Converged IP messaging (CPM) conversation history accessing method and message storage server

A technology for meeting historical records and storing servers, which is applied in the field of communication, and can solve problems such as high overhead and burden, and users' inability to manage resources, and achieve the effect of reducing overhead and improving user experience

Active Publication Date: 2011-08-03
BEIJING UNIV OF POSTS & TELECOMM +1
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] The present invention is proposed in view of the problems in the related art that the operation of constructing a linear view will bring relatively large overhead and burden, and that the user cannot manage the resources stored on the message storage server. Therefore, the main purpose of the present invention is to Provide a method for accessing CPM conversation history records and a message storage server to solve at least one of the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Converged IP messaging (CPM) conversation history accessing method and message storage server
  • Converged IP messaging (CPM) conversation history accessing method and message storage server
  • Converged IP messaging (CPM) conversation history accessing method and message storage server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0157] Embodiment 1: User obtains access control list operation

[0158] If the user wants to obtain the access control list of a certain user folder, according to the regulations in [RFC4314], the MSC constructs the IMAP4 / GETACL command, specifies the name of the target folder, and requests the MSS for the access control list of the target folder, specifically see Figure 9 .

[0159] The user requests the MSS for the access control list of the "Working" user folder. After receiving the command, the MSS checks whether the requesting user has the "a" permission on the target folder, that is, whether it can obtain the permission of the access control list. If it has this permission, MSS returns the access control list in the response message to the GETACL command, as shown in the above figure, the access control list shows that the user "Fred" has the "rwipslxetad" permission on the target folder, and the user "Chris" Have "lrswi" permissions on the target folder.

...

Embodiment 2

[0161] Embodiment 2: User setting access control list operation

[0162] If the user wants to set the access control list of a certain user folder, such as granting certain permissions to another user, the MSC should construct the IMAP4 / SETACL command according to the procedure specified in [RFC 4314], and request the MSS to specify The target folder adds access control permissions to a user, for details, see Figure 10 .

[0163] The user requests MSS to add the access control authority "cda" to the target folder "Working" for another user "Chris". After MSS receives this command, it should first check whether the requesting user has "a" permission on the target folder. If the requesting user has "a" permission on the target folder, then MSS will follow the request in the SETACL command as the target folder. In the access control list of the folder "Working", add the "cda" permission of the "Chris" user; if the requester user does not have the "a" permission for the ...

Embodiment 3

[0164] Embodiment 3: User deletes the access control list operation

[0165] If a user wants to delete another user's access control list for a certain user folder, the MSC should follow the procedure specified in [RFC 4314] to construct an "IMAP4 / DELETEACL" command, requesting the MSS to specify the user's access to the target folder Control permission list deletion, for details, see Figure 11 .

[0166] The user requests MSS to delete the access control permission list of another user "Fred" to the target folder "Working". After MSS receives this command, it should first check whether the requesting user has "a" permission on the target folder; if the requesting user has "a" permission on the target folder, then MSS will follow the request in the DELETEACL command as the target In the access control list of the folder "Working", delete all access control permissions of the "Fred" user; if the requester user does not have the "a" permission on the target folder, MSS...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a converged IP messaging (CPM) conversation history accessing method and a message storage server. The method comprises that: the message storage server receives an accessing instruction from a client, wherein the accessing instruction carries a label classification identifier; and the message storage server executes an access operation corresponding to the accessing instruction according to the label classification identifier. By the technical scheme provided by the invention, the overhead can be reduced and user experiences can be improved when a plurality of conversation logic views are provided for a user.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method for accessing a Converged IP Messaging (abbreviated as CPM) conversation history record and a message storage server. Background technique [0002] The Converged IP Messaging (CPM for short) enabler proposed by the OMA organization can span different access networks and is built on a unified IP core network to support one-to-one, One-to-many and communication of various media types (eg, text, pictures, audio / video clips, binary files, audio / video streams) between multiple applications. [0003] In a converged message communication environment, the CPM enabler provides CPM services to users in units of CPM talks to enable them to exchange information. Record and store on the side, so that when needed, you can send a request to the server on the network side to access the historical interaction record information of the CPM talks you have participated in, and truly repro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F17/30
Inventor 卢美莲周星李凤军杨栋曾玉冰张永旺
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products