Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

51 results about "Proxy pattern" patented technology

In computer programming, the proxy pattern is a software design pattern. A proxy, in its most general form, is a class functioning as an interface to something else. The proxy could interface to anything: a network connection, a large object in memory, a file, or some other resource that is expensive or impossible to duplicate. In short, a proxy is a wrapper or agent object that is being called by the client to access the real serving object behind the scenes. Use of the proxy can simply be forwarding to the real object, or can provide additional logic. In the proxy, extra functionality can be provided, for example caching when operations on the real object are resource intensive, or checking preconditions before operations on the real object are invoked. For the client, usage of a proxy object is similar to using the real object, because both implement the same interface.

Live-agent-enabled teis systems

Systems for providing live-agent and hybrid live-agent access to transaction-enabled information systems are disclosed. In various embodiments, a live agent can include a person who using one or more communications devices can hear the utterances of a caller to the transaction-enabled information system and in response may respond verbally to the caller (e.g., by asking the caller for added information that the transaction-enabled information system would otherwise ask for by automated means), and / or may respond by making an input to the transaction-enabled information system (by keyboard, touch screen, verbally, or some other means) based upon the live agent's understanding of the caller's intention. In some embodiments, the transaction-enabled information system may be designed to switch to the live agent mode either automatically, when a specified requirement has been fulfilled and / or when a caller expresses an intention to proceed with the assistance of a live agent.
Owner:SPEAKSOFT

Data encryption/decryption and desensitization operation engine and working method thereof

The invention relates to a data encryption / decryption and desensitization operation engine, a working method thereof and a computer readable storage medium. The working method of the data encryption / decryption and desensitization operation engine comprises the following steps of: 10, intercepting SQL statements by an SDK client integrated to a business system, judging whether the SQL statements need to be rewritten or not according to a metadata configuration, directly sending requests to a database by the SQL statements not needing to be rewritten, and requesting a security service by the SQLstatements needing to be rewritten so as to be rewritten; 20, obtaining the SQL statements needing to be rewritten by the security service, completing SQL statement rewriting according to the metadata configuration, returning the rewritten SQL statements to the SDK client, and calling the rewritten SQL statements to initiate a request to the database by the SDK client; and 30, for the request involved in desensitization processing, taking a database expansion function as an RPC client to call an operation component of an RPC operation service so as to return a result. By using a client SDK mode, the business unavailability risk, caused by stability, of transparent data encryption gateway agency mode is avoided.
Owner:SHENZHEN TIANYUAN DIC INFORMATION TECH CO LTD

IP address reduction method under transparent reverse proxy mode

The invention provides an IP address reduction method and system under a transparent reverse proxy mode. The method comprises the following steps: deploying a WAF protection system; when the WAF protection system receives a server access request from a client, performing target address conversion on a target IP address to generate a corresponding internal use address; using the internal use address to act for a requested server by the WAF protection system to receive the access request from the client, and detecting whether the access request comprises an attack behavior; restoring the internal use address corresponding to the access request excluding the attack behavior as the target IP address by the WAF protection system, and forwarding the access request to a server corresponding to the target IP address. The transparence of the WAF proxy mode to the network environment and the business server is realized, the proxy address is unnecessary to be configured in the network deployment, the deployment is transparent through the tracking conversion on a source IP on the basis of the connection tracking technology.
Owner:WEBRAY TECH BEIJING CO LTD

Supl initialization message in a location information system and method and system for processing supl by using the same

A terminal and method and system for processing SUPL are discussed. According to one embodiment, the invention provides a method of processing a SUPL request for a terminal that has performed roaming, the method comprising: receiving a SUPL INIT message from a home SLP entity, the SUPL INIT message including an indicator that indicates whether a home SLP entity uses a proxy mode or a non-proxy mode; checking the indicator to determine whether the home SLP operates in the proxy mode or the non-proxy mode; and selectively performing authentication with the home SLP entity based on the checking result indicating whether the home SLP entity operates in the proxy mode or the non-proxy mode.
Owner:LG ELECTRONICS INC

Method for processing new business and business server

The invention provides a method for processing new business and a business server. The method comprises the steps of releasing one or more messages about the capability of the new business; after receiving a request message from a third party application, acquiring and analyzing the uniform resource locator address of the request message, and obtaining a message of the address offering the capability of the new business; and requesting corresponding capability of the new business according to the address message of the capability, and directly transmitting the response result of the capability of the new business to the third party application. According to the method, the capability of the new business is accessed and managed based on a simple agency mode, so that an operator is capable of quickly responding to the new business in the mobile internet and providing an access to the capability of the new business, thereby forming own mobile internet value-added business.
Owner:ZTE CORP

Android database lazy loading method based on proxy mode

The invention discloses an android database lazy loading method based on a proxy mode. The method includes the following steps that S100, proxy of a collection class is realized in the proxy mode, and a DAO layer in ORM visits a proxy object of the collection class; S200, a proxy class acts for an Iterator method of the collection class, and only when specific data are taken from a collection to call the Iterator method, does the proxy object fills up the collection by searching for a database. The utilization efficiency of the database is effectively improved, and the memory overhead of a system is effectively lowered.
Owner:AEROSPACE INFORMATION

Internet of cards intelligent recharging management method

The invention relates to the technical field of communication, and provides an internet of cards intelligent recharging management method which comprises the following steps of S1, creating an Internet of cards recharging management system applied to an Internet of cards centralized management platform, the Internet of cards recharging management system comprising a system setting module, an Internet of cards state detection module, an Internet of cards configuration module and a recharging payment module; S2, setting the state of each Internet of card as a test period, a silencing period, a charging period, a stop period and a termination period; S3, detecting the current state of each Internet of card in real time by an Internet of cards state detection module, recharging the Internet ofcards according to the states, converting the recharging fee into corresponding flow, and recharging the flow into the Internet of cards; and S4, setting a platform recharging fee payment module andan agent recharging fee payment module in the recharging payment module. The internet of cards intelligent recharging management method solves the problems that the existing Internet of cards cannot effectively plan the card recharging data, so that the cost of selling the Internet of cards by a service provider is too high, and the agent modes of all levels and the benefit distribution managementcannot be generated, and the like.
Owner:福建省公田软件股份有限公司

Method for processing product application forms of cloud platform in multi-hierarchy agent mode

The invention relates to the technical field of public cloud, in particular to a method for processing product application forms of a cloud platform in a multi-hierarchy agent mode. The method comprises the steps that users submit product application forms in a public cloud sales platform; agents receive the application forms submitted by the users, the application forms agreed to be applied can directly pass audit, and the application forms not meeting the requirements can be refused to be applied and modification suggestions are fed back; if the agents cannot determine whether the application forms can be audited or not, the agents submit the application forms to a general agent, and the general agent determines whether the audit is passed or not; the application forms passing the audit enter a product delivery process; and the application forms not passing the audit are modified by the user and enters an application form process again. According to the method, the problems of application form processing disorder and non-timely response under the condition of relatively large agent scale are solved; and meanwhile, when the sub-agents are insufficiently familiar with G-Cloud platform resource conditions and cannot accurately judge whether the applications are authorized or not, the sub-agents can submit the application forms to the general agent for making a judgment.
Owner:G CLOUD TECH

Method and device for realizing authentication of interface calling party in dynamic proxy mode

The invention particularly relates to a method and a device for realizing authentication of an interface calling party in a dynamic proxy mode. According to the method and the device for realizing authentication of the interface calling party in the dynamic proxy mode. The method is characterized by firstly defining a service interface and an implementation class to realize the service interface, and rewriting and realizing a business logic method; then, defining a section abstract class, and rewriting business logic methods of starting, ending, exception, front enhancement and rear enhancement according to needs when the section abstract class is defined; creating a section class, configuring an entry point and enhancement in the section class, and verifying the identity of the caller; and finally, testing and generating a dynamic agent class. According to the method and the device for realizing authentication of the interface calling party in the dynamic proxy mode, non-intrusive code expansion is realized, the method can be enhanced under the condition of not modifying a source code, and meanwhile, proxy logic and business logic are mutually independent and are not coupled so that high reliability and high availability of system use and service provision are ensured.
Owner:INSPUR SOFTWARE CO LTD

Method for implementing agency mode of personal network equipment, and personal network equipment

InactiveCN102457531ASolve the problem that the CPNS network cannot be accessed through the proxy deviceExpand the ability to use businessServices signallingTransmissionComputer networkPersonal network
The invention discloses a method for implementing an agency mode of personal network equipment, and personal network equipment. The method comprises the following steps that: when monitoring that non-converged personal network service (CPNS) equipment access a network, the CPNS equipment starts the agency mode, wherein the agency mode is that the non-CPNS equipment is allowed to access the network through the CPNS equipment; under the agency mode, the CPNS equipment forwards information interacted between the non-CPNS equipment and the network. By the method, the problem that the non-CPNS equipment cannot access the network through agency equipment is solved, and a CPNS network and the service using capacity of the CPNS equipment and the non-CPNS equipment on the network are expanded.
Owner:ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products