1. Trang chủ
  2. » Công Nghệ Thông Tin

Enabling Technologies for Wireless E-Business phần 10 doc

43 309 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 43
Dung lượng 1,75 MB

Nội dung

Th e vo i ce mo d e of i nteract i on w i t h an app li cat i on requ i res speec h recogn i t i o n a nd text-to-speech s y nthesis (TTS) technolo gy . In principle, either of these t ran s f o rm s c an occu r o n e ith e r a c li e nt or a server. H owever, unlike p ersonal c omputers, the current g eneration of m o bile devices does not have the processin g p ower to p erform these transforms, and s o we assume in the following that they a re performed on a voice server. We further assume that the range of input c ommands is constrained so that a pe r sonalized voice recognitio n function is no t requ i re d . As s h own i n F i g. 14.5, a vo i ce server i s i nsta ll e d to act as a proxy c li ent to th e we b app li cat i on server. T h e we b app li cat i on server prov id es d ynam i c c ontent in an XML format known as V oiceXML. The voice server renders V oiceXML into s p eech. VoiceXML also con t ains dialo g ta g s that prescribe p ossible in p uts. The user’s vocal res p onse can be matched to one of the allowe d res p onses and the voice server transmits this as a new re q uest to the web app lication server. 14.3 Wireless e-Business Applications W i re l ess e- b us i ness app li cat i ons are som e ti mes ca ll e d mo bil e app li cat i ons. Mo bil e a pp li cat i ons g i ve peop l e t h e conven i ence to access re l evant i nformat i on an d to act o n that information at an y time and an y place. In the context of e-business, it t ranslates into increased sales, better customer service, and lower transaction cos t s. 344 S . S on g Fig. 14.4. Asynchronous mode F i g . 14.5 . Voice mode J ust like e-business, t h ere are two types of wireless e -business a pp lications, horizontal and vertical. Horizontal a pp lications are those used across a broa d se l ect i on of en d users. Vert i ca l app li cat i ons, on t h e ot h er h an d , are opt i m i ze d for a spec i f i c target mar k et. F i gure 14.6 ill ustrates t h e b as i c categor i es for mo bil e a pp li cat i ons. 14.3.1 Hor i zontal A pp l i cat i ons M essaging Services S ince 1992 short messa g in g service (SMS) h a s been providin g th e abilit y to send a nd receive text messages to and from mobile phones. Each message can contain up to 160 al p hanumeric ch a racters. After find i ng it tough going in the GSM m arket, SMS suddenly starte d to explode since the year 1998. About 90% of SMS m essages are vo i ce ma il not i f i cat i ons or s i mp l e person-to-person messag i ng. T h e r est i s mo bil e i nformat i on serv i ces, suc h as news, stoc k pr i ces, sport, weat h er, h oroscope, j o k es, etc. A ddi t i ona lly , SMS e-ma il not i f i cat i on, SMS c h at, an d d own l oa di n g of r i n gi n g tones h ave b een offere d recent ly . SMS i s an id ea l t ec h no l o gy for pus h i n g i nformat i on from one-to-one or one-to-few. It i s expecte d t hat SMS will show further rapid growth, with t he number of messages doubling e very six months. Many mobile applicatio n s have been initiated using SMS as a platform. In some countries, SMS is also used as a certification and paymen t m et h o d i n e-commerce. 14 Mo bil e Commerce an d W i re l ess e-Bus i ness App li cat i ons 345 F ig. 14.6. Vertical and horizontal mobile a pp lications Multimedia messaging service (MMS) is a new global messaging standard that e na bl es a w id e range of di fferent me di a e l ements (i nc l u di ng text, p i ctures, au di o, an d v id eo ) to b e com bi ne d an d sync hr o n i ze d i n messages sent among mo bil e d ev i ces. MMS i s d es i gne d to b e use d on 2.5G, w hi c h i nc l u d es genera l pac k e t radio service (GPRS), and 3G with the experience bein g richer as the network, bearer, and device ca p abilities p ermit. For device users, MMS enhances p ersonal connectivity and productivity through a more immediate exchange of rich conten t – for instance, while on the road, users can receive a localized city map; or while at a conference, an up-to-the-minute graph or l ayout. For network op erators, MMS prom i ses a ddi t i ona l revenue as a resu l t of i ncrease d a i r t i me, h eav i er a ll -aroun d u sage, serv i ce di fferent i at i on, an d cus t omer l oya l ty. By d ep l oy i ng MMS to d ay, opera t ors can secure a s t rong m ar k et pos i t i on ear l y i n t h e persona l mu l t i me di a era. W eb Access S erv i ces Web access is one of the most popular mobile applications. Typically there are t wo kinds of Web access for mobile a pp lications. One is online, the other is offline. The online mode is analogous to the wired browsing. The only differences are w i re l ess connect i on an d mo bil e b rowser. Web Access S erv i ce ( e-Wallet, Auct i ons, Transact i ons ) V oice Activated Service (Order, Mobile Banking) Location Based Service (Travel, Directions, Yellow Pa g es) Di g ital Content Service (Game, Audio, Video) Re tail L o gi st ic G o v F inan c ial T elco E nt e rtainm e nt I nsurance Vertical Wireless Applications H or i zontal W i reless A pp l i cat i on s The offline mode is based on synchron i zation. The content i s synchronized be t wee n t he m obile device an d b a ck - e n d s erv i ces b efore i t i s use d or processe d . A 3 46 S. Son g s y nchronization service help s s y nchronize the user’s desk t op or back-end serve r a nd mobile device, keepin g both devices updated. Users can automaticall y transfe r t heir websites, files, contacts, and calenda r events into their mobile devices before leaving the office or when there is a need. V oice-Activated Services T h e strengt h of a goo d m obil e app li cat i on i mp l ementat i o n li es i n h ow we ll i t d ea l s w ith nat u ral h u man be ha v i o r . H e n ce vo i ce XML technolo gy is proposed to brin g v oice control to websites, enablin g vo i c e response paradi g ms to navi g ate websites and general speech recognition interfaces. Currently, customers d i aling into an automated voice-menu-driven p hone system have to go through a series of complex commands and inputs to get to their g oal. The “Please press 1 for … , 2 f or … ” a pp roach is not the easiest one to follow, f orcing the customer to remember the r e q uired o p tion after listening to all of the opt i ons on t h e vo i ce menu or more often t h an not repeat i ng t h e menu c h o i ces. Thi s system i s not expecte d to wor k we ll for mo bil e app li cat i ons. A poss ibl e so l ut i on i s a vo i ce i nterface d r i ven b y pre d ef i ne d quest i ons an d comments. In suc h a system, mobile users might ask mobile a pplication services question a a s suc h a s “What is m y account balance?” or “When is the next showin g of Tro y a t C entur y ?” Mobile application services can then reco g nize common voice inputs and respond to them accordingly. L ocat i on-Based S erv i ces Th e a bili ty to l ocate t h e pos i t i on of a m o bil e d ev i ce i s a k ey to prov idi ng geo- g rap hi ca lly spec i f i c va l ue-a dd e d i nformat i o n t h at s i mu l ates mo bil e a ppli cat i ons. Mo bil e l ocat i on serv i ces ma y e i t h er b e term i na l or networ k b ase d . T h e l ar g est pus h for t hi s tec h no l o gy i s com i n g from t h e USA. T h ere, mo bil e te l ep h one operators had been forced by the FCC to provide emerg e ncy 911 services by October 2001 in such a way that the location of the caller could be determine d within a radius of 12 5 m in 67 % of all cases. U nt il now, l ocat i on i nformat i on h as b een t h e monopo l y of t h e carr i ers an d networ k operators t h emse l ves. In t h e future, t hi s may not b e t h e case. For e xamp l e, B l uetoot h or W i F i can contr ib ute to l ocat i on d eterm i nat i on i n t h at a network fixed devices may constantly comm unicate with mobile devices over a m m B lue t oo t h n e t wo r k o r wi r eless LAN . In s uc h a so l ut i on, a mo bil e d ev i ce can request i ts own l ocat i on re l at i v e t o t h at o f t he f i x ed device bec a use t he f i x ed device alread y knows its location. L oc ati o n- se n s iti ve inf o rmat i on becomes a ke y in mobile applications. Knowin g t he location of the user drives the service and application offerin g to a level that creates s i gn i f i cant va l ue to t h e user. Users nee d l oca l i nformat i on a b out t h e i r 14 Mobile Commerce and Wireless e-Business A pp lication s 34 7 normal local environment. Location-s p ecific information is even more valuable in new environments, when traveling. D i g i tal C ontent S erv i ces T h e high er d ata b an d w id t h affor d e d by 2.5 G an d 3 G networ k s w ill b e a b oon to m o bil e app li cat i ons i n t h e f i e ld o f i nt e ra c t ive m ul t i m edi a e nt e rta i nm e nt . In p articular, the distribution of multimedia content such as computer g ames, audio, a n d v i deo w ill be w ir e l ess an d o n de man d. 14.3.2 Vertical A pp lications Enterta i nment Mobile users will be able to downloa d d ifferent programs, products, or services to t heir devices , such as MP3 files , videos , o r games. They will also be able to pla y g ames an d li sten mus i c on li ne v i a mo bil e d ev i ces. Financial A pp lications Th e vo l u m e o f tran s a c ti o n s that cus t o m e r s co n duct with their financial institutions, t a s well as the im p ortance of these transactions, creates an im p ortant source of value. Users will be able to pa y bills a nd transfer mone y from different accounts. Enterpr i se Appl i cat i ons T h rou gh t h e i r w i re l ess d ev i ces, emp l o y ees w ill b e a bl e to f ill out forms, rea d an d d own l oa d f il es , sen d an d rece iv e messa g es t h at are i mportant to t h e i r b us i ness. T hi s w ill i mprove pro d uct i v i t y by d ecreas i n g t h e amount of t i me t h at emp l o y ees spend lookin g for different informati o n. For exam p le, workflow can now be e xtended to mobile devices, ensurin g not onl y that the ri g ht people are alwa y s involved in the p r o cess but also that processes are not dela y ed due to an individual being out of office. 14.3.3 Wireless E-Business A pp lication Architecture A t y p i ca l w i re l ess e- b us i ness s y stem i nc l u d es t h e components s h own i n F ig . 14.7: W ireless Handheld devices Mobile devices are portable physical devices, which sense and collect information a nd transmit the data wirelessly, ranging from pagers to mobile phones, wireless P DAs, and wireless la p to p s. There are a l arge variety of ways through which w i re l ess h an dh e ld d ev i ces , w hi c h c o ver GSM , GPRS , CDMA , CDPD , W i F i, i nfrare d, an d B l uetoot h, sen d an d rece i ve i nformat i on. 348 S . S on g Fi g . 14.7 . Wireless e-business s y stem components C onnect i v i t y and C overa g e From the end user p oint of view, the mobile device is used to access a local cell t ower (or access point). The cell tower is responsible for sending the data to a base stat i on. From t h e b ase stat i on po i nt of v i e w , t h e d ata are d e li vere d to a mo bil e sw i tc hi n g center t h at connects a ll t h e b ase stat i ons. T h ere are two t y pes of d ata transm i ss i on: c i rcu i t sw i tc h e d an d pac k et sw i tc h e d . C ircuit-switched transmission entails a dedi c at ed c ir cu it f o r co mm u ni c ati o n be t wee n two ded i c at ed dev i ces. It s du rati o n i s th e l e ng th of the entire communication. Packet switching does not require a dedicated l ine between the sender and reci p ient. This m ethod enables the data to be divided in t o a number of p ackets and to be sent to t heir intended destination using different paths. W ireless Middleware T he main g oal for the wireless middleware is to help alleviate the problems i nherent to deliverin g content and appli c ations to mobile devices. As we know, m ost of toda y ’s Internet applications and services are desi g ned for the desktop c lient like browser, email, etc. How to ex p an d the existing Internet a pp lications to t he wireless a pp lication and service d omain with minimum modifications on them i s the major challenge for the wireless m iddleware. For exam p le, wireless middl eware cou ld l et you li n k Internet content an d app li cat i ons to t h e w i re l ess We b w i t h out rewr i t i ng t h e app li cat i on , d ata b ase i nterfaces , or HTML s i te. U sua ll y, t h e w i re l ess m iddl eware componen t s prov id e t h e fo ll ow i ng b enef i ts: • Multi p le mobile devices’ su pp or t • No effort or minimum effort to rewrite the existin g applications • Wireless user and service authe n tication , and authorization • C ont i nuous w i re l ess access to content an d app li cat i ons 14 Mo bil e Commerce an d W i re l ess e-Bus i ness App li cat i ons 349 Wireless handheld devices Connectivity and coverage Application server Wireless device management User and sevice management API Transcoding Data system Wireless e-business application • Mobile device mana g ement • L ong-term cost savings The wireless middleware eases many of the functions that can otherwise plague the c onversion of a corporate system to wireless. It can ease the process of transforming m ar k up l an g ua g es, d e li ver i n g content an d d ata, prov idi n g p r o t ocol an d device reco g n i t i on, i ncorporat i n g an d proper ly ro u ti n g b us i ness l o gi c t h rou gh enterpr i se s y stems, and transformin g data formats for compatibilit y with different databases. In short, wireless middleware creates a common platform for the inte g ration of various sources under diverse s y stems and displa y s. T he wireless middleware system often comprises the following common m odules: gateways, application process i ng engine, content handling module, user a nd service management, wireless device management, and interfaces to the back - e n d l e g ac y app li cat i on s y stem. Gateways Wireless e-business a pp lication is domina t e d b y a variet y of non-IP networ k protocols, which are either proprietar y or specific to a particular industr y . As soon a s devices want to access the Internet or other com p uter networks a p rotocol c onversion is required. This task is done by a connectivity gateway. Gateways are t he point of entry i n t o a server network. They isolate the individual communi - c at i on c h anne l s an d t h e i r spec i f i c requ i r e ments from t h e rest of t h e b ac k -en d systems. Gateways, lik e a WAP Gateway or a Pa l m We b c li pp i ng Proxy Server, c onvert TCP / IP to protoco l s op ti m i ze d for w i re l ess d ata transm i ss i on. Gatewa y s can either be hosted b y a service provider offerin g wireless access to his customers or an enterprise environment providin g wireless access to the e nter p rise data t o his emplo y ees. A ppl i cat i on S erver A we b app li cat i on server i s t h e b ase component i n t h e e- b us i ness app li cat i on e nv i ronment. It i s t h e foun d at i on of a co m prehensive business sol m m ut i on. Tec h n i ca ll y, a n app li cat i on server i s a l ways referre d to as a conta i ner. T hi s means t h at we b - b ase d a pplications are deplo y ed, then reside and ru n i n thi s co ntain e r . In th e w ir e l ess e -business a pp lication environment, an a pp lication server must have more f unctionalities, for exam p le, an a pp lic a tion server might provide message queuing, a a thus ensuring that data- and content-requested transactions to and from wireless d devices are delivered only once. This is par ticularly important in financial r r t ransactions, where a transfer re q uest should not be p erformed twice. In a ddi t i on, an app li cat i on server m i gh t part i c i pate i n t h e i nte lli gent t ransformat i on of We b - b ase d app li cat i on i nterfaces. As prev i ous l y exp l a i ne d , intelli g ent transformation is more than a p rocess of sim p le data conversion. An intelli g ent transformation s y stem – w ir e l ess mi dd l ew ar e co m b in ed w ith an app lication server – “understands” content and so can break HTML into menus a nd submenus suitable to the handheld device. 3 50 S . S on g Intelli g ent transformation limits the size of files delivered to mobile devices, t hus improving the transfer rate. This benefits users by sparing them content that is both too expensive and too unwieldy to be accessed by a handheld device such as v ideo clips, large images, and large subsets of data. Th e w i re l ess app li cat i on server can use common d ev i ce c h aracter i st i cs to di sp l a y th e d ata. Us i ng t h ese stan d ar d s h e l ps pro d uct i v i ty i n d eve l opment. User IDs an d h an dh e ld d ev i ce IDs are store d i n t h e d ata b ase a t t h e app li cat i on server l eve l . Once a lo g in request is received, the ap p l i c ati o n se r ve r a ccesses th e d ata b a se. Th e m iddleware database is used to prepare and format the data for the device requestin g the login. The application ser ver will also compare the registered device ID to the r r u ser ID for additional security verification. The applicati o n server communicates with the gateway server for t h e s p ecific device that initiates the re q uest. The gateway t h en pus h es t h e i nformat i on to t h e h an dh e ld d ev i ce b ase d on t h e c onnect i v i ty p l atform b e i ng use d ( e.g., C DPD, SMS, Mo bi tex, or CDMA ) . Th e app li cat i on server must accommo d ate di fferent h an dh e ld p l atforms suc h as t hin-client devices (IP-based devices), t wo-wa y pa g in g , SMS messa g in g , an d smart p hones. It must then deliver d a ta formatted for that s p ecific device, end - t o-end, in a reliable and secure manner. C ontent Handl i ng Module B esides trans p ort p rotocol conversion done b y the connectivity ga t eways, con t en t s h ou ld a l so b e a dj uste d for spec i f i c c l asses of d ev i ces. Tra di t i ona ll y, t h ere are two ways for accomp li s hi ng t hi s tas k . One i s t h at t h e b ac k -en d app li cat i on i s respons ibl e f or g eneratin g the appropriate con t e nt la y out and formats to adapt the various mobile c lients. The other is b y usin g transc o din g technolo gy in the middleware. Transcodin g is one such kind of content adap t a tion technolo gy , w hi c h tail o r s information for a specific device b y t ransforming its format and representation. T he purpose of transcoding is obvious: When the content providers delive r c ontent to various mobile clients, t h e y need to accommodate device specific c onstra i nts suc h as li m i te d m emory, s l ow d ata transm i ss i on, an d sma ll screens. Transco di ng automat i ca ll y trans l ates content i nto di fferent representat i ons fo r e ac h c l ass of rece i v i ng c li ent systems. T hi s s i mp li f i es aut h or i ng, d ep l oyment, an d m aintenance dramaticall y . An arbitrar y multimedia web pa g e can be p rovided to Internet TVs, h an dh e ld s, an d WAP p h ones w i t h out c h an g e. It i s even poss ibl e to ad apt content from l e g ac y s y stems i nto a stan d ar di ze d Internet re p resentat i on, or t ranscode Web pages to the proprietary format of a specific client device. T ranscoding is the process of formatting the content (data) according to the handheld device request using XML, XSL stylesheets, and DTD files, as shown in F i g. 14.8. T hi s met h o d ena bl es en d users to access d ata un i versa ll y regar dl ess of th e d ev i ce type. 14 Mobile Commerce and Wireless e-Business A pp lication s 351 Once a request from a handheld device is initiated, the application server intercepts the request to identify the device type and capture the content. Using F i g . 14.8 . Transcodin g process severa l l og i ca l processes, t h e app li cat i on s erver eng i ne processes t h e d ata i nto an XML document, which can be communicated to the back-end s y stem via the API co nn ec t io n . T he r esul t i s t h en transco d e d ( processe d) us i n g XSL st yl es h eets an d r e f o rmatt ed f o r t he h an dheld device t h at ma de t he i n i t i a l r e q uest. T h e a ppli cat i on server engine selects the correct screen template, formats the data for the handheld device, and delivers the data re q uested. XSL is used for data transformation definitions, where the API will exchange m e s sages between the back-end system a n d t h e app li cat i on server. XSL an d XSLT sty l es h eets are ma i n l y use d to manage th e presentat i on of t h e d ata, wh ereas XML h an dl es t h e d ata i tse l f. User and S erv i ce Management User mana g ement module provides the wirel e ss e - bus in ess a d mini s trat o r t o a dd a new user or delete an existin g user. Service m ana g ement module is to help the wireless service administrator to deplo y and mana g e the service with more ease. I t u sua ll y prov id es too l s for t h e a d m i n i strator to i nst all, act i vate or i nact i vate , mon i tor , stop, an d un i nsta ll t h e w i re l ess e- b us i ness ap p li cat i ons. Wi re l ess m iddl eware a l so t a k es care of t h e access contro l for b ot h t h e w i re l ess users an d w i re l ess serv i ces. I n t he wi r eless e - busi n e ss d ep l o y ment p h rase, t h e wi r eless m iddlew ar e could h e l p t h e a d m i n i strator to spec i f y t h e a llo we d user g roups correspon d to t h e 352 S . S on g deplo y ed wireless e-business applications. In the runtime p hrase, the middleware is responsible for mapping the wireless device ID to the user ID, then check out i f such a user is allowed to access the requested service. Only the authorize d wireless user’s re q uest could be p a s sed through to the back-end service. If the b ac k -en d serv i ce i n i t i ates t h e requ e st to pus h t h e i nformat i on to one w i re l ess user , th e w i re l ess m iddl eware w ill c h ec k i f t h e target rec i p i ent b e l ongs to t hi s serv i ce. A ny out-range rec i p i ent w ill b e f il tere d b y t h e m iddl eware to h e l p re d uce t h e problems raised b y wireless content spam. M ob i le Dev i ce Management With the growth of high-end wireless handheld device market and the realistic nee d s for t h e w i re l ess e- b us i ness app li c at i ons, t h e w i re l ess d ev i ce managemen t h as b ecome one of ma j or concerns for b ot h serv i ce prov id ers an d enterpr i se IT m anagers. D i fferent from PC c li ents t h at are con s i stent l y tet h ere d to a LAN an d p rotected behind a firewall, wireless devices such as PDA and smart p hones are, b y nature, far more difficult to mana g e . The followin g five aspects are important f or the wireless device mana g ement: • S oftware deployment • A sset and configuration management • F ault management • D ev i ce contro l an d d ata secur i t y • B ac k -up an d restore Push i n g and Pull i n g model P u ll tec h no l og y i s w h en t h e h an dhe ld d ev i ce i n i t i ates t h e c o m mun i cat i on us i ng i ts gateway to request d ata. T h e d ata are t h en pulled from the a pplication server down a a t o t h e h an dh e ld d ev i ce. T h e d om i nant para di gm of commun i cat i on on t h e Wor ld Wid e W e b an d i n most di str ib ut e d s y stems i s t hi s request–rep ly mo d e l . Push technology is when the application server is in control over the handheld y d ev i ce. T h e app li cat i on server ma k es b as i c content d ec i s i ons an d pus h es d ata to t h e handheld device without waitin g for the client’s request. Push model is usuall y a do p ted when the back-end a pp lications attem p t to overcome the deficiencies of p ull m odel b y allowin g the information producer to “ p ush” the information to the user without the user initiating the request first. A typical push application, for example, c ould be the news alert. After the news subscriber specifies the news category tha t interests him to the news service provider, the back-end agent would intelligentl y d e li ver t h e correspon di n g news content v i a MMS to t h e w i re l ess en d users. In e i t h er met h o d , aut h ent i cat i on must ta k e p l ace f i rst. Un d er t h e pu ll mo d e l , t h e g atewa y transfers t h e h an dh e ld ’s request t o t h e app li cat i on server. T h e app li cat i on server usuall y needs to map the device I D to the user ID. After confirmin g that the wireless request user has the access ri g ht to the back-end application, the app lication server will translate the wireless device re q uest into the a pp lication- specific request by complementing para meters like user ID, user request data, a a 14 Mobile Commerce and Wireless e-Business A pp lications 353 [...]... through wireless communication networks and the Internet WAP includes t r wireless application environment (WAE), wireless session protocol (WSP), wireless transaction protocol (WTP), wireless transport layer security (WTLS), and wireless datagram protocol (WDP) Wireless Datagram Protocol (WDP) A datagram protocol for non-IP wireless packet data networks WDP specifies how different existing bearer... infrastructure Wireless Session Protocol (WSP) A protocol family derived from the HTTP version 1.1 standard with extensions for wireless data applications WSP provides WAP applications with a consistent interface for session services Wireless Telephony Applications (WTA) A framework for integrating wireless data a applications with voice networks WTA is a collection of telephony-specific extensions for call... layers of the WAP architecture framework 370 Glossary Wireless Markup Language (WML) An XML-based markup language for wireless handheld devices, including cellular phones, pagers, and PDAs Wireless Public Key Infrastructure (WPKI) WAP Forum established the WPKI framework not as a new PKI standard but as an extension of the traditional PKI to the wireless environment It utilizes two approaches to satisfy... Capability/Preference Profiles (CC/PP) 291 Compressed domain transcoder (CDT) 282 Confidentiality 45, 71 Context-aware mobile computing 109 -112, 115, 116, 128, 129 New features 109 , 111 Context-awareness 112, 129 Dynamism 110, 111, 115 Environmental heterogeneity 110 Support for mobile people 110 New requirements 111, 112, 119, 121 Infrastructure 111, 112, 114, 115 Representative projects 112 AURA at CMU 112 GAIA... uniqe address of a Web document u q Validation The process of demonstrating that the system under consideration meets the specification of that system in all respects Wireless Application Protocol (WAP) A specification that allows users to access information instantly via handheld wireless devices such as cellular phones, pagers, and personal digital assistants (PDAs) through wireless communication... authorization to push the data to the wireless user to avoid the push spam Then the application server will help to deliver the push content to the wireless user via the gateway modules In general, the pull model is often applied to the client–server/browser–server model, which provides an architectural approach for organizing the software for t distributed platforms The basic scheme is that clients... and support for mobile devices 14 Mobile Commerce and Wireless e-Business Applications 355 Fig 14.9 Pull and push model Commerce Suite Catalog Subsystem Common Server Run- Store Services Member Subsystem Administration Console Negotiation Subsystem System Management WebSphere Application Server Fig 14 .10 WebSphere commerce server Order Subsystem Messaging 356 S Song As shown in Fig 14 .10 the WebSphere... their workflow activities easily and reliably at any time and any place by using mobile phones only, even in conditions where wireless network performance is poor 2 14.5 Summary This chapter provided an overview of m-commerce and wireless e-business applications, including wireless networks, security issues such as single sign-on and privacy, location-based services, notification services, mobile payment,... form of cash in a cash-like e-payment system with which a person can make online payment for goods or services purchased over the Internet Digital Check An electronic form of a check in a check-like e-payment system where the check can be conveyed across computer networks Digital Signature A digital string produced by applying a cryptographic algorithm with the privatekey information on a message/document... behavioral biometric) Private Key In public-key cryptography, this key is the secret key It is primarily used for decryption and also used for encryption with digital signatures Public Key In public-key cryptography, this key is made public to all It is primarily used for encryption but can be used for verifying signatures Public-Key Cryptography Cryptography based on methods involving a public key and . enterpr i se s y stems, and transformin g data formats for compatibilit y with different databases. In short, wireless middleware creates a common platform for the inte g ration of various sources. physical devices, which sense and collect information a nd transmit the data wirelessly, ranging from pagers to mobile phones, wireless P DAs, and wireless la p to p s. There are a l arge variety. service d omain with minimum modifications on them i s the major challenge for the wireless m iddleware. For exam p le, wireless middl eware cou ld l et you li n k Internet content an d app li cat i ons

Ngày đăng: 07/08/2014, 21:20