Figure: Service Architecture for mobile application platform
This architecture is designed for the mobile platform keeping the future version of mobile application software in mind. It has the necessary tools for Mobile-Wallet, Speech Synthesizer, and a common platform for Instant Messengers and E-Mails.
Features of the Architecture
The main features of this architecture are as follows:
1. 5-Layer architecture – The architecture has 5 main layers, namely, Messaging, Middleware, Core Services, Service Creation, and Security Log-In.
2. 3-Layer security systems – The architecture has 3 types of security systems, namely, Security Log-In, Core Service, and Middleware.
3. Common Instant Messengers and E-Mails – There is a common platform where logging in would require the further access to the individual messengers and e-mails.
4. Introduction to Mobile-Wallet – This architecture introduces the concept of electronic money and mobile-wallet.
5. Introduction to Speech Synthesizer – This architecture allows the speech recognition to open certain applications for further use.
The components of Messaging are:
1. SMS Centre – SMS Centre is a high-performance messaging node that provides mobile-originating and mobile-terminating message services.
2. MMS Centre – Similarly MMS Centre is the junction point for MMS origin and termination.
3. Multimedia Centre-In – In this point, all the network initiated session that comes in the mobile is taken care of.
4. Multimedia Centre-Out – At this junction, all the user initiated or created session is delivered to the network. The difference is done due to traffic congestion, given the fact that more user initiated videos are being created now-a-days and loaded into the network.
The components of Middleware are:
1. Synchronization Engine – The Synchronization Engine actually works at tandem with the messaging centre, and the core services of the mobile application.
2. Multimedia Platform – This middleware node creates voice and video data interchangeable formats.
3. Security Systems Management – This is an inbuilt security system that checks the user’s or network’s operable application’s validity, including filtering.
About Core Services
The components of Core Services are:
1. Content – It supports various content types to deliver value added services supporting all consumer points including SMS, MMS, WAP, Web, and Multimedia which includes Voice and Video.
2. Analytics – This Engine analyzes the data used by the user as well as the data (all types), uploaded in the network, for a better decision making of targeted CRM.
3. Gateways – This includes social, Speech, Instant Messaging, E-Mail, and finance gateways, that carry out validation and allow operation of various advanced Services.
About Service Creation
The components of the Service Creation are:
1. WAP – WAP enables a mobile storefront to be created which can be accessed through both low and high-end devices.
2. Web – The Web allows the internet, intranet, and access to many content-rich portals.
3. CRM Control – This in conjunction with content and analytics provides a feedback mechanism for the data uploaded or downloaded from the network.
4. Multimedia – This allows the voice and video access and creation or change from the mobile.
5. IMs and E-Mails – All the messengers and e-mails are accessed at this node.
6. Speech Synthesizer – All the creation of speech synthesizer, change, maintain or deletion of speech used for instant translation in a different language, or in the form of text is done here.
7. Mobile Wallet – All the transactions of e-money is done at this front here.
About Security Log-In
The components are used for the first level of application security. They are:
1. Common Platform for IMs and E-mails – With this, the common access grants the next level of access to individual IMs and E-Mails.
2. Speech Recognizer – This node opens the application for speech after recognizing the speech.
3. Bio-metric Software – The finger prints open the application for the Mobile-Wallet. Hence, even if the mobile gets detached, the e-money cannot be accessed.
Taking advantage of the data interchanged, third parties can build custom applications, tools, and services to suit their needs, allowing hot plug-in and plug-out of certain services.
Some of the part of the architecture is referenced from http://www.imimobile.com.