)||Content management portal and method for communicating media content|
|US20030220901A1 (en)||Interaction manager|
|US20030140097A1 (en)||Method and device for presenting data to a user|
|US6892196B1 (en)||System, method and article of manufacture for a user programmable diary interface link|
|US20040083426A1 (en)||System and method for generating pre-populated forms|
|US20100077468A1 (en)||Method and system for providing efficient and complex database functionality to a mobile device|
Effective date: 20140414