METHOD AND SYSTEM FOR USING GLOBAL EQUIVALENCY SETS TO IDENTIFY DATA DURING PEER-TO-PEER SYNCHRONIZATION

Information

  • Patent Application
  • 20080034009
  • Publication Number
    20080034009
  • Date Filed
    August 04, 2006
    18 years ago
  • Date Published
    February 07, 2008
    16 years ago
Abstract
Systems and methods for synchronization including the use of a global equivalency identification datum or set of datum. A universally unique identification datum may be associated with each independently created associated data set. In some embodiments, a synchronization server software element may be responsible for maintaining synchronization for a plurality of clients, including software elements or devices. A record believed to be new by the software elements may verify that the record is actually new. In some embodiments, verification of the record's newness involves assuming that the local ID is a global identification datum and comparing that datum to the all the sets of datum that the Sync-Server knows about. The synchronization server software element may use a table to hold information for all of the records known to that element. In some embodiments these records may have been deleted in the past.
Description

BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 shows devices that may synchronize.



FIG. 2 is exemplary hardware.



FIG. 3 is exemplary hardware.



FIG. 4 is an exemplary software stack.



FIG. 5 is an exemplary software stack.



FIG. 6 shows the synchronization of three systems.



FIG. 7 shows the synchronization of three systems.





DETAILED DESCRIPTION

I. Vocabulary and Non-Limitation


Throughout this disclosure, we shall use certain vocabulary to discuss synchronization techniques and examples. Most of the illustrations discussed will relate to PIM data and the synchronization of same. However, many embodiments of the invention are expressly intended to apply to virtually any kind of data. Some examples of data that may be synchronized using the techniques taught herein are the following: text files; word processing files; files from a file system, media files such as jpegs, mp3, mpeg2, mpeg4, or wav files; records from a database; favorites lists; preferences settings, or any other data file type or data that may comprise a file or object, whether or not associated with a specific applications. Therefore, in discussing synchronization services, we are at least referring to services that would apply to application software suite sold by Apple Computer. Some examples of that software include, without limitation, Dashboard, Safari, iChat AV, Mail, iCal, iPhoto, iWeb, iMovie HD, iDVD, Garageband, Keynote, and Pages.


Retreating then to the language of most of our illustrative embodiments, we shall primarily discuss the invention in terms of PIM data. Generally, we shall discuss devices such as computers, PDAs, phones or other intelligent devices that are used to access PIM data. Each device is generally associated with a Sync-Server and a sync client, which are each usually one or more processes resident on the device. In some instances, a first device will have a sync client resident on another device (this is called a proxy). This may be because the first device is not sufficiently equipped to host a sync client. Alternatively, in a multi-peer system, the synchronization system may use a local proxy for each other peer in order to synchronize all peers even when many peers are not present (the proxy stands in for the missing devices). These proxies are also simply known as sync clients to the Sync Server.


PIM data itself generally occurs as personal contacts, calendar entries, notes, journal entries, etc. When we discuss a record, we are generally referring to a set of data items that have been associated. For example, a personal contact card for John Doe may be viewed as a record wherein a phone number, street address, pager number and a variety of other data items are interrelated by their common association with John Doe. Each record present for a Sync Server or client may have a corresponding record on other Sync Servers or clients. For example, there may be a contact record for Jon Doe on each of Jane Doe's phone, desktop computer and portable computer. Likewise, each item of PIM data on a single device may have one or more corresponding data items on one or more other devices. For example, Jon Doe's street address may have corresponding data items on each of Jane Doe's desktop computer, portable computer, PDA, and telephone. Likewise, if our data were digital photographs, a picture of Jon Doe on the desktop may have corresponding pictures of Jon on the PDA, the portable computer and elsewhere. It is an overall job of the synchronization function to provide a common view (as much as possible) of corresponding data across many devices. In many embodiments, the common view comprises analogous or corresponding records as well as analogous or corresponding properties within those records.


II. Sample Hardware and Software Structures


While the techniques described herein may be embodied in virtually any structural context, we shall describe some example structural embodiments for illustrative purposes. Referring to FIG. 2, there is shown a sample portable device such as a PDA or telephone handset. As stated earlier, a client device or Sync-Server may be embodied in any item with sufficient intelligence to allow users to access or edit data, either directly or indirectly. Therefore, the device of FIG. 2 is intended to illustrate, without limitation, a sample of any such device. Front view 201 of device 200 shows screen 204 that may be used for viewing or accessing data as well as inputting data (in the case of a touch-sensitive or otherwise input-equipped screen). Keypad 205 may also be used for data input such as by alpha-numerics or otherwise and wired connection 206 may be used for power and/or data transport. Wireless port 203 may be infrared, Bluetooth, 802.11, EV-DO or any other wireless transmission for moving data in and out of device 200. Turning now to inside 202 of device 200, we see that a processor 209 is present for performing processing tasks. The inventive embodiments may incorporate any type of device so processor 209 may be any type of microprocessor or controller or aggregate of components that perform the function of running software for effecting one or more of the device functions, such as, for example, one of the Intel Pentium family or IBM/Motorola PowerPC chips. Device 200 may also have two or more types of memory for storing data and programs as shown by memories 207 and 208. Memories 207 and 208 may be implemented as both volatile and non-volatile computer memory and may be any type such as magnetic memory, optical memory or any of the many types of silicon-based memory such as SRAM and DRAM. Finally, device 200 may have components 210 to support I/O functionality such as that potentially embodied in wired connection 206 and wireless connection 203.


Referring now to FIG. 3, computer 300 is another illustration of a device that may embody a client or Sync-Server or that otherwise exploits concepts of the invention. Computer 300 is an ordinary computer, such as a personal computer, but not intended to be limited as such. Computer 300 has one or more microprocessors 315 and an accompanying chipset (not shown) at the heart of the system. The chipset may include items such as network unit 310, audio unit 311 and many I/O functions such as those that might be embodied in I/O unit 314. Of course, any of these functions, or sub-functions, may be implemented individually or collectively within a chipset or outside. Computer 300 also has power supply 313 for adapting and supplying power. Computer 300 may have any variety of optical and magnetic drives and the appropriate controllers to use those drives 317 such as IDE, ATA, SATA or SCSI controllers. For user accessibility, computer 300 has monitor 318, speakers 319, keyboard 321 and a mouse or tablet/touch screen 320. Finally, computer 300 may connect with any manner of other items (such as other devices carrying corresponding data items) through various ports (Network 301, wireless 302, USB 303, mouse 304, keyboard 305, parallel 306, serial 307, devices compliant with the IEEE 1394 standard 308, or modem 309).


Transitioning from sample hardware, we shall now discuss general software background. In particular, referring to FIG. 4, there is shown a software stack intended to be illustrative of the software architecture in which software aspects of some embodiments of the invention will reside. Aspects of the present invention are implemented as a collection of software modules installed and running on a computer. Thus the software modules are computer program instructions for processing by a processor. These computer program instructions are stored in computer memory. The interrelation of these software modules is shown by the software stack of FIG. 4. Like our hardware examples, this structure is not intended to be exclusive in any way but rather illustrative. This is especially true for layer-type diagrams, which software developers tend to express in somewhat differing ways. In this case, we express layers starting with the O/S kernel so we have omitted lower level software and firmware. Our notation is generally intended to imply that software elements shown in any particular layer use resources from the layers below and provide services to layers above. However, in practice, all components of a particular software element may not behave entirely in that manner.


With those caveats, we see in FIG. 4 two layers 424 and 423 dedicated to the operating system kernel and core services, respectively. Generally, above core services layer 423 there are software layers (422 and 421) for providing higher level resources and services to applications in the application layer 420. Putting the layer diagram in context, we would generally expect to find PIM type software in the application layer 420. For example, there are iCal application 402 and Address Book application 403 residing in the application layer. iCal 402 and Address Book 403 are application programs that manage PIM data and present a user interface that allows a user to access, edit or manipulate that data. These application layer services are a type of sync client in that a synchronization function provides services to these clients by maintaining a common view (as much as possible) of data among designated clients. Area 4100 shows generally where processes implementing the synchronization function may be located in many embodiments. In more particularity, a process implementing the synchronization function may be a peer to its application clients or may reside in a layer below, possibly even masking itself to the application (referring to a sync client that does not know that it is a sync client). The sync function may also have components in two or more layers. In many embodiments, however, the application level sync clients provide a user interface to configure and exploit the synchronization functions, therefore the synchronization processes appear as an integrated feature in client software. In addition, the synchronization processes typically may present their own user interface for configuration and control that is independent of any particular application. Lastly, as discussed earlier, sync clients may exist as a proxy for an external device. Such a proxy process has less need for a user interface and generally (but not necessarily) exists in the higher layers of the software stack.


Referring again to FIG. 4, one aspect of some embodiments provides a Sync-Server and associated software for servicing the synchronization needs of user-level application software (e.g. layer 420). As a services function, this aspect resides in layers 421 and/or 422.


III. An Example of a Four Peer System


a. A Sample Software Stack and Group of Synching Peers


Referring to FIG. 5, a sample four-device system is shown along with a sample software stack 530. In particular, the group of theoretically syncing devices comprises desktop computer peer W 514, notebook computer peer X 515, PDA peer Y 516 and cell phone quasi-peer Z 517. The intent is not to limit the applicability of the invention to devices such as these, but rather to give common examples of devices that may be involved in a synchronizing group. Furthermore, the moniker “quasi-peer” will be explained later, but should not imply that a phone or any other device cannot be a full peer.


Referring further to FIG. 5, exemplary software stack 530 is shown and represents a potential software stack on any peer device. Sync-Server W 506 is so named to imply that this example software stack is a potential software stack for peer W 514 in particular. Above the O/S kernel 424 and core services 423 on the software stack is a sync services framework 523 layer used to implement the standard structure drawn upon by the services layer above. Furthermore, as compared to FIG. 4, one can see that this is a simplified software stack that only illustrates synchronization-related processes or programs in the services layer 522 of FIG. 5. Referring then to FIG. 5 and assuming that software stack 530 resides or runs in peer W 514, we see that Sync-Server W 506 is accompanied by a program or process for each peer or client device in the synchronizing group. Thus we see that: peer Y 516 is represented by client Y 508; peer X 515 is represented by client X 507; Application A 501 is represented by client app A 510; iCal 502 is represented by client iCal 511; Address Book 503 is represented by client Addr. Book 512; iMovie 504 is represented by client iMovie 507; application B 505 is represented by client app. B 513; and finally quasi-peer Z 517 is represented by client Z 509. This arrangement, present in some embodiments, is generalized as a preference for a Sync-Server to be accompanied by a client process or program corresponding with each peer or client device. Obviously, any particular Sync-Server may not be accompanied by client processes for client devices that the Sync-Server does not know about. Therefore, certain embodiments of the invention contemplate the creation of client processes as necessary when adding a new client device to the synchronization group; or when a particular peer first realizes the existence of another peer.


The Sync-Server and client processes work together to service the synchronization needs of the client device. In some embodiments, the work can be modeled by assuming that the client process represents the client device to the Sync Server. Thus, in many embodiments, the client process is responsible for interaction with the client device and serves as intermediary for the device with the Sync Server. Alternatively, the Sync-Server is responsible for maintaining the accuracy of synchronization through its own techniques and the protocols it requires of the clients.


As noted earlier, the moniker “quasi-peer” was given to the exemplary cell phone quasi-peer 517 to indicate a potential difference between it and full peers. That indication is to exemplify a device type that is desirable to include in the synchronization group but that may be incompatible or incapable of running a compatible Sync-Server and client processes. In the case of such a client device, the associated software process, client Z 509, usually serves as a proxy to quasi-peer Z 517 and has more significant duties and data retention (as well known in the art) than a normal client process. Thus, for example, client Z 509 may retain data structures that represent all the relevant data for synchronizing on quasi-peer Z 517. Furthermore, client Z 509 may also be responsible for monitoring and enforcing hardware and software limitations of the device such as the number of records that fit or number and types of properties or fields allowed for a record. Obviously neither the function of client Z 509, or any other process discussed, is necessarily limited to a single program or process.


b. A Sample Synchronization


Referring now to FIG. 6, there is shown a diagram comprising three synchronizing systems in table form displaying various systems (A 600, B 620, and C 640) in a column. From left to right of FIG. 6, subsequent columns 680, 681, 682, 683, 684, 685 and 686 show state or operations of and between the systems. Thus, if one looks across the row of system A 600, columns 680, 681, 682, 683, 684, 685 and 686 of that row show (in alternating fashion) either the state of system A 600 or an operation taking place in the system. In addition, for illustrative purposes, each system is accompanied by a list of internal synchronization clients, e.g. Mail, Contacts, and Calendar. This example will only refer to a generic record R1 that represents a record of any single structured data type.


Referring further to FIG. 6, we see the initially illustrated state in column 680 showing that system B 620 has record R1 and system C 640 has record R1′. For illustration of inventive embodiments, one assumes that R1 and R1′ were independently created on system B 620 and system C 640, respectively. In fact, if one assumes that R1 and R1′ are structured data of the contact type, we assume that local contact software applications on system B 620 and system C 640 were responsible for creation of R1 and R1′ respectively; and further, that such local application programs assign local IDs to those records. As an added feature, in some embodiments, the Sync-Server in respective systems will assume that local ID is a UUID and thus use the local ID as a GID datum. Therefore, in such embodiments the client processes and/or client devices (including application programs etc.) should be required to supply UUIDs as local IDs. UUID as defined here may be any globally unique identifier, including, but not limited to a UUID as defined in Internet Engineering Task Force RFC 4122. If the Sync-Server cannot be confident that the local ID will be a UUID, then there is risk in using the local ID as the GID datum. This is because, there may be another unrelated record in the system using the same GID and significant data corruption might ensue.


With respect to the creation of R1 and R1′, there are other interesting points to note. First, many embodiments require that a universally unique ID (UUID) is assigned to record upon the creation of the record. In the broadest sense, this is actually the Sync-Server's responsibility; however, in common embodiments where the client local ID is ultimately used by the Sync-Server as the GID datum, the responsibility falls further down to the client application where the record was created. Moreover, in the case of a quasi-peer type device as discussed earlier, the responsibility likely falls upon the proxy portion of the client process. Second, one should note that creation of a record can take many forms such as input by a user typing, by importing through software, or otherwise coming to the client device through a mechanism other than synchronization with members of the synchronization group here-discussed. Third, one should note that in some embodiments, GID datum is simply a property of a record. If the record somehow exists without a GID property field, then that field is created when it becomes desirable to incorporate GID datum in the record's properties. Fourth, one should also note that records may carry GID datum in one or more property fields. As we should discuss, the GID properties of a record may comprise multiple sets of GID datum. All of the GID datum can be combined in a single property field or each can have its own property field.


Having discussed origin and nature of a GID datum, one should also note that in FIG. 6, there is GID datum represented directly under R1 and R1′ in column 680, respective rows for system B 620 and system C 640. For example, R1 has the property of GID datum G(B,R1). The nomenclature chosen here is as follows: “G” to represent global rather than local ID; “B” to represent the client device where the record “R1” was created. Moreover, with respect to R1′ we see GID property G(C, R1′) because “G” represents global ID; “C” represents the client device where the record “R1′” was created.


Having set that predicate, we can move to column 681 and see that our example calls for the synchronizing system A 600 with system B 620. With attention to column 680, we see that system A 600 started with a null for data, therefore column 682 shows that after synchronizing with system B 620, system A 600 has record R1, the GID property of G(B,R1), which simply comes as a property of R1. Moving then to column 683, we see our example calls for synchronizing system C 640 with system B 620. Assuming these systems have never synchronized before, they will attempt to match their records by identity key data properties. In that process they will identify that R1 and R1′ are the same record (or at least similar enough to be associated). Therefore, the records will be synchronized without creating a duplicate record and by using the domain's conflict rules for resolving any property conflicts; however, excepting the GID property, which, if residing in the same field property, is resolved by deriving a global equivalency set from the GID datum of both records. This derivation is discussed throughout in terms of combining (by accumulating, concatenating, or any other functional means) the GID datum. However, any derivation resulting in a derived global equivalency set with a value unique to the GID datum (or, in some embodiments, previous global equivalency sets) from which the global equivalency set is derived (e.g., a hash function) may also be used, are readily apparent to those of skill in the art. If GID data reside in individual record property fields, then there will be no conflict and new property field is created when a unique GID datum is added to a record. Therefore, we see in column 684 (post synchronization) that system B 620 still has R1, but that the GID properties have been updated by the synchronization so that those properties represents the GID datum set G(B,R1), G(C,R1′). Similarly, with attention to column 684, we see that post synchronization, system C 640 still has R1′ but its GID properties have been updated by the synchronization so that those properties now represent G(B,R1), G(C,R1′). Finally, having had no interaction in the synchronization, the data state of system A 600 remains unchanged.


Moving then to FIG. 6, column 685, we see the example calls for the synchronization of system A 600 with system C 640. In order to illustrate the inventive concepts, we assume for this synchronization that R1 of system A 600 will not be matched to R1′ of system C 640 by virtue of an identity key match. The assumption illustrative of the real world where identity keys may be altered or where identity key matches may not be attempted based upon whether the systems have ever synchronized before. Without the benefit of an identity key match, the system can only determine that the records are the same by use of the GID property information. Thus each system receiving an apparently new record will check if any of the datum from the new record's GID property match any of the GID datum of the records that the receiving system knows about. Obviously, one way to perform this check is through brute force of checking every relevant record known to the Sync-Server. In the example being discussed, such brute force analysis is rather trivial because there is only one record in each system. As such, with attention to column 686, we see that the GID property information helps yield the correct result and now all three of the devices in FIG. 6 now hold records having the same GES, which is G(B,R1), G(C,R1′). Further, since the GID datum are simply kept as a record property, they may be maintained by the resident synchronization function.


Given the potential avoidance of duplicates and false adds (adding a record previously deleted), some Sync Server embodiments check GID information before checking identity key properties. Some embodiments also perform identity key property or other property analysis to determine if records are the same. Techniques for this analysis are known in the art.


c. GID Datum Tables


One potential disadvantage to the foregoing example is the use of brute force to match or search or GID datum equivalency. Thus, in many embodiments of the invention a Sync-Server maintains tables for use in GID equivalency searching. For any given type of structured data, each table may associate (e.g. in the same row) the following items: a native GID datum; all associated non-native GID datum; and a key into the local associated record. By way of explanation, the Native GID datum may be represented by the first GID that a particular Sync-Server receives for a record. Therefore, if the record is created on an application program local to the Sync-Server, the native GID datum is the GID datum assumed at the creation of the record. Alternatively, if a GID datum is first received with a new record from another system, that first received GID may be used for the native GID. As yet another alternative, for GIDs created on other systems, a Sync-Server may create a native GID, for example, represented by the GID format discussed above (i.e. G(local system identifier, record identifier)). For purpose of illustration, we shall retread the example of FIG. 6, while periodically showing the state of all three GID tables (one for each sync server or system).


Therefore, referring to FIG. 6, column 680 showing the data state of the three systems A 600, B 620 and C640. The corresponding table state is as follows:












Table for System A


600










Non-Native Associated



Native GID Datum
GID Datum
Key into local record






























Table for System B 620










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(B, R1)

R1



















Table for System C 640










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(C, R1′)

R1′









Thus, we see that at the state represented by FIG. 6, column 680, Sync-Server A's table is null because system A 600 has no data. Furthermore, Sync-Server B's table has a native ID representing system B 620's creation of the record R1 (which uses its record name to serve as a local key), and there is no non-native associate GID datum.


Moving now to column 681, that is a function calling for the synchronization of system A 600 and system B 620. The result in column 682 shows that after synchronizing with system B 620, system A 600 has record R1, and the GID property G(B,R1). The new tables corresponding with the data state at column 682 are as follows:












Table for System A 600










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(B, R1)

R1



















Table for System B 620










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(B, R1)

R1



















Table for System C 640










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(C, R1′)

R1′










Thus, we see that the only change to the tables occurring due to synchronization of system A 600 with system B 620 is that system A 600 received a duplicate of the record and properties (including GID datum) in system B 620. It is noteworthy that we have chosen to use G(B,R1) as the native GID datum for system A 600. As discussed earlier there are many other alternatives that fall within the scope of the invention.


Moving then to FIG. 6, column 683, we see our example calls for synchronizing system C 640 with system B 620. Assuming these systems have never synchronized before, they will attempt to match their records by identity key data properties. In that process they will identify that R1 and R1′ are the same record. Therefore, the records will be synchronized without creating a duplicate record. The result is shown in column 684 and indicates that system B 620 still has R1, but that the GID properties have been updated by the synchronization so that those properties represent the GID datum set G(B,R1), G(C,R1′). Similarly, with attention to column 684, we see that post synchronization, system C 640 still has R1′ but its GID properties have been updated by the synchronization so that those properties also represent G(B,R1), G(C,R1′). Finally, having had no interaction in the synchronization, the data state of system A 600 remains unchanged. The state of respective tables corresponding with column 684 is as follows:












Table for System A 600










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(B, R1)

R1



















Table for System B 620










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(B, R1)
G(C, R1′)
R1



















Table for System C 640










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(C, R1′)
G(B, R1)
R1′










Thus we see that the tables for Sync-Servers B and C have been updated to show non-native associated GID datum. Since our example has only three systems and two independent creations of the same record, this example will not carry more than one non-native associated GID datum per native GID datum. However, one should note that in a more complex and/or larger system consistent with real-world use and manipulation, there may be many non-native associated GID datum per native datum. From the standpoint of the inventive concepts, there is no limit.


Moving then to FIG. 6, column 685, we see the example calls for the synchronization of system A 600 with system C 640. Without the benefit of identity key matching, the system can only determine that the records are the same by use of the GID property information. Thus each system receiving an apparently new record will check if any of the datum from the new record's GID property match any of the GID datum of the records that the receiving system knows about. Here, the tables become very convenient because they simplify this checking process. Nevertheless, with attention to column 686, we see that the GID property information helps yield the correct result and now all three of the devices in FIG. 6 now hold records having the same GID properties, which is G(B,R1), G(C,R1′).












Table for System A 600










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(B, R1)
G(C, R1′)
R1



















Table for System B 620










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(B, R1)
G(C, R1′)
R1



















Table for System C 640










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(C, R1′)
G(B, R1)
R1′









Thus, we see now that all three systems have a full understanding of the same status in the system.

IV. The Case of Deletions


Some embodiments of the invention benefit from the GID techniques by acquiring the added ability to determine if a “new” record being pushed to a Sync-Server is actually a record that has been previously deleted. With that added knowledge, the Sync-Server can maintain a view of data that is most consistent with the user's desires. Thus, many embodiments of the invention contemplate techniques for use when deleting records.


In some embodiments, when the Sync-Server is notified of a deletion, it deletes the record and all its properties, including all its GID properties. However, the Sync-Server does retain a “tombstone” of the deleted record. The tombstone is datum that indicates the identity of the record and its disposition as deleted. In some embodiments, the tombstone datum is retained in log-type information for tracking the various client synchronizations. So, in those embodiments, the synchronization generation information will also be associated with the tombstone. In addition, upon deletion of a record, most embodiments do not immediately call for the deletion of the native-to-non-native association datum in the table discussed above. The association datum in the tables may only be deleted once the Sync-Server is certain that all know systems have deleted the record. The tombstones may be deleted at that time as well.


For purpose of illustration, we will discuss an example regarding deletions. Referring to FIG. 7, column 780 we assume an initial data state as shown for system A 700, system B 720 and system C 740. Furthermore, the native to non-native association tables at the point of column 780 will look like the following:












Table for System A 700










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(A, R1)
G(B, R1′)
R1



















Table for System B 720










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(B, R1′)
G(A, R1)
R1



















Table for System C 740










Non-Native Associated



Native GID Datum
GID Datum
Key into local record




















Moving to column 781, we see that our example requires system B 720 to delete R1′. As discussed earlier, when system B 720 deletes R1′, the Sync-Sever in system B will: (i) delete all properties of the record; maintain a tombstone as described above; and leave the related entries in the native-to-non-native GID association table. The data state of the systems is then shown in column 782 and the state of the native-to-non-native association tables will be unchanged as follows:












Table for System A 700










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(A, R1)
G(B, R1′)
R1



















Table for System B 720










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(B, R1′)
G(A, R1)
R1



















Table for System C 740










Non-Native Associated



Native GID Datum
GID Datum
Key into local record




















Moving on to column 783, the example requires that we synchronize system A 700 with system C 740. Since system A 700 has no knowledge regarding the system B deletion of the record, result column 784 shows that system A 700 pushes record R1 to system C and, of course, includes the GID properties. Therefore, we have a situation here where system C has updated its datum to incorporate a record that the user probably intended for deletion. However, using the embodiments of the invention, we shall see that the user's intent shall ultimately prevail. In any case, the state of the native-to-non-native association tables at the point of column 784 will be as follows (although for the first time in our examples, we are assuming that the Sync-Server in system B will create its own native ID for the table):












Table for System A 700










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(A, R1)
G(B, R1′)
R1



















Table for System B 720










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(B, R1′)
G(A, R1)
R1



















Table for System C 740










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(A, R1)
G(B, R1′)
R1









Moving now to column 785, we see that our example requires the synchronization of system B 720 with system C 740. According to our example, system B 720 and system C 740 have never seen each other before, however, due to the GID properties, the result of the synchronization will turn out in accordance with the user's desires. In particular, system C 740 will attempt to push R1 to system B, but because the GID properties of record R1 match the table entry of system B 720's native-to-non-native association table, system B is able to determine that record R1 has a corresponding datum on system B. Thus, system B can use the R1 tombstone to determine that R1 was deleted and then system B 720 can push the deletion back to system C 740. Thus, we see in result column 786 that, using the inventive embodiments, rather than system B receiving an unwanted record, an unwanted record was removed from system C. Once again the table status remains unchanged as follows:












Table for System A 700










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(A, R1)
G(B, R1′)
R1



















Table for System B 720










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(B, R1′)
G(A, R1)
R1



















Table for System C 740










Non-Native Associated



Native GID Datum
GID Datum
Key into local record





G(A, R1)
G(B, R1′)
R1









Finally, per column 787, we can synchronize system A 700 with either of system B 720 or C 740 and get the same result, which is shown column 787. Again, rather than revive a deleted record, the delete is pushed to the system holding the obsolete record. It may be determined that all clients have synchronized the last modification of a record by analyzing the last synchronization generation associated with the client or the last modified generation associated with each record. This function may be used to determine that all regularly synching clients have knowledge of a deleted record.


The foregoing embodiments are intended as illustrative and without limitation unless expressly stated. One skilled in the art may adapt these embodiments and illustrations in a variety of ways. Such adaptation is expected and intended as part of the discussion herein.

Claims
  • 1. A method for operating a synchronization server installed and running on a first system, the first system having stored thereon one or more current associated data sets each having associated therewith a global equivalency identification datum (GID), the method comprising: receiving from a client an associated data set having associated therewith a first GID;identifying the received first associated data set as one of new or old by determining if the first GID of the received first associated data set is equivalent to a second GID of one of the current associated data sets;identifying each new associated data set as one of truly new or independently created by checking at least one identity key of the received first associated data set against at least one identity key of at least one current associated data set;upon identifying the received first associated data set as independently created, associating the received and current associated data sets as corresponding to each other.
  • 2. The method of claim 1 wherein associating the received and current associated data sets as corresponding to each other further comprises deriving a global equivalency set from the first GID and the second GID.
  • 3. The method of claim 1 further comprising storing in memory one or more global equivalency sets each derived from one or more GIDs, wherein identifying the received first associated data set as one of new or old comprises determining that the received first associated data set is old by identifying that one of the global equivalency sets stored in memory is derivative of the first GID of the received first associated data set.
  • 4. The method of claim 1 wherein the value of the GID uniquely corresponds to the system on which it is generated.
  • 5. The method of claim 4 wherein the GID is a Universally Unique Identifier.
  • 6. The method of claim 1 further comprising, upon identifying the received first associated data set as truly new, storing the received first associated data set on the first system.
  • 7. A method of synchronizing a first system with a second system, each system having stored thereon one or more current associated data sets each having associated therewith a global equivalency identification datum (GID), the method comprising: receiving a first associated data set having associated therewith a first GID transmitted from a second system;identifying the received first associated data set as one of new or old by determining if the first GID of the received first associated data set is equivalent to a second GID of one of the current associated data sets;identifying each new associated data set as one of truly new or independently created by checking at least one identity key of the received first associated data set against at least one identity key of at least one current associated data set;upon identifying the received first associated data set as independently created, associating the received and current associated data sets as corresponding to each other.
  • 8. The method of claim 7 wherein associating the received and current associated data sets as corresponding to each other further comprises deriving a global equivalency set from the first GID and the second GID.
  • 9. The method of claim 7 further comprising storing in memory one or more global equivalency sets each derived from one or more GIDs, wherein identifying the received first associated data set as one of new or old comprises determining that the received first associated data set is old by identifying that one of the global equivalency sets stored in memory is derivative of the first GID of the received first associated data set.
  • 10. The method of claim 7 wherein the value of the GID uniquely corresponds to the system on which it is generated.
  • 11. The method of claim 10 wherein the GID is a Universally Unique Identifier.
  • 12. The method of claim 7 further comprising, upon identifying the received first associated data set as truly new, storing the received first associated data set on the first system.
  • 13. A system for synchronizing with one or more second systems, the system comprising: a processor;a memory operatively coupled to the processor, the memory having stored therein: one or more current associated data sets each having associated therewith a global equivalency identification datum (GID), anda synchronization server program adapted to: receive from a client a first associated data set having associated therewith a first GID;identify the received first associated data set as one of new or old by determining if the first GID of the received first associated data set is equivalent to a second GID of one of the current associated data sets;identify each new associated data set as one of truly new or independently created by checking at least one identity key of the received first associated data set against at least one identity key of at least one current associated data set; andupon identifying the received first associated data set as independently created, associate the received and current associated data sets as corresponding to each other.
  • 14. The system of claim 13 wherein the synchronization server program is adapted to identify the received first associated data set as old by identifying that the first GID of the received first associated data set is equivalent to a second GID of one of the current associated data sets.
  • 15. The system of claim 13 wherein the synchronization server program is adapted to associate the received and current associated data sets as corresponding to each other comprise program instructions adapted to derive a global equivalency set from the first GID and the second GID.
  • 16. The system of claim 13 wherein the synchronization server program is further adapted to: store in memory one or more global equivalency sets each derived from one or more GIDs; andidentify the received first associated data set as old by identifying that one of the global equivalency sets stored in memory is derivative of the first GID of the received first associated data set.
  • 17. The system of claim 13 wherein the client is a corresponding second system for synchronization with the first system.
  • 18. The system of claim 13 wherein the value of the GID uniquely corresponds to the system on which it is generated.
  • 19. The system of claim 18 wherein the GID is a Universally Unique Identifier.
  • 20. The system of claim 13 wherein the memory also has stored therein program instructions adapted to store the received first associated data set on the first system upon identifying the received first associated data set as truly new.
  • 21. The system of claim 13 wherein the second system is desktop computer.
  • 22. The system of claim 13 wherein the second system is a laptop computer.
  • 23. The system of claim 13 wherein the second system is a personal digital assistant.
  • 24. The system of claim 13 wherein the second system is a telephone.
  • 25. The system of claim 13 wherein the second system is a digital media player.
  • 26. A method for operating a synchronization server installed and running on a first system, the first system having stored thereon one or more current associated data sets each having associated therewith a global equivalency identification datum (GID), the method comprising: receiving from a client an associated data set having associated therewith a first GID;identifying the received first associated data set as one of new or old by determining if the first GID of the received first associated data set is equivalent to a second GID of one of the current associated data sets;identifying each new associated data set as one of truly new or independently created by checking at least one identity key of the received first associated data set against at least one identity key of at least one current associated data set;identifying each old associated data set as one of changed or unchanged by comparing at least one property of the received first associated data set with at least one corresponding property of at least one current associated data set having associated therewith a second GID equivalent to the first GID of the received first associated data set;if the received first associated data set is truly new, storing the first associated data set on the first system;if the received first associated data set is independently created, associating the received first associated data set and the current associated data set as corresponding to each other; andif the received first associated data set is old and changed, updating the current associated data set having associated therewith a second GID equal to the first GID of the received first associated data set according to a conflicts resolution scheme.
  • 27. The method of claim 26 wherein associating the received and current associated data sets as corresponding to each other further comprises deriving a global equivalency set from the first GID and the second GID.
  • 28. The method of claim 26 further comprising storing in memory one or more global equivalency sets each derived from one or more GIDs, wherein identifying the received first associated data set as one of new or old comprises determining that the received first associated data set is old by identifying that one of the global equivalency sets stored in memory is derivative of the first GID of the received first associated data set.
  • 29. The method of claim 26 wherein the value of the GID uniquely corresponds to the system on which it is generated.
  • 30. The method of claim 29 wherein the GID is a Universally Unique Identifier.
  • 31. A system synchronizing structured data comprising: a microprocessor resource and a memory resource for storing data associated with operations of said microprocessor resource;a first software element representing a sync server for execution on said microprocessor resource;a plurality of second software elements, each said second software element representing a synchronizing entity, each of said second software elements for running on said microprocessor resource;a first structured data record and an associated first unique ID created by a first synchronizing entity, said first structured data record representing data associated with a first item;a second structured data record and an associated second unique ID created by a second synchronizing entity, said second structured data record representing data associated with said first item;said first software element further comprising: a first sub element for associating a global equivalency identification datum (GID) with each of said first structured data record and said second structured data record;a second sub element for using said GIDs in a first data structure, said first data structure for maintaining associations between a plurality of structured data records that represent data associated with said first item.
  • 32. The system of claim 31 wherein one of said synchronizing entities is a software element representing an application program for running on said microprocessor resource.
  • 33. The system of claim 32 wherein said application program is a contact manager.
  • 34. The system of claim 31 wherein one of said synchronizing entities is an independent device that does not share the microprocessor resource.
  • 35. The system of claim 34 wherein said independent device is a PDA.
  • 36. The system of claim 34 wherein said independent device is a telephone.
  • 37. The system of claim 31 wherein said microprocessor resource comprises a single microprocessor.
  • 38. The system of claim 31 wherein said microprocessor resource comprises a plurality of microprocessors.
  • 39. The system of claim 31 wherein said first unique ID is the same as said GID.
  • 40. The system of claim 31 wherein said first software element uses said first unique ID as a GID.
  • 41. The system of claim 31 wherein said first data structure is a table.