CN101141295A - Strategy management method - Google Patents
Strategy management method Download PDFInfo
- Publication number
- CN101141295A CN101141295A CNA200710112404XA CN200710112404A CN101141295A CN 101141295 A CN101141295 A CN 101141295A CN A200710112404X A CNA200710112404X A CN A200710112404XA CN 200710112404 A CN200710112404 A CN 200710112404A CN 101141295 A CN101141295 A CN 101141295A
- Authority
- CN
- China
- Prior art keywords
- policy
- strategy
- user
- management system
- management method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The utility model discloses a strategy management method, which is used for the processing strategy in the network communication management system. The method includes following steps: step S102 defines a plurality of basic strategies, so as to respectively represent a plurality of the data processing strategies in the communication network; step S104, the network administration system creates the strategy objective as per the user's strategy objective establishing request and the basic strategy categories. Therefore, the utility model improves the flexibility, so that the user can flexibly choose the combination of various basic strategies, so as to form the strategies needed by the user. Thus, both the compatibility and the expandability are improved. In addition, when new basic strategies are added, the existing strategic definition and processing program will not be affected, so as to facilitate the increase of new strategies and lower the development and maintenance cost as well as improves reaction velocity for the new request proposed by the user.
Description
Technical field
The present invention relates to communication network management system field, more specifically, relate to a kind of policy management method that is used for the processing policy of management communication network management system.
Background technology
In communication network, network is made up of many communication nodes, and these network nodes are called network element.Connect by communication line between the network element, comprise various ways such as fiber optic cables.Network element then dispersed and distributed in each area, have in the laboratory, communication building in the city, the network element that has is in remote districts.Yet the equipment of these network elements need be configured, and safeguards and monitoring, can not every place all sends someone on dutyly, with regard to central site network management system centre machine room of needs, by telecommunication each node on the network is configured, safeguards and monitors like this.
Along with the expansion of network size, communication network system becomes increasingly complex, and needs the management more and more data.How handle in these data, just relate to the strategy of data processing.Under different environment or different the requirement, same class data are wished that different processing policies is arranged.For example, in the function of timing acquiring historical performance, the timing interval is how long, to which network element image data, and processing policies such as the time range of image data; Which network element needs the timing data synchronizing function in the timing data synchronizing function, and at interval how long timing runs into data collision and strategy such as how to handle; And in the timing data comparing function, timing at interval how long, which data type need compare, and finds inconsistent processing policy such as how to handle.In addition, also have other various data processing policy requirements.
Traditional method is to take directly to be provided with some memory variables to come Write strategy, designs special program then and handles these variablees.But will there be some following shortcomings:
1 lacks flexibility: in exploitation, just in program, finish writing also fixed policy, and can not flexible combination;
2 lack autgmentability: when needs expansion New Policy, can not keep compatible, must redesign, original design be caused very big impact, thereby the stability of network management system is had very big influence, the cost that has increased exploitation and safeguarded; And
3 various tactful differences are too big, inconvenient unified management.
Becoming increasingly complex along with network management system, deal with data is more and more diversified, processing requirements to network management system is more and more higher, can impel the user to propose more tactical management requirement, and former processing method just can not satisfy the needs of growing network management system.Therefore, be badly in need of a kind of method and solve above-mentioned each problem.
Summary of the invention
In order to overcome the above problems, the present invention proposes a kind of policy management method, the processing policy that is used for the management communication network management system, it can make the processing policy of network management system have unified model, carry out unified processing, thereby, make finally have good flexibility, compatibility and extensibility.
The invention provides a kind of policy management method, the processing policy that is used for the management communication network management system, it can may further comprise the steps: step S102 defines a plurality of elementary tactics classes, to represent a plurality of processing policies that are used for handling the data of communication network respectively; And step S104, network management system is come the construction strategy object according to user's construction strategy object requests according to the elementary tactics class.
According to the present invention, this policy management method can also may further comprise the steps: network management system shows qualified policy object according to user's query strategy object requests.
Alternatively, this policy management method can also may further comprise the steps: network management system is preserved the modification of user to policy object.
Alternatively, this policy management method can also may further comprise the steps: network management system is according to user's deletion strategy object requests, deletion strategy object.
Alternatively, this policy management method can also may further comprise the steps: the timer of network management system regular check policy object, to constantly, network management system is carried out corresponding data processing according to the strategy of the policy object that activates at timer.
Alternatively, this policy management method can also may further comprise the steps: when the trigger condition of policing rule satisfied, network management system was carried out corresponding data processing according to the strategy of the policy object that activates.
According to the present invention, the elementary tactics class can comprise: tactful class name is used to represent the policy goals of data processing; And tactful chosen candidate value, be used to be expressed as the implementation strategy target and the scheme that provides, wherein each different different scheme of tactful chosen candidate value representative.
According to the present invention, policy object can comprise: at least one elementary tactics class, and with the corresponding value of at least one elementary tactics class.
In addition, policy object can also comprise following a kind of: state of activation, the term of validity, priority, creation-time, establishment user and remarks.Wherein, state of activation can comprise: activate or hang up.
By the present invention, improved flexibility, and the user can select the combination of various elementary tactics flexibly, form the strategy that the user wanted, thereby improved compatibility and extensibility.In addition, when increasing new elementary tactics, can not influence the definition and the handling procedure of original strategy, the new strategy of convenient increase.Reduced exploitation, maintenance cost improves the reaction speed that the user is proposed new demand.
Other features and advantages of the present invention will be set forth in the following description, and, partly from specification, become apparent, perhaps understand by implementing the present invention.Purpose of the present invention and other advantages can realize and obtain by specifically noted structure in the specification of being write, claims and accompanying drawing.
Description of drawings
Accompanying drawing is used to provide further understanding of the present invention, and constitutes the part of specification, is used from explanation the present invention with embodiments of the invention one, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the flow chart according to policy management method of the present invention;
Fig. 2 is the object relationship figure that UML form of the present invention is represented;
Fig. 3 is user's construction strategy object schematic flow sheet;
Fig. 4 is a user inquiring policy object schematic flow sheet;
Fig. 5 is a user's modification policy object schematic flow sheet;
Fig. 6 is user's deletion strategy object schematic flow sheet;
Fig. 7 be when network management system at the timing schematic flow sheet handled according to the policy object activation strategy of network management system then; And
Fig. 8 is that network management system satisfies the schematic flow sheet that the back network management is handled according to the policy object activation strategy at the activation condition of strategy regulation.
Embodiment
Below with reference to accompanying drawing the preferred embodiments of the present invention are described, should be appreciated that preferred embodiment described herein only is used for description and interpretation the present invention, and be not used in qualification the present invention.
Fig. 1 is the flow chart according to policy management method of the present invention.Core concept of the present invention is: pre-defined better elementary tactics class and the alternative that can select, these are the good rules of predefined, as the resource that flexible selection is provided.Then in actual use, the construction strategy object, policy object is exactly a concrete real example, and this object the inside has comprised the flexible combination of one or more elementary tactics, reaches user's tactful requirement.Last in the network management system deal with data, according to creating the policy object of coming out, data are handled instructed the guidance on just a kind of strategy.As shown in Figure 1, this policy management method may further comprise the steps:
Step S102 defines a plurality of elementary tactics classes, to represent a plurality of processing policies that are used for handling the data of communication network respectively; And
Step S104, network management system is come the construction strategy object according to user's construction strategy object requests according to the elementary tactics class.
In addition, this policy management method is further comprising the steps of: network management system shows qualified policy object according to user's query strategy object requests.
Alternatively, this policy management method is further comprising the steps of: network management system is preserved the modification of user to policy object.
Alternatively, this policy management method is further comprising the steps of: network management system is according to user's deletion strategy object requests, deletion strategy object.
Alternatively, this policy management method is further comprising the steps of: the timer of network management system regular check policy object, to constantly, network management system is carried out corresponding data processing according to the strategy of the policy object that activates at timer.
Alternatively, this policy management method is further comprising the steps of: when the trigger condition of policing rule satisfied, network management system was carried out corresponding data processing according to the strategy of the policy object that activates.
According to the present invention, the elementary tactics class comprises: tactful class name is used to represent the policy goals of data processing; And tactful chosen candidate value, be used to be expressed as the implementation strategy target and the scheme that provides, wherein each different different scheme of tactful chosen candidate value representative.
According to the present invention, policy object comprises: at least one elementary tactics class, and with the corresponding value of at least one elementary tactics class.
In addition, policy object also comprises following a kind of: state of activation, the term of validity, priority, creation-time, establishment user and remarks.
Wherein, state of activation comprises: activate or hang up.
As above, core methed of the present invention roughly can be divided into three steps:
One, definition elementary tactics class;
Two, construction strategy object; And
Three, network management system is carried out data processing according to the requirement of policy object.
Wherein, the elementary tactics class is exactly a policing rule that pre-defines, and the policy class name gives expression to the target that strategy is handled, and the alternate strategies value is illustrated in to reaching this policy goals, and which selection can be arranged.And a selected tactful class name and strategy value just become a concrete policing rule.Specifically how long strategy names when school " regularly " for example, selected value can be.
The elementary tactics class, policing rule, the relation of policy object is represented as shown in Figure 2 with the UML object diagram.
Introduce how the elementary tactics class definition is become a class below:
PolicyClass-T::=SEQUENCE{
ClasssName GraphicString (80)--tactful class name
, candidate StringList-T--alternate strategies value, each string length 80
, the type of candidateType GraphicString--chosen candidate value
, candidateUnit[4] and GraphicString OPTIONAL--the unit of chosen candidate value, some tactful chosen candidate value has unit.
}
PolicyClassList-T::=SEQUENCE OF PolicyClass-T
As shown in table 2, the type of chosen candidate value can be an enumeration type, that is to say that chosen candidate value has fixing limited several values.This is enumerated can be the constant of integer, also can be the constant of character string.The type of chosen candidate value also can be an integer, perhaps integer scope.
Table 1
The candidateType alternative types | Explanation | The Candidate value |
" enumerated " | Enumeration type integer or fixing several character string constants | List all supports value, select for the user |
" integer " | Integer | Have only an element, expression integer span, the chosen candidate value form is " n1<x<n2 " " x<n2 " " n1<x " wherein n1, n2 will replace to concrete numeral.Perhaps null character string is represented unrestrictedly |
Strategy class name and optional strategy value contrast relationship such as following table.Elementary tactics and chosen candidate value are that predefined is good, select so that user flexibility to be provided, and are used in combination, and concrete condition is as shown in table 2.
Table 2
The strategy class name | Policy description | Optional strategy value | The value explanation |
TimeGetMod ifyRecord | Regularly data query revises that log system is unique to be enumerated | “NA” | The not timing inquiry |
The integer of character string forms " 1 " " 2 " " 3 " " 4 " " 5 " " 6 " | Regularly inquiry in n hour, default 2 | ||
DataInconsist WithSouth | When finding that data are inconsistent | “notifyOnly” | Only report notice, the user determines next step place |
Enumerate | Reason. | ||
" notifyAndAut oUpload " | Notify the user and upload automatically | ||
" autoUploadN oNotify " | Automatically upload warehouse-in, do not notify the user | ||
AutoUpload DataConflict | Automatically uploading the conversation strategy of finding data collision in the back enumerates | " notifyOnly " | Only report notice, do not put the user in storage and determine next step processing. |
" notifyAndSol ve " | Warehouse-in then manages conflict | ||
AutoUpload DataSolveCo nflictFailed | Automatically upload warehouse-in, find conflict, attempt solving failure.Enumerate | " notifyOnly " | Only report notice, do not put the user in storage and determine next step processing. |
" SaveInAnyCa se " | Force to preserve, do not send out public notice | ||
IsAckAlarmA tRaise | Whether confirm automatically to enumerate alarm report the time at once | " true " " false " | |
AckAlarmAft erClear | What seconds were confirmed integer automatically after alarm disappeared | Unit is " second: " | The integer of character string forms |
CommSouthT estInterval | South orientation object communication detection cycle integer | Unit is " second: " | |
IsAutoLoginS outhObj | Whether login the south orientation object enumeration automatically | " true " " false " | |
PerfCollectInt erval | Performance collection cycle integer | Unit is " second: " | The integer of character string forms |
Fig. 3 is user's construction strategy object schematic flow sheet, next will describe the process of construction strategy object in conjunction with Fig. 3 in detail.
As shown in Figure 3, may further comprise the steps:
Step S302, user are in the interface that network management system provides, and the strategy that selection is wanted oneself from the existing elementary tactics class that defines is selected a value of oneself wanting again from the chosen candidate value of correspondence;
Step S304, user select a plurality of policy-flexible combinations.Be used for creating a policy object, the user also will provide some other information simultaneously, comprises whether activating, time limit is arranged information such as remarks; And
Step S306, user issue the request of creating object and give network management system, and network management system is created policy object out.
Wherein, policy object is defined as follows:
PolicyObject-T::=SEQUENCE{
Name NamingAttributes-T--policy object title
, polices NVSList-T--choose Policy List, name fills out, and what be that tactful class name value fills out is the policy class value, just selects which option, and concrete in other words value can be the combination of a plurality of tactful class names and value
, attributes NVSList-T--attribute, following table definition
, domain GraphicString--object application
}
PolicyObjectList-T::=SEQUENCE OF PolicyObject-T
Wherein, policy object data (attributes NVSList-T) are as shown in table 3.
Table 3
Title | Value | Attribute characteristic | Explanation |
" activeState " | GraphicString | M S C | The state of strategy. |
" startTime " | GeneralizedTime | M C | Time started |
" endTime " | GeneralizedTime | M C | Expired time |
" createdBy " | GraphicString | M | Create the user |
" createTime " | GeneralizedTime | M | Creation-time |
" owner " | GraphicString | O C | Belong to that user.Only under the user can create the situation of individual-specific strategy, this field is arranged. |
" priority " | The integer of character string forms | O C | A plurality of policy object under the same application field, priority can be arranged, when contradictory when tactful between the Different Strategies object, just same policing rule class has been selected different values, and the policy object of pressing high priority is effective.Priority is since 0 to 4 byte integer, and 0 priority is the highest.Default normal priority 100. |
In addition, the policy object state of activation is as shown in table 4.
Table 4
Value | Chinese | Describe |
" active " | Activate | Come into force, but before the deadline |
" suspend " | Hang up | Time-out comes into force, even before the deadline. |
" obsolete " | Discarded | The user is arranged to discard, no matter whether before the deadline, and revival not. |
For instance, the user can create a policy object A, chooses " true " in previously defined policy class " isAckAlarmAtRaise " the selection chosen candidate value, is illustrated in and wants at once affirmation automatically when receiving alarm.Selection strategy class " commSouthTestInterval " in addition, selection strategy value " 5 ", this represents that the communication state that will carry out the south orientation communication interface in per 5 seconds detects.State of activation is for activating, and limited duration since this end of next month, priority is 1.
Like this, just finished the process of construction strategy object.In addition, all right query strategy object of user, modification policy object and deletion strategy object are as Fig. 4, Fig. 5 and shown in Figure 6.
Fig. 4 is a user inquiring policy object schematic flow sheet, as shown in Figure 4, may further comprise the steps:
Step S402, user send the request of query strategy object; And
Step S404, network management system demonstrates all policing rules and other attribute informations of qualified Existing policies object.
Fig. 5 is a user's modification policy object schematic flow sheet, as shown in Figure 5, may further comprise the steps:
Step S502, strategy or other attributes of user's modification policy object add the selection of deletion strategy rule; And
Step S504, network management system is preserved user's modification.
Therefore, the user can revise each attribute of policy object, comprises whether activating, the term of validity, remarks etc.Become not activate by revising state of activation, the user can allow a policy object temporary suspension, and inoperative, perhaps revising state of activation becomes activation, allows policy object activate again.The user can also reselect elementary tactics and chosen candidate value, adds new elementary tactics and the chosen candidate value chosen in policy object, perhaps deletion.Network management system is preserved user's modification.
For example, the user is in policy object A, and the value of revising " isAckAlarmAtRaise " becomes " false " and is illustrated in when receiving alarm, does not confirm automatically at once.Changed this processing policy.
Fig. 6 is user's deletion strategy object schematic flow sheet, as shown in Figure 6.May further comprise the steps:
Step S602, user send the request of deletion strategy object; And
Step S604, network management system deletion strategy object.
Thereby network management system has just been deleted the policy object of customer requirements deletion.
After creating policy object, network management system is in deal with data, and just the strategy that instructs according to policy object carries out data processing.Divide timing and incident that two kinds of triggering modes take place, as shown in Figure 7 and Figure 8.
Fig. 7 be when network management system at the timing schematic flow sheet handled according to the policy object activation strategy of network management system then, as shown in Figure 7, may further comprise the steps:
Step S702, the timer of regular check policy object is then; And
Step S704, network management system is called corresponding processing function and is carried out data processing according to the policing rule of the policy object that activates.
That is, timing on earth after, the trigger network management system requires to carry out data processing according to policy object.The policy object A that for example creates has previously comprised policy class
" commSouthTestInterval " selection strategy value " 5 ".After per 5 seconds timing arrived, network management system was just carried out the inspection of communication state to the communication interface of south orientation, and good function detects to call prior realization.So just finished regularly trigger process.
Fig. 8 is that network management system satisfies the schematic flow sheet that the back network management is handled according to the policy object activation strategy at the activation condition of strategy regulation, as shown in Figure 8, may further comprise the steps:
Step S802 satisfies the trigger condition of policing rule defined; And
Step S804, network management system is called corresponding processing function and is carried out data processing according to the policing rule of the policy object that activates.
That is, when an incident took place, the trigger network management system required to carry out data processing according to policy object.The policy object A that for example creates has previously comprised " true " in policy class " isAckAlarmAtRaise " the selection chosen candidate value.Be illustrated in when " receiving new alarm " such incident has taken place, network management system carries out acknowledged alarm as requested automatically, calls the good function of prior realization and carries out acknowledged alarm and handle.Like this, just finished the whole process of Time Triggered.
In sum,, improved flexibility, and the user can select the combination of various elementary tactics flexibly, form the strategy that the user wanted, thereby improved compatibility and extensibility by the present invention.In addition, when increasing new elementary tactics, can not influence the definition and the handling procedure of original strategy, the new strategy of convenient increase.Reduced exploitation, maintenance cost improves the reaction speed that the user is proposed new demand.
Be the preferred embodiments of the present invention only below, be not limited to the present invention, for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. policy management method is used for the processing policy of management communication network management system, it is characterized in that, may further comprise the steps:
Step S102 defines a plurality of elementary tactics classes, to represent a plurality of processing policies that are used for handling the data of communication network respectively; And
Step S104, network management system is come the construction strategy object according to user's construction strategy object requests according to described elementary tactics class.
2. policy management method according to claim 1 is characterized in that, and is further comprising the steps of:
Described network management system shows qualified policy object according to described user's query strategy object requests.
3. policy management method according to claim 1 is characterized in that, and is further comprising the steps of:
Described network management system is preserved the modification of described user to described policy object.
4. policy management method according to claim 1 is characterized in that, and is further comprising the steps of:
Described network management system is according to described user's deletion strategy object requests,
The deletion strategy object.
5. policy management method according to claim 1 is characterized in that, and is further comprising the steps of:
The timer of described network management system regular check policy object, to constantly, described network management system is carried out corresponding data processing according to the strategy of the policy object that activates at described timer.
6. policy management method according to claim 1 is characterized in that, and is further comprising the steps of:
When the trigger condition of described policing rule satisfied, described network management system was carried out corresponding data processing according to the strategy of the policy object that activates.
7. according to each described policy management method in the claim 1 to 6, it is characterized in that described elementary tactics class comprises:
The strategy class name is used to represent the policy goals of data processing; And
The strategy chosen candidate value is used to be expressed as the scheme that realizes described policy goals and provide, wherein each different different described scheme of described tactful chosen candidate value representative.
8. according to each described policy management method in the claim 1 to 6, it is characterized in that described policy object comprises: at least one described elementary tactics class, and with the corresponding value of described at least one described elementary tactics class.
9. policy management method according to claim 8 is characterized in that, described policy object also comprises following a kind of: state of activation, the term of validity, priority, creation-time, establishment user and remarks.
10. policy management method according to claim 9 is characterized in that, described state of activation comprises: activate or hang up.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA200710112404XA CN101141295A (en) | 2007-03-02 | 2007-06-19 | Strategy management method |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710080056.2 | 2007-03-02 | ||
CN200710080056 | 2007-03-02 | ||
CNA200710112404XA CN101141295A (en) | 2007-03-02 | 2007-06-19 | Strategy management method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101141295A true CN101141295A (en) | 2008-03-12 |
Family
ID=39193060
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA200710112404XA Pending CN101141295A (en) | 2007-03-02 | 2007-06-19 | Strategy management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101141295A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014085952A1 (en) * | 2012-12-03 | 2014-06-12 | 华为技术有限公司 | Policy processing method and network device |
CN110908642A (en) * | 2018-09-14 | 2020-03-24 | 亿阳信通股份有限公司 | Policy generation and execution method and device |
CN111355595A (en) * | 2018-12-21 | 2020-06-30 | 中国移动通信集团山东有限公司 | PCC strategy scheduling method and system |
WO2024092685A1 (en) * | 2022-11-04 | 2024-05-10 | Nokia Shanghai Bell Co., Ltd. | Policy based activation of capabilities |
-
2007
- 2007-06-19 CN CNA200710112404XA patent/CN101141295A/en active Pending
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014085952A1 (en) * | 2012-12-03 | 2014-06-12 | 华为技术有限公司 | Policy processing method and network device |
JP2015508538A (en) * | 2012-12-03 | 2015-03-19 | ▲ホア▼▲ウェイ▼技術有限公司 | Policy processing method and network device |
US9461888B2 (en) | 2012-12-03 | 2016-10-04 | Huawei Technologies Co., Ltd. | Policy processing method and network device |
US10225150B2 (en) | 2012-12-03 | 2019-03-05 | Huawei Technologies Co., Ltd. | Policy processing method and network device |
CN110908642A (en) * | 2018-09-14 | 2020-03-24 | 亿阳信通股份有限公司 | Policy generation and execution method and device |
CN110908642B (en) * | 2018-09-14 | 2024-04-05 | 亿阳信通股份有限公司 | Policy generation execution method and device |
CN111355595A (en) * | 2018-12-21 | 2020-06-30 | 中国移动通信集团山东有限公司 | PCC strategy scheduling method and system |
CN111355595B (en) * | 2018-12-21 | 2022-03-29 | 中国移动通信集团山东有限公司 | PCC strategy scheduling method and system |
WO2024092685A1 (en) * | 2022-11-04 | 2024-05-10 | Nokia Shanghai Bell Co., Ltd. | Policy based activation of capabilities |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101427556B (en) | Accessing a calendar server to facilitate initiation of a scheduled call | |
US8582450B1 (en) | Status reporting system | |
CN100426242C (en) | Method, system and product for identifying, reserving, and logically provisioning resources in provisioning data processing systems | |
US8250157B2 (en) | Presence mapping | |
CN109936571A (en) | A kind of mass data sharing method, opening and shares platform and electronic equipment | |
CN101594376B (en) | Method and corresponding device for registering CIM provider to CIMOM | |
US7366739B2 (en) | Data storage system | |
JP2001243413A (en) | System and method for business card, and client device, portable terminal device, and recording medium thereof | |
US6965751B2 (en) | Role managed collaborative learning support system and method | |
CN109005433B (en) | A kind of video cloud service platform architecture and implementation method | |
CN102098233B (en) | Method and system for controlling communication window in instant messenger | |
CN101141295A (en) | Strategy management method | |
CN102831165A (en) | Managing method and system of expired numbers in address book | |
CN103338269A (en) | Data transmission method and device | |
US7730093B2 (en) | Method for controlling access to the resources of a data processing system, data processing system, and computer program | |
CN100442711C (en) | File managing system and method in digital household network | |
EP2518636A1 (en) | Session management system, session management device, session management method, session management program | |
EP1717703A1 (en) | Electronic device for automatically continuing to provide service | |
WO2009087801A1 (en) | File sharing system, access right management method and terminal device | |
US20140280855A1 (en) | Generic snmp information collection | |
EP1199860A1 (en) | User context information database for plurality of network services | |
US7533153B1 (en) | Method for managing instant messaging presence by group | |
KR100374684B1 (en) | System and Method for managing PC room with PC room and franchise center each other | |
CN109491615A (en) | A kind of arbitration system based on cluster storage system | |
JP4831152B2 (en) | Destination information management system, communication terminal device, and destination information management program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20080312 |