Movatterモバイル変換


[0]ホーム

URL:


CN109582315A - Service privatization method, apparatus, computer equipment and storage medium - Google Patents

Service privatization method, apparatus, computer equipment and storage medium
Download PDF

Info

Publication number
CN109582315A
CN109582315ACN201811255524.XACN201811255524ACN109582315ACN 109582315 ACN109582315 ACN 109582315ACN 201811255524 ACN201811255524 ACN 201811255524ACN 109582315 ACN109582315 ACN 109582315A
Authority
CN
China
Prior art keywords
service
installation kit
server
mirror image
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811255524.XA
Other languages
Chinese (zh)
Inventor
林海涛
刘建夏
张文康
张红光
向宇波
宋乐侃
王莉
王天天
王磊
喻友平
吴甜
沈俊宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co LtdfiledCriticalBeijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201811255524.XApriorityCriticalpatent/CN109582315A/en
Publication of CN109582315ApublicationCriticalpatent/CN109582315A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention discloses service privatization method, apparatus, computer equipment and storage mediums, and wherein method includes: to be compiled to the service code got;Based on compiling as a result, by docker container engine technique, the mirror image of service is made;The installation kit of service is generated according to mirror image, and installation kit is stored to predetermined position, and after being downloaded on the server of user so as to installation kit, when the key for getting user disposes request, the deployment of service on the server is completed according to installation kit.Using scheme of the present invention, development and maintenance cost etc. can reduce.

Description

Service privatization method, apparatus, computer equipment and storage medium
[technical field]
The present invention relates to Computer Applied Technologies, in particular to service privatization method, apparatus, computer equipment and storageMedium.
[background technique]
Artificial intelligence (AI, Artificial Intelligence) technology is being widely used at present, be related to business,The every field such as finance, security protection, entertainment, relatively common service provider case are publicly-owned cloud services, and many companies both provideAI open platform, but in the case where bank finance, security protection etc. are related to the scene of private data, service privatization is deployed to client and (usesFamily) computer room is only client and needs most and optimal solution.
For industry in terms of the deployment of service privatization, the mode generallyd use is will to service (software) to run directly at presentIn the operating system (OS, Operating System) of client server, by using the side such as different editions deployment package or patchFormula removes the different os releases of compatible different clients server.In deployment services on client server, pass through middleware or agencyThe modes such as software establish clustered machine interface channel, by operating one to more than one servers, will service according to certain sequential placementOnto the clusters of machines of client.
But the customer group that service privatization faces is very big, the os release of the server of each client may be differentSample, service are run directly on the OS of client server, need to be adapted to centos, Ubuntu, redhat and suse etc. moreThe operating system of kind version, the development and maintenance cost in the software compatibility are very high.In addition, due to being related to deep learningThe complex environment of frame relies on, and relies on graphics processor (GPU, Graphics Processing to a certain extentThe hardware supporteds such as Unit), therefore dispose difficult, and these environment of curstomer's site deployed in real time are needed, to increaseLower deployment cost etc..
[summary of the invention]
In view of this, the present invention provides service privatization method, apparatus, computer equipment and storage mediums.
Specific technical solution is as follows:
A kind of service privatization method, comprising:
The service code got is compiled;
Based on compiling as a result, by docker container engine technique, the mirror image of the service is made;
The installation kit of the service is generated according to the mirror image, and the installation kit is stored to predetermined position, with toiletIt states after installation kit is downloaded on the server of user, when the key for getting user disposes request, according to the installation kitComplete deployment of the service on the server.
According to one preferred embodiment of the present invention, this method further comprises: in code compilation process, according at least twoThe Code obfuscation tool of language carries out Code obfuscation encryption.
According to one preferred embodiment of the present invention, this method further comprises: right before the mirror image of the production serviceBinary system in the compiling result executes program and carries out shell adding protection.
According to one preferred embodiment of the present invention, this method further comprises: before the installation kit for generating the service, obtainingThe machine fingerprint for taking the server generates permission according to the machine fingerprint and controls certificate.
According to one preferred embodiment of the present invention, this method further comprises: right before the installation kit for generating the serviceIn the mirror image by deep learning train come kernel model file be encrypted.
According to one preferred embodiment of the present invention, this method further comprises: before the installation kit for generating the service, obtainingTake the machine fingerprint of the server;
The described kernel model file is encrypted includes: to generate encryption key according to the machine fingerprint,The kernel model file is encrypted using the encryption key.
According to one preferred embodiment of the present invention, this method further comprises: raw before the installation kit for generating the serviceAt configuration file needed for the service starting, the installation kit is generated according to the mirror image and the configuration file.
A kind of service privatization method, comprising:
After the installation kit of service is downloaded on the server of user, the key deployment request of user, the peace are obtainedDress packet is is compiled to the code of the service got, and based on compiling as a result, by docker container engine technique,After the mirror image for producing the service, according to the installation kit for the service that the mirror image generates;
Deployment of the service on the server is completed according to the installation kit.
According to one preferred embodiment of the present invention, described that the service is completed on the server according to the installation kitDeployment includes:
The configuration file in the installation kit is read, the service is completed on the server according to the configuration fileDeployment.
According to one preferred embodiment of the present invention, it is carried in the installation kit and has permission control certificate, the permission control cardWhat the machine fingerprint of the server got according to book generated;
This method further comprises: controlling certificate according to the permission when service arrangement and tests server progress permissionCard.
According to one preferred embodiment of the present invention, this method further comprises: passing through depth when needing to run in the serviceWhen the kernel model file that learning training comes out, if the kernel model file has carried out encryption, it is decrypted.
According to one preferred embodiment of the present invention, this method further comprises following one or whole:
According to the self-service operation and maintenance tools that the service provides, service O&M is carried out;
According to the open source shipyard tool that the service provides, the visualized management of docker container is carried out.
A kind of service privatization device, comprising: code compilation unit, mirror image production unit and installation kit generation unit;
The code compilation unit, for being compiled to the service code got;
The mirror image production unit, for, as a result, by docker container engine technique, making the service based on compilingMirror image;
The installation kit generation unit, for generating the installation kit of the service according to the mirror image, and by the installationPredetermined position is arrived in packet storage, after being downloaded on the server of user so as to the installation kit, when the key portion for getting userWhen administration's request, deployment of the service on the server is completed according to the installation kit.
According to one preferred embodiment of the present invention, the code compilation unit is further used for, in code compilation process, rootAccording to the Code obfuscation tool of at least two language, Code obfuscation encryption is carried out.
According to one preferred embodiment of the present invention, the mirror image production unit is further used for, in the mirror for making the serviceBefore picture, program is executed to the binary system in the compiling result and carries out shell adding protection.
According to one preferred embodiment of the present invention, the installation kit generation unit is further used for, and is generating the serviceBefore installation kit, the machine fingerprint of the server is obtained, permission is generated according to the machine fingerprint and controls certificate.
According to one preferred embodiment of the present invention, the installation kit generation unit is further used for, and is generating the serviceBefore installation kit, in the mirror image by deep learning train come kernel model file be encrypted.
According to one preferred embodiment of the present invention, the installation kit generation unit is further used for, and is generating the serviceBefore installation kit, the machine fingerprint of the server is obtained, encryption key is generated according to the machine fingerprint, utilizes the encryptionKernel model file described in key pair is encrypted.
According to one preferred embodiment of the present invention, the installation kit generation unit is further used for, and is generating the serviceBefore installation kit, configuration file needed for generating the service starting generates institute according to the mirror image and the configuration fileState installation kit.
A kind of service privatization device, comprising: request unit and service arrangement unit;
The request unit, for obtaining user after the installation kit of service is downloaded on the server of userA key dispose request, the installation kit is to be compiled to the code of the service got, and based on compiling as a result, logicalDocker container engine technique is crossed, after the mirror image for producing the service, according to the installation for the service that the mirror image generatesPacket;
The service arrangement unit, for completing deployment of the service on the server according to the installation kit.
According to one preferred embodiment of the present invention, the service arrangement unit reads the configuration file in the installation kit, rootDeployment of the service on the server is completed according to the configuration file.
According to one preferred embodiment of the present invention, it is carried in the installation kit and has permission control certificate, the permission control cardWhat the machine fingerprint of the server got according to book generated;
The service arrangement unit is further used for, and controls certificate to the service according to the permission in service arrangementDevice carries out Authority Verification.
According to one preferred embodiment of the present invention, the service arrangement unit is further used for, when needing to run the serviceIn by deep learning train come kernel model file when, if the kernel model file has carried out encryption, intoRow decryption processing.
According to one preferred embodiment of the present invention, the service arrangement unit is further used for executing following one or whole:
According to the self-service operation and maintenance tools that the service provides, service O&M is carried out;
According to the open source shipyard tool that the service provides, the visualized management of docker container is carried out.
A kind of computer equipment, including memory, processor and be stored on the memory and can be in the processorThe computer program of upper operation, the processor realize method as described above when executing described program.
A kind of computer readable storage medium is stored thereon with computer program, real when described program is executed by processorNow method as described above.
It can be seen that based on above-mentioned introduction using scheme of the present invention, by introducing docker container engine technique, solutionThe service of having determined needs the problem of multi version OS of compatible subscribers, to reduce development and maintenance cost, and, it can be achieved that serviceKey deployment greatly reduce deployment difficulty, and reduce lower deployment cost so that complicated mapping out the work becomes simpleDeng.
[Detailed description of the invention]
Fig. 1 is the flow chart of service privatization method first embodiment of the present invention.
Fig. 2 is the flow chart of service privatization method second embodiment of the present invention.
Fig. 3 is that the whole of service privatization method of the present invention realizes process schematic.
Fig. 4 is the composed structure schematic diagram of service privatization device first embodiment of the present invention.
Fig. 5 is the composed structure schematic diagram of service privatization device second embodiment of the present invention.
Fig. 6 shows the block diagram for being suitable for the exemplary computer system/server 12 for being used to realize embodiment of the present invention.
[specific embodiment]
A kind of service privatization mode is proposed in the present invention, the service can be AI service etc..
In order to be clearer and more clear technical solution of the present invention, hereinafter, referring to the drawings and the embodiments, to institute of the present inventionThe scheme of stating is further described.
Obviously, described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on the present inventionIn embodiment, those skilled in the art's all other embodiment obtained without creative efforts, allBelong to the scope of protection of the invention.
Fig. 1 is the flow chart of service privatization method first embodiment of the present invention.As shown in Figure 1, including following toolBody implementation.
In 101, the service code got is compiled.
In 102, based on compiling as a result, by docker container engine technique, the mirror image of service is made.
In 103, the installation kit of service is generated according to the mirror image, and installation kit is stored to predetermined position, to pacifyAfter dress coating downloads on the server of user, when the key for getting user disposes request, complete to service according to installation kitDeployment on the server.
Service code can be obtained, and it is compiled, to obtain compiling result.It later, can be based on compiling as a result, logicalDocker container engine technique is crossed, the mirror image of service is made.
Current service privatization mode is the direct operation service of OS based on user (client) server, needs to be compatible withThe OS of multiple versions needs to put into a large amount of compatible development and maintenance cost etc..
By the docker container engine technique of open source in the present embodiment, service production is mirrored into, when operation does not depend onIn host OS, to realize service and the decoupling of os release, avoid the research and development for servicing compatible multi version OS and maintenance atThis, it is only necessary to solve deployment compatibility of the docker on multi version OS, such as offline deployment docker environment, this part workIt is very low to make cost.
, it can be achieved that the automated production of mirror image and version management in terms of mirror image production, the code that coding can be completed fromCode storage is self-service to pull compiler server, and the automatic production etc. of mirror image, and recordable clothes are realized by the Jib technology of open sourceBusiness version information and mirror image relevant information.In this way, research staff is not necessarily to hand-made mirror image, and can safeguard requiredVersion information etc., greatly reduce research and development cost, improve efficiency of research and development.
The different function of service can correspond to different service modules, can calculate dependence according to the dependence of intermoduleTree, and then the required configuration file of service starting can be generated according to dependent tree, it may include service module version in configuration file, openThe information such as dynamic sequence and Starting mode, according to the installation kit of the producible services such as the mirror image and configuration file got.
The installation kit of generation can be stored to predetermined position, such as storage to specified external document storage server, forFamily is downloaded, and the downloading can be downloading manually.After installation kit is downloaded on the server of user, user is being gotKey when disposing request, service deployment on the server can be completed automatically according to installation kit.
Under privatization scene, the intellectual property of service needs to be protected, therefore further provides in the present embodimentFollowing safety prevention measure.
In code compilation process, it can be carried out at Code obfuscation encryption according to the Code obfuscation tool of at least two languageReason.
Such as, it is possible to provide the Code obfuscation tool of 4 kinds of language such as c, c++, java and python, it can be according to different servicesThe language of module, is respectively adopted the Code obfuscation tool of corresponding language, and generation is automatically completed in code compilation processCode obscures encryption, to prevent from obtaining source code by decompiling.
Before the mirror image of production service, can also program be executed to the binary system in compiling result and carry out shell adding protection.JourneyAfter sequence shell adding, then the automated production of mirror image is carried out, dis-assembling analysis or dynamic analysis to program can be prevented, protect softwareSafety is substantially improved in copyright.
In addition, generate service installation kit before, can also in mirror image by deep learning train come core mouldType file is encrypted, to achieve the purpose that protect kernel model document knowledge property right.
For example, the machine fingerprint of server can be obtained, encryption key is generated according to the machine fingerprint got, utilizes generationEncryption key kernel model file is encrypted.Server refers to the server to deployment services, how to obtain machineDevice fingerprint is the prior art, and the machine fingerprint of different server is typically different.Encryption key can dynamic generation, can be referred to according to machineLine, which calculates, to be generated.
Under privatization scene, permission control is to ensure the necessary means of the business equity of developer, as developer issues cardBook (license) give user, describe can which hardware device, what time period in, using which type of service.
The authority control method based on license is also provided that in the present embodiment, before the installation kit for generating service,The machine fingerprint of server can be obtained, and permission control certificate can be generated according to the machine fingerprint got.It is providing based on clothesIt is engaged in except the common permission control ability of device, service module and this 3 kinds of dimensions of time, may further provide based on Service InstanceSeveral and query rate per second (QPS: Queries Per Second) the permission control of dimension can control how many of user's deploymentService Instance and oncurrent processing ability meet more control scenes.It is tested in addition, carrying out permission to server in service arrangementWhen card, the security hardening of Secure Socket Layer (SSL, Secure Sockets Layer) two-way authentication can be used, prevent from forging visitorThe request of family end or server-side response, control around permission.
Fig. 2 is the flow chart of service privatization method second embodiment of the present invention.As shown in Fig. 2, including following toolBody implementation.
In 201, after the installation kit of service is downloaded on the server of user, the key deployment for obtaining user is askedIt asks, the installation kit is to be compiled to the code of the service got, and be based on compiling as a result, passing through docker container engineTechnology, after the mirror image for producing service, according to the installation kit for the service that mirror image generates.
In 202, the deployment of service on the server is completed according to installation kit.
It in current service privatization mode, needs to carry out complicated operation, input complicated order or calls differentScript, step by step go deployment services and preparing environment etc..
A key deployment tool is provided in the present embodiment, need to only be executed calling starting script and be issued key deployment request,Can be completed service mapping out the work on a server, including to service environment deployment support, as TensorFlow,PaddlePaddle, GPU drive environment etc..After the completion of Servers-all is performed both by, that is, complete entire cluster serviceDeployment, subsequent work include that upgrading, rollback, shutdown etc. all only need to can control the reality of entire cluster in the operation of middle control machineIt is existing.
The standard of customizable modular modularization arranges file knot, Starting mode and the log output of each service moduleStandard etc., so that the deployment criteria of all modules is the same.As previously mentioned, needing to generate service in installation kit productionConfiguration file needed for starting, wherein may include the information such as service module version, boot sequence and Starting mode, in service departmentWhen administration, configuration file can be read, the deployment of service on the server is completed according to information therein.
In addition, can also carry out permission when service arrangement to server according to the permission control certificate carried in installation kit and testCard, Authority Verification pass through, then continue subsequent processing.
When need in operation service by deep learning train come kernel model file when, if kernel model file intoEncryption is gone, it is also necessary to be decrypted, manner of decryption corresponding with cipher mode can be used and be decrypted.
In existing service privatization mode, often lack the relevant tool of O&M, when breaking down so as to cause serviceIt can not find in time, or service O&M is realized by command line mode, maloperation is easy to appear, in addition, service fault reasonWhen location difficulty, especially more machines, can not express statistic service the core index such as performance and stability.
In the present embodiment, the self-service operation and maintenance tools that can be provided according to service carry out service O&M, comprising: take by acquisitionBe engaged in log, performance, the stability of Analysis Service, based on the modes such as serve port inspection, log keyword match visit it is living andService availability monitoring carries out early warning etc. by channels such as short message and mails.
In addition, the open source shipyard tool that can be also provided according to service, carries out the visualized management of docker container, fromAnd the operation management container service for allowing user self-service, including restart container, it is scalable hold, stop service, connection container holdRow shell etc..
In summary it introduces, Fig. 3 is the whole realization process schematic of service privatization method of the present invention, specific realReferring now to aforementioned related description, repeat no more.
It should be noted that for the various method embodiments described above, for simple description, being all expressed as a series ofCombination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described, because according toAccording to the present invention, certain steps can use other sequences or carry out simultaneously.Secondly, those skilled in the art should also know that,The embodiments described in the specification are all preferred embodiments, and not necessarily the present invention must for related actions and modulesMust.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodimentPoint, it may refer to the associated description of other embodiments.
In short, by introducing docker container engine technique, solving clothes using scheme described in embodiment of the present invention methodThe problem of business needs the multi version OS of compatible subscribers, to reduce development and maintenance cost, and, it can be achieved that the key servicedDeployment, so that complicated mapping out the work becomes simple, greatly reduce deployment difficulty, and reduce lower deployment cost etc..
In addition, by self-service operation and maintenance tools etc., reducing user's O&M pipe using scheme described in embodiment of the present invention methodThe cost of service is managed, it is simple and convenient.
In addition, using scheme described in embodiment of the present invention method, by carrying out Code obfuscation, program shell adding and core mouldThe processing such as type file encryption, improves the safety of service, ensure that the intellectual property of service, also, control by permission, protectsThe business equity etc. of developer is demonstrate,proved.
It from overall plan, more improves more efficient, runs through entire privatization process, the installation including automation packsMake, self-service downloading and deployment and self-service O&M etc., the very efficient quick execution of whole flow process, does not need excessive artificialIntervention, do not need deployment assistant director's waiting go on business to user's computer room deployment etc., substantially reduce the privatization period.
The introduction about embodiment of the method above, below by way of Installation practice, to scheme of the present invention carry out intoOne step explanation.
Fig. 4 is the composed structure schematic diagram of service privatization device first embodiment of the present invention.As shown in figure 4, packetIt includes: code compilation unit 401, mirror image production unit 402 and installation kit generation unit 403.
Code compilation unit 401, for being compiled to the service code got.
Mirror image production unit 402, for, as a result, by docker container engine technique, making the mirror of service based on compilingPicture.
Installation kit generation unit 403 is stored for generating the installation kit of service according to mirror image, and by installation kit to pre-determined bitIt sets, after being downloaded on the server of user so as to installation kit, when the key for getting user disposes request, according to installation kitComplete the deployment of service on the server.
Code compilation unit 401 can obtain service code, and be compiled to it, to obtain compiling result.Later, mirrorAs production unit 402 can make the mirror image of service based on compiling as a result, by docker container engine technique.
By the docker container engine technique of open source, service production is mirrored into, independent of host OS when operation,To realize service and the decoupling of os release, the research and development and maintenance cost for servicing compatible multi version OS are avoided.
Wherein, in code compilation process, code compilation unit 401 can also be according to the Code obfuscation work of at least two languageTool carries out Code obfuscation encryption.
Before the mirror image of production service, mirror image production unit 402 can also execute program to the binary system in compiling resultCarry out shell adding protection.
Installation kit generation unit 403 can obtain the machine fingerprint of server, according to machine before the installation kit for generating serviceDevice fingerprint generates permission and controls certificate.In addition, installation kit generation unit 403 can also in mirror image by deep learning train comeKernel model file be encrypted.For example, obtaining the machine fingerprint of server, it is close to generate encryption according to machine fingerprintKey is encrypted kernel model file using encryption key.
The different function of service can correspond to different service modules, and installation kit generation unit 403 can also be according to intermoduleDependence calculates dependent tree, and then generates the required configuration file of service starting according to dependent tree, can wrap in configuration fileThe information such as the module release containing service, boot sequence and Starting mode, can give birth to according to the mirror image and configuration file etc. that getAt the installation kit of service, and the installation kit of generation can be stored to predetermined position, such as store to specified external file and store clothesBusiness device, is downloaded for user.
Fig. 5 is the composed structure schematic diagram of service privatization device second embodiment of the present invention.As shown in figure 5, packetIt includes: request unit 501 and service arrangement unit 502.
Request unit 501, for obtaining user's after the installation kit of service is downloaded on the server of userThe deployment request of one key, the installation kit are to be compiled to the code of the service got, and be based on compiling as a result, passing throughDocker container engine technique, after the mirror image for producing service, according to the installation kit for the service that mirror image generates.
Service arrangement unit 502, for completing the deployment of service on the server according to installation kit.
Wherein, the configuration file in installation kit can be read in service arrangement unit 502, completes service according to configuration file and is takingThe deployment being engaged on device.
It can also be carried in installation kit and have permission control certificate, the machine of the server got according to permission control certificateWhat fingerprint generated, correspondingly, service arrangement unit 502 can control certificate according to permission in service arrangement and weigh to serverLimit verifying.
When need in operation service by deep learning train come kernel model file when, if kernel model file intoEncryption is gone, service arrangement unit 502 also needs first to be decrypted.
In addition, service arrangement unit 502 can also further execute following one or whole:
According to the self-service operation and maintenance tools that service provides, service O&M is carried out, comprising: by acquiring serve log, analysis clothesPerformance, the stability of business carry out visiting living and service availability prison based on modes such as serve port inspection, log keyword matchsControl carries out early warning etc. by channels such as short message and mails;
According to the open source shipyard tool that service provides, the visualized management of docker container is carried out, so that withFamily can be self-service operation management container service, including restart container, it is scalable hold, stop service, connection container execute shellDeng.
The specific workflow of Fig. 4 and Fig. 5 shown device embodiment please refers to the related description in preceding method embodiment,It repeats no more.
In short, by introducing docker container engine technique, solving clothes using scheme described in apparatus of the present invention embodimentThe problem of business needs the multi version OS of compatible subscribers, to reduce development and maintenance cost, and, it can be achieved that the key servicedDeployment, so that complicated mapping out the work becomes simple, greatly reduce deployment difficulty, and reduce lower deployment cost etc..
In addition, by self-service operation and maintenance tools etc., reducing user's O&M pipe using scheme described in apparatus of the present invention embodimentThe cost of service is managed, it is simple and convenient.
In addition, using scheme described in apparatus of the present invention embodiment, by carrying out Code obfuscation, program shell adding and core mouldThe processing such as type file encryption, improves the safety of service, ensure that the intellectual property of service, also, control by permission, protectsThe business equity etc. of developer is demonstrate,proved.
It from overall plan, more improves more efficient, runs through entire privatization process, the installation including automation packsMake, self-service downloading and deployment and self-service O&M etc., the very efficient quick execution of whole flow process, does not need excessive artificialIntervention, do not need deployment assistant director's waiting go on business to user's computer room deployment etc., substantially reduce the privatization period.
Fig. 6 shows the block diagram for being suitable for the exemplary computer system/server 12 for being used to realize embodiment of the present invention.The computer system/server 12 that Fig. 6 is shown is only an example, should not function and use scope to the embodiment of the present inventionBring any restrictions.
As shown in fig. 6, computer system/server 12 is showed in the form of universal computing device.Computer system/serviceThe component of device 12 can include but is not limited to: one or more processor (processing unit) 16, memory 28, connect not homologyThe bus 18 of system component (including memory 28 and processor 16).
Bus 18 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller,Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It liftsFor example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC)Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Computer system/server 12 typically comprises a variety of computer system readable media.These media, which can be, appointsWhat usable medium that can be accessed by computer system/server 12, including volatile and non-volatile media, it is moveable andImmovable medium.
Memory 28 may include the computer system readable media of form of volatile memory, such as random access memoryDevice (RAM) 30 and/or cache memory 32.Computer system/server 12 may further include it is other it is removable/noMovably, volatile/non-volatile computer system storage medium.Only as an example, storage system 34 can be used for reading and writingImmovable, non-volatile magnetic media (Fig. 6 do not show, commonly referred to as " hard disk drive ").It, can although being not shown in Fig. 6To provide the disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk "), and it is non-volatile to movingProperty CD (such as CD-ROM, DVD-ROM or other optical mediums) read and write CD drive.In these cases, each driveDynamic device can be connected by one or more data media interfaces with bus 18.Memory 28 may include at least one programProduct, the program product have one group of (for example, at least one) program module, these program modules are configured to perform the present inventionThe function of each embodiment.
Program/utility 40 with one group of (at least one) program module 42 can store in such as memory 28In, such program module 42 includes --- but being not limited to --- operating system, one or more application program, other programsIt may include the realization of network environment in module and program data, each of these examples or certain combination.Program mouldBlock 42 usually executes function and/or method in embodiment described in the invention.
Computer system/server 12 can also be (such as keyboard, sensing equipment, aobvious with one or more external equipments 14Show device 24 etc.) communication, it is logical that the equipment interacted with the computer system/server 12 can be also enabled a user to one or moreLetter, and/or with the computer system/server 12 any is set with what one or more of the other calculating equipment was communicatedStandby (such as network interface card, modem etc.) communicates.This communication can be carried out by input/output (I/O) interface 22.AndAnd computer system/server 12 can also pass through network adapter 20 and one or more network (such as local area network(LAN), wide area network (WAN) and/or public network, such as internet) communication.As shown in fig. 6, network adapter 20 passes through bus18 communicate with other modules of computer system/server 12.It should be understood that although not shown in the drawings, computer can be combinedSystems/servers 12 use other hardware and/or software module, including but not limited to: microcode, device driver, at redundancyManage unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
The program that processor 16 is stored in memory 28 by operation, at various function application and dataReason, such as realize the method in Fig. 1 or embodiment illustrated in fig. 2.
The present invention discloses a kind of computer readable storage mediums, are stored thereon with computer program, the program quiltProcessor will realize the method in embodiment as shown in Figure 1 or 2 when executing.
It can be using any combination of one or more computer-readable media.Computer-readable medium can be calculatingMachine readable signal medium or computer readable storage medium.Computer readable storage medium for example can be --- but it is unlimitedIn system, device or the device of --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or any above combination.It calculatesThe more specific example (non exhaustive list) of machine readable storage medium storing program for executing includes: electrical connection with one or more conducting wires, justTaking formula computer disk, hard disk, random access memory (RAM), read-only memory (ROM), erasable type may be programmed read-only storageDevice (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device,Or above-mentioned any appropriate combination.In this document, computer readable storage medium can be it is any include or storage journeyThe tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including --- butIt is not limited to --- electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also beAny computer-readable medium other than computer readable storage medium, which can send, propagate orTransmission is for by the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimitedIn --- wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereofProgram code, described program design language include object oriented program language-such as Java, Smalltalk, C++,Further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be withIt fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portionDivide and partially executes or executed on a remote computer or server completely on the remote computer on the user computer.?Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) orWide area network (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as mentioned using Internet serviceIt is connected for quotient by internet).
In several embodiments provided by the present invention, it should be understood that disclosed device and method etc. can pass throughOther modes are realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit,Only a kind of logical function partition, there may be another division manner in actual implementation.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unitThe component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multipleIn network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unitIt is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated listMember both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at oneIn storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computerIt is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute the present inventionThe part steps of embodiment the method.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM,Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. it is variousIt can store the medium of program code.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the inventionWithin mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the present invention.

Claims (26)

CN201811255524.XA2018-10-262018-10-26Service privatization method, apparatus, computer equipment and storage mediumPendingCN109582315A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201811255524.XACN109582315A (en)2018-10-262018-10-26Service privatization method, apparatus, computer equipment and storage medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201811255524.XACN109582315A (en)2018-10-262018-10-26Service privatization method, apparatus, computer equipment and storage medium

Publications (1)

Publication NumberPublication Date
CN109582315Atrue CN109582315A (en)2019-04-05

Family

ID=65920880

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201811255524.XAPendingCN109582315A (en)2018-10-262018-10-26Service privatization method, apparatus, computer equipment and storage medium

Country Status (1)

CountryLink
CN (1)CN109582315A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110175033A (en)*2019-05-242019-08-27北京百度网讯科技有限公司Service arrangement method and apparatus and serving starting method and device
CN110297653A (en)*2019-07-022019-10-01浪潮云信息技术有限公司A kind of method of container service upgrading
CN110413294A (en)*2019-08-062019-11-05中国工商银行股份有限公司Service delivery system, method, apparatus and equipment
CN111124646A (en)*2019-12-232020-05-08百度国际科技(深圳)有限公司Privatization transformation implementation method and device, electronic equipment and storage medium
CN111352635A (en)*2019-04-162020-06-30深圳市鸿合创新信息技术有限责任公司 A method and apparatus for deploying microservices, and an electronic device
CN111459506A (en)*2020-03-022020-07-28平安科技(深圳)有限公司Deployment method, device, medium and electronic equipment of deep learning platform cluster
CN111857738A (en)*2020-08-052020-10-30北京千丁互联科技有限公司Privatization deployment method and device
CN112148297A (en)*2020-08-262020-12-29广州市保伦电子有限公司Intelligent server encryption and packaging method and device
CN114661306A (en)*2020-12-222022-06-24苏州国双软件有限公司Data processing method and device, electronic equipment and storage medium
CN115098106A (en)*2022-06-022022-09-23苏州思萃工业互联网技术研究所有限公司HCI cluster virtualization management automation compiling and deploying system and method
CN115552369A (en)*2020-06-042022-12-30深圳市欢太科技有限公司 Compiling method, compiling device, compiling system, storage medium and electronic equipment
CN116126453A (en)*2021-11-122023-05-16深圳长城开发科技股份有限公司Method for offline setting up of LNMP environment based on Docker

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103078858A (en)*2012-12-312013-05-01上海同岩土木工程科技有限公司Web service and signature certificate-based software trial authorization method
CN106095408A (en)*2016-05-312016-11-09浙江网新恒天软件有限公司A kind of system and method for data monitoring and Code automatic build and deployment
CN107609394A (en)*2017-08-282018-01-19上海移卓网络科技有限公司Tamper resistant method, storage device and the device of Android installation kits
CN107678756A (en)*2017-09-292018-02-09千寻位置网络有限公司A kind of Web based on Docker applies a key dissemination method
CN107896230A (en)*2017-12-262018-04-10车智互联(北京)科技有限公司A kind of system for supporting high concurrent order to perform passage
US20180173512A1 (en)*2016-12-192018-06-21International Business Machines CorporationOptimized Creation of Distributed Storage and Distributed Processing Clusters on Demand
CN108196843A (en)*2018-01-092018-06-22成都睿码科技有限责任公司Visualization Docker containers compile the O&M method of deployment automatically
CN108282513A (en)*2017-12-082018-07-13广州视源电子科技股份有限公司Server deployment method, system, storage medium and computer equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103078858A (en)*2012-12-312013-05-01上海同岩土木工程科技有限公司Web service and signature certificate-based software trial authorization method
CN106095408A (en)*2016-05-312016-11-09浙江网新恒天软件有限公司A kind of system and method for data monitoring and Code automatic build and deployment
US20180173512A1 (en)*2016-12-192018-06-21International Business Machines CorporationOptimized Creation of Distributed Storage and Distributed Processing Clusters on Demand
CN107609394A (en)*2017-08-282018-01-19上海移卓网络科技有限公司Tamper resistant method, storage device and the device of Android installation kits
CN107678756A (en)*2017-09-292018-02-09千寻位置网络有限公司A kind of Web based on Docker applies a key dissemination method
CN108282513A (en)*2017-12-082018-07-13广州视源电子科技股份有限公司Server deployment method, system, storage medium and computer equipment
CN107896230A (en)*2017-12-262018-04-10车智互联(北京)科技有限公司A kind of system for supporting high concurrent order to perform passage
CN108196843A (en)*2018-01-092018-06-22成都睿码科技有限责任公司Visualization Docker containers compile the O&M method of deployment automatically

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张博等: "《常用黑客攻防技术大全》", 31 January 2011, 中国铁道出版社*
许云峰等: "《大数据技术及行业应用》", 31 August 2016, 北京邮电大学出版社*

Cited By (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111352635A (en)*2019-04-162020-06-30深圳市鸿合创新信息技术有限责任公司 A method and apparatus for deploying microservices, and an electronic device
CN111352635B (en)*2019-04-162024-12-17深圳市鸿合创新信息技术有限责任公司Method and device for deploying micro-service and electronic equipment
CN110175033A (en)*2019-05-242019-08-27北京百度网讯科技有限公司Service arrangement method and apparatus and serving starting method and device
CN110297653A (en)*2019-07-022019-10-01浪潮云信息技术有限公司A kind of method of container service upgrading
CN110413294A (en)*2019-08-062019-11-05中国工商银行股份有限公司Service delivery system, method, apparatus and equipment
CN110413294B (en)*2019-08-062023-09-12中国工商银行股份有限公司Service release system, method, device and equipment
CN111124646A (en)*2019-12-232020-05-08百度国际科技(深圳)有限公司Privatization transformation implementation method and device, electronic equipment and storage medium
CN111124646B (en)*2019-12-232023-03-14百度国际科技(深圳)有限公司Privatization transformation implementation method and device, electronic equipment and storage medium
CN111459506A (en)*2020-03-022020-07-28平安科技(深圳)有限公司Deployment method, device, medium and electronic equipment of deep learning platform cluster
CN111459506B (en)*2020-03-022023-10-13平安科技(深圳)有限公司Deep learning platform cluster deployment method and device, medium and electronic equipment
CN115552369A (en)*2020-06-042022-12-30深圳市欢太科技有限公司 Compiling method, compiling device, compiling system, storage medium and electronic equipment
CN111857738A (en)*2020-08-052020-10-30北京千丁互联科技有限公司Privatization deployment method and device
CN112148297A (en)*2020-08-262020-12-29广州市保伦电子有限公司Intelligent server encryption and packaging method and device
CN114661306A (en)*2020-12-222022-06-24苏州国双软件有限公司Data processing method and device, electronic equipment and storage medium
CN116126453A (en)*2021-11-122023-05-16深圳长城开发科技股份有限公司Method for offline setting up of LNMP environment based on Docker
CN115098106A (en)*2022-06-022022-09-23苏州思萃工业互联网技术研究所有限公司HCI cluster virtualization management automation compiling and deploying system and method

Similar Documents

PublicationPublication DateTitle
CN109582315A (en)Service privatization method, apparatus, computer equipment and storage medium
CN111316279B (en) Computer-implemented systems and methods for connecting blockchains with digital twin collections
CN110414268B (en)Access control method, device, equipment and storage medium
CN106575243A (en)Hypervisor-hosted virtual machine forensics
CN109597677A (en)Method and apparatus for handling information
CN109344568A (en)Document handling method and device based on block chain
CN109683880A (en)Webpage exchange method, device, equipment and storage medium
CN103310139A (en)Input validation method and input validation device
CN109783374A (en)Code process method, apparatus, equipment and the computer storage medium in automatic Pilot field
CN107873125A (en)Active/standby devices scramble is shown
CN112153012A (en)Multi-terminal contact access method, device and storage medium
CN101930361A (en) Method and system for providing online data storage service
CN111222181B (en)AI model supervision method, system, server and storage medium
CN109347899A (en) Method of writing log data in distributed storage system
CN109657167A (en)Collecting method, device, server and storage medium
CN111241540A (en)Service processing method and device
US8972745B2 (en)Secure data handling in a computer system
CN113377666A (en)Test method and system based on cloud server, client and cloud server
US20200074049A1 (en)Preventing software application tampering
CN114185702A (en)Cross-platform calling method, device, equipment and storage medium of shared application
CN109522683A (en)Software source tracing method, system, computer equipment and storage medium
CN113761481A (en)Software authorization authentication method based on container cloud
CN111030816A (en)Authentication method and device for access platform of evidence obtaining equipment and storage medium
CN109840402A (en)Privatization authorization of service management method, device, computer equipment and storage medium
US20250036378A1 (en)Obfuscation on exposed public api from software library

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination

[8]ページ先頭

©2009-2025 Movatter.jp