摘要:
A method or protocol for synchronizing parallel processors in a mobile communication system is disclosed, whereby a sync engine associated with one processor retrieves the current value of a change counter for a database associated with the second processor, stores the current value of the change counter, retrieves all data entries from the database associated with the second processor, and performs a synchronization procedure for a database associated with the first processor based on of all of the data entries retrieved. By examining the change counter, the sync engine can determine whether a user modified a database while the synchronization was in process.
摘要:
A database system has at least two hose databases (204, 214) in respective host processing apparatuses (200, 210). A remote database (224) is provided in a remote processing apparatus (220). The host databases and the remote database store a plurality of database items. A synchronization engine (206, 216) is provided in each host processing apparatus for synchronizing its host database with the remote database. A first log file (227) contains entries, that represent changes made to the remote database (224), including additions and modifications of items in the remote database as well as deletions of items from the remote database in order to increase its free storage space available for storing new items. A second log file (229) contains entries, that represent deletions from the remote database upon respective deletions in either of the host databases (204, 214). The synchronization engine (206, 216) deletes items in its host database in accordance with the entries in the second log file but not in the first log file.
摘要:
A checksum is calculated on a database stored in a SIM card when changes are made to a database stored therein. This checksum can be stored in a mobile phone, e.g., with the change log. When synchronization between devices is to be performed, another checksum can be calculated on the database stored in the SIM card. If the stored checksum does not match the calculated checksum, then a change has occurred in the contents of the database that is not reflected in the change log. Accordingly, a full synchronization process can be performed wherein the database records in each device can be compared. If, on the other hand, the checksums match, then the change log accurately reflects any changes made to the database stored in the SIM card and the synchronization process can proceed more expediently using the change log.
摘要:
An information synchronization method and apparatus stores a change log having an associated change counter at a first database, updates the change counter at the first database in response to a database update command from a second database, and returns the updated change counter to the second database in response to a processing condition resulting from the database update command at the first database. The information synchronization protocol ensures that the second database maintains the most current change counter for use in a subsequent synchronization procedure and in the event that an interruption or error occurs, thereby increasing the efficiency of information synchronization by enabling the second database to process only those changes of the first database occurring after the updated change counter.
摘要:
A database multipoint synchronization which allows multiple clients to simultaneously access and edit a database while avoiding inadvertent data corruption and ensuring the integrity of data within the database. A database manager, which may be configured as part of a database software application, keeps track of modifications saved to a database file and increments a modification change counter accordingly. When a client user accesses a database record, the database manager detects the modification change counter value. Then if that client seeks to save modifications to the database record, the database manager detects the current modification change counter value to discern whether other clients have saved modifications to the record following the access by the client presently seeking to save modifications. If the modification change counter has incremented, the client is denied authorization to save the modifications and offered a choice of alternative operations. In this way, the data within the database record is not corrupted due to inadvertently overwriting by another client's record.
摘要:
A technique for securely storing data within a memory is disclosed. In a preferred embodiment, the technique is realized by encrypting the data using a non-verifiable personal identifier, and then encrypting a reminder using the same non-verifiable personal identifier. The encrypted data and the encrypted reminder are then stored in the memory. The stored encrypted data and the stored encrypted reminder can only be correctly decrypted using the non-verifiable personal identifier. Also, a correctly decrypted reminder provides an indication of correctly decrypted data. The non-verifiable personal identifier is not stored in the memory so as to insure security of the system.
摘要:
A method and system for synchronizing a first database with a second database is disclosed. A client containing a first version of a database transmits a first synchronization message from the client to the server. The message contains MAPITEM records from a previous synchronization process, UPDATES for the present synchronization process, a current synchronization time and a last synchronization time. A second version of the database within a server is updated responsive to the first synchronization message. The server transmits a second synchronization message to the client containing UPDATES to be performed at the client, the RESULTS of the updates requested by the client, and the received current synchronization time from the first synchronization message. The client updates the first database, removes the previously transmitted MAPITEMs and stores the MAPITEM records for the present synchronization process for transmission during a next synchronization process.
摘要:
A first database is synchronized with a second database, wherein the first database is located in a mobile terminal. To avoid erroneous synchronization results that can occur if a timer associated with the mobile terminal is changed, relative to a timer associated with the second database, an indicator is set to indicate that a full synchronization should be performed whenever it is detected that the timer in the mobile terminal has been set back. Then, when synchronization is to take place, full synchronization of the first database with the second database is performed if the indicator is set. Otherwise, a fast synchronization that uses a change log may be performed. The indicator may be in the form of a change in a database identifier.
摘要:
User terminals are connected to a telecommunication system. The telecommunication system includes a control system for the control, such as set-up, release and modification, of connections between the user terminals. A large portion of functions are common for control of dynamical as well as semi-permanent connections. Control of a connection can be initiated from any of the user terminals to which the connection relates, or from other user terminals. Control data for the connections can be stored in different types of storage resources in the control system, the different types of storage resources having different degrees of reliability.
摘要:
A network device receives, via a user interface, a selection to call a contact's mobile device. The mobile device detects a feature, on the contact's mobile device, that supports presenting a priority call notification and initiates, via a first communication protocol, a pending call to the contact's mobile device. The mobile device presents, prior to the pending call being connected and based on the detecting the feature set, a user interface to solicit a priority indicator option. The mobile device receives, via the user interface, a selection of the priority indicator option and sends, via a second communication protocol, a priority indication flag for the pending call.