摘要:
Construction of virtual environment, isolate the end user to interact directly with the core data sources, deploy the network listener engine in a virtual environment, using listening and interception technology, a variety of fine-grained authorization aggregates attribute information data to achieve the control of the end user to access core data sources. The present invention implements centralized control of remote maintenance authority, to Encapsulated client application packaged in a virtualized environment, control user access to core data sources, cut off end-users access to core data sources directly. Unify the interface of the maintenance path by virtual environment, standardized login path of maintenance personnel and maintenance tools.
摘要:
Using the way of destruct, the complex system is split into several different qualitative elements (the definition of indicator, the definition of database, the definition of scheduling, the definition of check way, etc.). Each element has its special concept. Combing different elements organically, a completely certain meaning indicator-checked incident is produced, and it is possible to finish the expected indicator-checked task flexibly. In the case of the check fails, due to the pre-warning it is possible to perform the manual intervention in time.
摘要:
Method of traffic control for cross-carrier SMS application, the major feature is to set different RAM realization strategies and achieve traffic control over the operational process of SMS by setting different limits for different carriers including the overall limit, total traffic limit and individual user's traffic limit; 1) Different carriers adopt different overall limits: traffic limit is set for different carriers in RAM, based on differences of the receiving number's properties. 2) Overall Traffic Limit: It is achieved by setting a simple overall traffic limit. When the time limit is reached for sending the message, all sending modules will temporarily suspend the sending procedure for a certain time until the defined time. 3) The strategy of using RAM to restrict individual user's network traffic: RAM can be achieved through HASH MAP. 4) The implementation of RAM strategy: using RAM in accordance with different traffic control requirements. 5) In order to achieve “time-out processing”, the system also add the “time-out sub thread”. Through this thread, the message will be transferred to the “time-out processing module” automatically in the case of timeout.
摘要:
SOAP client protocol encapsulation Based on TCP , based on the short TCP connection, SOAP client protocol encapsulation method, the client package for SOAP protocol, that is Web Services Description Language WSDL file into xml file, put to the client application's configuration file which, variable part of the SOAP protocol allows all the code from the configuration file object after conversion, and then generated after the body of SOAP protocol: 1) client load WSDL converted xml file; 2) the client application to read out the configuration file, the xml with the application to transfer data into a SOAP message body; 3) in the generated SOAP message body together with SOAP message header, turned into a complete SOAP request; 4) We will be based on TCP short connection to the complete SOAP request sent to the web services server, then receive and process about the content of web services to return, to complete a full SOAP interface calls; All the web Services client: a client using the same source, and adopt a unified approach to a request to the web service server.
摘要:
Construction of virtual environment, isolate the end user to interact directly with the core data sources, deploy the network listener engine in a virtual environment, using listening and interception technology, a variety of fine-grained authorization aggregates attribute information data to achieve the control of the end user to access core data sources. The present invention implements centralized control of remote maintenance authority, to Encapsulated client application packaged in a virtualized environment, control user access to core data sources, cut off end-users access to core data sources directly. Unify the interface of the maintenance path by virtual environment, standardized login path of maintenance personnel and maintenance tools.