Abstract:
Disclosed is a method for data synchronization and update conflict resolution between mobile clients and a server in a mobile system which maintains consistency of data between the clients and the server and enables the clients to continuously perform an effective update operation with respect to objects of the server even in a clients' disconnection state by the mobile clients performing an independent update operation with respect to disjoint fragments and associated objects for a specified object using the structure of the objects and the meaning of applications and then performing the data synchronization and the conflict resolution between the clients and the server during a reconnection operation. The method includes a copy management step of copying data of a server-side DB into a client-side built-in DB and the server managing contents of copying and a copying time, a data synchronization step of synchronizing changed data between the mobile clients and the DB server with respect to a data change produced during the mobile clients' disconnection state in accordance with a request of the mobile clients after a reconnection of the mobile clients, and a conflict detection and resolution step of detecting an error that damages consistency of the data in the data synchronization process and resolving the detected error.
Abstract:
PURPOSE: A modular multiplier for exponentiation in a java card and a multiplying method thereof are provided to perform a high-speed operation process for the exponentiation by forming a modular multiplication module according to Montgomery algorithm. CONSTITUTION: A modular multiplier for exponentiation in a java card includes a basic operation module for performing basic calculation such as addition, subtraction, multiplication, and division. The basic operation module is used for performing a high-speed calculation process for operational terms A and B of n-bits on a Java card(100). The basic operation module includes a common buffer and a carry buffer. The common buffer has 2n+2 bits to recycle a memory. The carry buffer is used for storing a carry.
Abstract:
PURPOSE: A web service tester and a method for testing a web service are provided to test the web service by simply making an SOAP(Simple Object Access Protocol) request message with only a WSDL(Web Service Description Language) file of the web service when the web service of a web service server or a client program is realized. CONSTITUTION: A user interface(10) displays the WSDL files, selects the service, a port, and an operation for testing the request generated based on the WSDL file, and inputs a parameter according to the selected operation. The user interface displays an SOAP request message generated by the parameter and an SOAP reply message of the web service server for the SOAP request message, and displays a stress test request of the web service server and a result. A WSDL processing module(20) generates a new request for the test by receiving the WSDL file from the server and helps the user input the parameter for the selected operation. A message processing module(30) displays the SOAP reply message of the server after generating/transmitting the SOAP request message to the server, tests the stress of the server by continuously transmitting the SOAP request message the server, and records the exchanged message.
Abstract:
PURPOSE: A device and a method for converting an ebXML(e-business eXtensible Markup Language) filter query using a G-FQL(Generalized Filter Query Language) are provided to convert the filter query offered from an ebXML registry into an SQL(Structured Query Language) by using the G-FQL defined in the XML sentences. CONSTITUTION: A G-FQL converter converts the ebXML filter query defined by a user into the G-FQL, which is a graph model based query language defined in the XML sentences(10). An XML-object converter converts the G-FQL of the XML sentences into a program object controllable to the user(20). A query graph generator generates a query graph having the same meaning as the G-FQL from the object converted G-FQL(30). An SQL generator generates the SQL by optimizing the query to the query graph(40). A query executer executes the query by using the optimized SQL(50). An object-XML converter converts the object searched by the query executer into the XML again(60).
Abstract:
PURPOSE: A system for a UDDI(Universal Description Discovery Integration) web service registry based on an ebXML(electronic business eXtensible Markup Language) registry and a managing method thereof are provided to save a system construction expense and keep the consistency of information management by using a UDDI service module in a field needing the e-business and a web service. CONSTITUTION: The first client system(10) supports the web service based on the UDDI regulation and transmits/receives a UDDI message. A UDDI registry processes a service request depending on the service request in the UDDI message. The second client system(20) supports the web service based on the ebXML regulation and transmits/receives an ebXML message. The ebXML registry(50) processes the service request depending on the service request in the ebXML message. The UDDI service module(30) converts the UDDI message into the ebXML message and transmits the ebXML message to the ebXML registry.
Abstract:
PURPOSE: An authentication and key agreement method of mobile communication network is provided to perform an effective authentication of the user's mobile phone and the service provider's server so as to safely use without limiting the service environment. CONSTITUTION: An authentication and key agreement method of mobile communication network includes: an initializing step of exchanging the public key and the certificate between the user side wireless communication terminal and the authenticate agency; a previous calculation step of reducing the operation load of the following processes by calculating the required values when the user side wireless communication terminal is not used; and a performing step of performing a specific authentication and key agreement protocol between the user side wireless communication terminal and the service provider's server.
Abstract:
PURPOSE: A system and a method for the credit card based payment on the wireless Internet are provided to offer security between terminals to online goods/service purchase using the wireless Internet, which is used on any protocol such as the WAP(Wireless Application Protocol), the ME(Mobile Explorer), and the I-Mode. CONSTITUTION: A mobile gateway(102) connects a wireless and a wired communication network section. A wireless terminal(100) is connected to the wireless Internet network through the mobile gateway, and transmits/receives the information data for using various goods/service provided from goods/service providing servers connected to the wireless Internet network. A value added service provider(104) requests a payment process to a payment gateway(108) and provides the goods/service depending on a processing result after certifying a user. A certificate authority(106) certifies the users requesting the goods/service by connecting to the value added service provider. The payment gateway processes the payment information applied from the value added service provider by linking an external credit card company, and provides the payment processing result to the user through the value added service provider.
Abstract:
PURPOSE: A method for managing a global buffer capable of executing a load distribution in a cluster system is provided to calculate loads of each host and distribute a request of a global buffer manager for preventing a performance decline caused by a concentration to a specific host in a system of a system load necessary for an operation of a global buffer manager when a buffer cache is shared among many hosts through a global buffer manager in a cluster system. CONSTITUTION: The upper module of a specific host of a cluster system requests a transmission of a buffer block to a global buffer manager(S131). The global buffer manager requests a permission as to a corresponding disk block to a locking manager(S132). The locking manager transmits a response message including an accept of the permission to the global buffer manager(S133). If the global buffer manager acquires a permission, it is checked whether a requested buffer block exists in a buffer cache of a host having a permission(S136). If a requested buffer block does not exist in a buffer cache of a host having a permission, it is checked whether a requested buffer block exists in a buffer cache of other host(S137). If a requested buffer block exists in a buffer cache of other host, a transmission of a buffer block is requested to other host through a communication module(S138,S140). If a transmission of a buffer block requested to other host is failed, the buffer block requested through a disk I/O is copied to the buffer cache(S139). The copied buffer block or a buffer block received from a buffer cache of other host is transmitted to the upper module(S142). If the upper block requests a release of a buffer block use, the global buffer manager returns a permission as to the buffer block(S145).
Abstract:
PURPOSE: A device for generating and verifying an XML(eXtensible Markup Language) digital signature is provided to generate the XML digital signature matched with a business document, to combine the generated signature with the document, and to verify the XML digital signature included to the document received through the communication network. CONSTITUTION: The device comprises a signature writing part(110) including a reference factor generator(111) and a signature generator(112), a verification part(120) including a reference factor verifier(121) and a signature verifier(122), a converter(130), a seriating part(131), a digester(132), a signature device(133), and a verification device(134). The digital signature generating and verifying device(100) receives the information for the business document, a conversion rule name, a seriating rule name, and a digesting rule name from a user. The signature writing part(110) writes all XML digital signatures between signature tags according to a statement, generates the signature by receiving a public/private key and a value of a certain format selected from the user, and transmits the document to a receiver after including the signature to the document.
Abstract:
PURPOSE: The method for executing the nested transaction using the XID(transaction identifier) and shared memory is provided to improve the performance of the transaction by extending the commit and the rollback, removing the high cost compensation transaction operation, and reducing the depth of the sub-transaction. CONSTITUTION: The method comprises the following steps. When the transaction happens, the transaction context is created(101). It is checked if the inputted command is the exit command or the call command(102). In case of the exit command, all the transaction performance is ended(103). In case of the call command, the type of the transaction identifier is checked(104). The first type is the course of performing the transaction that the identifier of the parent and the sub-transaction is the same(105). The second type is the course of performing the transaction that the whole identifier of the parent and sub-transaction is the same(106). The third type is the course of performing the transaction that the identifier of the parent and the sub-transaction is different(105).