Patents Assigned to Linkage Technology Group Co., Ltd.
  • Patent number: 8516103
    Abstract: Construction of virtual environment, isolate the end user to interact directly with the core data sources, deploy the network listener engine in a virtual environment, using listening and interception technology, a variety of fine-grained authorization aggregates attribute information data to achieve the control of the end user to access core data sources. The present invention implements centralized control of remote maintenance authority, to Encapsulated client application packaged in a virtualized environment, control user access to core data sources, cut off end-users access to core data sources directly. Unify the interface of the maintenance path by virtual environment, standardized login path of maintenance personnel and maintenance tools.
    Type: Grant
    Filed: May 16, 2011
    Date of Patent: August 20, 2013
    Assignee: Linkage Technology Group Co., Ltd.
    Inventors: Xiaojun Wang, Wei Jiang, Dong Wu, Libin Sun, Haidong Pang, Zhiqiang Lu
  • Patent number: 8335758
    Abstract: The data ETL (Extraction-Transformation-Loading) dispatching method of the present invention is applied to a real-time data ETL system, wherein a main ETL dispatching engine executes tasks according to preset sequence. In the execution, some key information are memorized by the main ETL dispatching engine, such as lscycle (latest successful data cycle), curcycle (current processing data cycle), and endcycle (processing end data cycle), etc., and are transferred to called programs. After the execution of the called programs, the main ETL dispatching engine records and keeps the updated dispatching information. In the data re-extraction, the data ETL dispatching method is adopted for the automatic re-extraction of some tasks and some cycles therein.
    Type: Grant
    Filed: December 22, 2009
    Date of Patent: December 18, 2012
    Assignee: Linkage Technology Group Co., Ltd.
    Inventors: Wei Chang, Zhigang Yu, Shuquan Liu, Guoxiang Liu, Pengcheng Shen, Qing Lan, Guozhen Bian, Feng Zhang
  • Publication number: 20110289418
    Abstract: Construction of virtual environment, isolate the end user to interact directly with the core data sources, deploy the network listener engine in a virtual environment, using listening and interception technology, a variety of fine-grained authorization aggregates attribute information data to achieve the control of the end user to access core data sources. The present invention implements centralized control of remote maintenance authority, to Encapsulated client application packaged in a virtualized environment, control user access to core data sources, cut off end-users access to core data sources directly. Unify the interface of the maintenance path by virtual environment, standardized login path of maintenance personnel and maintenance tools.
    Type: Application
    Filed: May 16, 2011
    Publication date: November 24, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: XIAOJUN WANG, WEI JIANG, DONG WU, LIBIN SUN, HAIDONG PANG, ZHIQIANG LU
  • Publication number: 20110251931
    Abstract: This article is about the accurate method of account checking in the situation of 7×24 hours transactions between telecom multiple systems. The systems we discussed here provide services individually. There is an Account Checking Controlling Server, and all the systems are connected with the Account Checking Controlling Server, the transaction between systems is distributed by Account Checking Controlling Server. Account Checking Controlling Server is in charge of control and manage the transaction of account checking between systems, it is consists of transaction management module, account checking cycle management module, transaction flow module and account checking management module. Transaction management module is in charge of storage and handle the system information and the system distribute rules. Account checking cycle management module is responsible for create and manage the account checking cycle. Transaction flow module realize the specific transaction.
    Type: Application
    Filed: January 28, 2011
    Publication date: October 13, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: MAOCHUN LI, QIAN LI, ZHONG LIN, QINGTONG XUE, ZHIGANG YU, PENG CUI, XIAOYING HUANG, JIANBAO LI
  • Publication number: 20110238851
    Abstract: SOAP client protocol encapsulation Based on TCP , based on the short TCP connection, SOAP client protocol encapsulation method, the client package for SOAP protocol, that is Web Services Description Language WSDL file into xml file, put to the client application's configuration file which, variable part of the SOAP protocol allows all the code from the configuration file object after conversion, and then generated after the body of SOAP protocol: 1) client load WSDL converted xml file; 2) the client application to read out the configuration file, the xml with the application to transfer data into a SOAP message body; 3) in the generated SOAP message body together with SOAP message header, turned into a complete SOAP request; 4) We will be based on TCP short connection to the complete SOAP request sent to the web services server, then receive and process about the content of web services to return, to complete a full SOAP interface calls; All the web Services client: a client using the same source, and adopt a
    Type: Application
    Filed: March 26, 2011
    Publication date: September 29, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: CHUNFEI ZHANG, Haihua Song, Bendong Wei, Fuhai Gao, Libin Sun, Haidong Pang, Zhiqiang Lu
  • Publication number: 20110137983
    Abstract: The innovation provided an approach to the great volume of data based dynamic policy model, which consists of the steps as the following: 1) User registration in the Differentiation Access & Application Control System (DACS); 2) After user log in Radius system, the user profile is delivered to DACS system where user profile can be recorded; 3) After logging in DACS system, user has option to subscribe the policy for the bandwidth, and the DACS system record the subscribed policy information; 4) User requests to use the subscribed policy via the interface provided by DACS system; 5) After receiving policy requests from user, the DACS system creates a thread which dispatches the policy ordered by subscriber. After finishing above, the result will be returned to subscriber.
    Type: Application
    Filed: December 7, 2010
    Publication date: June 9, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: ZHIGANG XU, SONG LIU, ZUNPING ZHANG, ZHEN YANG, HUAIZHUANG XU, XIWEI HUANG, ZHIQIANG LU, JIANGUO REN
  • Publication number: 20110137958
    Abstract: Implementation method of DATACOM Data command platform, taking the characteristic of data business into account, DATACOM system working on the data command platform, which is both data processor and data general converter, completes both command protocol conversion and command contents conversion, after the conversion of the opening command of data business from BOSS to the opening command of network element (NE) data, business opening, including single business and a batch of business, NE scheduling and load balancing are all achievable. Meanwhile, troubles are compatible; comprising following steps: 1) Data Source Configuration; 2) Configuration of Data Source Differences; 3) Data Command Configuration; 4) NE Data Configuration; 5) Configuration of Generating Data Command; this method stores the command in a configuration table, splitting the command content into records of the table.
    Type: Application
    Filed: December 7, 2010
    Publication date: June 9, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: GUOMIN HANG, Shan Chen, Bin Liang, Hua Li, Libin Sun, Fan Zhang
  • Publication number: 20110137939
    Abstract: Using the way of destruct, the complex system is split into several different qualitative elements (the definition of indicator, the definition of database, the definition of scheduling, the definition of check way, etc.). Each element has its special concept. Combing different elements organically, a completely certain meaning indicator-checked incident is produced, and it is possible to finish the expected indicator-checked task flexibly. In the case of the check fails, due to the pre-warning it is possible to perform the manual intervention in time.
    Type: Application
    Filed: December 7, 2010
    Publication date: June 9, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: YIMIN ZHAO, JIE LI, XIAOHUA CHAO, XIAOJUN SHEN, XUEZHI ZHANG, HAIDONG PANG
  • Publication number: 20110137764
    Abstract: This invention proposes a method of applying multi-threaded framework on online charging network service. Web service process launches listening socket in the service end to wait for connection in the customer end. When the listening socket intercepts connections in the new customer end, the web service process in the service end derives a positive thread, which reads positive data out of the socket and a negative thread, which sends the data to the socket. This invention can ensure that both the positive and negative data in the network interface at any time will be treated on time to fully reduce data transmission delay in the network interface.
    Type: Application
    Filed: December 7, 2010
    Publication date: June 9, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: FENGPING WANG, ZHIQIANG SHAN, BIN LIANG, HUA LI, YOUGEN ZHANG, YAN XIA, JUNHUI SIMA
  • Publication number: 20110113014
    Abstract: A methodology of applying storage and logistics center model to achieve business data exchange between systems, is based on the storage logistics center model, establishes data storage management center, which receives and saves the data in each business system and sends data extraction request to the corresponding data; Conducts a detailed checking and verification action in the sending and receiving process of aforementioned data storage management center. Comparing with the existing technology and according to the empirical test, the data delivery stem that is based on fragmented data transportation of the logistics center model (the most typical system in the concurrent technology) shows that: performance is increased by 10%, resource consumption is reduced by 30%, system failure rate has dropped 20%, and each process can be controlled.
    Type: Application
    Filed: November 9, 2010
    Publication date: May 12, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: JIUSONG SHAO, ZHENHUA JI, CHENGGONG GU, LIBIN SUN, CHUNLEI GAO, YUANYUAN DAI, ZHIPENG YUE, LIANG DING, HAITAO SHI
  • Publication number: 20110113131
    Abstract: The invention provides a method of loading balance that is based on BS structure, it includes the following steps: using a 4-layers switch to distribute the application request for the proxy server; using the so-called proxy server to distribute application request for application server; and establishing the corresponding WEBLOGIC clusters in accordance with each application request. This invention provides method of loading balance that is based on BS structure that is rationally configure the connection between 4-layers switch and the proxy layer of proxy server; at the same time, maintains the loading balance of the application server and eliminates the single-spot fault by utilizing the advantages of the WEBLOGIC clusters server communication and the back-up synchronization of the users' calling back.
    Type: Application
    Filed: November 9, 2010
    Publication date: May 12, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: YIJING DUANMU, GANG LI, GUOXIANG LIU, YOUGENG ZHANG, BIN LIANG, HUA LI
  • Publication number: 20110086649
    Abstract: Method of traffic control for cross-carrier SMS application, the major feature is to set different RAM realization strategies and achieve traffic control over the operational process of SMS by setting different limits for different carriers including the overall limit, total traffic limit and individual user's traffic limit; 1) Different carriers adopt different overall limits: traffic limit is set for different carriers in RAM, based on differences of the receiving number's properties. 2) Overall Traffic Limit: It is achieved by setting a simple overall traffic limit. When the time limit is reached for sending the message, all sending modules will temporarily suspend the sending procedure for a certain time until the defined time. 3) The strategy of using RAM to restrict individual user's network traffic: RAM can be achieved through HASH MAP. 4) The implementation of RAM strategy: using RAM in accordance with different traffic control requirements.
    Type: Application
    Filed: October 11, 2010
    Publication date: April 14, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: FENG XU, ZHUGUO ZHANG, ZHIGANG XU, HAIDONG PANG, ZHIQIANG LU, JIANGUO REN, WEI WANG
  • Publication number: 20110085649
    Abstract: Fluctuation monitoring method based on the mid-layer data comprising a monitoring component of the customized instance, mid-layer telephone traffic statistics, a component of self learning telephone traffic and a drawing component of multidimensional traffic monitor. 1) Modeling of telephone traffic status is based on social science empirical model, and uses telephone traffic per day as an analysis granularity, which is composed of three dimensions—time, region and business. 2) the mid-layer of the telephone traffic statistics is calculated based on a monitoring target in regular time. 3) the self learning component of telephone traffic studies and forecasts based on monitoring data. 4) the drawing component of multidimensional traffic monitor will extract data from in the mid-layer of traffic data statistics.
    Type: Application
    Filed: October 11, 2010
    Publication date: April 14, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: JIUSONG SHAO, ZHENHUA JI, LIBIN SUN, JIANQIANG DENG, JINGLEI LANG, DAWEI SHI, YUFENG ZHAO, ZHE HUANG, SHUNCHENG XU
  • Publication number: 20110087714
    Abstract: Based on the ORACLE's umbel data import and export method, 1) data was imported, a main process would pack the external data into a memory array and then reading the external data into a RAM; packed exchange interface of the OCI data will be resolved by the RAM array, and import the array to a global temporary table; dispersion of data and multidimensional statistical data totally depend on the reference of API which provides better freedom and flexibility; 2) export an internal data package: the umbel import and export API is based on the global temporary table's umbel import API (the interface of application) and the multi-dimensional memory chip's umbel export API.
    Type: Application
    Filed: October 11, 2010
    Publication date: April 14, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: YI HE, RUHUA LU, JIANQIANG DENG, JINSONG WANG, ZHIGANG YU, JIUSONG SHAO
  • Publication number: 20100179954
    Abstract: For the massive data of physical memory on the computer system, data indexing can be created base on the two-dimensional hash indexing algorithm, using specific mapping relationship conversion between the index keyword and index sequence address under hash algorithm, which realize the fast addressing while introducing two-dimensional hash list to solve the ‘confliction’ problem of mapping relations in hash queue, which caused by the same keyword index or hash algorithm.
    Type: Application
    Filed: December 22, 2009
    Publication date: July 15, 2010
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: MIN CHEN, LIBIN SUN, BIN LIANG, GUOXIANG LIU, JIARONG ZHANG
  • Publication number: 20100180088
    Abstract: As for the memory dispatching method applied to real-time data ETL system, the main ETL dispatching program executes one task according to preset sequence. In the execution, some key information are memorized by dispatching engine, such as lscycle (latest successful data cycle), curcycle (current processing data cycle), and endcycle (processing end data cycle), etc., are transferred to the called program. After the execution of the called program, the dispatching engine records and keeps the updated dispatching information; in the data re-extraction, memory dispatching method is adopted for the automatic re-extraction of some tasks and some cycles therein.
    Type: Application
    Filed: December 22, 2009
    Publication date: July 15, 2010
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: WEI CHANG, ZHIGANG YU, SHUQUAN LIU, GUOXIANG LIU, PENGCHENG SHEN, QING LAN, GUOZHEN BIAN, FENG ZHANG
  • Publication number: 20100179957
    Abstract: The polling method of switch status based on Timer-triggered Scheduler of Stored Procedures is to create interface tables related with switch status in the database including switch object table, switch type table, alarms information table which are used to store meta-information and switch status values. Then, create stored procedure of acquiring relevant switch status for each kind of switch needed for polling of switch status, and data will be filtered out and switch status will be judged via the related stored procedures, and write the status values into relevant switch status interface table; finally create regularly-executed tasks to regularly schedule each stored procedure required to poll switch status. The whole process is composed of three parts: i.e., create relevant switch status interface table; create stored procedure of acquiring switch status and setting status value; regularly-executed tasks.
    Type: Application
    Filed: December 22, 2009
    Publication date: July 15, 2010
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: JUNHUA ZHOU, HAIHUA SONG, LIBIN SUN, XIWEI HUANG, GUOXIANG LIU
  • Publication number: 20100179967
    Abstract: As for the data transfer method based on MAP, adopts a MAP data structure during the data transferring process and configures it using SOID (Standard of Interface Department) syntax after encapsulation; the definition of MAP data structure; one system consists of many matching and individual source ends and target ends, one source end just accesses to its matching target end, and vice versa, all member methods of source and target end adopt MAP structure to transfer data, logic implementation steps are shown as below: data processing of database is the most basic and most featured part of BRS system which adopts SOID syntax, if a table is not simply imported into another Oracle database, it should be treated by another process, that is, generate a derived class directly, and then rewrite “Key process”; data transfer method based on MAP bring excellent compatibility. It nearly supports all kinds of existing platforms, protocols, businesses and manufacturers.
    Type: Application
    Filed: December 22, 2009
    Publication date: July 15, 2010
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: CHUNFEI ZHANG, HAIHUA SONG, LIBIN SUN, ZHIQIANG LU, BENDONG WEI, FUHAI GAO