Data synchronous method, client, server and system

A data synchronization and client-side technology, applied in the field of communications, can solve the problems of large amount of data transmission, low transmission efficiency, and inability to synchronize data compression, and achieve the effect of large amount of transmitted data and high transmission efficiency

Inactive Publication Date: 2009-10-21
HUAWEI TECH CO LTD
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] In the data synchronization method of the prior art, the client and the server both use the XML or WBXML format to transmit the synchronization data during the data synchronization process, and the WBXML format can only compress the SyncML tags in the XML message, but cannot compress the synchronization data. It is compressed by itself, so the amount of transmitted data is large and the transmission efficiency is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data synchronous method, client, server and system
  • Data synchronous method, client, server and system
  • Data synchronous method, client, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0046] In Embodiment 2, the server requires the message from the client to be encrypted, and the client has pre-installed or downloaded the server's certificate from the network side. The certificate is an asymmetric key, and the public key is used for client encryption, where The private key of the server is used for decryption by the server, and the server considers the client requesting access to be trusted, and does not require the client's certificate.

[0047] image 3 Including:

[0048] 301. The client generates a session key and encrypts it;

[0049]After the client confirms that it has installed the server's certificate and that the certificate is within the validity period, it generates a session key for encrypting messages, encrypts the generated session key with the public key of the server certificate, and uses the session key to Use the key to encrypt the initialization request message to be transmitted, and then use the specified format in the request message...

Embodiment 3

[0131] Embodiment 3 By defining the path separator negotiation method between the client and the server, it is avoided when the path separator (such as " / ") supported by the client is different from the path separator (such as "\") sent by the server. Data synchronization between client and server is abnormal or fails.

[0132] The steps of the third embodiment are basically the same as those of the second embodiment, except that there are some changes in the processing in the initialization phase.

[0133] Embodiment 3 In the initialization request message sent from the client to the server, an element , used to indicate the path separator that the client can handle (such as the unix operating system path separator " / " or the windows operating system path separator "\", etc.), that is, the response message that the server is required to return All path separators in must conform to the value defined by PathSeparatorType.

[0134] In addition, an element , used to indicate th...

Embodiment 4

[0157] Embodiment 4 mainly sets the information about the maximum number of commands contained in a message supported by the client and informs the server, so as to avoid the failure problem caused by the number of commands contained in a message sent by the server exceeding the processing capacity of the client.

[0158] The steps of the fourth embodiment are basically the same as those of the second embodiment, except that the processing process in the initialization phase has some changes.

[0159] Embodiment 4 In the initialization request message sent by the client to the server, an element , used to indicate the maximum number of commands in a message that the client can process, that is, the number of commands contained in the response message returned by the server cannot exceed the value defined by MaxCmdCnt.

[0160] The following is an example of the revised DevInf of the embodiment of the present invention:

[0161]

[0162] 1.1

[0163] huawe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment in the invention discloses a data synchronous method, a client, a server and a system. The data synchronous method comprises the steps: compressing a message in a synchronous phase; and sending the compressed message to an opposite end apparatus. Correspondingly, the embodiment of the invention discloses a client which comprises a compressing unit for compressing the message; and a sending unit for sending the message compressed by the compressing unit in the synchronous phase to a server. The embodiment of the invention also discloses a server and a system. The technical scheme provided by the embodiment of the invention can improve the transmission efficiency of data synchronization.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a data synchronization method, client, server and system. Background technique [0002] Among current data synchronization technologies, OMA (Open Mobile Alliance, Open Mobile Alliance) defines a SyncML (Synchronization Markup Language, Synchronization Markup Language) specification. A typical application of SyncML is to realize data synchronization between a client (such as a mobile device) and a server. [0003] see figure 1 , is a flow chart of a data synchronization method in the prior art, including: [0004] 101. The client sends a synchronous initialization request message to the server, and requests the server to perform authentication and other related processing; [0005] The synchronization initialization request message may include authentication information (including user name and password), device capability information of the client, specified path for s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L7/00H04L12/56H04L29/06H04L29/08
Inventor 易永健李克鹏柏广昌
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products