摘要:
A method, apparatus, and article of manufacture for a computer-implemented model for user-defined search in Relational Database Management Systems. A statement is executed in a database stored on a data storage device connected to a computer. Data that is qualified by user-defined functions is located based on a model that supports user-defined search.
摘要:
A method, apparatus, and article of manufacture for run-time support for user-defined index ranges and index filters. A statement is executed in a database stored on a data storage device, which is connected to a computer. The database contains data. A search range is generated based on a user-defined range function associated with a user-defined index.
摘要:
A method, apparatus, and article of manufacture for a computer-implemented multiple-stage evaluation of a user-defined predicate. A statement is executed in a database stored on a data storage device connected to a computer. The statement is received containing a user-defined predicate with a user-defined function. Then, multiple-stage evaluation of the user-defined predicate is performed.
摘要:
The present invention provides a dynamic connection for distributed applications that need to locate application development tools, including but not limited to debuggers, trace collection tools, compilers, etc.) which may be running on different machines, and to send the tools messages. The program requesting debugging service (i.e., a debugger client) sends, to a tool locator, criteria which specifies the properties of a desired debugger. The tool locator maintains a registry of all tools, e.g. debuggers, and their properties, which remain active within the network by receiving tool registration information from each tool as it is started on any machine within the network. When a message is received by the tool locator from a debugger client specifying the criteria of a desired debugger, the tool locator searches its registry and returns a list of debuggers matching the specified properties along with a communication endpoint address that can be used to establish a connection with a debugger meeting the criteria. The debugger client then sends a message, using the established connection, to the desired debugger requesting debugging services on behalf of the debugger client or another program. As a result, a dynamic connection is made, at run time, between an application program and a debugger having certain desired properties wherein the debugger may be active, if at all, at any time on any machine within the network.
摘要:
A system, method and related software architecture are disclosed as a platform for developing and deploying RFID-enabled software applications. The platform is a framework between these applications and their connected physical RFID devices. The runtime version of this platform can be thought of as a logical RFID device. The platform allows RFID-enabled applications securely communicate with physical RFID devices to monitor their status and to access their tag data. The platform includes externalized APIs for accessing tag data, an event manager to alert applications of events coming from RFID devices and tags, data manager to filter and reconcile data returned from physical RFID readers before relaying them to applications, device manager to monitor the RFID device status for network management, and secured communication channels with data encryption. The deployed RFID-enabled applications can recognize user identification via the RFID tags then access data of selected RFID tags within a secured infrastructure.
摘要:
The present invention provides a method, system, and program for debugging external programs, such as user-defined functions, stored procedures, and triggers executed in relational database management systems (RDBMS), in a client-server, i.e., distributed, environment. In the present invention, a debugger is initiated from within a process running the external program by executing a special segment of code prior to the execution of the external program. In one embodiment of the invention, this debugging function is triggered by including a variation of this special segment of program code within the external program, itself. In another embodiment of the invention, this debugging triggering function is provided within an enhanced RDBMS with extensions to SQL to activate the debugging ability in the RDBMS. The invention can be implemented by using present day serial debuggers or parallel and/or distributed debuggers. One such parallel and distributed debugger utilized in a preferred embodiment is the Parallel and Distributed Dynamic Analyzer (PDDA) debugger. In addition, although the following invention is described with reference to a debugger, the invention can be applicable for any application development tool.
摘要:
Techniques for managing modules or applications installed in a mobile device are described. To provide authentic and secured transactions with another device, each of the installed applications is provisioned with a server through data communication capability in a mobile device. A provisioned application is associated with the personalized secure element in the mobile device and works with a set of keys that are generated in accordance with a set of keys from the personalized secure element. Further management of controlling an installed application is also described.
摘要:
Techniques for portable devices functioning as an electronic purse (e-purse) are disclosed. According to one aspect of the invention, a mechanism is provided to enable a portable device to conduct transactions over an open network with a payment server without compromising security. In one embodiment, a device is loaded with an e-purse manager. The e-purse manager is configured to manage various transactions and functions as a mechanism to access an emulator therein. The transactions may be conducted over a wired network or a wireless network. A three-tier security model is contemplated to support the security of the transactions from the e-purse. The three-tier security model includes a physical security, an e-purse security and a card manager security, concentrically encapsulating one with another. Security keys (either symmetric or asymmetric) are personalized within the three-tier security model.
摘要:
Techniques for portable devices functioning as an electronic purse (e-purse) are disclosed. According to one aspect of the invention, a mechanism is provided to enable a portable device to conduct transactions over an open network with a payment server without compromising security. In one embodiment, a device is loaded with an e-purse manager. The e-purse manager is configured to manage various transactions and functions as a mechanism to access an emulator therein. The transactions may be conducted over a wired network or a wireless network. A three-tier security model is contemplated to support the security of the transactions from the e-purse. The three-tier security model includes a physical security, an e-purse security and a card manager security, concentrically encapsulating one with another. Security keys (either symmetric or asymmetric) are personalized within the three-tier security model.
摘要:
Techniques for portable devices functioning as an electronic purchaser (e.g., e-purse) and/or an electronic mobile seller (e.g., mobile point-of-sales (POS)) are disclosed. According to one aspect of the invention, a mechanism is provided to enable a portable device to conduct e-commerce and m-commerce transactions over an open network with a payment server and/or a POS transaction server without compromising security. In one embodiment, a portable device is loaded with an e-purse as an electronic mobile purchaser. In another embodiment, the portable device is installed with a mobile POS as an electronic mobile seller.