The invention relates to methods and equipment for synchronizing a database between two parties via a mobile network. In a very common but non-restricting application, one party is a desktop computer, while the other one is a portable computer, a pocket computer or a “smart” telephone. The database contains data items, such as documents, calendar events, meeting requests, address book entries or the like that can be changed at either party. As commonly used in the context of databases, synchronization means reducing or eliminating differences between the database copies maintained at the parties, which are supposedly similar but at least one database contains changed data items which are not reflected in the other database.
Prior art database synchronization techniques via a mobile network are developed for a circuit-switched networks, or they attempt to simulate circuit-switched operation by means of sessions. In a session-based database synchronization, a session is established between the two parties, differences between the database copies are detected and eliminated by transmitting differing data items between the parties, after which the session is closed. In many mobile applications, database synchronization between a mobile terminal and an office computer takes place when the mobile terminal is inserted in a cradle that, in addition to the database synchronization, may load the mobile terminal's battery.
Such prior art database synchronization techniques are suitable for applications that are not time-critical, i.e., applications that tolerate long periods of time between synchronization sessions. If session-based synchronization techniques are used for time-critical databases that have to be synchronized frequently, a major problem is the signalling overhead caused by the session establishment. In time-critical applications, a synchronization session is frequently established merely for detecting potential differences between the database copies, and if no differences are detected, the session is closed without actually transferring any data items between the parties. The overhead is a particular problem in mobile applications in which data transfer is expensive, even if it is only overhead data. Any superfluous traffic also loads the mobile terminal's battery.
An object of the present invention is to provide a method and an apparatus for implementing the method so as to alleviate the above disadvantages. The object of the invention is achieved by the methods and equipment which are defined in the independent claims. The preferred embodiments of the invention are disclosed in the dependent claims.
An aspect of the invention is a method for synchronizing a database between an A party and a B party, wherein the parties communicate via a mobile communication network and the database contains data items to be synchronized. Each party comprises a client part and a server part of a client-server communication module. The client part of the client-server communication module of a party communicates via the mobile communication network with the server part of the client-server communication module of the other party. Each party maintains a respective copy of the database. In response to generating a changed data item, the party having generated the changed data item initiates a synchronization event via the client part of its client-server communication module.
Another aspect of the invention is an apparatus adapted to act as one of the parties in the method. Yet another aspect of the invention is a computer program product that causes a data processor to carry out the method when the program product is executed.
An advantage of the invention is a reduced overhead compared with session-based synchronization techniques. The overhead reduction is beneficial in push-type applications.
In the following the invention will be described in greater detail by means of preferred embodiments with reference to the attached drawings, in which
Database synchronization in the present invention is event-based, which is why there is a change detection logic or layer 15A logically between the processor 11A and the database 10A. This means that if one application, such as a calendar application, changes a data item in the database 10A, the change detection logic 15A detects this change and signals it to the client-server communication module 12A.
As is common in client-server technology, a client does not store a copy of all the data in the server but only a view to that data, and the view typically contains only a subset of the data in the server. The invention differs from conventional use of client-server technology in that each of the two databases is associated with a processor and a client-server communication module, wherein each party's client part communicates with the server part of the other party and vice versa. Thus each of the two parties A and B only store a view to the data in the other party, but unlike session-based synchronization mechanisms, in which differences between the two databases are assessed and eliminated (by copying differing data items both ways), the present invention tolerates situations in which the databases 10A and 10B will never be perfectly identical in content. This is useful in, say, calendar applications in which a person's office computer may store several years' worth of calendar events in the past, while the user has deleted past events from his/her mobile terminal, in order to save its memory. The office computer may also store more data fields per calendar event. Because the database synchronization of the present invention is based on detection of events that change data items, instead of wholesale comparison between the databases, data items which the user has deleted from the mobile database need not be deleted from the office database.
In terms of hardware,
The invention is applicable to virtually any mobile e-mail system architecture.
Reference numeral 106 denotes a data network, such as an IP (Internet Protocol) network, which may be the common Internet or its closed subnetworks, commonly called intranets or extranets. Reference numeral 108 denotes an e-mail server and its associated database. There may be separate e-mail servers and/or server addresses for incoming and outgoing e-mail. The database stores an e-mail account, addressable by means of an e-mail address, that appears as a mailbox to the owner of the e-mail account. In order to communicate with mobile terminals 102, the data network 106 is connected, via a gateway 112 to an access network 114. The access network comprises a set of base stations 116 to provide wireless coverage over a wireless interface 118 to the mobile terminals 102.
Reference numeral 110 denotes a messaging centre that is largely responsible for providing the above-mentioned transparency between the host system 100 and the mobile terminal 102. The system architecture also comprises a connectivity function 120, whose task is to push e-mail messages to the mobile terminal. In the embodiment shown in
The mobile terminal 102 may be a pocket or laptop computer with a radio interface, a smart cellular telephone, or the like. Depending on implementation, the host system 100, if present, may have different roles. In some implementations the host system 100 is optional and may be a conventional office computer that merely acts as the mobile terminal user's principal computer and e-mail terminal. In other implementations the host system may act as a platform for a single user's connectivity function, in addition to being an office computer. In yet other implementations the host system 100 may comprise the connectivity function for several users. Thus it is a server instead of a normal office computer.
We assume here that the access network 114 is able to establish and maintain a tunnel 122 between the messaging centre 110 and the mobile terminal 102. For instance, the tunnel may be set up using GPRS Tunneling Protocol (GTP) or its later derivatives, or any other suitable tunneling protocol.
A real e-mail system supports a large number of mobile terminals 102 and tunnels 122. In order to keep track of which e-mail account and which tunnel belongs to which mobile terminal, the messaging centre 110 and the connectivity function collectively maintain an association 124, 124′ for each supported mobile terminal. Basically, each association 124, 124′ joins three fields, namely an e-mail address 124A assigned to the mobile terminal or its user, encryption information 124C and a temporary wireless identity 124D of the mobile terminal in the access network. The embodiment shown in
The elements shown in
Steps 3-2 through 3-6 are optional and relate to a full synchronization via a local connection. In step 3-2 a local connection is established between the two parties A and B. For instance, the two parties may be a mobile terminal and an office computer which are able to communicate via a local interface, such as a short-range radio interface or a docking station. In step 3-4 a full synchronization is performed between the two databases. Full synchronization does not necessarily mean that the databases DBA and DBB are made fully identical. Instead, as is well known in mobile applications, a mobile station may store calendar events from a restricted period of time and fewer data fields per calendar event than the office computer does. Thus the full synchronization may mean detection and elimination of differences between the ranges and fields to be synchronized in the two databases. In step 3-6 the local connection is disconnected.
In step 3-16 the mobile connection is interrupted. In step 3-18 the application again changes a data item. In step 3-20, the change detector detects the change and signals it to the client part of the A party, which has to buffer the change notification while the inter-party communication is interrupted. Instead of buffering change notifications in the client part of the A party, the change notifications may be buffered in an intervening network elements, such as the messaging centre 110 shown in
It is to be noted that the full synchronization in step 3-4 is optional and is shown primarily to clarify how the present invention differs from conventional synchronization protocols. The actual invention relates to steps that take place after the full synchronization. It is apparent from the scenario shown in
In step 4-20 a connection re-establishment between the parties is detected. In step 4-22 any buffered data items are sent to the other party, and the process returns to the idle state 4-0. On the network side, such buffering may be implemented in the connectivity function 120 or messaging centre 110, for example.
An optional step 4-4 comprises testing whether the change to a data item relates to a data item that is already stored in the buffer. If yes, in step 4-6 the most recent change is combined with the previous changes to the same data item in the buffer. Such combination may be based on type of the data item and/or the nature of the change. In many cases, a more recent change can simply override earlier changes to the same data item. For example, the data items may be control messages of an e-mail application. If the previous control message was “move e-mail message xxx to folder yyy” and the most recent control message is “delete e-mail message xxx”, it is apparent that only the most recent control message has to be deleted. Likewise, the most recent change to a calendar event can simply override earlier changes to the same calendar event in the buffer.
A process shown in
This embodiment is based on the idea that each party maintains two change counts per data item. A first change count keeps track of changes to the data item by the party itself, while the second change count keeps track of changes to the data item by its peer, ie, the other party. At each synchronization event, either party sends its peer the data items it has changed after the previous synchronization event plus the two change counts. The sent change counts tell the other party how many changes the party has made and how many peer changes the party is aware of. Either party detects a conflict if the count of changes by the party, as maintained by its peer, differs from the corresponding change count as maintained by the party itself. Such a difference in change counts serves as an indication that the data item received from the peer did not reflect all changes made by the party that detects the conflict.
In a variant of the above inventive idea, each party may send its peer an identifier of each data item it has changed, plus the two change counts. By comparing the received change counts with the corresponding change counts maintained locally, the parties can determine which data items have been changed after the latest synchronization, and request the transmission of the changed data items separately. The two techniques can be summarized by saying that each party sends its peer an indication of a data item it has changed, plus the two change counts. The indication may be an identifier of the data item or the data item itself.
In addition to the two change counts per party, it is beneficial to maintain some record-keeping of which data items have been changed after the latest synchronization, whereby only the changed data items need to be synchronized. For example, such a record-keeping can be based on time stamps of data items that are compared with the time of the latest synchronization. Alternatively, the record-keeping can be based on a one-bit flag, which is marked “changed” when the data item is changed and “unchanged” when the data items are synchronized.
As an alternative to the record-keeping of data items changed after the latest synchronization, the parties may send changed data items or indications thereof immediately, if this is possible. In some implementations, one application (such as a calendar application) may be responsible for changing the data items (calendar events), while a separate application (a communications application or protocol layer) is responsible for actually sending the changed data items.
An advantage of this embodiment is that synchronization of data items is possible without providing each data item with a data stamp. A further advantage is that synchronization is possible even if the parties' clocks are offset in relation to each other. This embodiment is particularly suitable in mobile applications because a party receiving a changed data item does not have to acknowledge the reception of received data item. The party sending the changed data item can determine from the next pair of change counts if its peer actually received the changed data item.
In step 5-0 a new data item 50A, such as an electronic document or calendar event, is created at the A party. At this time the data item does not yet exist at the B party. In step 5-2 the A party detects a synchronization trigger and sends the data item 50A to the B party. The synchronization trigger may be the simultaneous existence of a changed (in this case: newly-created) data item and a data connection between the parties. Both parties maintain two change counts that relate to the data item. The change counts are denoted by the following reference signs:
NAA, number of changes made by A, as seen by A;
NBA, number of changes made by B, as seen by A;
NAB, number of changes made by A, as seen by B; and
NBB, number of changes made by B, as seen by B.
In the embodiment shown in
In step 5-4 the A party changes the data item 50A. Synchronization does not take place immediately, possibly because a data connection between the parties does not exist. The NAA change count is ‘2’ because A knows it has changed the data item twice. The NAB change count remains at ‘1’ because B is not yet aware of the latest change.
In step 5-6 the data item is again synchronized. In other words, A sends to B the data item 50A and the NAA and NBA change counts. B compares the received data counts with the respective data counts NAB and NBB maintained at the B party. Since NAA=‘2’ and NAB=‘1’, B detects that the data item has been changed by A after the previous synchronization. B can accept the changed data item because the NBA change count equals the NBB change count (both are zeros).
In step 5-8 the B party changes its copy 50B of the data item. In the interest of clarity, the A and B parties respectively add letters ‘A’ and ‘B’, in upper or lower case, to the data item. Since this is B's first change to the data item, B also changes the NBB change count to ‘1’. The NBA change count remains at ‘0’ because A is not yet aware of the change made by B.
In step 5-8 the data item is again synchronized. B sends to A the data item 50B and the NAB and NBB change counts. A compares the received data counts with the respective data counts NAA and NBA maintained at the A party. Since NBB=‘1’ and NBA=‘0’, the A party detects that the data item has been changed by B after the previous synchronization in step 5-6. A can accept the changed data item because the NAB change count equals the NAA change count (both have a value of ‘2’).
In step 5-12 both parties A and B change their respective copies 50A and 50B of the data item and the change counts. The A party increments the NAA change count to ‘3’, while B increments the NBB change count to ‘2’. But neither party is yet aware of the changes made by its peer.
Reference numeral 5-14A describes a situation in which B attempts to send the data item 50B to A. B also sends the NAB and NBB change counts. A compares the received data counts with the respective data counts NAA and NBA maintained at the A party. Since NBB=‘2’ and NBA=‘1’, A detects that the data item has been changed by B after the previous synchronization. But A cannot accept the changed data item because the received NAB change count (with a value of ‘2’) is lower than the locally maintained NAA change count (with a value of ‘3’). Thus A detects a conflict if the NAB change count (count of changes made by A and known to B) is lower than the NAA change count, ie, the corresponding change count maintained by A itself. In such a situation, A detects that the data item sent by B did not include all the changes made by A, and if A accepted the data item, some of the changes made by A would be lost. The big ‘X’ over the arrow in step 5-14A signifies the fact that A does not accept the changed data item, at least not without some conflict resolution. For the purposes of
Reference numeral 5-14B describes a situation in which A attempts to send the data item 50A to B. The situation is symmetrical to the previously described situation 5-14A. In this case B detects a conflict because the change count NBA (with a value of 1) received from A is lower than the corresponding change count NBB (with a value of 2) maintained by B itself. Thus B detects that the data item sent by A did not include all the changes made by B.
In the scenario shown in
The synchronization technique preferably comprises a set of predetermined rules for conflict resolution. The applicable rules may be displayed for user selection, or they may be selected by some predetermined criteria that may, for example, be based on the type of the data item. Instead of presenting the applicable rules for user selection, the party that detects the conflict may select one of the rules automatically, preferably on the basis of the type of the data item. For example, if the data items are calendar events, it is relatively safe to assume that the newer one is to replace the older one. If the data items are word processing documents, the documents may be combined for later editing by the user.
It is readily apparent to a person skilled in the art that, as the technology advances, the inventive concept can be implemented in various ways. The invention and its embodiments are not limited to the examples described above but may vary within the scope of the claims.
Number | Date | Country | Kind |
---|---|---|---|
20045508 | Dec 2004 | FI | national |
This is non-provisional application, which claims priority to U.S. patent application Ser. No. 14/145,843 filed on Dec. 31, 2013, which claims priority to U.S. patent application Ser. No. 11/318,487 filed on Dec. 28, 2005, which relies for priority upon U.S. Provisional Application No. 60/650,976, filed Feb. 5, 2005, and Finnish Patent Application No. 20045508, filed Dec. 29, 2004, the contents of all of which are incorporated herein by reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
4831582 | Miller et al. | May 1989 | A |
4875159 | Cary et al. | Oct 1989 | A |
4897781 | Chang et al. | Jan 1990 | A |
5263157 | Janis | Nov 1993 | A |
5386564 | Shearer et al. | Jan 1995 | A |
5392390 | Crozier | Feb 1995 | A |
5581749 | Hossain et al. | Dec 1996 | A |
5600834 | Howard | Feb 1997 | A |
5623601 | Vu | Apr 1997 | A |
5627658 | Connors et al. | May 1997 | A |
5630081 | Rybicki et al. | May 1997 | A |
5634053 | Noble et al. | May 1997 | A |
5647002 | Brunson | Jul 1997 | A |
5652884 | Palevich | Jul 1997 | A |
5666553 | Crozier | Sep 1997 | A |
5680542 | Mulchandani et al. | Oct 1997 | A |
5682524 | Freund et al. | Oct 1997 | A |
5684990 | Boothby | Nov 1997 | A |
5701423 | Crozier | Dec 1997 | A |
5704029 | Wright, Jr. | Dec 1997 | A |
5706502 | Foley et al. | Jan 1998 | A |
5710918 | Lagarde et al. | Jan 1998 | A |
5713019 | Keaten | Jan 1998 | A |
5717925 | Harper et al. | Feb 1998 | A |
5721908 | Lagarde et al. | Feb 1998 | A |
5721914 | DeVries | Feb 1998 | A |
5727202 | Kucala | Mar 1998 | A |
5729735 | Meyering | Mar 1998 | A |
5745360 | Leone et al. | Apr 1998 | A |
5752246 | Rogers et al. | May 1998 | A |
5757916 | MacDoran et al. | May 1998 | A |
5758150 | Bell et al. | May 1998 | A |
5758354 | Huang et al. | May 1998 | A |
5758355 | Buchanan | May 1998 | A |
5765171 | Gehani et al. | Jun 1998 | A |
5778346 | Frid-Nielsen et al. | Jul 1998 | A |
5787441 | Beckhardt | Jul 1998 | A |
5790425 | Wagle | Aug 1998 | A |
5799318 | Cardinal et al. | Aug 1998 | A |
5806074 | Souder et al. | Sep 1998 | A |
5832483 | Barker | Nov 1998 | A |
5857201 | Wright, Jr. et al. | Jan 1999 | A |
5870759 | Bauer et al. | Feb 1999 | A |
5909689 | Van Ryzin | Jun 1999 | A |
5924096 | Draper et al. | Jul 1999 | A |
5943676 | Boothby | Aug 1999 | A |
5961590 | Mendez et al. | Oct 1999 | A |
5968131 | Mendez et al. | Oct 1999 | A |
5978933 | Wyld et al. | Nov 1999 | A |
6006274 | Hawkins et al. | Dec 1999 | A |
6023708 | Mendez et al. | Feb 2000 | A |
6044381 | Boothby et al. | Mar 2000 | A |
6081806 | Chang et al. | Jun 2000 | A |
6085192 | Mendez et al. | Jul 2000 | A |
6131096 | Ng et al. | Oct 2000 | A |
6131116 | Riggins et al. | Oct 2000 | A |
6138124 | Beckhardt | Oct 2000 | A |
6141664 | Boothby | Oct 2000 | A |
6151606 | Mendez | Nov 2000 | A |
6173312 | Atarashi et al. | Jan 2001 | B1 |
6212529 | Boothby et al. | Apr 2001 | B1 |
6223187 | Boothby et al. | Apr 2001 | B1 |
6233341 | Riggins | May 2001 | B1 |
6243705 | Kucala | Jun 2001 | B1 |
6324542 | Wright, Jr. et al. | Nov 2001 | B1 |
6487560 | LaRue et al. | Nov 2002 | B1 |
6493727 | Huang et al. | Dec 2002 | B1 |
6516314 | Birkler et al. | Feb 2003 | B1 |
6694335 | Hopmann et al. | Feb 2004 | B1 |
6708221 | Mendez et al. | Mar 2004 | B1 |
6799190 | Boothby | Sep 2004 | B1 |
6925477 | Champagne | Aug 2005 | B1 |
7346616 | Ramanujam et al. | Mar 2008 | B2 |
7430609 | Brown et al. | Sep 2008 | B2 |
20020055351 | Elsey | May 2002 | A1 |
20020069298 | Birkler et al. | Jun 2002 | A1 |
20020099727 | Kadyk | Jul 2002 | A1 |
20030078880 | Alley et al. | Apr 2003 | A1 |
20030172070 | Sawadsky et al. | Sep 2003 | A1 |
20040006551 | Sahinoja et al. | Jan 2004 | A1 |
20040010510 | Hotti | Jan 2004 | A1 |
20040024795 | Hind et al. | Feb 2004 | A1 |
20040139235 | Rashid et al. | Jul 2004 | A1 |
20040147262 | Lescuyer et al. | Jul 2004 | A1 |
20040176128 | Grabelsky et al. | Sep 2004 | A1 |
20040190688 | Timmins | Sep 2004 | A1 |
20040230619 | Blanco et al. | Nov 2004 | A1 |
20040249857 | Gauweiler | Dec 2004 | A1 |
20040255137 | Ying | Dec 2004 | A1 |
20040260761 | Leaute et al. | Dec 2004 | A1 |
20040266441 | Sinha | Dec 2004 | A1 |
20050005259 | Avery | Jan 2005 | A1 |
20050015432 | Cohen | Jan 2005 | A1 |
20050015436 | Singh | Jan 2005 | A1 |
20050028165 | McGowan | Feb 2005 | A1 |
20050071194 | Bormann et al. | Mar 2005 | A1 |
20050086540 | Gunter | Apr 2005 | A1 |
20050099963 | Multer et al. | May 2005 | A1 |
20050278641 | Mansour | Dec 2005 | A1 |
20060036580 | Stata et al. | Feb 2006 | A1 |
20060048061 | Forlenza | Mar 2006 | A1 |
20060063544 | Zhao et al. | Mar 2006 | A1 |
20060149970 | Imazu | Jul 2006 | A1 |
20060200583 | Le Lann et al. | Sep 2006 | A1 |
Number | Date | Country |
---|---|---|
WO2003098890 | Nov 2003 | WO |
WO2004071049 | Aug 2004 | WO |
Entry |
---|
ETSI, Universal Mobile Telecommunications System (UMTS); Telecommunications Management, Charging management; Charging data description for the Packet Switched (PS) domain (3GPP TS 32.215 version 4.7.0 Release 5), ETSI TS 132 215 V5.7.0 (Sep. 2004), pp. 0-68. |
ETSI, Universal Mobile Telecommunications System (UMTS); Telecommunications Management, Charging and billing; 3G call and event data for the Packet Switched (PS) domain (3GPP TS 32.015 version 3.12.0 Release 1999), ETSI TS 132 015 V3.12.0 (Dec. 2003), pp. 0-66. |
ETSI, Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); General Packet Radio Service (GPRS); GPRS Tunnelling Protocol (GTP) across the Gn and Gp interface (3GPP TS 29.060 version 5.11.0 Release 5), ETSI TS 129 060 V5.11.0 (Sep. 2004), pp. 0-95. |
Number | Date | Country | |
---|---|---|---|
20160371359 A1 | Dec 2016 | US |
Number | Date | Country | |
---|---|---|---|
60650976 | Feb 2005 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14145843 | Dec 2013 | US |
Child | 15251277 | US | |
Parent | 11318487 | Dec 2005 | US |
Child | 14145843 | US |