Tải bản đầy đủ (.pdf) (43 trang)

Enabling Technologies for Wireless E-Business phần 10 doc

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (1.75 MB, 43 trang )

Th
e vo
i
ce mo
d
e of
i
nteract
i
on w
i
t
h
an app
li
cat
i
on requ
i
res speec
h
recogn
i
t
i
o
n

a
nd text-to-speech s
y


nthesis (TTS) technolo
gy
. In principle, either of these
t
ran
s
f
o
rm
s

c
an
occu
r
o
n
e
ith
e
r a
c
li
e
nt
or
a server.
H
owever, unlike
p

ersonal
c
omputers, the current
g
eneration of m
o
bile devices does not have the processin
g

p
ower to
p
erform these transforms, and
s
o we assume in the following that they
a
re performed on a voice server. We further assume that the range of input
c
ommands is constrained so that a
pe
r
sonalized voice recognitio
n
function is no
t

requ
i
re
d

.
As s
h
own
i
n F
i
g. 14.5, a vo
i
ce server
i
s
i
nsta
ll
e
d
to act as a proxy c
li
ent to
th
e we
b
app
li
cat
i
on server. T
h
e we

b
app
li
cat
i
on server prov
id
es
d
ynam
i
c
c
ontent in an XML format known as
V
oiceXML. The voice server renders
V
oiceXML into s
p
eech. VoiceXML also con
t
ains dialo
g
ta
g
s that prescribe
p
ossible in
p
uts. The user’s vocal res

p
onse can be matched to one of the allowe
d
res
p
onses and the voice server transmits this as a new re
q
uest to the web
app
lication server.
14.3 Wireless e-Business Applications
W
i
re
l
ess e-
b
us
i
ness app
li
cat
i
ons are som
e
ti
mes ca
ll
e
d

mo
bil
e app
li
cat
i
ons. Mo
bil
e
a
pp
li
cat
i
ons g
i
ve peop
l
e t
h
e conven
i
ence to access re
l
evant
i
nformat
i
on an
d

to act
o
n that information at an
y
time and an
y
place. In the context of e-business, it
t
ranslates into increased sales, better customer service, and lower transaction
cos
t
s.

344
S
.
S
on
g
Fig. 14.4. Asynchronous mode
F
i
g
. 14.5
.
Voice mode
J
ust like e-business, t
h
ere are two types of wireless

e
-business a
pp
lications,
horizontal and vertical. Horizontal a
pp
lications are those used across a broa
d

se
l
ect
i
on of en
d
users. Vert
i
ca
l
app
li
cat
i
ons, on t
h
e ot
h
er
h
an

d
, are opt
i
m
i
ze
d
for
a

spec
i
f
i
c target mar
k
et. F
i
gure 14.6
ill
ustrates t
h
e
b
as
i
c categor
i
es for mo
bil

e
a
pp
li
cat
i
ons.
14.3.1 Hor
i
zontal A
pp
l
i
cat
i
ons
M
essaging Services
S
ince 1992 short messa
g
in
g
service (SMS) h
a
s
been providin
g
th
e

abilit
y
to send
a
nd receive text messages to and from mobile phones. Each message can contain
up
to 160 al
p
hanumeric ch
a
racters. After find
i
ng it tough going in the GSM
m
arket, SMS suddenly starte
d
to explode since the year 1998. About 90% of SMS
m
essages are vo
i
ce ma
il
not
i
f
i
cat
i
ons or s
i

mp
l
e person-to-person messag
i
ng. T
h
e
r
est
i
s mo
bil
e
i
nformat
i
on serv
i
ces, suc
h
as news, stoc
k
pr
i
ces, sport, weat
h
er,
h
oroscope,
j

o
k
es, etc. A
ddi
t
i
ona
lly
, SMS e-ma
il
not
i
f
i
cat
i
on, SMS c
h
at, an
d

d
own
l
oa
di
n
g
of r
i

n
gi
n
g
tones
h
ave
b
een offere
d
recent
ly
. SMS
i
s an
id
ea
l
t
ec
h
no
l
o
gy
for pus
h
i
n
g


i
nformat
i
on from one-to-one or one-to-few. It
i
s expecte
d
t
hat SMS will show further rapid growth, with
t
he number of messages doubling
e
very six months. Many mobile applicatio
n
s have been initiated using SMS as a
platform. In some countries, SMS is also used as a certification and paymen
t

m
et
h
o
d

i
n e-commerce.
14 Mo
bil
e Commerce an

d
W
i
re
l
ess e-Bus
i
ness App
li
cat
i
ons
345

F
ig. 14.6. Vertical and horizontal mobile a
pp
lications
Multimedia messaging service (MMS) is a new global messaging standard that
e
na
bl
es a w
id
e range of
di
fferent me
di
a e
l

ements
(i
nc
l
u
di
ng text, p
i
ctures, au
di
o,
an
d
v
id
eo
)
to
b
e com
bi
ne
d
an
d
sync
hr
o
n
i

ze
d

i
n messages sent among mo
bil
e
d
ev
i
ces. MMS
i
s
d
es
i
gne
d
to
b
e use
d
on 2.5G, w
hi
c
h

i
nc
l

u
d
es genera
l
pac
k
e
t

radio service (GPRS), and 3G with the experience bein
g
richer as the network,
bearer, and device ca
p
abilities
p
ermit. For device users, MMS enhances
p
ersonal
connectivity and productivity through a more immediate exchange of rich conten
t


for instance, while on the road, users can receive a localized city map; or while
at a conference, an up-to-the-minute graph or
l
ayout. For network
op
erators, MMS
prom

i
ses a
ddi
t
i
ona
l
revenue as a resu
l
t of
i
ncrease
d
a
i
r t
i
me,
h
eav
i
er a
ll
-aroun
d

u
sage, serv
i
ce

di
fferent
i
at
i
on, an
d
cus
t
omer
l
oya
l
ty. By
d
ep
l
oy
i
ng MMS to
d
ay,
opera
t
ors can secure a s
t
rong
m
ar
k

et pos
i
t
i
on ear
l
y
i
n t
h
e
persona
l
mu
l
t
i
me
di
a era.
W
eb Access
S
erv
i
ces
Web access is one of the most popular mobile applications. Typically there are
t
wo kinds of Web access for mobile a
pp

lications. One is online, the other is
offline. The online mode is analogous to the wired browsing. The only differences
are w
i
re
l
ess connect
i
on an
d
mo
bil
e
b
rowser.

Web Access
S
erv
i
ce
(
e-Wallet, Auct
i
ons, Transact
i
ons
)
V
oice Activated Service (Order, Mobile Banking)

Location Based Service (Travel, Directions, Yellow Pa
g
es)
Di
g
ital Content Service (Game, Audio, Video)
Re
tail
L
o
gi
st
ic
G
o
v
F
inan
c
ial
T
elco
E
nt
e
rtainm
e
nt
I
nsurance

Vertical Wireless Applications
H
or
i
zontal W
i
reless A
pp
l
i
cat
i
on
s
The offline mode is based on synchron
i
zation. The content
i
s synchronized
be
t
wee
n t
he
m
obile

device
an
d


b
a
ck
-
e
n
d

s
erv
i
ces
b
efore
i
t
i
s use
d
or processe
d
. A
3
46 S. Son
g
s
y
nchronization service help
s

s
y
nchronize the user’s desk
t
op
or back-end serve
r

a
nd mobile device, keepin
g
both devices updated. Users can automaticall
y
transfe
r

t
heir websites, files, contacts, and calenda
r
events into their mobile devices before
leaving the office or when there is a need.
V
oice-Activated Services
T
h
e strengt
h
of a goo
d


m
obil
e app
li
cat
i
on
i
mp
l
ementat
i
o
n
li
es
i
n
h
ow we
ll

i
t
d
ea
l
s
w
ith nat

u
ral h
u
man
be
ha
v
i
o
r
.
H
e
n
ce

vo
i
ce
XML technolo
gy
is proposed to brin
g

v
oice control to websites, enablin
g
vo
i
c

e response paradi
g
ms to navi
g
ate websites
and general speech recognition interfaces.
Currently, customers d
i
aling into an automated voice-menu-driven
p
hone
system have to go through a series of complex commands and inputs to get to their
g
oal. The “Please press 1 for

,
2
f
or


a
pp
roach is not the easiest one to follow,
f
orcing the customer to remember the r
e
q
uired o
p

tion after listening to all of the
opt
i
ons on t
h
e vo
i
ce menu or more often t
h
an not repeat
i
ng t
h
e menu c
h
o
i
ces.
Thi
s system
i
s not expecte
d
to wor
k
we
ll
for mo
bil
e app

li
cat
i
ons. A poss
ibl
e
so
l
ut
i
on
i
s a vo
i
ce
i
nterface
d
r
i
ven
b
y pre
d
ef
i
ne
d
quest
i

ons an
d
comments. In suc
h

a system, mobile users might ask mobile a
pplication services question
a
a
s

suc
h a
s
“What is m
y
account balance?” or “When is the next showin
g
of Tro
y
a
t

C
entur
y
?” Mobile application services can then reco
g
nize common voice inputs
and respond to them accordingly.

L
ocat
i
on-Based
S
erv
i
ces
Th
e a
bili
ty to
l
ocate t
h
e pos
i
t
i
on of a
m
o
bil
e
d
ev
i
ce
i
s a

k
ey to prov
idi
ng geo-
g
rap
hi
ca
lly
spec
i
f
i
c va
l
ue-a
dd
e
d

i
nformat
i
o
n t
h
at s
i
mu
l

ates mo
bil
e a
ppli
cat
i
ons.
Mo
bil
e
l
ocat
i
on serv
i
ces ma
y
e
i
t
h
er
b
e term
i
na
l
or networ
k


b
ase
d
. T
h
e
l
ar
g
est
pus
h
for t
hi
s tec
h
no
l
o
gy

i
s com
i
n
g
from t
h
e USA. T
h

ere, mo
bil
e te
l
ep
h
one
operators had been forced by the FCC to provide emerg
e
ncy 911 services by
October 2001 in such a way that the location of the caller could be determine
d

within a radius of 12
5
m in 67
%
of all cases.
U
nt
il
now,
l
ocat
i
on
i
nformat
i
on

h
as
b
een t
h
e monopo
l
y of t
h
e carr
i
ers an
d

networ
k
operators t
h
emse
l
ves. In t
h
e future, t
hi
s may not
b
e t
h
e case. For
e

xamp
l
e, B
l
uetoot
h
or W
i
F
i
can contr
ib
ute to
l
ocat
i
on
d
eterm
i
nat
i
on
i
n t
h
at a
network fixed devices may constantly comm
unicate with mobile devices over a
m

m
B
lue
t
oo
t
h
n
e
t
wo
r
k

o
r
wi
r
eless
LAN
.
In
s
uc
h
a so
l
ut
i
on, a mo

bil
e
d
ev
i
ce can
request
i
ts own
l
ocat
i
on re
l
at
i
v
e
t
o
t
h
at
o
f t
he
f
i
x
ed


device

bec
a
use
t
he
f
i
x
ed

device alread
y
knows its location.
L
oc
ati
o
n-
se
n
s
iti
ve
inf
o
rmat
i

on becomes a ke
y
in mobile applications. Knowin
g
t
he location of the user drives the service and application offerin
g
to a level that
creates s
i
gn
i
f
i
cant va
l
ue to t
h
e user. Users nee
d

l
oca
l

i
nformat
i
on a
b

out t
h
e
i
r
14 Mobile Commerce and Wireless e-Business A
pp
lication
s
34
7
normal local environment. Location-s
p
ecific information is even more valuable in
new environments, when traveling.
D
i
g
i
tal
C
ontent
S
erv
i
ces
T
h
e
high

er
d
ata
b
an
d
w
id
t
h
affor
d
e
d

by
2.5
G
an
d
3
G
networ
k
s w
ill

b
e a
b

oon to
m
o
bil
e app
li
cat
i
ons
i
n t
h
e f
i
e
ld
o
f

i
nt
e
ra
c
t
ive
m
ul
t
i

m
edi
a
e
nt
e
rta
i
nm
e
nt
.
In
p
articular, the distribution of multimedia content such as computer
g
ames, audio,
a
n
d

v
i
deo

w
ill
be

w

ir
e
l
ess
an
d

o
n
de
man
d.

14.3.2 Vertical A
pp
lications
Enterta
i
nment
Mobile users will be able to downloa
d

d
ifferent programs, products, or services to
t
heir devices
,
such as MP3 files
,
videos

,
o
r
games. They will also be able to pla
y

g
ames an
d

li
sten mus
i
c on
li
ne v
i
a mo
bil
e
d
ev
i
ces.
Financial A
pp
lications
Th
e


vo
l
u
m
e

o
f tran
s
a
c
ti
o
n
s
that
cus
t
o
m
e
r
s

co
n
duct
with their financial institutions,
t
a

s well as the im
p
ortance of these transactions, creates an im
p
ortant source of value.
Users will be able to pa
y
bills
a
nd transfer mone
y
from different accounts.
Enterpr
i
se Appl
i
cat
i
ons
T
h
rou
gh
t
h
e
i
r w
i
re

l
ess
d
ev
i
ces, emp
l
o
y
ees w
ill

b
e a
bl
e to f
ill
out forms, rea
d
an
d

d
own
l
oa
d
f
il
es

,
sen
d
an
d
rece
iv
e messa
g
es t
h
at are
i
mportant to t
h
e
i
r
b
us
i
ness.
T
hi
s w
ill

i
mprove pro
d

uct
i
v
i
t
y

by

d
ecreas
i
n
g
t
h
e amount of t
i
me t
h
at emp
l
o
y
ees
spend lookin
g
for different informati
o
n. For exam

p
le, workflow can now be
e
xtended to mobile devices, ensurin
g
not onl
y
that the ri
g
ht people are alwa
y
s
involved in the
p
r
o
cess but also that processes are not dela
y
ed due to an individual
being out of office.
14.3.3 Wireless E-Business A
pp
lication Architecture
A
t
y
p
i
ca
l

w
i
re
l
ess e-
b
us
i
ness s
y
stem
i
nc
l
u
d
es t
h
e components s
h
own
i
n F
ig
. 14.7:
W
ireless Handheld devices
Mobile devices are portable physical devices, which sense and collect information
a
nd transmit the data wirelessly, ranging from pagers to mobile phones, wireless

P
DAs, and wireless la
p
to
p
s. There are a
l
arge variety of ways through which
w
i
re
l
ess
h
an
dh
e
ld

d
ev
i
ces
,
w
hi
c
h
c
o

ver GSM
,
GPRS
,
CDMA
,
CDPD
,
W
i
F
i,

i
nfrare
d,
an
d
B
l
uetoot
h,
sen
d
an
d
rece
i
ve
i

nformat
i
on.
348
S
.
S
on
g
Fi
g
. 14.7
.
Wireless e-business s
y
stem components
C
onnect
i
v
i
t
y
and
C
overa
g
e
From the end user
p

oint of view, the mobile device is used to access a local cell
t
ower (or access point). The cell tower is responsible for sending the data to a base
stat
i
on. From t
h
e
b
ase stat
i
on po
i
nt of v
i
e
w
,
t
h
e
d
ata are
d
e
li
vere
d
to a mo
bil

e
sw
i
tc
hi
n
g
center t
h
at connects a
ll
t
h
e
b
ase stat
i
ons.
T
h
ere are two t
y
pes of
d
ata transm
i
ss
i
on: c
i

rcu
i
t sw
i
tc
h
e
d
an
d
pac
k
et sw
i
tc
h
e
d
.
C
ircuit-switched transmission entails a dedi
c
at
ed

c
ir
cu
it f
o

r
co
mm
u
ni
c
ati
o
n
be
t
wee
n
two

ded
i
c
at
ed

dev
i
ces.
It
s

du
rati
o

n i
s
th
e
l
e
ng
th of the entire communication. Packet
switching does not require a dedicated
l
ine between the sender and reci
p
ient. This
m
ethod enables the data to be divided in
t
o a number of
p
ackets and to be sent to
t
heir intended destination using different paths.
W
ireless Middleware
T
he main
g
oal for the wireless middleware is to help alleviate the problems
i
nherent to deliverin
g

content and appli
c
ations to mobile devices. As we know,
m
ost of toda
y
’s Internet applications and services are desi
g
ned for the desktop
c
lient like browser, email, etc. How to ex
p
an
d
the existing Internet a
pp
lications to
t
he wireless a
pp
lication and service
d
omain with minimum modifications on them
i
s the major challenge for the wireless
m
iddleware. For exam
p
le, wireless
middl

eware cou
ld

l
et you
li
n
k
Internet content an
d
app
li
cat
i
ons to t
h
e w
i
re
l
ess
We
b
w
i
t
h
out rewr
i
t

i
ng t
h
e app
li
cat
i
on
,
d
ata
b
ase
i
nterfaces
,
or HTML s
i
te.
U
sua
ll
y, t
h
e w
i
re
l
ess m
iddl

eware componen
t
s prov
id
e t
h
e fo
ll
ow
i
ng
b
enef
i
ts:

Multi
p
le mobile devices’ su
pp
or
t


No effort or minimum effort to rewrite the existin
g
applications

Wireless user and service authe
n

tication
,
and authorization

C
ont
i
nuous w
i
re
l
ess access to content an
d
app
li
cat
i
ons
14 Mo
bil
e Commerce an
d
W
i
re
l
ess e-Bus
i
ness App
li

cat
i
ons
349

Wireless
handheld
devices
Connectivity
and coverage
Application server
Wireless
device
management
User and
sevice
management
API
Transcoding
Data
system
Wireless
e-business
application

Mobile device mana
g
ement

L

ong-term cost savings
The wireless middleware eases many of the functions that can otherwise plague the
c
onversion of a corporate system to wireless. It can ease the process of transforming
m
ar
k
up
l
an
g
ua
g
es,
d
e
li
ver
i
n
g
content an
d

d
ata, prov
idi
n
g
p

r
o
t
ocol
an
d

device
reco
g
n
i
t
i
on,
i
ncorporat
i
n
g
an
d
proper
ly
ro
u
ti
n
g


b
us
i
ness
l
o
gi
c t
h
rou
gh
enterpr
i
se
s
y
stems, and transformin
g
data formats for compatibilit
y
with different databases. In
short, wireless middleware creates a common platform for the inte
g
ration of various
sources under diverse s
y
stems and displa
y
s.
T

he wireless middleware system often comprises the following common
m
odules: gateways, application process
i
ng engine, content handling module, user
a
nd service management, wireless device management, and interfaces to the back
-
e
n
d

l
e
g
ac
y
app
li
cat
i
on s
y
stem.
Gateways
Wireless e-business a
pp
lication is domina
t
e

d b
y
a variet
y
of non-IP networ
k

protocols, which are either proprietar
y
or specific to a particular industr
y
. As soon
a
s devices want to access the Internet or other com
p
uter networks a
p
rotocol
c
onversion is required. This task is done by a connectivity gateway. Gateways are
t
he point of entry i
n
t
o a server network. They isolate the individual communi
-
c
at
i
on c

h
anne
l
s an
d
t
h
e
i
r spec
i
f
i
c requ
i
r
e
ments from t
h
e rest of t
h
e
b
ac
k
-en
d
systems. Gateways,
lik
e a WAP Gateway or a Pa

l
m We
b
c
li
pp
i
ng Proxy Server,
c
onvert TCP
/
IP to protoco
l
s op
ti
m
i
ze
d
for w
i
re
l
ess
d
ata transm
i
ss
i
on.

Gatewa
y
s can either be hosted b
y
a service provider offerin
g
wireless access to
his customers or an enterprise environment providin
g
wireless access to the
e
nter
p
rise data t
o
his emplo
y
ees.
A
ppl
i
cat
i
on
S
erver
A
we
b
app

li
cat
i
on server
i
s t
h
e
b
ase component
i
n t
h
e e-
b
us
i
ness app
li
cat
i
on
e
nv
i
ronment. It
i
s t
h
e foun

d
at
i
on of a co
m
prehensive business sol
m
m
ut
i
on. Tec
h
n
i
ca
ll
y,
a
n app
li
cat
i
on server
i
s a
l
ways referre
d
to as a conta
i

ner. T
hi
s means t
h
at we
b
-
b
ase
d

a
pplications are deplo
y
ed, then reside and ru
n

i
n thi
s

co
ntain
e
r
.
In th
e

w

ir
e
l
ess
e
-business a
pp
lication environment, an a
pp
lication server must have more
f
unctionalities, for exam
p
le, an a
pp
lic
a
tion server might provide message queuing,
a
a
thus ensuring that data- and content-requested
transactions to and from wireless
d
devices are delivered only once. This is par
ticularly important in financial
r
r
t
ransactions, where a transfer re
q

uest should not be
p
erformed twice.
In a
ddi
t
i
on, an app
li
cat
i
on server m
i
gh
t part
i
c
i
pate
i
n t
h
e
i
nte
lli
gent
t
ransformat
i

on of We
b
-
b
ase
d
app
li
cat
i
on
i
nterfaces. As prev
i
ous
l
y exp
l
a
i
ne
d
,
intelli
g
ent transformation is more than a
p
rocess of sim
p
le data conversion. An

intelli
g
ent transformation s
y
stem


w
ir
e
l
ess
mi
dd
l
ew
ar
e

co
m
b
in
ed

w
ith an
app
lication server – “understands” content and so can break HTML into menus
a

nd submenus suitable to the handheld device.
3
50
S
.
S
on
g
Intelli
g
ent transformation limits the size of files delivered to mobile devices,
t
hus improving the transfer rate. This benefits users by sparing them content that is
both too expensive and too unwieldy to be accessed by a handheld device such as
v
ideo clips, large images, and large subsets of data.
Th
e w
i
re
l
ess app
li
cat
i
on server can use common
d
ev
i
ce c

h
aracter
i
st
i
cs to
di
sp
l
a
y

th
e
d
ata. Us
i
ng t
h
ese stan
d
ar
d
s
h
e
l
ps pro
d
uct

i
v
i
ty
i
n
d
eve
l
opment. User IDs an
d

h
an
dh
e
ld

d
ev
i
ce IDs are store
d

i
n t
h
e
d
ata

b
ase
a
t t
h
e app
li
cat
i
on server
l
eve
l
. Once
a

lo
g
in request is received, the ap
p
l
i
c
ati
o
n
se
r
ve
r a

ccesses
th
e

d
ata
b
a
se.
Th
e
m
iddleware database is used to prepare and format the data for the device requestin
g
the login. The application ser
ver will also compare the registered device ID to the
r
r
u
ser ID for additional security verification. The applicati
o
n server communicates
with the gateway server for t
h
e
s
p
ecific device that initiates the re
q
uest. The

gateway t
h
en pus
h
es t
h
e
i
nformat
i
on to t
h
e
h
an
dh
e
ld

d
ev
i
ce
b
ase
d
on t
h
e
c

onnect
i
v
i
ty p
l
atform
b
e
i
ng use
d

(
e.g.,
C
DPD, SMS, Mo
bi
tex, or CDMA
)
.
Th
e app
li
cat
i
on server must accommo
d
ate
di

fferent
h
an
dh
e
ld
p
l
atforms suc
h
as
t
hin-client devices (IP-based devices),
t
wo-wa
y
pa
g
in
g
, SMS messa
g
in
g
, an
d

smart
p
hones. It must then deliver d

a
ta formatted for that s
p
ecific device, end
-
t
o-end, in a reliable and secure manner.
C
ontent Handl
i
ng Module
B
esides trans
p
ort
p
rotocol conversion done
b
y the connectivity ga
t
eways, con
t
en
t

s
h
ou
ld
a

l
so
b
e a
dj
uste
d
for spec
i
f
i
c c
l
asses of
d
ev
i
ces. Tra
di
t
i
ona
ll
y, t
h
ere are two
ways for accomp
li
s
hi

ng t
hi
s tas
k
. One
i
s t
h
at t
h
e
b
ac
k
-en
d
app
li
cat
i
on
i
s respons
ibl
e
f
or
g
eneratin
g

the appropriate con
t
e
nt la
y
out and formats to adapt the various mobile
c
lients. The other is b
y
usin
g
transc
o
din
g
technolo
gy
in the middleware.
Transcodin
g
is one such kind of content adap
t
a
tion technolo
gy
,
w
hi
c
h tail

o
r
s

information for a specific device b
y

t
ransforming its format and representation.
T
he purpose of transcoding is obvious: When the content providers delive
r

c
ontent to various mobile clients, t
h
e
y need to accommodate device specific
c
onstra
i
nts suc
h
as
li
m
i
te
d


m
emory, s
l
ow
d
ata transm
i
ss
i
on, an
d
sma
ll
screens.
Transco
di
ng automat
i
ca
ll
y trans
l
ates content
i
nto
di
fferent representat
i
ons fo
r


e
ac
h
c
l
ass of rece
i
v
i
ng c
li
ent systems. T
hi
s s
i
mp
li
f
i
es aut
h
or
i
ng,
d
ep
l
oyment, an
d

m
aintenance dramaticall
y
. An arbitrar
y
multimedia web pa
g
e can be
p
rovided to
Internet TVs,
h
an
dh
e
ld
s, an
d
WAP p
h
ones w
i
t
h
out c
h
an
g
e. It
i

s even poss
ibl
e to
ad
apt content from
l
e
g
ac
y
s
y
stems
i
nto a stan
d
ar
di
ze
d
Internet re
p
resentat
i
on, or
t
ranscode Web pages to the proprietary format of a specific client device.
T
ranscoding is the process of formatting the content (data) according to the
handheld device request using XML, XSL stylesheets, and DTD files, as shown in

F
i
g. 14.8. T
hi
s met
h
o
d
ena
bl
es en
d
users to access
d
ata un
i
versa
ll
y regar
dl
ess of
th
e
d
ev
i
ce type.
14 Mobile Commerce and Wireless e-Business A
pp
lication

s
351

Once a request from a handheld device is initiated, the application server
intercepts the request to identify the device type and capture the content. Using
F
i
g
. 14.8
.
Transcodin
g
process
severa
l

l
og
i
ca
l
processes, t
h
e app
li
cat
i
on
s
erver eng

i
ne processes t
h
e
d
ata
i
nto an
XML document, which can be communicated to the back-end s
y
stem via the API
co
nn
ec
t
io
n
.
T
he
r
esul
t
i
s t
h
en transco
d
e
d


(
processe
d)
us
i
n
g
XSL st
yl
es
h
eets an
d

r
e
f
o
rmatt
ed
f
o
r t
he

h
an
dheld


device
t
h
at ma
de
t
he

i
n
i
t
i
a
l
r
e
q
uest. T
h
e a
ppli
cat
i
on
server engine selects the correct screen template, formats the data for the handheld
device, and delivers the data re
q
uested. XSL is used for data transformation
definitions, where the API will exchange m

e
s
sages between the back-end system
a
n
d
t
h
e app
li
cat
i
on server. XSL an
d
XSLT sty
l
es
h
eets are ma
i
n
l
y use
d
to manage
th
e presentat
i
on of t
h

e
d
ata,
wh
ereas XML
h
an
dl
es t
h
e
d
ata
i
tse
l
f.
User and
S
erv
i
ce Management
User mana
g
ement module provides the wirel
e
ss

e
-

bus
in
ess
a
d
mini
s
trat
o
r t
o
a
dd
a
new user or delete an existin
g
user. Service
m
ana
g
ement module is to help the
wireless service administrator to deplo
y
and mana
g
e the service with more ease. I
t

u
sua

ll
y prov
id
es too
l
s for t
h
e a
d
m
i
n
i
strator to
i
nst
all,
act
i
vate or
i
nact
i
vate
,
mon
i
tor
,
stop, an

d
un
i
nsta
ll
t
h
e w
i
re
l
ess e-
b
us
i
ness ap
p
li
cat
i
ons.
Wi
re
l
ess m
iddl
eware a
l
so
t

a
k
es care of t
h
e access contro
l
for
b
ot
h
t
h
e w
i
re
l
ess users an
d
w
i
re
l
ess serv
i
ces.
I
n t
he

wi

r
eless

e
-
busi
n
e
ss
d
ep
l
o
y
ment p
h
rase, t
h
e

wi
r
eless
m
iddlew
ar
e

could


h
e
l
p t
h
e a
d
m
i
n
i
strator to spec
i
f
y
t
h
e a
llo
we
d
user
g
roups correspon
d
to t
h
e
352
S

.
S
on
g
deplo
y
ed wireless e-business applications. In the runtime
p
hrase, the middleware
is responsible for mapping the wireless device ID to the user ID, then check out i
f

such a user is allowed to access the requested service. Only the authorize
d
wireless user’s re
q
uest could be
p
a
s
sed through to the back-end service. If the
b
ac
k
-en
d
serv
i
ce
i

n
i
t
i
ates t
h
e requ
e
st to pus
h
t
h
e
i
nformat
i
on to one w
i
re
l
ess user
,

th
e w
i
re
l
ess m
iddl

eware w
ill
c
h
ec
k

i
f t
h
e target rec
i
p
i
ent
b
e
l
ongs to t
hi
s serv
i
ce.
A
ny out-range rec
i
p
i
ent w
ill


b
e f
il
tere
d

b
y t
h
e m
iddl
eware to
h
e
l
p re
d
uce t
h
e
problems raised b
y
wireless content spam.
M
ob
i
le Dev
i
ce Management

With the growth of high-end wireless handheld device market and the realistic
nee
d
s for t
h
e w
i
re
l
ess e-
b
us
i
ness app
li
c
at
i
ons, t
h
e w
i
re
l
ess
d
ev
i
ce managemen
t


h
as
b
ecome one of ma
j
or concerns for
b
ot
h
serv
i
ce prov
id
ers an
d
enterpr
i
se IT
m
anagers. D
i
fferent from PC c
li
ents t
h
at are con
s
i
stent

l
y tet
h
ere
d
to a LAN an
d

p
rotected behind a firewall, wireless devices such as PDA and smart
p
hones are,
b
y
nature, far more difficult to mana
g
e
.
The followin
g
five aspects are important
f
or the wireless device mana
g
ement:

S
oftware deployment

A

sset and configuration management

F
ault management

D
ev
i
ce contro
l
an
d

d
ata secur
i
t
y

B
ac
k
-up an
d
restore
Push
i
n
g
and Pull

i
n
g
model
P
u
ll
tec
h
no
l
og
y
i
s w
h
en t
h
e
h
an
dhe
ld

d
ev
i
ce
i
n

i
t
i
ates t
h
e c
o
m
mun
i
cat
i
on us
i
ng
i
ts
gateway to request
d
ata. T
h
e
d
ata are t
h
en
pulled from the a
pplication server down
a
a

t
o t
h
e
h
an
dh
e
ld

d
ev
i
ce. T
h
e
d
om
i
nant para
di
gm of commun
i
cat
i
on on t
h
e Wor
ld


Wid
e
W
e
b
an
d

i
n most
di
str
ib
ut
e
d
s
y
stems
i
s t
hi
s request–rep
ly
mo
d
e
l
.
Push technology

is when the application server is in control over the handheld
y
d
ev
i
ce. T
h
e app
li
cat
i
on server ma
k
es
b
as
i
c content
d
ec
i
s
i
ons an
d
pus
h
es
d
ata to t

h
e
handheld device without waitin
g
for the client’s request. Push model is usuall
y

a
do
p
ted when the back-end a
pp
lications attem
p
t to overcome the deficiencies of
p
ull
m
odel b
y
allowin
g
the information producer to “
p
ush” the information to the user
without the user initiating the request first. A typical push application, for example,
c
ould be the news alert. After the news subscriber specifies the news category tha
t


interests him to the news service provider, the back-end agent would intelligentl
y

d
e
li
ver t
h
e correspon
di
n
g
news content v
i
a MMS to t
h
e w
i
re
l
ess en
d
users.
In e
i
t
h
er met
h
o

d
, aut
h
ent
i
cat
i
on must ta
k
e p
l
ace f
i
rst. Un
d
er t
h
e pu
ll
mo
d
e
l
, t
h
e
g
atewa
y
transfers t

h
e
h
an
dh
e
ld
’s request t
o
t
h
e app
li
cat
i
on server. T
h
e app
li
cat
i
on
server usuall
y
needs to map the device I
D
to the user ID. After confirmin
g
that the
wireless request user has the access ri

g
ht to the back-end application, the
app
lication server will translate the wireless device re
q
uest into the a
pp
lication-
specific request by complementing para
meters like user ID, user request data,
a
a
14 Mobile Commerce and Wireless e-Business A
pp
lications
353

device t
y
pe, etc. This information is then s
e
nt to the back-end application s
y
stem
u
sing the API between the applicatio
n
server and the back-end system. The
a
pplication server receives the reply information from the back-end system an

d
r
e
p
orts it to the handheld device. The reply data are formatted into screens
a
ppropr
i
ate to t
h
e
d
ev
i
ce t
h
at requeste
d
t
h
e
d
ata e
i
t
h
er v
i
a transco
di

ng mo
d
u
l
e or
b
y t
h
e
b
ac
k
-en
d
app
li
cat
i
on
i
tse
l
f. T
h
e pu
s
h
mo
d
e

l

i
s often use
d

i
n event-
b
ase
d

a
pp
li
cat
i
ons. W
h
en some spec
i
f
i
c even
h
appens, t
h
e

b

ac
k
-en
d
app
li
cat
i
on
i
n
i
t
i
ates
a

p
ush re
q
uest. The a
pp
lication
s
erver will check if this a
pp
lication has the
a
uthorization to
pu

s
h th
e

d
ata t
o
th
e

w
ir
e
l
ess

use
r
t
o avoid the
p
ush s
p
am. Then
t
he a
pp
lication server will hel
p


t
o deliver the
p
ush conten
t
t
o
th
e

w
ir
e
l
ess

use
r
v
ia
t
he gateway modules.
In general, the pull model is often a
pp
lied to the client–server/browser–serve
r

m
o
d

e
l
, w
hi
c
h
prov
id
es an arc
hi
tec
t
ural approach for organizing the software for
t
t
distributed platforms. The basic scheme is that
clients initiate the request to the
t
servers, then servers respond to the client request. It
is suitable for real time and
t
session-based a
pp
lications. The
p
ush model is often a
pp
lied to the event-based
m
odel. The architecture is more loose connected. The basic scheme is

p
eer-to-
p
ee
r

co
mm
u
ni
c
ati
o
n an
d

se
r
ve
r-t
o
-
c
li
e
nt
co
mm
u
ni

c
ati
o
n
.
Th
e

s
t
o
r
e
an
d
f
o
r
w
ar
d

functionality is also the basic function modul
e
in the model, which is used to
t
emporally store the data in case the pus
h

r

eci
p
ient does not retrieve the
p
ush data in
t
ime. There are several common channels availabl
e
for
p
ush model like SMS, MMS,
et
c.
Bot
h
pu
ll
mo
d
e
l
or pus
h
mo
d
e
l

h
ave t

h
e
i
r
b
enef
i
ts. In t
h
e pu
ll
mo
d
e
l
, t
h
e c
li
en
t

presentat
i
on capa
bili
ty
i
s
m

ore powerfu
l

i
n prov
idi
ng t
h
e comp
l
ex user
i
nterface
di
a
l
o
g
, w
hil
e t
h
e pus
h
mo
d
e
l
prov
id

es t
h
e f
l
e
x
ibl
e not
i
f
i
cat
i
on mec
h
an
i
sm
h
e
l
p
i
n
g
th
e
b
ac
k

-en
d
app
li
cat
i
on
i
n
i
t
i
ate t
h
e
i
nformat
i
on
d
e
li
ver
y
to
i
ts en
d
users. How to
c

om
bi
ne t
h
ese two mec
h
an
i
sms to
i
mprove user exper
i
ence
i
s one of t
h
e
i
nterest
i
n
g

r
esearch topics and challenges in the wireless e-business applications (Fig. 14.9).
14.4 Case Study
14.4.1 IBM
WCS
M-
C

ommerce
S
olut
i
on
IBM provides a wide range of e-commerce solutions for customer business needs.
W
i
t
hi
n t
h
e IBM We
b
Sp
h
ere
b
ran
d
, IBM
h
as ena
bl
e
d
an e-commerce pro
d
uct su
i

te
t
o support m-commerce: IBM We
b
Sp
h
ere Commerce Su
i
te
(
WCS
)
V5.1.
A
rchitecture Overview
This product suite is ver
y
versatile and can
b
e used for B2C, B2B, and auction
e
-commerce websites. WCS V5.1 provides a pure Java programming model that is
c
onducive to supporting mobile clients. Features have been added to WCS V5.1 to
provide integration an
d
su
pp
ort for mobile devices.
3

54
S
.
S
on
g
Fig. 14.9
.
Pull and
p
ush model
F
i
g
. 14.10. WebS
p
here commerce serve
r

WebSphere Application Server
Common
Server Run-
System
Management
Messaging
Catalog
Subsystem
Member
Subsystem
Negotiation

Subsystem
Order
Subsystem
Commerce
Suite
Store
Services
Administration
Console
14 Mo
bil
e Commerce an
d
W
i
re
le
s
s e-Bus
i
ness App
li
cat
i
ons 355
A
s shown in Fi
g
. 14.10 the WebSphere commerce server consists of the followin
g


functional com
p
onents:
Tools
:
Tools in WCS V5.1 consist of
p
ackages such as store services, loader package,
c
ommerce su
i
te acce
l
erator
,
an
d
t
h
e a
d
m
i
n
i
strat
i
on conso
l

e.
S
u
b
system
s
:
T
h
e arc
hi
tecture of WCS prov
id
es a num
b
er of su
b
systems t
h
at are
l
og
i
ca
l
g
roupin
g
s of product functionalit
y

. Th
e
se subs
y
stems contain support for online
product catalo
g
navi
g
ation, partitionin
g
, cate
g
orization, and product association.
C
ommon server runtime
:
The common server runtime leverages t
h
e runtime services provided by
WebS
p
here a
pp
lication server to su
pp
ort m-commerce a
pp
lications. For exam
p

le,
a
PvC a
d
apter
i
s use
d
to prov
id
e sess
i
on contro
l
an
d

d
ev
i
ce contro
l
fo
r

m
-commerce app
li
cat
i

ons.
S
ystem management
:
The s
y
stem mana
g
ement component handles s
y
stem reliabilit
y
, availabilit
y
, an
d
serviceabilit
y
. It provides a lo
gg
in
g
facilit
y
and a dia
g
nostic facilit
y
.
M

essa
g
in
g
service
s
:
T
he messaging services provide a means to send and receive messages betwee
n
WCS and other users and systems. The messaging services provide a common
m
essaging API for different notificatio
n
schemes such as broadcast email an
d

o
r
d
er not
i
f
i
cat
i
on t
h
roug
h


a
n SMTP server. It a
l
so prov
id
es async
h
ronous message
d
e
li
very t
h
roug
h
MQSer
i
es.
M
ob
i
le Auct
i
on
S
cenar
i
o
Here we use a mo

bil
e auct
i
on scenar
i
o to s
h
ow
h
ow to use WCS to
b
u
ild
up m
-
commerce app
li
cat
i
ons. As s
h
own
i
n F
i
g. 14.11, a user can rece
i
ve pr
i
ce

i
nformat
i
on
an
d
su
b
m
i
t
bid
s v
i
a SMS
b
y a ce
ll
u
l
a
r
p
h
one
i
n t
hi
s scenar
i

o. An SMS gateway an
d

S
MS a
d
aptor
i
s set up to prov
i
d
e an SMS c
h
anne
l
support for WCS.
In t
he
tra
di
t
io
na
l

web
-
b
a
sed


a
uct
i
on s
y
stem, users part
i
c
i
pate
i
n an auct
i
on
th
rou
gh
t
h
e we
b

b
rowser. T
h
e user can
g
et t
h

e
li
st of auct
i
on status,
bid
pr
i
ce, an
d

an
y
other related information on the auction web pa
g
es. The advanta
g
e of this
m
ode is that the user can
g
et rich informati
o
n throu
g
h the web b
r
owse
r
.

B
u
t th
e
r
e
a
re some
di
sa
d
vantages. F
i
rst, t
h
e user
h
as to s
i
t
i
n front of t
h
e P
C

i
f
h
e wants to

k
eep
i
n touc
h
w
i
t
h
t
h
e rea
l
-t
i
me auct
i
on
p
rocess. Secon
d
, auct
i
on
i
nformat
i
on
i
s

o
n
l
y
i
ssue
d

b
y respon
di
ng to t
h
e user req
u
est. If a query
i
s not sent, t
h
e user
l
oses
th
e trac
k
of auct
i
on process.
After
i

nte
g
rat
i
n
g
s
h
ort messa
gi
n
g
serv
i
ce
i
nto t
h
e au
c
t
i
on s
y
stem, t
h
e user w
ill

h

ave an a
l
ternat
i
ve wa
y
of carr
yi
n
g
out an auct
i
on.

A
user must reg
i
ster f
i
rst
b
efore
j
o
i
n
i
ng an auct
i
on. T

h
e user can
i
nput
hi
s s
h
or
t

m
essa
g
e-ena
bl
e
d
p
h
one num
b
er on t
h
e WCS user re
gi
strat
i
on we
b
pa

g
e. T
h
e use
r

d
oes not nee
d
to sta
y

i
n front of a PC. I
f
anot
h
er user su
b
m
i
ts a
high
er pr
i
ce to t
h
e
356
S

.
S
on
g
F
ig. 14.11. A mobile auction scenario
same
i
tem, a s
h
ort messa
g
e not
i
f
i
cat
i
on w
ill

b
e sent to a
ll
t
h
e users w
h
o
h

ave
bid

t
he item. The short messa
g
e notification carries the new bid price. The receive
r

c
an modif
y
the price and send it back to the WCS server if he wants to make
a
nother bid. After that, a server-side confirmation will be sent back to inform
w
h
et
h
er t
h
e new request
h
as
b
een successfu
ll
y su
b
m

i
tte
d
or
h
as fa
il
e
d
to
b
e
a
ccepte
d
.
14.4.2 Interact
i
ve MM
S

(i
MM
S)
-Based Mob
i
le Work
f
low
S

olut
i
on
Workflow is a means of automatically routing work based on business rules an
d

a
ssigning work based on a person’s position o
r

f
unctional role in an organization.
B
ecause wor
k
f
l
ow can
h
e
l
p
i
n faster wor
k
comp
l
et
i
on,

g
a
i
n
i
n
g
pro
d
uct
i
v
i
t
y
, an
d

i
mprov
i
n
g
t
h
e qua
li
t
y
of process man

a
g
ement, wor
k
f
l
ow
b
ecomes one of most
i
mportant app
li
cat
i
ons
i
n an
e
nterpr
i
se. For examp
l
e,
i
t
i
s w
id
e
ly

use
d

i
n off
i
ce
a
utomation s
y
stems.
C
urrentl
y
most workflow applications can onl
y
be accessed b
y
PC via browse
r

o
r other client. If a user is not usin
g

a
PC, he/she cannot use the s
y
stem via a
m

obile device. In order to deal with this
p
roblem, an iMMS-based mobile
workflow solution is being developed by
I
BM, which
p
rovides a mobile workflow
m
iddleware and software develo
p
ment ki
t
(SDK) to provide mobile supports by
i
ntegrat
i
ng w
i
t
h
ex
i
st
i
ng wor
k
f
l
ow app

l
i
cat
i
ons or
d
eve
l
op
i
ng new wor
k
f
l
ow
14 Mo
bil
e Commerce an
d
W
i
re
l
ess e-Bus
i
ness App
li
cat
i
ons

3
57
a
pplications. Customers can use mobile phones to access these enterprise s
y
stems,
which will fully improve
t
heir efficiency and effectiveness.
i
MMS is a new technology developed by IBM to extend the current MMS
standard to enhance its presentation capability and interactive capability, thus to
prov
id
e a
b
etter user exper
i
ence t
h
an MMS on t
h
e mo
bil
e p
h
one.
N
owa
d

ays, mo
bil
e app
li
cat
i
ons are ge
n
era
ll
y
i
mp
l
emente
d

i
n two ways:
m
essag
i
ng
lik
e SMS or MMS an
d
t
h
e
m

o
bil
e
b
rowser. Us
i
ng messag
i
ng as t
h
e
inf
o
rmati
o
n n
o
tifi
c
ati
o
n
c
hann
e
l i
s

su
ita

b
l
e for a
pp
lication-to-
p
erson scenarios
w
here when the s
p
ecific event ha
pp
ens,
t
he back-end application could
g
enerate
the information and alert the user via the messa
g
e. The messa
g
in
g
solution does
n
ot solve the issue well when a
p
erson
w
ants to initiate a re

q
u
e
st to the back-en
d

a
pplication since the current messaging system lacks the mechanism for user
-
a
pp
li
cat
i
on
i
nteract
i
on. Us
i
ng t
h
e
b
rowser tec
h
no
l
ogy, t
h

e user cou
ld
eas
il
y
i
nteract w
i
t
h
t
h
e
b
ac
k
-en
d
ap
p
li
cat
i
on
b
y means of t
h
e We
b/
WAP pages. But t

hi
s
a
pproac
h
requ
i
res t
h
at t
h
e networ
k

b
e a
l
w
a
ys connected when the
a
a
user per
f
orms
a
ctions on the pa
g
e. The mobile browser d
o

es
n
o
t ha
ve
th
e
n
o
tifi
c
ati
o
n m
ec
hani
sm

a
nd cannot o
p
erate in the
p
ush mode.
In
g
eneral, iMMS technolo
gy
inherits merits from both messa
g

in
g
and browser
technology to achieve the following unique features:
G
uarantee
d
message
d
elivery: Since the MMS center has the MMS store an
d

forward capability and g
u
a
rantees the message delivery, the back-end application
c
an
h
ave free
d
om from message
l
oss
i
nc
id
ence.
N
ot

i
f
i
cat
i
on – Pus
h
mo
d
e.
Interact
i
ve messag
i
ng capa
bili
t
i
es – Pu
ll
mo
d
e
Off
li
ne operat
i
on an
d
c

li
ent s
id
e mana
g
ement – Off
li
ne mo
d
e
Fig
. 14.12.
i
MM
S
wor
k
f
l
ow so
l
ut
i
on
A
s
ill
ustrate
d


i
n F
i
g. 14.12, t
h
ere are t
h
ree ma
i
n t
h
ree components
i
n t
h
e mo
bil
e
wo
rkfl
ow

so
l
u
ti
o
n
:


1.
iMMS client
.
Runtime container of iMMS messa
g
es on mobile device. Its
f
unctions include (1) iMMS messa
g
e’s presentation and mana
g
ement and
(2) local interaction support between mobile user and iMMS messages.
358
S
.
S
on
g
2
.
Work
f
low a
d
apto
r
. A plu
g
-in for workflow

e
n
g
ine. Its main functions
include (1) monitoring and deliverin
g
information of workflow active
-
t
ies to mobile workflow mid
d
l
eware and (2) controlling workflow
e
ngine and business processes according to the commands of mobile
wor
k
f
l
ow m
iddl
eware
;
3
.
M
obile workflow middleware
.
Br
id

ge of wor
k
f
l
ow app
li
cat
i
ons an
d

m
o
bil
e users. Its ma
i
n funct
i
on
s
i
nc
l
u
d
e
(
1
)
transco

d
i
ng wor
k
f
l
ow
a
ctivities into iMMS messa
g
es an
d

r
outin
g
to correspondin
g
mobile
u
sers and (2) unwrappin
g
incomin
g

i
MMS messa
g
es and controllin
g


workflow a
pp
lications (via workflow ada
p
tor) on behalf of mobile
users
.
When there is an urgent business mobile workflow task, an iMMS message is sent
t
o t
h
e
i
MM
S
c
li
ent of t
h
e
m
o
bil
e user. T
hi
s
i
MMS message
i

nc
l
u
d
es
b
ot
h
t
h
e tas
k

i
nformat
i
on an
d
t
h
e poss
ibl
e act
i
ons on t
h
at tas
k,
an
d

t
h
e
i
MMS c
li
ent a
ll
ows t
h
e
m
o
bil
e user to v
i
ew t
h
e wor
k
f
l
ow tas
k
co
n
t
ent on t
h
e mo

bil
e
d
ev
i
ces. T
h
e
i
MM
S
m
essa
g
e contains the control elements such as check box, form, button, etc. to
hel
p

p
eo
p
le to interact with the
b
ack-end application efficientl
y
. Therefore the
mob
il
e


so
l
u
ti
o
n all
ows
th
e
m
ob
ile user to accom
p
lish the workfl
ow
ta
s
k
s
in
o
fflin
e

m
odel. Mobile users can save the related wor
k
flow in processing data in thei
r


m
obile devices and retrieve them when needed. Once they submit the “sen
d
m
essage” request, all the work for data
t
ransmission is handled by the iMMS
cli
ent. Because t
h
e
i
MMS c
li
ent guarantees t
h
e
d
e
li
very of t
h
e
i
MMS message, t
h
e
u
ser
d

oes not nee
d
to worr
y
a
b
out t
h
e networ
k
connect
i
on status an
d
ot
h
er
i
ssues.
Th
e target users of t
h
e so
l
ut
i
on are enterpr
i
se mo
bil

e emp
l
oyees. T
hi
s so
l
ut
i
on
c
an
i
mprove enterpr
i
se pro
d
uct
i
v
i
t
y

by

e
na
bli
n
g

mo
bil
e users
to

h
an
dle
t
heir

wor
k
f
l
ow act
i
v
i
t
i
es eas
ily
an
d
re
li
a
bly
at an

y
t
i
me an
d
an
y
p
l
ace
by
us
i
n
g
mo
bil
e
p
h
ones on
ly
, even
i
n c
o
n
di
t
i

ons w
h
ere w
i
re
l
ess networ
k

p
erformance
i
s
p
oor.
14.5 Summary
This cha
p
ter
p
rovided an overview of m-commerce and wireless e-business
a
pplications, including w
i
r
eless networks, security issues s
u
ch as single sign-on
a
n

d
pr
i
vacy,
l
ocat
i
on-
b
ase
d
serv
i
ces, not
i
f
i
cat
i
on serv
i
ces, mo
bil
e payment, s
h
or
t

m
essage, mu

l
t
i
me
di
a messages, content
h
an
dli
ng, mo
bil
e user management,
mobile device management, and a variety of
architecture issues. In addition, we
f
provided a case stud
y
to present wireless applications such as interactive mobile
workflow mana
g
ement (iMMS) solution.
References
1
.
W
. Hu, C. Lee, and W. Kou, (2004), Advances in Security and Payment
M
ethods for Mobile Commerce
,
I

dea Group Publishing
14 Mo
bil
e Commerce an
d
W
i
re
l
ess e-Bus
i
ness App
li
cat
i
ons
3
5
9

2
.
W
AP Location Protocol,
g
/
3.
I
BM (2004), Pervasive computing and wireless technology, http://www.
i

bm.com/software/
p
ervasive
4.
N
ational Institute of Standards and Technology (2000),
D
igital Signature
Stan
d
ar
d
, FIPS Pu
bli
cat
i
on 186-2, Fe
b
ruary 2000. Ava
il
a
bl
e at
h
ttp:
//
cstc.
ni
st.gov
/

f
i
ps
360
S
.
S
on
g
Glossary
Appl
i
cat
i
on Pro
g
ramm
i
n
g
Inter
f
ace
(
API
)
A set of the specific methods, services, or instructions prescribed by a compute
r

p

rogram
b
y w
hi
c
h
a
p
rogrammer wr
i
t
i
ng an
a
pp
li
cat
i
on program can ma
k
e
re
uests of the computer program.
qq
Authenticatio
n
Providing assurance that the entity (user, host, and so forth) req
uesting access is
q
q

the entity that it claims to be.
C
DMA2000 1x
C
DM
A
2000 1x o
p
erates in various fre
uency bands of 450,
qq
8
00, 900, 1700, 1800,
1900, and 2100 MHz, and is f
u
ll
y
backward compatible with IS-95.
C
ert
ifi
cate
A
di
g
i
ta
l
cre
d

ent
i
a
l

i
n a pu
bli
c-
k
ey cryptograp
h
y system
,
w
hi
c
h
conta
i
ns t
h
e
cert
i
f
i
cate
h
o

ld
er
s name and public key, a serial


num
b
er, t
h
e exp
i
rat
i
on
d
ate of
the certificate, and the di
g
ital si
g
nature of t
h
e
certificate authorit
y
t
h
a
t i
ssued

th
e
ce
rtifi
c
at
e.

C
ert
ifi
cate Author
i
ty
(C
A
)
A truste
d
ent
i
ty t
h
at
i
s part of a pu
b
li
c
k

ey
i
nfrastructure
(
PKI
)
an
d
t
h
at creates,
i
ssues, an
d
manages cert
i
f
i
cates for PKI users.
C
ertificate Revocation List (CRL)
A list of certificates issued by a certification authority (CA) that are no longer
valid. The CRL is maintaine
d
and published by the CA.
C
ode D
i
v
i

s
i
on Mult
ip
le A
c
cess 2000
(C
DMA2000
)

C
DMA2000
i
s an evo
l
ut
i
on from I
S
-95 an
d

i
sa
bl
e to support
high
-rate
d

ata ove
r

t
h
e a
i
r
i
nterface. CDMA2000
i
s current
ly
un
de
r t
he

s
tan
d
ar
di
zat
io
n
o
f T
hi
r

d
-
Generat
i
on Partners
hi
p Pro
j
ect 2
(
3GP
P
2
)
an
d

i
s a fam
ily
of stan
d
ar
d
s.
C
ommon Adapter Framework
(C
AF
)

It prov
id
es a stan
d
ar
d
API to fetc
h

l
ocat
i
on
i
nformat
i
on of t
h
e target o
bj
ect
i
n
d
epen
d
ent of pos
i
t
i

on
i
n
g
mec
h
an
i
sms. It
d
ef
i
nes a common a
d
apter
i
nterface
i
nt
e
n
ded
t
o

shield
t
he

de

ta
ils

o
f
v
ar
iou
s pos
i
t
i
on
i
n
g
s
y
stems an
d
prov
id
es an
a
d
apter
i
mp
l
ement

i
n
g
t
hi
s
i
nterface for eac
h
un
d
er
lyi
n
g
pos
i
t
i
on
i
n
g
s
y
stem.
C
ontext Awareness
C
ontext awareness re

f
ers to t
h
e capa
bili
t
i
es of a computat
i
ona
l
system to
un
d
erstan
d
t
h
e s
i
tuat
i
on an
d
a
dj
ust
i
ts
b

e
h
av
i
or accor
di
ng
l
y.
36
2
Glossa
ry
sa
y
C
ookie
A file sent by a Web server to a
b
rowser and stored by the browser. The cookie
i
ncludes a destination address as a URL, possibly with wildcards. When the
browser sends any req
uest to a Web server correspo
q
q
n
ding to the destination
address, the browser attaches the cookie to the req
uest. Cookies are used to

q
q
id
ent
i
f
y
t
h
e consumer, espec
i
a
lly
for repeat access to t
h
e same s
i
te.
D
enial-of-Service Attack (DoS Attack)
In the running of a given proto
c
ol
,
some malicious clients initiate numerous
req
uests for the connections with se rver, which include numerous stateful
q
q
cookies”

““
for a server to maintain. As a result


,
the computation and storage of the
server are seriously taken up, the req
es
t fr
o
m
q
q
good”


clients may be refused, and
d


t
h
e server s
y
stem ma
y
even
b
rea
k


d
own.
D
est
i
nat
i
on-
S
equent
i
al D
i
stance
V
ector Rout
i
n
g
Al
g
or
i
thm
A table-driven al
g
o
rithm based on the Bellman


Ford routing mechanism.


D
i
g
ital Cash
An electronic form of cash in a cash-like e-pa
y
ment s
y
stem with which a person
can make online pa
y
ment for
g
oods or services purchased over the Internet.
Digi
tal
C
heck
An e
l
ectron
i
c form of a c
h
ec
k


i
n a c
h
ec
k
-
lik
e e-payment system w
h
ere t
h
e c
h
ec
k
can
b
e conveye
d
across computer networ
k
s.
D
igital Signature
A digital string produced by applying a cryptographic algorithm with the private-
key information on a message/docume
n
t to authenticate
t
he message/document.

Dy
nam
i
c
S
ource Rout
i
n
g
Al
g
or
i
thm
(
D
S
R
)
A
sou
r
ce
-initiat
ed

o
n
de
m

a
n
d-routin
g
protoco
l
-an alt
e
rnati
ve
t
o
ta
b
l
e
-
d
ri
ve
n
routin
g
al
g
orithms. DRS creates a route
o
nl
y
upon an explicit source-initiate

d
req
uest.
q
q
E
ll
i
pt
i
c
C
urve
C
r
y
pto
g
raph
y
Elli
pt
i
c curve cryptograp
h
y
i
s a
b
ranc

h

o
f pu
bli
c-
k
ey cryptog
r
a
p
h
y propose
d

by

Vi
ctor M
ill
er an
d
Nea
l
Ko
bli
tz
i
n t
h

e m
id
-1980s. It
i
s an a
l
ternat
i
ve met
h
o
d
to t
h
e
old
er RSA s
y
stem an
d
offers t
h
e re
l
at
i
v
e
a
d

vanta
g
e of
high
er performance
i
n
t
erms of spee
d
an
d
space usa
g
e. T
hi
s ma
k
es
i
t espec
i
a
lly
su
i
te
d
for
i

m
p
lementation on devices with limite
d
computation capability, storage area,
d
battery power, and communication bandwidth.
E
nhanced Messa
gi
n
g

S
erv
i
ce
(
EM
S)
It
i
s an app
li
cat
i
on-
l
eve
l

extens
i
on of
S
M
S
for
m
obil
e p
h
ones ava
il
a
bl
e on
GS
M
/G
PR
S
an
d

C
DMA networ
k
s. EM
S
n

o
w
a
ll
ows users to sen
d
text messa
g
es
Gl
ossar
y
363
containin
g
sounds, pictures, and anim
a
t
ions. EMS messa
g
es that are sent to
devices that do not su
pp
ort it will be displayed as SMS transmissions.
E
T
S
I
E
uropean Te

l
ecommun
i
cat
i
on Stan
d
ar
d
s Inst
i
tute
G
eneral Packet Rad
i
o
S
erv
i
ce
(G
PR
S)

GPRS is part of ETSI’
s GSM Phase 2


development to support packet switching
+

+
within GSM. It can be upgrade
d

f
rom GSM without extra infrastructure.
H
eterogeneity
A remar
k
a
bl
e tra
i
t of future comput
i
n
g
e
nv
i
ronments. T
h
e ran
g
e
of comput
i
n
g

d
ev
i
ces
i
s w
id
en
i
n
g
cont
i
nuous
ly
, an
d
t
h
e
y

d
ramat
i
ca
lly

di
ffer

i
n comput
i
n
g
capabilities, including storage, pr
o
c
essing power, screen size, networking, to name
a few. Such devices woul
d
seamlessly interact and coordinate to fulfill a user’
s



re
uirement. Heterogeneity in this sense is
q
q
a
d
ou
bl
e-e
d
ge
d
swor
d

. On t
h
e one
h
an
d
, spec
i
a
l
t
i
es of var
i
ous
d
ev
i
ces prov
id
e a
l
ternat
i
ves for
di
fferent use
r

pre

f
erences
on the other, the challenge to bridge those devices becomes
;
i
mperat
i
ve.
H
yperText Trans
f
er Protocol
(
HTTP
)
S
tandard transfer
p
rotocol used in the Internet, which defines how messa
g
es are
f
ormatte
d
an
d
transm
i
tte
d,

an
d
w
h
a
t act
i
ons
W
e
b
servers an
d

b
rowsers s
h
ou
ld
ta
k
e
i
n response to var
i
ous comman
d
s. For examp
l
e, w

h
en enter
i
ng a URL
i
n
a

b
rowser, one actua
ll
y sen
d
s an HTTP comman
d
to t
h
e
W
e
b
server an
d

i
nstructs
it

to fetch and transmit the req
uested Web document.

q
q
I
nternat
i
onal Mob
i
le
S
ubscr
i
ber Ident
i
ty
(
IM
S
I
)
In GSM, the user identit
y
is represented b
y
IMSI an
d
i
s

s
t

o
r
ed
in th
e

subsc
ri
ber

id
ent
i
ty mo
d
u
l
e
(
SIM
)
car
d
. T
h
e
id
ent
i
ty

o
f t
h
e MS
i
s represente
d

b
y t
h
e
i
nternat
i
ona
l
mo
bil
e stat
i
on e
uipment identity (IMEI). The IMEI is allocated by
qq
th
e e
uipment manufacturer and registered by
q
q
th

e networ
k
operator. SIM car
d
can
be
tran
s
f
e
rr
ed

be
t
wee
n m
obile

s
t
a
ti
ons, user serv
i
ce on
ly
re
l
ates to t

h
e SIM car
d

and is not dependent
on a particular MS.
t
I
nteractive MMS (iMMS)
i
MMS
i
s a new tec
h
no
l
ogy
d
eve
l
ope
d

b
y IBM to exten
d
t
h
e current MMS
stan

d
ar
d
to en
h
ance
i
ts presentat
i
on capa
bili
ty an
d

i
nteract
i
v
e
capa
bili
ty, an
d

th
ere
by
prov
id
e a

b
etter user exper
i
ence t
h
an MMS on t
h
e mo
bil
e p
h
one.
It
prov
id
es a mo
bil
e wor
k
f
l
ow m
iddl
eware an
d
software
d
eve
l
opment

ki
t
(
SDK
)
to
provide mobile supports by
integrating with existing
y
wor
k
f
l
ow app
li
cat
i
ons or
developin
g
new workflow applications.
I
nternet Protocol
S
ecur
i
t
y

(

IP
S
ec
)

A set of security functions and options available at the IP level.
36
4
Gloss a
r y
a
y
I
nternet Service Provider (ISP)
A company that provides users with access to the Internet. For a monthly fee, the
ISP provides users with a software package, user ID, password, and access phone
number. Some ISPs also
p
rovide users with a modem to enable users to access the
Int
e
rn
e
t
.

I
S-95
IS-95 was standardized b
y

W
he USA. IS-95 is also know
n
as CDMA One. IS-95
ha
s
t
wo

subs
tan
d
ar
ds
IS-95 A and IS-95 B. IS-95 A is a 2G technology and is
:
mainly designed for voice communication. IS-95 B can provide higher data rates
by simultaneously using multiple code channels for each use
r

ITU
Int
e
rnati
o
nal T
e
l
eco
m

m
unication Union
m
m
K
e
y

A small piece of data used in conjunction with an algorithm to encrypt or decrypt
(
a
)
messages
/d
ata of ar
bi
trary s
i
ze
(
see a
l
so PKI
)
, or
(b)
an attr
ib
ute w
h

ose va
l
ue
serves to identify a uniq
ue record in a database/table
q
q
(
e.g., emp
l
oyee ID num
b
e
r

may be the primary key used to locate and identify a specific employee’
s personal


data, such as name, address, telephone number, salar
y
).
Li
ghtwe
i
ght Mob
i
le
C
ode

S
ystem
(
LM
CS)

L
MCS handles strong mobility of mobile code and caters to various modes of
mo
bili
ty
L
ocation-Based Services (LBS)
A key value-added service for telecom op
e
r
ators to delive
r

p
ersonalized location
-
aware content to their subscribers using its wireless infrastructure.
L
ocat
i
on Operat
i
n
g

Re
f
erence Model
(
LORE
)
It
i
s
d
eve
l
ope
d
to capture t
h
e
l
ocat
i
on operat
i
on semant
i
cs from a
l
a
y
ere
d


p
erspect
i
ve, w
h
ere r
i
c
h
er
l
ocat
i
on operat
i
on semant
i
c
i
s mo
d
e
l
e
d
at a
high
er
l

a
y
er.
M
ed
i
a Access
C
ontrol
(
MA
C)

A
l
ayer t
h
at
i
s respons
ibl
e for t
h
e management of pac
k
et transm
i
ss
i
on.

M
essage Authentication Code (MAC)
A fixed-size binary code obtained by
applying a shared-key cryptographic
y
al
g
orithm to an arbitrar
y
amount of data
to

se
r
ve
a
s
an a
u
th
e
nti
c
at
o
r
o
f th
e


d
ata
.

Mi
cropa
y
ment
A payment of sma
ll
amounts, c
l
ose to or
b
e
l
ow t
h
e m
i
n
i
ma
l
cre
di
t car
d
fees
(

of
a
b
out 20 US cents
)
.
Gl
ossar
y
36
5
M
icropayment Syste
m
A system allowing merchants to charg
e
many payments of small amounts
(micropayments) from customers over open data networks such as the Internet by
using one or more payment service providers (PSPs).
M
ob
i
le
S
w
i
tch
i
n
g


C
ente
r
(
MSC)

MSC w
hi
c
h
mon
i
tors t
h
e s
ig
na
li
n
g

b
etween t
h
e mo
bil
e stat
i
on

(
MS
)
an
d
t
h
e core
networ
k
, an
d
performs sw
i
tc
hi
n
g

b
et
w
e
en t
h
e
b
ase transce
i
ver stat

i
on
(
BTS
)
an
d

core network. It is also res
p
onsible for
r
esource management for each BTS.
M
ult
i
med
i
a Messa
g
e
S
erv
i
ce
(
MM
S)
It extends the capability of
SMS to support more media

f
t
ypes suc
h
as
i
mages,
au
di
o c
li
ps, v
id
eo c
li
ps, an
d
more.
N
etB
i
ll
A pa
y
ment s
y
stem w
h
ere t
h

e
digi
ta
l
c
h
ec
k
i
s use
d
to se
ll
an
d

d
e
li
ver
l
ow-pr
i
ce
d

i
nformat
i
on

g
oo
d
s.
N
et
C
heque
Sy
stem
A
di
str
ib
ute
d
account
i
n
g
ser
v
ice supporting the credit–
debit model of payment.


N
onrepud
i
at

i
on
A proof that the consumer approved a particular action, usuall
y
a pa
y
ment.
Offline Pa
y
ments
Payments between the consumer and the merchant that do not req
uire
q
q
commun
i
cat
i
on w
i
t
h
ot
h
er part
i
es suc
h
as t
h

e PSP.
Order In
f
ormat
i
on
(
OI
)

I
nformat
i
on
i
nc
l
u
d
e
d

i
n a
S
ET transact
i
on to
d
escr

ib
e t
h
e transact
i
on.
P
a
y
ment Approva
l
A process where the customer a
g
rees to a particular pa
y
ment.
P
a
y
ment Author
i
zat
i
o
n
A process w
h
ere t
h
e PSP ta

k
es respons
ibili
ty for a payment,
i
n part
i
cu
l
ar
by
i
n
di
cat
i
n
g
t
h
at t
h
ere are fun
d
s to cover t
h
e pa
y
ment.
P

ayment Gateway (PG)
Entit
y
in a SET transaction t
h
a
t han
d
l
es

c
r
ed
it
c
ar
d

ve
rifi
c
ati
o
n an
d
a
u
th
o

rizati
o
n
of transactions.
P
a
y
ment Order (PO)
A messa
g
e indicatin
g
pa
y
ment to the merchant.
366
Gloss a
r y
a
y
Pa
y
ment Routin
g
Table (PRT
)
A messa
g
e sent b
y

a PSP to a merchant or another PSP, indicatin
g
the terms under
which the PSP sendin
g
the PRT is willin
g
to receive pa
y
ment orders issued b
y
other PSPs.
Pa
y
ment Service Provider (PSP)
An ent
i
t
y
t
h
at ma
i
nta
i
ns a
l
on
g
-term re

l
at
i
ons
hi
p w
i
t
h
customers an
d
merc
h
ants,
rece
i
v
i
n
g
pa
y
ments of a
gg
re
g
ate
d

(l

ar
g
e
)
amounts from customers, an
d
pass
i
n
g

a
gg
re
g
ated pa
y
ments to the merchants.
P
ena
l
t
y

P
a
y
ment
A payment
b

y a merc
h
ant w
h
o
h
as
h
a
d
too many
di
spu
t
es an
d/
or c
h
arge
b
ac
k
s.
Personal Identification Number (PIN)
A securit
y
method whereb
y
a
(

usuall
y
) four-di
g
it number is entered b
y
an
i
n
di
v
id
ua
l
to ga
i
n access to a part
i
cu
l
ar system or area.
Ph
y
sical/Ph
y
siolo
g
ical Biometric
A
bi

ometr
i
c t
h
at
i
s c
h
aracter
i
ze
d

by
a p
hy
s
i
ca
l
c
h
aracter
i
st
i
c rat
h
er t
h

an a
b
ehavioral trait
(
in contras
t
with behavioral biometric
)
.
Pr
i
vate Ke
y
In public-key crypto
g
raphy, this key is the secret key. It is primarily used fo
r

d
ecr
y
pt
i
on an
d
a
l
so use
d
for encr

y
pt
io
n
w
i
t
h

digi
ta
l
s
ig
natures.
Public Key
In public-ke
y
cr
y
pto
g
raph
y
, th
i
s ke
y
is made public to all. It is primaril
y

used fo
r

e
ncryption but can be u
s
ed for verifying signatures.
Public-Ke
y
Cr
y
pto
g
raph
y

C
r
y
pto
g
rap
hy

b
ase
d
on met
h
o

d
s
i
nvo
l
v
in
g
a pu
bli
c
k
e
y
an
d
a pr
i
vate
k
e
y
.
Publ
i
c-Ke
y
In
f
rastructure

(
PKI
)

Structure used to issue, manage, and allow verification of public-key certificates.
PKI is a security framework for messages and data, based on the notion of a pair
of cryptograp
hi
c
k
eys
(i
.e., one pu
bli
c
a
n
d
one pr
i
vate
)
an
d
use
d
to fac
ili
tate
s

ecur
i
ty,
i
ntegr
i
ty, an
d
pr
i
vacy.
Pull Technology
It is when the handheld device i
n
i
tiates the communication using its gateway to
req
uest data. The data are then pulled
q
q
f
r om the a
pp
lication server down to the
h
an
dh
e
ld


d
ev
i
ce. T
h
e
d
om
i
nant para
di
gm
o
f commun
i
cat
i
on on t
h
e
W
or
ld

Wid
e
Web and in most distributed systems is this req
est

q

q
reply model.
––
Gl
ossar
y
367
P
us
h

T
ec
h
no
l
ogy
It is when the a
pp
lication
se
r
ve
r i
s
in
co
ntr
o
l

ove
r
t
h
e
han
d
h
e
l
d

dev
i
ce.
Th
e

a
pp
lication server makes basic content decis
i
ons and
p
ushes data to the handheld
device without waiting for the client’
s

re



uest. The push model is usually adopted
qq
w
h
en t
h
e
b
ac
k
en
d
app
li
cat
i
ons
a
ttempt to overcome t
h
e
d
ef
i
c
i
enc
i
es of pu

ll
mo
d
e
l
by allowing the information producer to “
push”


their information to the user

w
i
t
h
out t
h
e use
r

initiate the req
uest first.
q
q
Q
ual
i
ty o
f


S
erv
i
ce
(Q
o
S)

Q
oS re
Q
Q
uirements are vastly different among all types of applications and should
qq
be considered in the GPRS network.
R
adio Frequenc
y
Identification (RFID)
Th
e use of ra
di
o waves to fac
ili
tate w
i
re
l
ess
(

contact
l
ess
)
commun
i
cat
i
on w
i
t
h
a
chi
p
or device.
R
esponse T
i
me
/
Process
i
n
g
T
i
me
Th
e t

i
me per
i
o
d
re
uired by a biometric system to return a decision on the
q
q
id
ent
i
f
i
cat
i
on or ver
i
f
i
cat
i
on of a
bi
ometr
i
c samp
l
e.
Secure Electronic Commerce

A form of commerce conducted via electronic means, but desi
g
ned with securit
y

i
n mind to enable i
d
e
ntification
,
authentication
,
authorization, or paymen
t

p
rocessing.
Secure Electronic Transaction (SET)
A protocol for secure pa
y
ment processin
g
ove
r
th
e
Int
e
rn

e
t in
w
hi
c
h
c
r
ed
it
c
ar
d

i
nformation (e.
g
., Visa, MasterCard) is not
r
ead or stored b
y
a merchant. The
p
rotocol links man
y
parties,
including the customer, merchant, acq
uirer, and
q
q

certification authorities. The
p
rotocol is designed to emulate card-presen
t

transactions.
Secure Electronic Transaction (SET) Protocol
SET is a protocol produced b
y
MasterCard and Visa. This
p
rotocol
p
rovides
i
dentit
y
authentication, confidentialit
y
, inte
g
ration, and nonre
p
udiation of the
tran
s
a
c
ti
o

n
d
ata
.
Secure Sockets La
y
er (SSL
)
A protoco
l
or
i
g
i
na
ll
y
i
ntro
d
uce
d

b
y Netscape to secure commun
i
cat
i
on
b

etwee
n
W
eb servers and Web clients, supported b
y
most Web browsers and servers, and
s
uperceded b
y
TLS.
S
em
i
O
ff
l
i
ne Payment
s
Payment protocol where most
transactions are offline (involving only
t
commun
i
cat
i
on
b
etween t
h

e consumer an
d
merc
h
ant, not w
i
t
h
t
h
e PSP
)
,
b
ut
s
omet
i
mes commun
i
cat
i
on w
i
t
h
t
h
e PSP
i

s necessary.
368
Gloss a
r y
a
y
S
hort Messa
g
e
S
erv
i
ces
(S
M
S)
It is a non-realtime delivery system. It
allows the exchange of the text messages
t
b
etween subscribers. The text can com
p
rise words, numbers, or al
p
hanumeric
co
m
b
inati

o
n
s.

Si
mple Ob
j
ect Access Protocol
(S
OAP
)

SOAP
i
s t
h
e ma
j
or approac
h
to access regu
l
ar We
b
serv
i
ces. In essence, SOAP
i
s
an XML message transm

i
ss
i
on approac
h
over HTTP. It
i
s assume
d
t
h
at HTTP
i
s
alwa
y
s available at the service client end and that XML messa
g
es can be
p
rocessed there when Web services are bein
g
consumed.
S
mart
C
ard
A p
l
ast

i
c car
d
w
i
t
h
an em
b
e
dd
e
d
c
hi
p to ena
bl
e payment process
i
ng or
di
g
i
ta
l
id
ent
i
f
i

cat
i
on. A typ
i
ca
l
smart car
d
c
hi
p
i
nc
l
u
d
es a m
i
croprocessor or CPU, ROM
(for storing operating instructions), RAM (f
or storing data during processing), and
f
f
E
PROM
(
or EEPROM
)
memor
y

for nonvo
l
at
il
e stora
g
e of
i
nformat
i
on.
S
o
f
t Hando
ff

Soft
h
an
d
off means a mo
bil
e stat
i
on
(
MS
)
can connect to more t

h
an one
b
ase
s
tat
i
on
(
BS
)

d
ur
i
ng t
h
e
h
an
d
off process, an
d
t
h
e M
S
can se
l
ect t

h
e
li
n
k
w
i
t
h
t
h
e
b
est connect
i
on
uality. Further, soft handoff allows an
q
q
M
S
to
h
ave cont
i
nuous
connect
i
on w
i

t
h
t
h
e B
S
so t
h
at t
h
e connect
i
on
i
s never
i
nterrupte
d
.
S
o
f
tware Agent
A computer program that acts autonomously on behalf of a person or an
organ
i
zat
i
on to accomp
li

s
h
a pre
d
ef
i
ne
d
tas
k
or a ser
i
es of tas
k
s.
Subscriber Identity Module (SIM)
SIM
i
n t
h
e GSM comp
rises the subscriber’
s authentication informat


i
on, e.
g
., t
h

e
secret keys, and a uniq
ue identifier called internationa
q
q
l m
ob
il
e

subs
c
riber identit
y
.
T
he SIM alwa
y
s takes the form of a
s
mart card with a limited abilit
y
of
computation and stora
g
e.
Third-Generation Partnership Pro
j
ect (3GPP)
A set of t

h
e spec
i
f
i
c met
h
o
d
s, serv
i
ces, or
i
nstruct
i
ons prescr
ib
e
d

by
a compute
r

p
ro
g
ram.
T
i

me D
i
v
i
s
i
on Mult
i
ple Access
(
TDMA
)
A
di
g
i
ta
l
s
i
gna
l
transm
i
ss
i
on tec
h
n
o

l
ogy, w
hi
c
h

i
s t
h
e f
o
u
n
d
at
i
on of t
h
e current D
-
AMP
S
an
d

GS
M. A TDMA frame
l
asts for 4
.

615 ms an
d

i
s
di
v
id
e
d

i
nto e
igh
t t
i
me
s
lots, corresponding to a slot time of 576.9
µ
s. The gross data rate of a frame is
2
71
kb
ps, or 33.9
kb
ps fo
r

a slot. This data rate is eq

uivalent to 156.25 bit periods
q
q
i
n a t
i
m
e

slo
t
.
T
he
r
e
ar
e
f
i
ve types of time slot burst:
normal, fre
t
:
uency correction,
q
q
sy
nc
h

ron
i
zat
i
on, access, an
d

d
umm
y
s
l
ot.

×