CN101141295A - Strategy management method - Google Patents

Strategy management method Download PDF

Info

Publication number
CN101141295A
CN101141295A CNA200710112404XA CN200710112404A CN101141295A CN 101141295 A CN101141295 A CN 101141295A CN A200710112404X A CNA200710112404X A CN A200710112404XA CN 200710112404 A CN200710112404 A CN 200710112404A CN 101141295 A CN101141295 A CN 101141295A
Authority
CN
China
Prior art keywords
policy
strategy
user
management system
management method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200710112404XA
Other languages
Chinese (zh)
Inventor
陈俏钢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CNA200710112404XA priority Critical patent/CN101141295A/en
Publication of CN101141295A publication Critical patent/CN101141295A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The utility model discloses a strategy management method, which is used for the processing strategy in the network communication management system. The method includes following steps: step S102 defines a plurality of basic strategies, so as to respectively represent a plurality of the data processing strategies in the communication network; step S104, the network administration system creates the strategy objective as per the user's strategy objective establishing request and the basic strategy categories. Therefore, the utility model improves the flexibility, so that the user can flexibly choose the combination of various basic strategies, so as to form the strategies needed by the user. Thus, both the compatibility and the expandability are improved. In addition, when new basic strategies are added, the existing strategic definition and processing program will not be affected, so as to facilitate the increase of new strategies and lower the development and maintenance cost as well as improves reaction velocity for the new request proposed by the user.

Description

Policy management method
Technical field
The present invention relates to communication network management system field, more specifically, relate to a kind of policy management method that is used for the processing policy of management communication network management system.
Background technology
In communication network, network is made up of many communication nodes, and these network nodes are called network element.Connect by communication line between the network element, comprise various ways such as fiber optic cables.Network element then dispersed and distributed in each area, have in the laboratory, communication building in the city, the network element that has is in remote districts.Yet the equipment of these network elements need be configured, and safeguards and monitoring, can not every place all sends someone on dutyly, with regard to central site network management system centre machine room of needs, by telecommunication each node on the network is configured, safeguards and monitors like this.
Along with the expansion of network size, communication network system becomes increasingly complex, and needs the management more and more data.How handle in these data, just relate to the strategy of data processing.Under different environment or different the requirement, same class data are wished that different processing policies is arranged.For example, in the function of timing acquiring historical performance, the timing interval is how long, to which network element image data, and processing policies such as the time range of image data; Which network element needs the timing data synchronizing function in the timing data synchronizing function, and at interval how long timing runs into data collision and strategy such as how to handle; And in the timing data comparing function, timing at interval how long, which data type need compare, and finds inconsistent processing policy such as how to handle.In addition, also have other various data processing policy requirements.
Traditional method is to take directly to be provided with some memory variables to come Write strategy, designs special program then and handles these variablees.But will there be some following shortcomings:
1 lacks flexibility: in exploitation, just in program, finish writing also fixed policy, and can not flexible combination;
2 lack autgmentability: when needs expansion New Policy, can not keep compatible, must redesign, original design be caused very big impact, thereby the stability of network management system is had very big influence, the cost that has increased exploitation and safeguarded; And
3 various tactful differences are too big, inconvenient unified management.
Becoming increasingly complex along with network management system, deal with data is more and more diversified, processing requirements to network management system is more and more higher, can impel the user to propose more tactical management requirement, and former processing method just can not satisfy the needs of growing network management system.Therefore, be badly in need of a kind of method and solve above-mentioned each problem.
Summary of the invention
In order to overcome the above problems, the present invention proposes a kind of policy management method, the processing policy that is used for the management communication network management system, it can make the processing policy of network management system have unified model, carry out unified processing, thereby, make finally have good flexibility, compatibility and extensibility.
The invention provides a kind of policy management method, the processing policy that is used for the management communication network management system, it can may further comprise the steps: step S102 defines a plurality of elementary tactics classes, to represent a plurality of processing policies that are used for handling the data of communication network respectively; And step S104, network management system is come the construction strategy object according to user's construction strategy object requests according to the elementary tactics class.
According to the present invention, this policy management method can also may further comprise the steps: network management system shows qualified policy object according to user's query strategy object requests.
Alternatively, this policy management method can also may further comprise the steps: network management system is preserved the modification of user to policy object.
Alternatively, this policy management method can also may further comprise the steps: network management system is according to user's deletion strategy object requests, deletion strategy object.
Alternatively, this policy management method can also may further comprise the steps: the timer of network management system regular check policy object, to constantly, network management system is carried out corresponding data processing according to the strategy of the policy object that activates at timer.
Alternatively, this policy management method can also may further comprise the steps: when the trigger condition of policing rule satisfied, network management system was carried out corresponding data processing according to the strategy of the policy object that activates.
According to the present invention, the elementary tactics class can comprise: tactful class name is used to represent the policy goals of data processing; And tactful chosen candidate value, be used to be expressed as the implementation strategy target and the scheme that provides, wherein each different different scheme of tactful chosen candidate value representative.
According to the present invention, policy object can comprise: at least one elementary tactics class, and with the corresponding value of at least one elementary tactics class.
In addition, policy object can also comprise following a kind of: state of activation, the term of validity, priority, creation-time, establishment user and remarks.Wherein, state of activation can comprise: activate or hang up.
By the present invention, improved flexibility, and the user can select the combination of various elementary tactics flexibly, form the strategy that the user wanted, thereby improved compatibility and extensibility.In addition, when increasing new elementary tactics, can not influence the definition and the handling procedure of original strategy, the new strategy of convenient increase.Reduced exploitation, maintenance cost improves the reaction speed that the user is proposed new demand.
Other features and advantages of the present invention will be set forth in the following description, and, partly from specification, become apparent, perhaps understand by implementing the present invention.Purpose of the present invention and other advantages can realize and obtain by specifically noted structure in the specification of being write, claims and accompanying drawing.
Description of drawings
Accompanying drawing is used to provide further understanding of the present invention, and constitutes the part of specification, is used from explanation the present invention with embodiments of the invention one, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the flow chart according to policy management method of the present invention;
Fig. 2 is the object relationship figure that UML form of the present invention is represented;
Fig. 3 is user's construction strategy object schematic flow sheet;
Fig. 4 is a user inquiring policy object schematic flow sheet;
Fig. 5 is a user's modification policy object schematic flow sheet;
Fig. 6 is user's deletion strategy object schematic flow sheet;
Fig. 7 be when network management system at the timing schematic flow sheet handled according to the policy object activation strategy of network management system then; And
Fig. 8 is that network management system satisfies the schematic flow sheet that the back network management is handled according to the policy object activation strategy at the activation condition of strategy regulation.
Embodiment
Below with reference to accompanying drawing the preferred embodiments of the present invention are described, should be appreciated that preferred embodiment described herein only is used for description and interpretation the present invention, and be not used in qualification the present invention.
Fig. 1 is the flow chart according to policy management method of the present invention.Core concept of the present invention is: pre-defined better elementary tactics class and the alternative that can select, these are the good rules of predefined, as the resource that flexible selection is provided.Then in actual use, the construction strategy object, policy object is exactly a concrete real example, and this object the inside has comprised the flexible combination of one or more elementary tactics, reaches user's tactful requirement.Last in the network management system deal with data, according to creating the policy object of coming out, data are handled instructed the guidance on just a kind of strategy.As shown in Figure 1, this policy management method may further comprise the steps:
Step S102 defines a plurality of elementary tactics classes, to represent a plurality of processing policies that are used for handling the data of communication network respectively; And
Step S104, network management system is come the construction strategy object according to user's construction strategy object requests according to the elementary tactics class.
In addition, this policy management method is further comprising the steps of: network management system shows qualified policy object according to user's query strategy object requests.
Alternatively, this policy management method is further comprising the steps of: network management system is preserved the modification of user to policy object.
Alternatively, this policy management method is further comprising the steps of: network management system is according to user's deletion strategy object requests, deletion strategy object.
Alternatively, this policy management method is further comprising the steps of: the timer of network management system regular check policy object, to constantly, network management system is carried out corresponding data processing according to the strategy of the policy object that activates at timer.
Alternatively, this policy management method is further comprising the steps of: when the trigger condition of policing rule satisfied, network management system was carried out corresponding data processing according to the strategy of the policy object that activates.
According to the present invention, the elementary tactics class comprises: tactful class name is used to represent the policy goals of data processing; And tactful chosen candidate value, be used to be expressed as the implementation strategy target and the scheme that provides, wherein each different different scheme of tactful chosen candidate value representative.
According to the present invention, policy object comprises: at least one elementary tactics class, and with the corresponding value of at least one elementary tactics class.
In addition, policy object also comprises following a kind of: state of activation, the term of validity, priority, creation-time, establishment user and remarks.
Wherein, state of activation comprises: activate or hang up.
As above, core methed of the present invention roughly can be divided into three steps:
One, definition elementary tactics class;
Two, construction strategy object; And
Three, network management system is carried out data processing according to the requirement of policy object.
Wherein, the elementary tactics class is exactly a policing rule that pre-defines, and the policy class name gives expression to the target that strategy is handled, and the alternate strategies value is illustrated in to reaching this policy goals, and which selection can be arranged.And a selected tactful class name and strategy value just become a concrete policing rule.Specifically how long strategy names when school " regularly " for example, selected value can be.
The elementary tactics class, policing rule, the relation of policy object is represented as shown in Figure 2 with the UML object diagram.
Introduce how the elementary tactics class definition is become a class below:
PolicyClass-T::=SEQUENCE{
ClasssName GraphicString (80)--tactful class name
, candidate StringList-T--alternate strategies value, each string length 80
, the type of candidateType GraphicString--chosen candidate value
, candidateUnit[4] and GraphicString OPTIONAL--the unit of chosen candidate value, some tactful chosen candidate value has unit.
}
PolicyClassList-T::=SEQUENCE OF PolicyClass-T
As shown in table 2, the type of chosen candidate value can be an enumeration type, that is to say that chosen candidate value has fixing limited several values.This is enumerated can be the constant of integer, also can be the constant of character string.The type of chosen candidate value also can be an integer, perhaps integer scope.
Table 1
The candidateType alternative types Explanation The Candidate value
" enumerated " Enumeration type integer or fixing several character string constants List all supports value, select for the user
" integer " Integer Have only an element, expression integer span, the chosen candidate value form is " n1<x<n2 " " x<n2 " " n1<x " wherein n1, n2 will replace to concrete numeral.Perhaps null character string is represented unrestrictedly
Strategy class name and optional strategy value contrast relationship such as following table.Elementary tactics and chosen candidate value are that predefined is good, select so that user flexibility to be provided, and are used in combination, and concrete condition is as shown in table 2.
Table 2
The strategy class name Policy description Optional strategy value The value explanation
TimeGetMod ifyRecord Regularly data query revises that log system is unique to be enumerated “NA” The not timing inquiry
The integer of character string forms " 1 " " 2 " " 3 " " 4 " " 5 " " 6 " Regularly inquiry in n hour, default 2
DataInconsist WithSouth When finding that data are inconsistent “notifyOnly” Only report notice, the user determines next step place
Enumerate Reason.
" notifyAndAut oUpload " Notify the user and upload automatically
" autoUploadN oNotify " Automatically upload warehouse-in, do not notify the user
AutoUpload DataConflict Automatically uploading the conversation strategy of finding data collision in the back enumerates " notifyOnly " Only report notice, do not put the user in storage and determine next step processing.
" notifyAndSol ve " Warehouse-in then manages conflict
AutoUpload DataSolveCo nflictFailed Automatically upload warehouse-in, find conflict, attempt solving failure.Enumerate " notifyOnly " Only report notice, do not put the user in storage and determine next step processing.
" SaveInAnyCa se " Force to preserve, do not send out public notice
IsAckAlarmA tRaise Whether confirm automatically to enumerate alarm report the time at once " true " " false "
AckAlarmAft erClear What seconds were confirmed integer automatically after alarm disappeared Unit is " second: " The integer of character string forms
CommSouthT estInterval South orientation object communication detection cycle integer Unit is " second: "
IsAutoLoginS outhObj Whether login the south orientation object enumeration automatically " true " " false "
PerfCollectInt erval Performance collection cycle integer Unit is " second: " The integer of character string forms
Fig. 3 is user's construction strategy object schematic flow sheet, next will describe the process of construction strategy object in conjunction with Fig. 3 in detail.
As shown in Figure 3, may further comprise the steps:
Step S302, user are in the interface that network management system provides, and the strategy that selection is wanted oneself from the existing elementary tactics class that defines is selected a value of oneself wanting again from the chosen candidate value of correspondence;
Step S304, user select a plurality of policy-flexible combinations.Be used for creating a policy object, the user also will provide some other information simultaneously, comprises whether activating, time limit is arranged information such as remarks; And
Step S306, user issue the request of creating object and give network management system, and network management system is created policy object out.
Wherein, policy object is defined as follows:
PolicyObject-T::=SEQUENCE{
Name NamingAttributes-T--policy object title
, polices NVSList-T--choose Policy List, name fills out, and what be that tactful class name value fills out is the policy class value, just selects which option, and concrete in other words value can be the combination of a plurality of tactful class names and value
, attributes NVSList-T--attribute, following table definition
, domain GraphicString--object application
}
PolicyObjectList-T::=SEQUENCE OF PolicyObject-T
Wherein, policy object data (attributes NVSList-T) are as shown in table 3.
Table 3
Title Value Attribute characteristic Explanation
" activeState " GraphicString M S C The state of strategy.
" startTime " GeneralizedTime M C Time started
" endTime " GeneralizedTime M C Expired time
" createdBy " GraphicString M Create the user
" createTime " GeneralizedTime M Creation-time
" owner " GraphicString O C Belong to that user.Only under the user can create the situation of individual-specific strategy, this field is arranged.
" priority " The integer of character string forms O C A plurality of policy object under the same application field, priority can be arranged, when contradictory when tactful between the Different Strategies object, just same policing rule class has been selected different values, and the policy object of pressing high priority is effective.Priority is since 0 to 4 byte integer, and 0 priority is the highest.Default normal priority 100.
In addition, the policy object state of activation is as shown in table 4.
Table 4
Value Chinese Describe
" active " Activate Come into force, but before the deadline
" suspend " Hang up Time-out comes into force, even before the deadline.
" obsolete " Discarded The user is arranged to discard, no matter whether before the deadline, and revival not.
For instance, the user can create a policy object A, chooses " true " in previously defined policy class " isAckAlarmAtRaise " the selection chosen candidate value, is illustrated in and wants at once affirmation automatically when receiving alarm.Selection strategy class " commSouthTestInterval " in addition, selection strategy value " 5 ", this represents that the communication state that will carry out the south orientation communication interface in per 5 seconds detects.State of activation is for activating, and limited duration since this end of next month, priority is 1.
Like this, just finished the process of construction strategy object.In addition, all right query strategy object of user, modification policy object and deletion strategy object are as Fig. 4, Fig. 5 and shown in Figure 6.
Fig. 4 is a user inquiring policy object schematic flow sheet, as shown in Figure 4, may further comprise the steps:
Step S402, user send the request of query strategy object; And
Step S404, network management system demonstrates all policing rules and other attribute informations of qualified Existing policies object.
Fig. 5 is a user's modification policy object schematic flow sheet, as shown in Figure 5, may further comprise the steps:
Step S502, strategy or other attributes of user's modification policy object add the selection of deletion strategy rule; And
Step S504, network management system is preserved user's modification.
Therefore, the user can revise each attribute of policy object, comprises whether activating, the term of validity, remarks etc.Become not activate by revising state of activation, the user can allow a policy object temporary suspension, and inoperative, perhaps revising state of activation becomes activation, allows policy object activate again.The user can also reselect elementary tactics and chosen candidate value, adds new elementary tactics and the chosen candidate value chosen in policy object, perhaps deletion.Network management system is preserved user's modification.
For example, the user is in policy object A, and the value of revising " isAckAlarmAtRaise " becomes " false " and is illustrated in when receiving alarm, does not confirm automatically at once.Changed this processing policy.
Fig. 6 is user's deletion strategy object schematic flow sheet, as shown in Figure 6.May further comprise the steps:
Step S602, user send the request of deletion strategy object; And
Step S604, network management system deletion strategy object.
Thereby network management system has just been deleted the policy object of customer requirements deletion.
After creating policy object, network management system is in deal with data, and just the strategy that instructs according to policy object carries out data processing.Divide timing and incident that two kinds of triggering modes take place, as shown in Figure 7 and Figure 8.
Fig. 7 be when network management system at the timing schematic flow sheet handled according to the policy object activation strategy of network management system then, as shown in Figure 7, may further comprise the steps:
Step S702, the timer of regular check policy object is then; And
Step S704, network management system is called corresponding processing function and is carried out data processing according to the policing rule of the policy object that activates.
That is, timing on earth after, the trigger network management system requires to carry out data processing according to policy object.The policy object A that for example creates has previously comprised policy class
" commSouthTestInterval " selection strategy value " 5 ".After per 5 seconds timing arrived, network management system was just carried out the inspection of communication state to the communication interface of south orientation, and good function detects to call prior realization.So just finished regularly trigger process.
Fig. 8 is that network management system satisfies the schematic flow sheet that the back network management is handled according to the policy object activation strategy at the activation condition of strategy regulation, as shown in Figure 8, may further comprise the steps:
Step S802 satisfies the trigger condition of policing rule defined; And
Step S804, network management system is called corresponding processing function and is carried out data processing according to the policing rule of the policy object that activates.
That is, when an incident took place, the trigger network management system required to carry out data processing according to policy object.The policy object A that for example creates has previously comprised " true " in policy class " isAckAlarmAtRaise " the selection chosen candidate value.Be illustrated in when " receiving new alarm " such incident has taken place, network management system carries out acknowledged alarm as requested automatically, calls the good function of prior realization and carries out acknowledged alarm and handle.Like this, just finished the whole process of Time Triggered.
In sum,, improved flexibility, and the user can select the combination of various elementary tactics flexibly, form the strategy that the user wanted, thereby improved compatibility and extensibility by the present invention.In addition, when increasing new elementary tactics, can not influence the definition and the handling procedure of original strategy, the new strategy of convenient increase.Reduced exploitation, maintenance cost improves the reaction speed that the user is proposed new demand.
Be the preferred embodiments of the present invention only below, be not limited to the present invention, for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. policy management method is used for the processing policy of management communication network management system, it is characterized in that, may further comprise the steps:
Step S102 defines a plurality of elementary tactics classes, to represent a plurality of processing policies that are used for handling the data of communication network respectively; And
Step S104, network management system is come the construction strategy object according to user's construction strategy object requests according to described elementary tactics class.
2. policy management method according to claim 1 is characterized in that, and is further comprising the steps of:
Described network management system shows qualified policy object according to described user's query strategy object requests.
3. policy management method according to claim 1 is characterized in that, and is further comprising the steps of:
Described network management system is preserved the modification of described user to described policy object.
4. policy management method according to claim 1 is characterized in that, and is further comprising the steps of:
Described network management system is according to described user's deletion strategy object requests,
The deletion strategy object.
5. policy management method according to claim 1 is characterized in that, and is further comprising the steps of:
The timer of described network management system regular check policy object, to constantly, described network management system is carried out corresponding data processing according to the strategy of the policy object that activates at described timer.
6. policy management method according to claim 1 is characterized in that, and is further comprising the steps of:
When the trigger condition of described policing rule satisfied, described network management system was carried out corresponding data processing according to the strategy of the policy object that activates.
7. according to each described policy management method in the claim 1 to 6, it is characterized in that described elementary tactics class comprises:
The strategy class name is used to represent the policy goals of data processing; And
The strategy chosen candidate value is used to be expressed as the scheme that realizes described policy goals and provide, wherein each different different described scheme of described tactful chosen candidate value representative.
8. according to each described policy management method in the claim 1 to 6, it is characterized in that described policy object comprises: at least one described elementary tactics class, and with the corresponding value of described at least one described elementary tactics class.
9. policy management method according to claim 8 is characterized in that, described policy object also comprises following a kind of: state of activation, the term of validity, priority, creation-time, establishment user and remarks.
10. policy management method according to claim 9 is characterized in that, described state of activation comprises: activate or hang up.
CNA200710112404XA 2007-03-02 2007-06-19 Strategy management method Pending CN101141295A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA200710112404XA CN101141295A (en) 2007-03-02 2007-06-19 Strategy management method

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN200710080056.2 2007-03-02
CN200710080056 2007-03-02
CNA200710112404XA CN101141295A (en) 2007-03-02 2007-06-19 Strategy management method

Publications (1)

Publication Number Publication Date
CN101141295A true CN101141295A (en) 2008-03-12

Family

ID=39193060

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200710112404XA Pending CN101141295A (en) 2007-03-02 2007-06-19 Strategy management method

Country Status (1)

Country Link
CN (1) CN101141295A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014085952A1 (en) * 2012-12-03 2014-06-12 华为技术有限公司 Policy processing method and network device
CN110908642A (en) * 2018-09-14 2020-03-24 亿阳信通股份有限公司 Policy generation and execution method and device
CN111355595A (en) * 2018-12-21 2020-06-30 中国移动通信集团山东有限公司 PCC strategy scheduling method and system
WO2024092685A1 (en) * 2022-11-04 2024-05-10 Nokia Shanghai Bell Co., Ltd. Policy based activation of capabilities

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014085952A1 (en) * 2012-12-03 2014-06-12 华为技术有限公司 Policy processing method and network device
JP2015508538A (en) * 2012-12-03 2015-03-19 ▲ホア▼▲ウェイ▼技術有限公司 Policy processing method and network device
US9461888B2 (en) 2012-12-03 2016-10-04 Huawei Technologies Co., Ltd. Policy processing method and network device
US10225150B2 (en) 2012-12-03 2019-03-05 Huawei Technologies Co., Ltd. Policy processing method and network device
CN110908642A (en) * 2018-09-14 2020-03-24 亿阳信通股份有限公司 Policy generation and execution method and device
CN110908642B (en) * 2018-09-14 2024-04-05 亿阳信通股份有限公司 Policy generation execution method and device
CN111355595A (en) * 2018-12-21 2020-06-30 中国移动通信集团山东有限公司 PCC strategy scheduling method and system
CN111355595B (en) * 2018-12-21 2022-03-29 中国移动通信集团山东有限公司 PCC strategy scheduling method and system
WO2024092685A1 (en) * 2022-11-04 2024-05-10 Nokia Shanghai Bell Co., Ltd. Policy based activation of capabilities

Similar Documents

Publication Publication Date Title
CN101427556B (en) Accessing a calendar server to facilitate initiation of a scheduled call
US6871076B2 (en) Method and system for automatically adjusting location based system information in a mobile computer
CN100426242C (en) Method, system and product for identifying, reserving, and logically provisioning resources in provisioning data processing systems
US8250157B2 (en) Presence mapping
CN101594376B (en) Method and corresponding device for registering CIM provider to CIMOM
CN109936571A (en) A kind of mass data sharing method, opening and shares platform and electronic equipment
JP2001243413A (en) System and method for business card, and client device, portable terminal device, and recording medium thereof
US6965751B2 (en) Role managed collaborative learning support system and method
CN102098233B (en) Method and system for controlling communication window in instant messenger
CN101141295A (en) Strategy management method
CN102831165A (en) Managing method and system of expired numbers in address book
US7730093B2 (en) Method for controlling access to the resources of a data processing system, data processing system, and computer program
CN110399136A (en) A kind of BMC firmware update, device, equipment and medium
CN100442711C (en) File managing system and method in digital household network
EP2518636A1 (en) Session management system, session management device, session management method, session management program
EP1717703A1 (en) Electronic device for automatically continuing to provide service
WO2009087801A1 (en) File sharing system, access right management method and terminal device
US20140280855A1 (en) Generic snmp information collection
JP2007188239A (en) Document management system
CN105893534A (en) Media file deleting method and device
CN103425684A (en) Method and device for database operation
US7533153B1 (en) Method for managing instant messaging presence by group
KR100374684B1 (en) System and Method for managing PC room with PC room and franchise center each other
US6421743B1 (en) Method and system for data transformation in a computer network
CN109491615A (en) A kind of arbitration system based on cluster storage system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20080312