Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for accessing CPM (Critical Path Method) conversation historic record and message storage server

A technology for meeting historical records and storing servers, which is applied in the field of communication, and can solve problems such as increasing wireless interface data traffic, large overhead and burden, and increasing user service costs, so as to improve user experience and save overhead

Active Publication Date: 2011-08-03
BEIJING UNIV OF POSTS & TELECOMM +1
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] (2) Since CPM message records and CPM session history records can be distributed in arbitrary folders, the server cannot support message storage. The client requests the server to build a linear view for the conversation history records through the IMAP / THREAD command ([RFC5256]), however For mobile devices with limited computing and storage resources, completing the operation of building a linear view will bring a lot of overhead and burden, which may cause slow response speed and other adverse effects on user experience
[0016] (3) Since the CPM message records and CPM session history records belonging to a CPM meeting may be distributed in different folders, the message storage client needs to continuously pass the IMAP / SELECT command when obtaining the content related to a CPM meeting history record Select a folder, and then use the IMAP / FETCH command to obtain the record files stored in this folder, and then re-SELECT another folder to obtain the record files stored in this folder, and repeat until all the CPM talks are obtained. Content, the operation of constantly using the SELECT command to open the folder increases the number of command interactions between the message storage client and the server, and there is additional overhead, especially for mobile devices, frequent redundant command interactions will increase the data on the wireless interface Traffic, increase the cost of using the service for users, and reduce the experience of using the service for users
[0017] (4) Some management operations of users may destroy the linear view of CPM talks
[0021] However, the above scheme has the following disadvantages. Since the meeting folder is managed by the message storage server, the user has no operation authority, so the user cannot manage the resources stored on the message storage server, cannot create custom folders, and cannot move / copy Message records and session history files can only be viewed in the chat view, which has poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for accessing CPM (Critical Path Method) conversation historic record and message storage server
  • Method for accessing CPM (Critical Path Method) conversation historic record and message storage server
  • Method for accessing CPM (Critical Path Method) conversation historic record and message storage server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0099] Embodiment 1: User obtains access control list operation

[0100] If the user wants to obtain the access control list of a certain user folder, according to the regulations in [RFC4314], the MSC constructs the IMAP4 / GETACL command, specifies the name of the target folder, and requests the MSS for the access control list of the target folder, specifically see Figure 6 .

[0101] The user requests the MSS for the access control list of the "Working" user folder. After receiving the command, the MSS checks whether the requesting user has the "a" permission for the target folder, that is, whether the permission of the access control list can be obtained. If it has this permission, MSS returns the access control list in the response message to the GETACL command, as shown in the above figure, the access control list shows that the user "Fred" has the "rwipslxetad" permission on the target folder, and the user "Chris" Have "lrswi" permissions on the target folder.

[0102...

Embodiment 2

[0103] Embodiment 2: User setting access control list operation

[0104] If the user wants to set the access control list of a certain user folder, such as granting certain permissions to another user, the MSC should construct the IMAP4 / SETACL command according to the procedure specified in [RFC 4314], and request the MSS to specify The target folder adds access control permissions to a user, for details, see Figure 7 .

[0105] The user requests MSS to add the access control authority "cda" to the target folder "Working" for another user "Chris". After MSS receives this command, it should first check whether the requesting user has the "a" permission on the target folder. If the requesting user has "a" permission on the target folder, then MSS will follow the request in the SETACL command as the target folder. In the access control list of the folder "Working", add the "cda" permission of the "Chris" user; if the requester user does not have the "a" permission for the targ...

Embodiment 3

[0106] Embodiment 3: User deletes the access control list operation

[0107]If a user wants to delete another user's access control list to a certain user folder, the MSC should follow the procedure specified in [RFC 4314] to construct an "IMAP4 / DELETEACL" command, requesting the MSS to specify the user's access to the target folder Control permission list deletion, for details, see Figure 8 .

[0108] The user requests the MSS to delete the access control permission list of another user "Fred" to the target folder "Working". After MSS receives this command, it should first check whether the requesting user has "a" permission on the target folder; if the requesting user has "a" permission on the target folder, then MSS will follow the request in the DELETEACL command as the target In the access control list of the folder "Working", delete all access control permissions of the "Fred" user; if the requester user does not have the "a" permission on the target folder, MSS shoul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for accessing a CPM (Critical Path Method) conversation historic record and a message storage server. The method comprises the steps: the message storage server receives an access command from a client side, wherein the access command is used for indicating that the CPM conversation historic record stored in a system management region is modified; and the message storage server copies and stores the CPM conversation historic record to a user management region, and executes an access operation corresponding to the access command on the CPM conversation historic record stored in the system management region. According to the technical scheme provided by the invention, overhead can be saved and user experience is improved.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method for accessing a Converged IP Messaging (abbreviated as CPM) conversation history record and a message storage server. Background technique [0002] The CPM enabler is proposed by the OMA organization, which can span different access networks and is built on a unified IP core network to support end users' one-to-one, one-to-many, and various communication between multiple applications. Communication of various media types (eg, text, pictures, audio / video clips, binary files, audio / video streams). [0003] In a converged message communication environment, the CPM enabler provides CPM services to users in units of CPM talks to enable them to exchange information. Record and store on the side, so that when needed, you can send a request to the server on the network side to access the historical interaction record information of the CPM talks you have participated in, and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/58H04L29/06
Inventor 卢美莲周星李凤军杨栋曾玉冰张永旺
Owner BEIJING UNIV OF POSTS & TELECOMM