Method for accessing control that based on virtual computing
    1.
    发明授权
    Method for accessing control that based on virtual computing 有权
    用于访问基于虚拟计算的控制的方法

    公开(公告)号:US08516103B2

    公开(公告)日:2013-08-20

    申请号:US13108877

    申请日:2011-05-16

    CPC分类号: H04W12/08 H04W4/00

    摘要: Construction of virtual environment, isolate the end user to interact directly with the core data sources, deploy the network listener engine in a virtual environment, using listening and interception technology, a variety of fine-grained authorization aggregates attribute information data to achieve the control of the end user to access core data sources. The present invention implements centralized control of remote maintenance authority, to Encapsulated client application packaged in a virtualized environment, control user access to core data sources, cut off end-users access to core data sources directly. Unify the interface of the maintenance path by virtual environment, standardized login path of maintenance personnel and maintenance tools.

    摘要翻译: 构建虚拟环境,隔离最终用户直接与核心数据源进行交互,在虚拟环境中部署网络侦听器引擎,使用侦听和拦截技术,各种细粒度授权聚合属性信息数据实现控制 最终用户访问核心数据源。 本发明实现对远程维护机构的集中控制,封装在虚拟环境中的封装客户端应用程序,控制用户对核心数据源的访问,直接切断终端用户对核心数据源的访问。 通过虚拟环境统一维护路径的界面,维护人员的标准化登录路径和维护工具。

    Data Supervision Based on the Configuration Rule of All Operational Indicators
    2.
    发明申请
    Data Supervision Based on the Configuration Rule of All Operational Indicators 审中-公开
    基于所有操作指标的配置规则进行数据监控

    公开(公告)号:US20110137939A1

    公开(公告)日:2011-06-09

    申请号:US12962550

    申请日:2010-12-07

    IPC分类号: G06F17/30

    CPC分类号: G06F16/215

    摘要: Using the way of destruct, the complex system is split into several different qualitative elements (the definition of indicator, the definition of database, the definition of scheduling, the definition of check way, etc.). Each element has its special concept. Combing different elements organically, a completely certain meaning indicator-checked incident is produced, and it is possible to finish the expected indicator-checked task flexibly. In the case of the check fails, due to the pre-warning it is possible to perform the manual intervention in time.

    摘要翻译: 使用破坏的方式,将复杂系统分为几个不同的定性要素(指标的定义,数据库的定义,调度的定义,检查方式的定义等)。 每个元素都有其特殊的概念。 有机梳理不同的元素,产生一个完全一定的意义的指标检查事件,可以灵活地完成预期的指标检查任务。 在检查失败的情况下,由于预警,可以及时进行手动干预。

    Methodology for Traffic Control Based on Cross-Carriers Short Message (SMS) Application
    3.
    发明申请
    Methodology for Traffic Control Based on Cross-Carriers Short Message (SMS) Application 审中-公开
    基于交叉运营商短消息(SMS)应用的交通控制方法

    公开(公告)号:US20110086649A1

    公开(公告)日:2011-04-14

    申请号:US12901750

    申请日:2010-10-11

    IPC分类号: H04W4/12

    CPC分类号: H04W4/14 H04W28/02

    摘要: Method of traffic control for cross-carrier SMS application, the major feature is to set different RAM realization strategies and achieve traffic control over the operational process of SMS by setting different limits for different carriers including the overall limit, total traffic limit and individual user's traffic limit; 1) Different carriers adopt different overall limits: traffic limit is set for different carriers in RAM, based on differences of the receiving number's properties. 2) Overall Traffic Limit: It is achieved by setting a simple overall traffic limit. When the time limit is reached for sending the message, all sending modules will temporarily suspend the sending procedure for a certain time until the defined time. 3) The strategy of using RAM to restrict individual user's network traffic: RAM can be achieved through HASH MAP. 4) The implementation of RAM strategy: using RAM in accordance with different traffic control requirements. 5) In order to achieve “time-out processing”, the system also add the “time-out sub thread”. Through this thread, the message will be transferred to the “time-out processing module” automatically in the case of timeout.

    摘要翻译: 交叉运营商SMS应用的流量控制方法主要是设置不同的RAM实现策略,通过为不同的运营商设置不同的限制,实现对SMS的运行流程的流量控制,包括总体限制,总流量限制和个人用户流量 限制; 1)不同的运营商采用不同的总体限制:根据接收号码属性的差异,为不同的运营商设置流量限制。 2)总体流量限制:通过设置简单的总体流量限制来实现。 当发送消息的时间限制时,所有发送模块将暂停发送过程一段时间直到定义的时间。 3)使用RAM限制个人用户网络流量的策略:可以通过HASH MAP实现RAM。 4)实施RAM策略:根据不同的流量控制要求使用RAM。 5)为了实现“超时处理”,系统还添加了“超时子线程”。 通过此线程,在超时的情况下,消息将自动传输到“超时处理模块”。

    Soap Client Protocol Encapsulation Based on TCP
    4.
    发明申请
    Soap Client Protocol Encapsulation Based on TCP 审中-公开
    基于TCP的肥皂客户端协议封装

    公开(公告)号:US20110238851A1

    公开(公告)日:2011-09-29

    申请号:US13072698

    申请日:2011-03-26

    IPC分类号: G06F15/16

    CPC分类号: G06F9/547 H04L67/02

    摘要: SOAP client protocol encapsulation Based on TCP , based on the short TCP connection, SOAP client protocol encapsulation method, the client package for SOAP protocol, that is Web Services Description Language WSDL file into xml file, put to the client application's configuration file which, variable part of the SOAP protocol allows all the code from the configuration file object after conversion, and then generated after the body of SOAP protocol: 1) client load WSDL converted xml file; 2) the client application to read out the configuration file, the xml with the application to transfer data into a SOAP message body; 3) in the generated SOAP message body together with SOAP message header, turned into a complete SOAP request; 4) We will be based on TCP short connection to the complete SOAP request sent to the web services server, then receive and process about the content of web services to return, to complete a full SOAP interface calls; All the web Services client: a client using the same source, and adopt a unified approach to a request to the web service server.

    摘要翻译: SOAP客户端协议封装基于TCP,基于短TCP连接,SOAP客户端协议封装方法,客户端软件包为SOAP协议,即Web服务描述语言WSDL文件转换为xml文件,放到客户端应用程序的配置文件中,变量 SOAP协议的一部分允许来自配置文件对象的所有代码转换后,然后在SOAP协议体之后生成:1)客户端加载WSDL转换的xml文件; 2)客户端应用程序读出配置文件,xml与应用程序将数据传输到SOAP消息体; 3)在生成的SOAP消息体中连同SOAP消息头,变成一个完整的SOAP请求; 4)我们将基于TCP短连接到完整的SOAP请求发送到Web服务服务器,然后接收和处理关于Web服务内容的返回,完成一个完整的SOAP接口调用; 所有Web服务客户端:使用相同源的客户端,并对Web服务服务器的请求采用统一的方法。

    Method for Accessing Control That Based on Virtual Computing
    5.
    发明申请
    Method for Accessing Control That Based on Virtual Computing 有权
    基于虚拟计算的访问控制方法

    公开(公告)号:US20110289418A1

    公开(公告)日:2011-11-24

    申请号:US13108877

    申请日:2011-05-16

    IPC分类号: G06F3/01 G06F15/173

    CPC分类号: H04W12/08 H04W4/00

    摘要: Construction of virtual environment, isolate the end user to interact directly with the core data sources, deploy the network listener engine in a virtual environment, using listening and interception technology, a variety of fine-grained authorization aggregates attribute information data to achieve the control of the end user to access core data sources. The present invention implements centralized control of remote maintenance authority, to Encapsulated client application packaged in a virtualized environment, control user access to core data sources, cut off end-users access to core data sources directly. Unify the interface of the maintenance path by virtual environment, standardized login path of maintenance personnel and maintenance tools.

    摘要翻译: 构建虚拟环境,隔离最终用户直接与核心数据源进行交互,在虚拟环境中部署网络侦听器引擎,使用侦听和拦截技术,各种细粒度授权聚合属性信息数据实现控制 最终用户访问核心数据源。 本发明实现对远程维护机构的集中控制,封装在虚拟环境中的封装客户端应用程序,控制用户对核心数据源的访问,直接切断终端用户对核心数据源的访问。 通过虚拟环境统一维护路径的界面,维护人员的标准化登录路径和维护工具。