Solved

WAP Push

Posted on 2007-11-26
3
745 Views
Last Modified: 2010-08-05
Hi Experts,

I've currently developed a new e-commerce solution for mobile entertainment, which will feature mobile games. All game related information such as game name, images, jad/jar locations, price, customer purchase orders, etc are all stored on a SQL 2005 Enterprise Server. The site is developed using ASP.NET 2. Basically everything is complete, and I have left to do is push out a link via sms, which features the link to the jar file as well as the customer order number.

What I'd like to know is how can a I create a WAP Push message , which only features the link to the game jar/jad as well as the customer purchase order. Once the game has been downloaded the WAP push message, which was sent can no longer be used as the purchase order is no longer valid for game downloads indicating that the game is downloaded. The results are then sent back to the SQL Server. The link must contain both the jar or jad link + the purchase order information, which automatically downloads the game validating the purchase order.
0
Comment
Question by:maykut
3 Comments
 
LVL 2

Accepted Solution

by:
tshsc earned 125 total points
Comment Utility
When sending a WAP push link, the formatting must be in binary. Only certain carriers support binary SMS, mainly Cingular, Tmobile, and smaller companies.
 When sending to other companies (other than verizon) simply sending the URL in plaintext usually allows the handset to access the content.
 You will have trouble sending your game to verizon, because their standard for content delivery is MMS,  and they do not allow other content delivery formats.
 It really should be as simple as sending the URL as the text, and ensuring the message format is set to binary.

You may also want to look into port directed SMS if you're trying to activate a java application on the handset, but it sounds like you might not need it at this point.
0
 
LVL 1

Expert Comment

by:Computer101
Comment Utility
Forced accept.

Computer101
Community Support Moderator
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Wifi Dropping 6 45
Issues with PAT on wireless router 9 49
dynamic VLAN not working with RADIUS 3 47
How to Stream Drone FPV video 6 80
Multi-source agreements are important because they set standards that all manufacturers should follow to ensure that devices are compatible with multiple vendors. The multi-source agreement (MSA) is an agreement that establishes how multiple vendors…
This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now