LINKAGE TECHNOLOGY GROUP CO., LTD. Patent applications |
Patent application number | Title | Published |
20110289418 | Method for Accessing Control That Based on Virtual Computing - Construction of virtual environment, isolate the end user to interact directly with the core data sources, deploy the network listener engine in a virtual environment, using listening and interception technology, a variety of fine-grained authorization aggregates attribute information data to achieve the control of the end user to access core data sources. The present invention implements centralized control of remote maintenance authority, to Encapsulated client application packaged in a virtualized environment, control user access to core data sources, cut off end-users access to core data sources directly. Unify the interface of the maintenance path by virtual environment, standardized login path of maintenance personnel and maintenance tools. | 11-24-2011 |
20110251931 | Accurate Method of Account Checking in the Situation of 7*24 Hours Transactions Between Telecom Multiple Systems - This article is about the accurate method of account checking in the situation of 7×24 hours transactions between telecom multiple systems. The systems we discussed here provide services individually. There is an Account Checking Controlling Server, and all the systems are connected with the Account Checking Controlling Server, the transaction between systems is distributed by Account Checking Controlling Server. Account Checking Controlling Server is in charge of control and manage the transaction of account checking between systems, it is consists of transaction management module, account checking cycle management module, transaction flow module and account checking management module. Transaction management module is in charge of storage and handle the system information and the system distribute rules. Account checking cycle management module is responsible for create and manage the account checking cycle. Transaction flow module realize the specific transaction. Account checking management module is responsible for account checking. This invention realize account checking accurately, it can do account checking timely, accurately, and don't affect the systems 7*24 hours running, when account checking cycle ended, account checking is automatically invoked, so we can find problems as soon as possible. | 10-13-2011 |
20110238851 | Soap Client Protocol Encapsulation Based on TCP - SOAP client protocol encapsulation Based on TCP , based on the short TCP connection, SOAP client protocol encapsulation method, the client package for SOAP protocol, that is Web Services Description Language WSDL file into xml file, put to the client application's configuration file which, variable part of the SOAP protocol allows all the code from the configuration file object after conversion, and then generated after the body of SOAP protocol: 1) client load WSDL converted xml file; 2) the client application to read out the configuration file, the xml with the application to transfer data into a SOAP message body; 3) in the generated SOAP message body together with SOAP message header, turned into a complete SOAP request; 4) We will be based on TCP short connection to the complete SOAP request sent to the web services server, then receive and process about the content of web services to return, to complete a full SOAP interface calls; All the web Services client: a client using the same source, and adopt a unified approach to a request to the web service server. | 09-29-2011 |
20110137983 | Realization to the Great Volume of Data Based Dynamic Policy - The innovation provided an approach to the great volume of data based dynamic policy model, which consists of the steps as the following: 1) User registration in the Differentiation Access & Application Control System (DACS); 2) After user log in Radius system, the user profile is delivered to DACS system where user profile can be recorded; 3) After logging in DACS system, user has option to subscribe the policy for the bandwidth, and the DACS system record the subscribed policy information; 4) User requests to use the subscribed policy via the interface provided by DACS system; 5) After receiving policy requests from user, the DACS system creates a thread which dispatches the policy ordered by subscriber. After finishing above, the result will be returned to subscriber. The innovation supports dynamic policy dispatch in real-time manner for the large number of subscribers, specified bandwidth and QoS according to the service, thus the change from bandwidth control to the dynamic policy model for the service control is realized. | 06-09-2011 |
20110137958 | Implementation Method of DATACOM Data Command Platform - Implementation method of DATACOM Data command platform, taking the characteristic of data business into account, DATACOM system working on the data command platform, which is both data processor and data general converter, completes both command protocol conversion and command contents conversion, after the conversion of the opening command of data business from BOSS to the opening command of network element (NE) data, business opening, including single business and a batch of business, NE scheduling and load balancing are all achievable. Meanwhile, troubles are compatible; comprising following steps: 1) Data Source Configuration; 2) Configuration of Data Source Differences; 3) Data Command Configuration; 4) NE Data Configuration; 5) Configuration of Generating Data Command; this method stores the command in a configuration table, splitting the command content into records of the table. The relation between the records forms a tree structure, which can present either XML format or fixed length string, the program generates the command content in accordance with this structure. | 06-09-2011 |
20110137939 | Data Supervision Based on the Configuration Rule of All Operational Indicators - Using the way of destruct, the complex system is split into several different qualitative elements (the definition of indicator, the definition of database, the definition of scheduling, the definition of check way, etc.). Each element has its special concept. Combing different elements organically, a completely certain meaning indicator-checked incident is produced, and it is possible to finish the expected indicator-checked task flexibly. In the case of the check fails, due to the pre-warning it is possible to perform the manual intervention in time. | 06-09-2011 |
20110137764 | Method of Applying Multi-Threaded Framework on Online Charging Network Service - This invention proposes a method of applying multi-threaded framework on online charging network service. Web service process launches listening socket in the service end to wait for connection in the customer end. When the listening socket intercepts connections in the new customer end, the web service process in the service end derives a positive thread, which reads positive data out of the socket and a negative thread, which sends the data to the socket. This invention can ensure that both the positive and negative data in the network interface at any time will be treated on time to fully reduce data transmission delay in the network interface. | 06-09-2011 |
20110113131 | Method of Load Balance Based on BS Architecture - The invention provides a method of loading balance that is based on BS structure, it includes the following steps: using a 4-layers switch to distribute the application request for the proxy server; using the so-called proxy server to distribute application request for application server; and establishing the corresponding WEBLOGIC clusters in accordance with each application request. This invention provides method of loading balance that is based on BS structure that is rationally configure the connection between 4-layers switch and the proxy layer of proxy server; at the same time, maintains the loading balance of the application server and eliminates the single-spot fault by utilizing the advantages of the WEBLOGIC clusters server communication and the back-up synchronization of the users' calling back. | 05-12-2011 |
20110113014 | Methodology of Applying Storage and Logistics Center Model to Achieve Business Data Exchange between Systems - A methodology of applying storage and logistics center model to achieve business data exchange between systems, is based on the storage logistics center model, establishes data storage management center, which receives and saves the data in each business system and sends data extraction request to the corresponding data; Conducts a detailed checking and verification action in the sending and receiving process of aforementioned data storage management center. Comparing with the existing technology and according to the empirical test, the data delivery stem that is based on fragmented data transportation of the logistics center model (the most typical system in the concurrent technology) shows that: performance is increased by 10%, resource consumption is reduced by 30%, system failure rate has dropped 20%, and each process can be controlled. | 05-12-2011 |
20110087714 | Methodology Based on Oracle's Umbel Data Import and Export - Based on the ORACLE's umbel data import and export method, | 04-14-2011 |
20110086649 | Methodology for Traffic Control Based on Cross-Carriers Short Message (SMS) Application - Method of traffic control for cross-carrier SMS application, the major feature is to set different RAM realization strategies and achieve traffic control over the operational process of SMS by setting different limits for different carriers including the overall limit, total traffic limit and individual user's traffic limit; 1) Different carriers adopt different overall limits: traffic limit is set for different carriers in RAM, based on differences of the receiving number's properties. 2) Overall Traffic Limit: It is achieved by setting a simple overall traffic limit. When the time limit is reached for sending the message, all sending modules will temporarily suspend the sending procedure for a certain time until the defined time. 3) The strategy of using RAM to restrict individual user's network traffic: RAM can be achieved through HASH MAP. 4) The implementation of RAM strategy: using RAM in accordance with different traffic control requirements. 5) In order to achieve “time-out processing”, the system also add the “time-out sub thread”. Through this thread, the message will be transferred to the “time-out processing module” automatically in the case of timeout. | 04-14-2011 |
20110085649 | Fluctuation Monitoring Method that Based on the Mid-Layer Data - Fluctuation monitoring method based on the mid-layer data comprising a monitoring component of the customized instance, mid-layer telephone traffic statistics, a component of self learning telephone traffic and a drawing component of multidimensional traffic monitor. 1) Modeling of telephone traffic status is based on social science empirical model, and uses telephone traffic per day as an analysis granularity, which is composed of three dimensions—time, region and business. 2) the mid-layer of the telephone traffic statistics is calculated based on a monitoring target in regular time. 3) the self learning component of telephone traffic studies and forecasts based on monitoring data. 4) the drawing component of multidimensional traffic monitor will extract data from in the mid-layer of traffic data statistics. | 04-14-2011 |
20100180088 | Memory Dispatching Method Applied to Real-time Data ETL System - As for the memory dispatching method applied to real-time data ETL system, the main ETL dispatching program executes one task according to preset sequence. In the execution, some key information are memorized by dispatching engine, such as lscycle (latest successful data cycle), curcycle (current processing data cycle), and endcycle (processing end data cycle), etc., are transferred to the called program. After the execution of the called program, the dispatching engine records and keeps the updated dispatching information; in the data re-extraction, memory dispatching method is adopted for the automatic re-extraction of some tasks and some cycles therein. Memory dispatching method (state-based dispatching method) solves the defect in stateless of traditional ETL dispatching program, simplifies the tasks of the called program, makes the called program focus on its own business logic through the memory state, wins plentiful development time for the real-time data ETL field, and greatly enhances the efficiency of project implementation. | 07-15-2010 |
20100179967 | MAP-Queue-Based Data Transfer Method - As for the data transfer method based on MAP, adopts a MAP data structure during the data transferring process and configures it using SOID (Standard of Interface Department) syntax after encapsulation; the definition of MAP data structure; one system consists of many matching and individual source ends and target ends, one source end just accesses to its matching target end, and vice versa, all member methods of source and target end adopt MAP structure to transfer data, logic implementation steps are shown as below: data processing of database is the most basic and most featured part of BRS system which adopts SOID syntax, if a table is not simply imported into another Oracle database, it should be treated by another process, that is, generate a derived class directly, and then rewrite “Key process”; data transfer method based on MAP bring excellent compatibility. It nearly supports all kinds of existing platforms, protocols, businesses and manufacturers. | 07-15-2010 |
20100179957 | Polling Method of Switch Status Based on Timer-triggered Scheduler of Stored Procedures - The polling method of switch status based on Timer-triggered Scheduler of Stored Procedures is to create interface tables related with switch status in the database including switch object table, switch type table, alarms information table which are used to store meta-information and switch status values. Then, create stored procedure of acquiring relevant switch status for each kind of switch needed for polling of switch status, and data will be filtered out and switch status will be judged via the related stored procedures, and write the status values into relevant switch status interface table; finally create regularly-executed tasks to regularly schedule each stored procedure required to poll switch status. The whole process is composed of three parts: i.e., create relevant switch status interface table; create stored procedure of acquiring switch status and setting status value; regularly-executed tasks. | 07-15-2010 |
20100179954 | Quick Mass Data Manipulation Method Based on Two-Dimension Hash - For the massive data of physical memory on the computer system, data indexing can be created base on the two-dimensional hash indexing algorithm, using specific mapping relationship conversion between the index keyword and index sequence address under hash algorithm, which realize the fast addressing while introducing two-dimensional hash list to solve the ‘confliction’ problem of mapping relations in hash queue, which caused by the same keyword index or hash algorithm. | 07-15-2010 |