Patents by Inventor HAIDONG PANG

HAIDONG PANG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8516103
    Abstract: Construction of virtual environment, isolate the end user to interact directly with the core data sources, deploy the network listener engine in a virtual environment, using listening and interception technology, a variety of fine-grained authorization aggregates attribute information data to achieve the control of the end user to access core data sources. The present invention implements centralized control of remote maintenance authority, to Encapsulated client application packaged in a virtualized environment, control user access to core data sources, cut off end-users access to core data sources directly. Unify the interface of the maintenance path by virtual environment, standardized login path of maintenance personnel and maintenance tools.
    Type: Grant
    Filed: May 16, 2011
    Date of Patent: August 20, 2013
    Assignee: Linkage Technology Group Co., Ltd.
    Inventors: Xiaojun Wang, Wei Jiang, Dong Wu, Libin Sun, Haidong Pang, Zhiqiang Lu
  • Publication number: 20110289418
    Abstract: Construction of virtual environment, isolate the end user to interact directly with the core data sources, deploy the network listener engine in a virtual environment, using listening and interception technology, a variety of fine-grained authorization aggregates attribute information data to achieve the control of the end user to access core data sources. The present invention implements centralized control of remote maintenance authority, to Encapsulated client application packaged in a virtualized environment, control user access to core data sources, cut off end-users access to core data sources directly. Unify the interface of the maintenance path by virtual environment, standardized login path of maintenance personnel and maintenance tools.
    Type: Application
    Filed: May 16, 2011
    Publication date: November 24, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: XIAOJUN WANG, WEI JIANG, DONG WU, LIBIN SUN, HAIDONG PANG, ZHIQIANG LU
  • Publication number: 20110238851
    Abstract: SOAP client protocol encapsulation Based on TCP , based on the short TCP connection, SOAP client protocol encapsulation method, the client package for SOAP protocol, that is Web Services Description Language WSDL file into xml file, put to the client application's configuration file which, variable part of the SOAP protocol allows all the code from the configuration file object after conversion, and then generated after the body of SOAP protocol: 1) client load WSDL converted xml file; 2) the client application to read out the configuration file, the xml with the application to transfer data into a SOAP message body; 3) in the generated SOAP message body together with SOAP message header, turned into a complete SOAP request; 4) We will be based on TCP short connection to the complete SOAP request sent to the web services server, then receive and process about the content of web services to return, to complete a full SOAP interface calls; All the web Services client: a client using the same source, and adopt a
    Type: Application
    Filed: March 26, 2011
    Publication date: September 29, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: CHUNFEI ZHANG, Haihua Song, Bendong Wei, Fuhai Gao, Libin Sun, Haidong Pang, Zhiqiang Lu
  • Publication number: 20110137939
    Abstract: Using the way of destruct, the complex system is split into several different qualitative elements (the definition of indicator, the definition of database, the definition of scheduling, the definition of check way, etc.). Each element has its special concept. Combing different elements organically, a completely certain meaning indicator-checked incident is produced, and it is possible to finish the expected indicator-checked task flexibly. In the case of the check fails, due to the pre-warning it is possible to perform the manual intervention in time.
    Type: Application
    Filed: December 7, 2010
    Publication date: June 9, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: YIMIN ZHAO, JIE LI, XIAOHUA CHAO, XIAOJUN SHEN, XUEZHI ZHANG, HAIDONG PANG
  • Publication number: 20110086649
    Abstract: Method of traffic control for cross-carrier SMS application, the major feature is to set different RAM realization strategies and achieve traffic control over the operational process of SMS by setting different limits for different carriers including the overall limit, total traffic limit and individual user's traffic limit; 1) Different carriers adopt different overall limits: traffic limit is set for different carriers in RAM, based on differences of the receiving number's properties. 2) Overall Traffic Limit: It is achieved by setting a simple overall traffic limit. When the time limit is reached for sending the message, all sending modules will temporarily suspend the sending procedure for a certain time until the defined time. 3) The strategy of using RAM to restrict individual user's network traffic: RAM can be achieved through HASH MAP. 4) The implementation of RAM strategy: using RAM in accordance with different traffic control requirements.
    Type: Application
    Filed: October 11, 2010
    Publication date: April 14, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: FENG XU, ZHUGUO ZHANG, ZHIGANG XU, HAIDONG PANG, ZHIQIANG LU, JIANGUO REN, WEI WANG