CN109582315A - Service privatization method, apparatus, computer equipment and storage medium - Google Patents
Service privatization method, apparatus, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109582315A CN109582315A CN201811255524.XA CN201811255524A CN109582315A CN 109582315 A CN109582315 A CN 109582315A CN 201811255524 A CN201811255524 A CN 201811255524A CN 109582315 A CN109582315 A CN 109582315A
- Authority
- CN
- China
- Prior art keywords
- service
- installation kit
- server
- mirror image
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 93
- 238000003860 storage Methods 0.000 title claims abstract description 26
- 238000009434 installation Methods 0.000 claims abstract description 112
- 238000012423 maintenance Methods 0.000 claims abstract description 16
- 238000004519 manufacturing process Methods 0.000 claims description 21
- 230000008569 process Effects 0.000 claims description 13
- 238000013135 deep learning Methods 0.000 claims description 12
- 229910002056 binary alloy Inorganic materials 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims description 5
- 238000012795 verification Methods 0.000 claims description 4
- 239000011248 coating agent Substances 0.000 claims description 2
- 238000000576 coating method Methods 0.000 claims description 2
- 238000012549 training Methods 0.000 claims description 2
- 238000011161 development Methods 0.000 abstract description 6
- 238000012545 processing Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000005291 magnetic effect Effects 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000013507 mapping Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 238000012827 research and development Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000001419 dependent effect Effects 0.000 description 3
- 238000013473 artificial intelligence Methods 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000005242 forging Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformation of program code
- G06F8/41—Compilation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
- G06F8/63—Image based installation; Cloning; Build to order
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Stored Programmes (AREA)
Abstract
The invention discloses service privatization method, apparatus, computer equipment and storage mediums, and wherein method includes: to be compiled to the service code got;Based on compiling as a result, by docker container engine technique, the mirror image of service is made;The installation kit of service is generated according to mirror image, and installation kit is stored to predetermined position, and after being downloaded on the server of user so as to installation kit, when the key for getting user disposes request, the deployment of service on the server is completed according to installation kit.Using scheme of the present invention, development and maintenance cost etc. can reduce.
Description
[technical field]
The present invention relates to Computer Applied Technologies, in particular to service privatization method, apparatus, computer equipment and storage
Medium.
[background technique]
Artificial intelligence (AI, Artificial Intelligence) technology is being widely used at present, be related to business,
The every field such as finance, security protection, entertainment, relatively common service provider case are publicly-owned cloud services, and many companies both provide
AI open platform, but in the case where bank finance, security protection etc. are related to the scene of private data, service privatization is deployed to client and (uses
Family) computer room is only client and needs most and optimal solution.
For industry in terms of the deployment of service privatization, the mode generallyd use is will to service (software) to run directly at present
In the operating system (OS, Operating System) of client server, by using the side such as different editions deployment package or patch
Formula removes the different os releases of compatible different clients server.In deployment services on client server, pass through middleware or agency
The modes such as software establish clustered machine interface channel, by operating one to more than one servers, will service according to certain sequential placement
Onto the clusters of machines of client.
But the customer group that service privatization faces is very big, the os release of the server of each client may be different
Sample, service are run directly on the OS of client server, need to be adapted to centos, Ubuntu, redhat and suse etc. more
The operating system of kind version, the development and maintenance cost in the software compatibility are very high.In addition, due to being related to deep learning
The complex environment of frame relies on, and relies on graphics processor (GPU, Graphics Processing to a certain extent
The hardware supporteds such as Unit), therefore dispose difficult, and these environment of curstomer's site deployed in real time are needed, to increase
Lower deployment cost etc..
[summary of the invention]
In view of this, the present invention provides service privatization method, apparatus, computer equipment and storage mediums.
Specific technical solution is as follows:
A kind of service privatization method, comprising:
The service code got is compiled;
Based on compiling as a result, by docker container engine technique, the mirror image of the service is made;
The installation kit of the service is generated according to the mirror image, and the installation kit is stored to predetermined position, with toilet
It states after installation kit is downloaded on the server of user, when the key for getting user disposes request, according to the installation kit
Complete deployment of the service on the server.
According to one preferred embodiment of the present invention, this method further comprises: in code compilation process, according at least two
The Code obfuscation tool of language carries out Code obfuscation encryption.
According to one preferred embodiment of the present invention, this method further comprises: right before the mirror image of the production service
Binary system in the compiling result executes program and carries out shell adding protection.
According to one preferred embodiment of the present invention, this method further comprises: before the installation kit for generating the service, obtaining
The machine fingerprint for taking the server generates permission according to the machine fingerprint and controls certificate.
According to one preferred embodiment of the present invention, this method further comprises: right before the installation kit for generating the service
In the mirror image by deep learning train come kernel model file be encrypted.
According to one preferred embodiment of the present invention, this method further comprises: before the installation kit for generating the service, obtaining
Take the machine fingerprint of the server;
The described kernel model file is encrypted includes: to generate encryption key according to the machine fingerprint,
The kernel model file is encrypted using the encryption key.
According to one preferred embodiment of the present invention, this method further comprises: raw before the installation kit for generating the service
At configuration file needed for the service starting, the installation kit is generated according to the mirror image and the configuration file.
A kind of service privatization method, comprising:
After the installation kit of service is downloaded on the server of user, the key deployment request of user, the peace are obtained
Dress packet is is compiled to the code of the service got, and based on compiling as a result, by docker container engine technique,
After the mirror image for producing the service, according to the installation kit for the service that the mirror image generates;
Deployment of the service on the server is completed according to the installation kit.
According to one preferred embodiment of the present invention, described that the service is completed on the server according to the installation kit
Deployment includes:
The configuration file in the installation kit is read, the service is completed on the server according to the configuration file
Deployment.
According to one preferred embodiment of the present invention, it is carried in the installation kit and has permission control certificate, the permission control card
What the machine fingerprint of the server got according to book generated;
This method further comprises: controlling certificate according to the permission when service arrangement and tests server progress permission
Card.
According to one preferred embodiment of the present invention, this method further comprises: passing through depth when needing to run in the service
When the kernel model file that learning training comes out, if the kernel model file has carried out encryption, it is decrypted.
According to one preferred embodiment of the present invention, this method further comprises following one or whole:
According to the self-service operation and maintenance tools that the service provides, service O&M is carried out;
According to the open source shipyard tool that the service provides, the visualized management of docker container is carried out.
A kind of service privatization device, comprising: code compilation unit, mirror image production unit and installation kit generation unit;
The code compilation unit, for being compiled to the service code got;
The mirror image production unit, for, as a result, by docker container engine technique, making the service based on compiling
Mirror image;
The installation kit generation unit, for generating the installation kit of the service according to the mirror image, and by the installation
Predetermined position is arrived in packet storage, after being downloaded on the server of user so as to the installation kit, when the key portion for getting user
When administration's request, deployment of the service on the server is completed according to the installation kit.
According to one preferred embodiment of the present invention, the code compilation unit is further used for, in code compilation process, root
According to the Code obfuscation tool of at least two language, Code obfuscation encryption is carried out.
According to one preferred embodiment of the present invention, the mirror image production unit is further used for, in the mirror for making the service
Before picture, program is executed to the binary system in the compiling result and carries out shell adding protection.
According to one preferred embodiment of the present invention, the installation kit generation unit is further used for, and is generating the service
Before installation kit, the machine fingerprint of the server is obtained, permission is generated according to the machine fingerprint and controls certificate.
According to one preferred embodiment of the present invention, the installation kit generation unit is further used for, and is generating the service
Before installation kit, in the mirror image by deep learning train come kernel model file be encrypted.
According to one preferred embodiment of the present invention, the installation kit generation unit is further used for, and is generating the service
Before installation kit, the machine fingerprint of the server is obtained, encryption key is generated according to the machine fingerprint, utilizes the encryption
Kernel model file described in key pair is encrypted.
According to one preferred embodiment of the present invention, the installation kit generation unit is further used for, and is generating the service
Before installation kit, configuration file needed for generating the service starting generates institute according to the mirror image and the configuration file
State installation kit.
A kind of service privatization device, comprising: request unit and service arrangement unit;
The request unit, for obtaining user after the installation kit of service is downloaded on the server of user
A key dispose request, the installation kit is to be compiled to the code of the service got, and based on compiling as a result, logical
Docker container engine technique is crossed, after the mirror image for producing the service, according to the installation for the service that the mirror image generates
Packet;
The service arrangement unit, for completing deployment of the service on the server according to the installation kit.
According to one preferred embodiment of the present invention, the service arrangement unit reads the configuration file in the installation kit, root
Deployment of the service on the server is completed according to the configuration file.
According to one preferred embodiment of the present invention, it is carried in the installation kit and has permission control certificate, the permission control card
What the machine fingerprint of the server got according to book generated;
The service arrangement unit is further used for, and controls certificate to the service according to the permission in service arrangement
Device carries out Authority Verification.
According to one preferred embodiment of the present invention, the service arrangement unit is further used for, when needing to run the service
In by deep learning train come kernel model file when, if the kernel model file has carried out encryption, into
Row decryption processing.
According to one preferred embodiment of the present invention, the service arrangement unit is further used for executing following one or whole:
According to the self-service operation and maintenance tools that the service provides, service O&M is carried out;
According to the open source shipyard tool that the service provides, the visualized management of docker container is carried out.
A kind of computer equipment, including memory, processor and be stored on the memory and can be in the processor
The computer program of upper operation, the processor realize method as described above when executing described program.
A kind of computer readable storage medium is stored thereon with computer program, real when described program is executed by processor
Now method as described above.
It can be seen that based on above-mentioned introduction using scheme of the present invention, by introducing docker container engine technique, solution
The service of having determined needs the problem of multi version OS of compatible subscribers, to reduce development and maintenance cost, and, it can be achieved that service
Key deployment greatly reduce deployment difficulty, and reduce lower deployment cost so that complicated mapping out the work becomes simple
Deng.
[Detailed description of the invention]
Fig. 1 is the flow chart of service privatization method first embodiment of the present invention.
Fig. 2 is the flow chart of service privatization method second embodiment of the present invention.
Fig. 3 is that the whole of service privatization method of the present invention realizes process schematic.
Fig. 4 is the composed structure schematic diagram of service privatization device first embodiment of the present invention.
Fig. 5 is the composed structure schematic diagram of service privatization device second embodiment of the present invention.
Fig. 6 shows the block diagram for being suitable for the exemplary computer system/server 12 for being used to realize embodiment of the present invention.
[specific embodiment]
A kind of service privatization mode is proposed in the present invention, the service can be AI service etc..
In order to be clearer and more clear technical solution of the present invention, hereinafter, referring to the drawings and the embodiments, to institute of the present invention
The scheme of stating is further described.
Obviously, described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on the present invention
In embodiment, those skilled in the art's all other embodiment obtained without creative efforts, all
Belong to the scope of protection of the invention.
Fig. 1 is the flow chart of service privatization method first embodiment of the present invention.As shown in Figure 1, including following tool
Body implementation.
In 101, the service code got is compiled.
In 102, based on compiling as a result, by docker container engine technique, the mirror image of service is made.
In 103, the installation kit of service is generated according to the mirror image, and installation kit is stored to predetermined position, to pacify
After dress coating downloads on the server of user, when the key for getting user disposes request, complete to service according to installation kit
Deployment on the server.
Service code can be obtained, and it is compiled, to obtain compiling result.It later, can be based on compiling as a result, logical
Docker container engine technique is crossed, the mirror image of service is made.
Current service privatization mode is the direct operation service of OS based on user (client) server, needs to be compatible with
The OS of multiple versions needs to put into a large amount of compatible development and maintenance cost etc..
By the docker container engine technique of open source in the present embodiment, service production is mirrored into, when operation does not depend on
In host OS, to realize service and the decoupling of os release, avoid the research and development for servicing compatible multi version OS and maintenance at
This, it is only necessary to solve deployment compatibility of the docker on multi version OS, such as offline deployment docker environment, this part work
It is very low to make cost.
, it can be achieved that the automated production of mirror image and version management in terms of mirror image production, the code that coding can be completed from
Code storage is self-service to pull compiler server, and the automatic production etc. of mirror image, and recordable clothes are realized by the Jib technology of open source
Business version information and mirror image relevant information.In this way, research staff is not necessarily to hand-made mirror image, and can safeguard required
Version information etc., greatly reduce research and development cost, improve efficiency of research and development.
The different function of service can correspond to different service modules, can calculate dependence according to the dependence of intermodule
Tree, and then the required configuration file of service starting can be generated according to dependent tree, it may include service module version in configuration file, open
The information such as dynamic sequence and Starting mode, according to the installation kit of the producible services such as the mirror image and configuration file got.
The installation kit of generation can be stored to predetermined position, such as storage to specified external document storage server, for
Family is downloaded, and the downloading can be downloading manually.After installation kit is downloaded on the server of user, user is being got
Key when disposing request, service deployment on the server can be completed automatically according to installation kit.
Under privatization scene, the intellectual property of service needs to be protected, therefore further provides in the present embodiment
Following safety prevention measure.
In code compilation process, it can be carried out at Code obfuscation encryption according to the Code obfuscation tool of at least two language
Reason.
Such as, it is possible to provide the Code obfuscation tool of 4 kinds of language such as c, c++, java and python, it can be according to different services
The language of module, is respectively adopted the Code obfuscation tool of corresponding language, and generation is automatically completed in code compilation process
Code obscures encryption, to prevent from obtaining source code by decompiling.
Before the mirror image of production service, can also program be executed to the binary system in compiling result and carry out shell adding protection.Journey
After sequence shell adding, then the automated production of mirror image is carried out, dis-assembling analysis or dynamic analysis to program can be prevented, protect software
Safety is substantially improved in copyright.
In addition, generate service installation kit before, can also in mirror image by deep learning train come core mould
Type file is encrypted, to achieve the purpose that protect kernel model document knowledge property right.
For example, the machine fingerprint of server can be obtained, encryption key is generated according to the machine fingerprint got, utilizes generation
Encryption key kernel model file is encrypted.Server refers to the server to deployment services, how to obtain machine
Device fingerprint is the prior art, and the machine fingerprint of different server is typically different.Encryption key can dynamic generation, can be referred to according to machine
Line, which calculates, to be generated.
Under privatization scene, permission control is to ensure the necessary means of the business equity of developer, as developer issues card
Book (license) give user, describe can which hardware device, what time period in, using which type of service.
The authority control method based on license is also provided that in the present embodiment, before the installation kit for generating service,
The machine fingerprint of server can be obtained, and permission control certificate can be generated according to the machine fingerprint got.It is providing based on clothes
It is engaged in except the common permission control ability of device, service module and this 3 kinds of dimensions of time, may further provide based on Service Instance
Several and query rate per second (QPS: Queries Per Second) the permission control of dimension can control how many of user's deployment
Service Instance and oncurrent processing ability meet more control scenes.It is tested in addition, carrying out permission to server in service arrangement
When card, the security hardening of Secure Socket Layer (SSL, Secure Sockets Layer) two-way authentication can be used, prevent from forging visitor
The request of family end or server-side response, control around permission.
Fig. 2 is the flow chart of service privatization method second embodiment of the present invention.As shown in Fig. 2, including following tool
Body implementation.
In 201, after the installation kit of service is downloaded on the server of user, the key deployment for obtaining user is asked
It asks, the installation kit is to be compiled to the code of the service got, and be based on compiling as a result, passing through docker container engine
Technology, after the mirror image for producing service, according to the installation kit for the service that mirror image generates.
In 202, the deployment of service on the server is completed according to installation kit.
It in current service privatization mode, needs to carry out complicated operation, input complicated order or calls different
Script, step by step go deployment services and preparing environment etc..
A key deployment tool is provided in the present embodiment, need to only be executed calling starting script and be issued key deployment request,
Can be completed service mapping out the work on a server, including to service environment deployment support, as TensorFlow,
PaddlePaddle, GPU drive environment etc..After the completion of Servers-all is performed both by, that is, complete entire cluster service
Deployment, subsequent work include that upgrading, rollback, shutdown etc. all only need to can control the reality of entire cluster in the operation of middle control machine
It is existing.
The standard of customizable modular modularization arranges file knot, Starting mode and the log output of each service module
Standard etc., so that the deployment criteria of all modules is the same.As previously mentioned, needing to generate service in installation kit production
Configuration file needed for starting, wherein may include the information such as service module version, boot sequence and Starting mode, in service department
When administration, configuration file can be read, the deployment of service on the server is completed according to information therein.
In addition, can also carry out permission when service arrangement to server according to the permission control certificate carried in installation kit and test
Card, Authority Verification pass through, then continue subsequent processing.
When need in operation service by deep learning train come kernel model file when, if kernel model file into
Encryption is gone, it is also necessary to be decrypted, manner of decryption corresponding with cipher mode can be used and be decrypted.
In existing service privatization mode, often lack the relevant tool of O&M, when breaking down so as to cause service
It can not find in time, or service O&M is realized by command line mode, maloperation is easy to appear, in addition, service fault reason
When location difficulty, especially more machines, can not express statistic service the core index such as performance and stability.
In the present embodiment, the self-service operation and maintenance tools that can be provided according to service carry out service O&M, comprising: take by acquisition
Be engaged in log, performance, the stability of Analysis Service, based on the modes such as serve port inspection, log keyword match visit it is living and
Service availability monitoring carries out early warning etc. by channels such as short message and mails.
In addition, the open source shipyard tool that can be also provided according to service, carries out the visualized management of docker container, from
And the operation management container service for allowing user self-service, including restart container, it is scalable hold, stop service, connection container hold
Row shell etc..
In summary it introduces, Fig. 3 is the whole realization process schematic of service privatization method of the present invention, specific real
Referring now to aforementioned related description, repeat no more.
It should be noted that for the various method embodiments described above, for simple description, being all expressed as a series of
Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described, because according to
According to the present invention, certain steps can use other sequences or carry out simultaneously.Secondly, those skilled in the art should also know that,
The embodiments described in the specification are all preferred embodiments, and not necessarily the present invention must for related actions and modules
Must.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiments.
In short, by introducing docker container engine technique, solving clothes using scheme described in embodiment of the present invention method
The problem of business needs the multi version OS of compatible subscribers, to reduce development and maintenance cost, and, it can be achieved that the key serviced
Deployment, so that complicated mapping out the work becomes simple, greatly reduce deployment difficulty, and reduce lower deployment cost etc..
In addition, by self-service operation and maintenance tools etc., reducing user's O&M pipe using scheme described in embodiment of the present invention method
The cost of service is managed, it is simple and convenient.
In addition, using scheme described in embodiment of the present invention method, by carrying out Code obfuscation, program shell adding and core mould
The processing such as type file encryption, improves the safety of service, ensure that the intellectual property of service, also, control by permission, protects
The business equity etc. of developer is demonstrate,proved.
It from overall plan, more improves more efficient, runs through entire privatization process, the installation including automation packs
Make, self-service downloading and deployment and self-service O&M etc., the very efficient quick execution of whole flow process, does not need excessive artificial
Intervention, do not need deployment assistant director's waiting go on business to user's computer room deployment etc., substantially reduce the privatization period.
The introduction about embodiment of the method above, below by way of Installation practice, to scheme of the present invention carry out into
One step explanation.
Fig. 4 is the composed structure schematic diagram of service privatization device first embodiment of the present invention.As shown in figure 4, packet
It includes: code compilation unit 401, mirror image production unit 402 and installation kit generation unit 403.
Code compilation unit 401, for being compiled to the service code got.
Mirror image production unit 402, for, as a result, by docker container engine technique, making the mirror of service based on compiling
Picture.
Installation kit generation unit 403 is stored for generating the installation kit of service according to mirror image, and by installation kit to pre-determined bit
It sets, after being downloaded on the server of user so as to installation kit, when the key for getting user disposes request, according to installation kit
Complete the deployment of service on the server.
Code compilation unit 401 can obtain service code, and be compiled to it, to obtain compiling result.Later, mirror
As production unit 402 can make the mirror image of service based on compiling as a result, by docker container engine technique.
By the docker container engine technique of open source, service production is mirrored into, independent of host OS when operation,
To realize service and the decoupling of os release, the research and development and maintenance cost for servicing compatible multi version OS are avoided.
Wherein, in code compilation process, code compilation unit 401 can also be according to the Code obfuscation work of at least two language
Tool carries out Code obfuscation encryption.
Before the mirror image of production service, mirror image production unit 402 can also execute program to the binary system in compiling result
Carry out shell adding protection.
Installation kit generation unit 403 can obtain the machine fingerprint of server, according to machine before the installation kit for generating service
Device fingerprint generates permission and controls certificate.In addition, installation kit generation unit 403 can also in mirror image by deep learning train come
Kernel model file be encrypted.For example, obtaining the machine fingerprint of server, it is close to generate encryption according to machine fingerprint
Key is encrypted kernel model file using encryption key.
The different function of service can correspond to different service modules, and installation kit generation unit 403 can also be according to intermodule
Dependence calculates dependent tree, and then generates the required configuration file of service starting according to dependent tree, can wrap in configuration file
The information such as the module release containing service, boot sequence and Starting mode, can give birth to according to the mirror image and configuration file etc. that get
At the installation kit of service, and the installation kit of generation can be stored to predetermined position, such as store to specified external file and store clothes
Business device, is downloaded for user.
Fig. 5 is the composed structure schematic diagram of service privatization device second embodiment of the present invention.As shown in figure 5, packet
It includes: request unit 501 and service arrangement unit 502.
Request unit 501, for obtaining user's after the installation kit of service is downloaded on the server of user
The deployment request of one key, the installation kit are to be compiled to the code of the service got, and be based on compiling as a result, passing through
Docker container engine technique, after the mirror image for producing service, according to the installation kit for the service that mirror image generates.
Service arrangement unit 502, for completing the deployment of service on the server according to installation kit.
Wherein, the configuration file in installation kit can be read in service arrangement unit 502, completes service according to configuration file and is taking
The deployment being engaged on device.
It can also be carried in installation kit and have permission control certificate, the machine of the server got according to permission control certificate
What fingerprint generated, correspondingly, service arrangement unit 502 can control certificate according to permission in service arrangement and weigh to server
Limit verifying.
When need in operation service by deep learning train come kernel model file when, if kernel model file into
Encryption is gone, service arrangement unit 502 also needs first to be decrypted.
In addition, service arrangement unit 502 can also further execute following one or whole:
According to the self-service operation and maintenance tools that service provides, service O&M is carried out, comprising: by acquiring serve log, analysis clothes
Performance, the stability of business carry out visiting living and service availability prison based on modes such as serve port inspection, log keyword matchs
Control carries out early warning etc. by channels such as short message and mails;
According to the open source shipyard tool that service provides, the visualized management of docker container is carried out, so that with
Family can be self-service operation management container service, including restart container, it is scalable hold, stop service, connection container execute shell
Deng.
The specific workflow of Fig. 4 and Fig. 5 shown device embodiment please refers to the related description in preceding method embodiment,
It repeats no more.
In short, by introducing docker container engine technique, solving clothes using scheme described in apparatus of the present invention embodiment
The problem of business needs the multi version OS of compatible subscribers, to reduce development and maintenance cost, and, it can be achieved that the key serviced
Deployment, so that complicated mapping out the work becomes simple, greatly reduce deployment difficulty, and reduce lower deployment cost etc..
In addition, by self-service operation and maintenance tools etc., reducing user's O&M pipe using scheme described in apparatus of the present invention embodiment
The cost of service is managed, it is simple and convenient.
In addition, using scheme described in apparatus of the present invention embodiment, by carrying out Code obfuscation, program shell adding and core mould
The processing such as type file encryption, improves the safety of service, ensure that the intellectual property of service, also, control by permission, protects
The business equity etc. of developer is demonstrate,proved.
It from overall plan, more improves more efficient, runs through entire privatization process, the installation including automation packs
Make, self-service downloading and deployment and self-service O&M etc., the very efficient quick execution of whole flow process, does not need excessive artificial
Intervention, do not need deployment assistant director's waiting go on business to user's computer room deployment etc., substantially reduce the privatization period.
Fig. 6 shows the block diagram for being suitable for the exemplary computer system/server 12 for being used to realize embodiment of the present invention.
The computer system/server 12 that Fig. 6 is shown is only an example, should not function and use scope to the embodiment of the present invention
Bring any restrictions.
As shown in fig. 6, computer system/server 12 is showed in the form of universal computing device.Computer system/service
The component of device 12 can include but is not limited to: one or more processor (processing unit) 16, memory 28, connect not homology
The bus 18 of system component (including memory 28 and processor 16).
Bus 18 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller,
Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts
For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC)
Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Computer system/server 12 typically comprises a variety of computer system readable media.These media, which can be, appoints
What usable medium that can be accessed by computer system/server 12, including volatile and non-volatile media, it is moveable and
Immovable medium.
Memory 28 may include the computer system readable media of form of volatile memory, such as random access memory
Device (RAM) 30 and/or cache memory 32.Computer system/server 12 may further include it is other it is removable/no
Movably, volatile/non-volatile computer system storage medium.Only as an example, storage system 34 can be used for reading and writing
Immovable, non-volatile magnetic media (Fig. 6 do not show, commonly referred to as " hard disk drive ").It, can although being not shown in Fig. 6
To provide the disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk "), and it is non-volatile to moving
Property CD (such as CD-ROM, DVD-ROM or other optical mediums) read and write CD drive.In these cases, each drive
Dynamic device can be connected by one or more data media interfaces with bus 18.Memory 28 may include at least one program
Product, the program product have one group of (for example, at least one) program module, these program modules are configured to perform the present invention
The function of each embodiment.
Program/utility 40 with one group of (at least one) program module 42 can store in such as memory 28
In, such program module 42 includes --- but being not limited to --- operating system, one or more application program, other programs
It may include the realization of network environment in module and program data, each of these examples or certain combination.Program mould
Block 42 usually executes function and/or method in embodiment described in the invention.
Computer system/server 12 can also be (such as keyboard, sensing equipment, aobvious with one or more external equipments 14
Show device 24 etc.) communication, it is logical that the equipment interacted with the computer system/server 12 can be also enabled a user to one or more
Letter, and/or with the computer system/server 12 any is set with what one or more of the other calculating equipment was communicated
Standby (such as network interface card, modem etc.) communicates.This communication can be carried out by input/output (I/O) interface 22.And
And computer system/server 12 can also pass through network adapter 20 and one or more network (such as local area network
(LAN), wide area network (WAN) and/or public network, such as internet) communication.As shown in fig. 6, network adapter 20 passes through bus
18 communicate with other modules of computer system/server 12.It should be understood that although not shown in the drawings, computer can be combined
Systems/servers 12 use other hardware and/or software module, including but not limited to: microcode, device driver, at redundancy
Manage unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
The program that processor 16 is stored in memory 28 by operation, at various function application and data
Reason, such as realize the method in Fig. 1 or embodiment illustrated in fig. 2.
The present invention discloses a kind of computer readable storage mediums, are stored thereon with computer program, the program quilt
Processor will realize the method in embodiment as shown in Figure 1 or 2 when executing.
It can be using any combination of one or more computer-readable media.Computer-readable medium can be calculating
Machine readable signal medium or computer readable storage medium.Computer readable storage medium for example can be --- but it is unlimited
In system, device or the device of --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or any above combination.It calculates
The more specific example (non exhaustive list) of machine readable storage medium storing program for executing includes: electrical connection with one or more conducting wires, just
Taking formula computer disk, hard disk, random access memory (RAM), read-only memory (ROM), erasable type may be programmed read-only storage
Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device,
Or above-mentioned any appropriate combination.In this document, computer readable storage medium can be it is any include or storage journey
The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including --- but
It is not limited to --- electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be
Any computer-readable medium other than computer readable storage medium, which can send, propagate or
Transmission is for by the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited
In --- wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof
Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++,
Further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with
It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion
Divide and partially executes or executed on a remote computer or server completely on the remote computer on the user computer.?
Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) or
Wide area network (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as mentioned using Internet service
It is connected for quotient by internet).
In several embodiments provided by the present invention, it should be understood that disclosed device and method etc. can pass through
Other modes are realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit,
Only a kind of logical function partition, there may be another division manner in actual implementation.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at one
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer
It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute the present invention
The part steps of embodiment the method.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM,
Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. it is various
It can store the medium of program code.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the present invention.
Claims (26)
1. a kind of service privatization method characterized by comprising
The service code got is compiled;
Based on compiling as a result, by docker container engine technique, the mirror image of the service is made;
The installation kit of the service is generated according to the mirror image, and the installation kit is stored to predetermined position, so as to the peace
After dress coating downloads on the server of user, when the key for getting user disposes request, completed according to the installation kit
Deployment of the service on the server.
2. the method according to claim 1, wherein
This method further comprises: in code compilation process, according to the Code obfuscation tool of at least two language, carrying out code
Obscure encryption.
3. the method according to claim 1, wherein
This method further comprises: before the mirror image of the production service, executing to the binary system in the compiling result
Program carries out shell adding protection.
4. the method according to claim 1, wherein
This method further comprises: before the installation kit for generating the service, the machine fingerprint of the server is obtained, according to
The machine fingerprint generates permission and controls certificate.
5. the method according to claim 1, wherein
This method further comprises: before the installation kit for generating the service, training to deep learning is passed through in the mirror image
Kernel model file out is encrypted.
6. according to the method described in claim 5, it is characterized in that,
This method further comprises: before the installation kit for generating the service, obtaining the machine fingerprint of the server;
The described kernel model file is encrypted includes: to generate encryption key according to the machine fingerprint, is utilized
The kernel model file is encrypted in the encryption key.
7. the method according to claim 1, wherein
This method further comprises: before the installation kit for generating the service, configuration text needed for generating the service starting
Part generates the installation kit according to the mirror image and the configuration file.
8. a kind of service privatization method characterized by comprising
After the installation kit of service is downloaded on the server of user, the key deployment request of user, the installation kit are obtained
To be compiled to the code of the service got, and based on compiling as a result, being made by docker container engine technique
Out after the mirror image of the service, according to the installation kit for the service that the mirror image generates;
Deployment of the service on the server is completed according to the installation kit.
9. according to the method described in claim 8, it is characterized in that,
It is described the deployment of the service on the server is completed according to the installation kit to include:
The configuration file in the installation kit is read, portion of the service on the server is completed according to the configuration file
Administration.
10. according to the method described in claim 8, it is characterized in that,
It is carried in the installation kit and has permission control certificate, the server got according to the permission control certificate
What machine fingerprint generated;
This method further comprises: controlling certificate according to the permission when service arrangement and carries out Authority Verification to the server.
11. according to the method described in claim 8, it is characterized in that,
This method further comprises: when need to run in the service by deep learning train come kernel model file
When, if the kernel model file has carried out encryption, it is decrypted.
12. according to the method described in claim 8, it is characterized in that,
This method further comprises following one or whole:
According to the self-service operation and maintenance tools that the service provides, service O&M is carried out;
According to the open source shipyard tool that the service provides, the visualized management of docker container is carried out.
13. a kind of service privatization device characterized by comprising code compilation unit, mirror image production unit and installation kit
Generation unit;
The code compilation unit, for being compiled to the service code got;
The mirror image production unit, for, as a result, by docker container engine technique, making the mirror of the service based on compiling
Picture;
The installation kit generation unit is deposited for generating the installation kit of the service according to the mirror image, and by the installation kit
It stores up to predetermined position, after being downloaded on the server of user so as to the installation kit, disposes and ask when the key for getting user
When asking, deployment of the service on the server is completed according to the installation kit.
14. device according to claim 13, which is characterized in that
The code compilation unit is further used for, in code compilation process, according to the Code obfuscation work of at least two language
Tool carries out Code obfuscation encryption.
15. device according to claim 13, which is characterized in that
The mirror image production unit is further used for, before the mirror image for making the service, to two in the compiling result
System executes program and carries out shell adding protection.
16. device according to claim 13, which is characterized in that
The installation kit generation unit is further used for, and before the installation kit for generating the service, obtains the server
Machine fingerprint generates permission according to the machine fingerprint and controls certificate.
17. device according to claim 13, which is characterized in that
The installation kit generation unit is further used for, before the installation kit for generating the service, to passing through in the mirror image
Deep learning trains the kernel model file come and is encrypted.
18. device according to claim 17, which is characterized in that
The installation kit generation unit is further used for, and before the installation kit for generating the service, obtains the server
Machine fingerprint is generated encryption key according to the machine fingerprint, is carried out using the encryption key to the kernel model file
Encryption.
19. device according to claim 13, which is characterized in that
The installation kit generation unit is further used for, and before the installation kit for generating the service, generates the service starting
Required configuration file generates the installation kit according to the mirror image and the configuration file.
20. a kind of service privatization device characterized by comprising request unit and service arrangement unit;
The request unit, for obtaining the one of user after the installation kit of service is downloaded on the server of user
Key deployment request, the installation kit are to be compiled to the code of the service got, and be based on compiling as a result, passing through
Docker container engine technique, after the mirror image for producing the service, according to the installation kit for the service that the mirror image generates;
The service arrangement unit, for completing deployment of the service on the server according to the installation kit.
21. device according to claim 20, which is characterized in that
The service arrangement unit reads the configuration file in the installation kit, completes the service according to the configuration file and exists
Deployment on the server.
22. device according to claim 20, which is characterized in that
It is carried in the installation kit and has permission control certificate, the server got according to the permission control certificate
What machine fingerprint generated;
The service arrangement unit is further used for, in service arrangement according to the permission control certificate to the server into
Row Authority Verification.
23. device according to claim 20, which is characterized in that
The service arrangement unit is further used for, when need to run in the service by deep learning train come core
When model file, if the kernel model file has carried out encryption, it is decrypted.
24. device according to claim 20, which is characterized in that
The service arrangement unit is further used for executing following one or whole:
According to the self-service operation and maintenance tools that the service provides, service O&M is carried out;
According to the open source shipyard tool that the service provides, the visualized management of docker container is carried out.
25. a kind of computer equipment, including memory, processor and it is stored on the memory and can be on the processor
The computer program of operation, which is characterized in that the processor is realized when executing described program as any in claim 1~12
Method described in.
26. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that described program is processed
The method as described in any one of claim 1~12 is realized when device executes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811255524.XA CN109582315A (en) | 2018-10-26 | 2018-10-26 | Service privatization method, apparatus, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811255524.XA CN109582315A (en) | 2018-10-26 | 2018-10-26 | Service privatization method, apparatus, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109582315A true CN109582315A (en) | 2019-04-05 |
Family
ID=65920880
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811255524.XA Pending CN109582315A (en) | 2018-10-26 | 2018-10-26 | Service privatization method, apparatus, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109582315A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110175033A (en) * | 2019-05-24 | 2019-08-27 | 北京百度网讯科技有限公司 | Service arrangement method and apparatus and serving starting method and device |
CN110297653A (en) * | 2019-07-02 | 2019-10-01 | 浪潮云信息技术有限公司 | A kind of method of container service upgrading |
CN110413294A (en) * | 2019-08-06 | 2019-11-05 | 中国工商银行股份有限公司 | Service delivery system, method, apparatus and equipment |
CN111124646A (en) * | 2019-12-23 | 2020-05-08 | 百度国际科技(深圳)有限公司 | Privatization transformation implementation method and device, electronic equipment and storage medium |
CN111459506A (en) * | 2020-03-02 | 2020-07-28 | 平安科技(深圳)有限公司 | Deployment method, device, medium and electronic equipment of deep learning platform cluster |
CN111857738A (en) * | 2020-08-05 | 2020-10-30 | 北京千丁互联科技有限公司 | Privatization deployment method and device |
CN112148297A (en) * | 2020-08-26 | 2020-12-29 | 广州市保伦电子有限公司 | Intelligent server encryption and packaging method and device |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103078858A (en) * | 2012-12-31 | 2013-05-01 | 上海同岩土木工程科技有限公司 | Web service and signature certificate-based software trial authorization method |
CN106095408A (en) * | 2016-05-31 | 2016-11-09 | 浙江网新恒天软件有限公司 | A kind of system and method for data monitoring and Code automatic build and deployment |
CN107609394A (en) * | 2017-08-28 | 2018-01-19 | 上海移卓网络科技有限公司 | Tamper resistant method, storage device and the device of Android installation kits |
CN107678756A (en) * | 2017-09-29 | 2018-02-09 | 千寻位置网络有限公司 | A kind of Web based on Docker applies a key dissemination method |
CN107896230A (en) * | 2017-12-26 | 2018-04-10 | 车智互联(北京)科技有限公司 | A kind of system for supporting high concurrent order to perform passage |
US20180173512A1 (en) * | 2016-12-19 | 2018-06-21 | International Business Machines Corporation | Optimized Creation of Distributed Storage and Distributed Processing Clusters on Demand |
CN108196843A (en) * | 2018-01-09 | 2018-06-22 | 成都睿码科技有限责任公司 | Visualization Docker containers compile the O&M method of deployment automatically |
CN108282513A (en) * | 2017-12-08 | 2018-07-13 | 广州视源电子科技股份有限公司 | Server disposition method, system, storage medium and computer equipment |
-
2018
- 2018-10-26 CN CN201811255524.XA patent/CN109582315A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103078858A (en) * | 2012-12-31 | 2013-05-01 | 上海同岩土木工程科技有限公司 | Web service and signature certificate-based software trial authorization method |
CN106095408A (en) * | 2016-05-31 | 2016-11-09 | 浙江网新恒天软件有限公司 | A kind of system and method for data monitoring and Code automatic build and deployment |
US20180173512A1 (en) * | 2016-12-19 | 2018-06-21 | International Business Machines Corporation | Optimized Creation of Distributed Storage and Distributed Processing Clusters on Demand |
CN107609394A (en) * | 2017-08-28 | 2018-01-19 | 上海移卓网络科技有限公司 | Tamper resistant method, storage device and the device of Android installation kits |
CN107678756A (en) * | 2017-09-29 | 2018-02-09 | 千寻位置网络有限公司 | A kind of Web based on Docker applies a key dissemination method |
CN108282513A (en) * | 2017-12-08 | 2018-07-13 | 广州视源电子科技股份有限公司 | Server disposition method, system, storage medium and computer equipment |
CN107896230A (en) * | 2017-12-26 | 2018-04-10 | 车智互联(北京)科技有限公司 | A kind of system for supporting high concurrent order to perform passage |
CN108196843A (en) * | 2018-01-09 | 2018-06-22 | 成都睿码科技有限责任公司 | Visualization Docker containers compile the O&M method of deployment automatically |
Non-Patent Citations (2)
Title |
---|
张博等: "《常用黑客攻防技术大全》", 31 January 2011, 中国铁道出版社 * |
许云峰等: "《大数据技术及行业应用》", 31 August 2016, 北京邮电大学出版社 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110175033A (en) * | 2019-05-24 | 2019-08-27 | 北京百度网讯科技有限公司 | Service arrangement method and apparatus and serving starting method and device |
CN110297653A (en) * | 2019-07-02 | 2019-10-01 | 浪潮云信息技术有限公司 | A kind of method of container service upgrading |
CN110413294A (en) * | 2019-08-06 | 2019-11-05 | 中国工商银行股份有限公司 | Service delivery system, method, apparatus and equipment |
CN110413294B (en) * | 2019-08-06 | 2023-09-12 | 中国工商银行股份有限公司 | Service release system, method, device and equipment |
CN111124646A (en) * | 2019-12-23 | 2020-05-08 | 百度国际科技(深圳)有限公司 | Privatization transformation implementation method and device, electronic equipment and storage medium |
CN111124646B (en) * | 2019-12-23 | 2023-03-14 | 百度国际科技(深圳)有限公司 | Privatization transformation implementation method and device, electronic equipment and storage medium |
CN111459506A (en) * | 2020-03-02 | 2020-07-28 | 平安科技(深圳)有限公司 | Deployment method, device, medium and electronic equipment of deep learning platform cluster |
CN111459506B (en) * | 2020-03-02 | 2023-10-13 | 平安科技(深圳)有限公司 | Deep learning platform cluster deployment method and device, medium and electronic equipment |
CN111857738A (en) * | 2020-08-05 | 2020-10-30 | 北京千丁互联科技有限公司 | Privatization deployment method and device |
CN112148297A (en) * | 2020-08-26 | 2020-12-29 | 广州市保伦电子有限公司 | Intelligent server encryption and packaging method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109582315A (en) | Service privatization method, apparatus, computer equipment and storage medium | |
CN110414268A (en) | Access control method, device, equipment and storage medium | |
CN101589397B (en) | Cryptographic key containers on USB token | |
CN110088742A (en) | Use the logical repositories service of encrypted configuration data | |
CN106575243A (en) | Hypervisor-hosted virtual machine forensics | |
CN109597677A (en) | Method and apparatus for handling information | |
CN109344568A (en) | Document handling method and device based on block chain | |
CN109997143A (en) | The safety of sensitive data is shared | |
CN109271358A (en) | Data summarization method, querying method, device, equipment and storage medium | |
CN109800475A (en) | Automatic Pilot data processing method, device, equipment and computer storage medium | |
CN107886320A (en) | It is a kind of to handle the method, equipment and computer-readable storage medium for tying up card | |
CN109783374A (en) | Code process method, apparatus, equipment and the computer storage medium in automatic Pilot field | |
CN107873125A (en) | Active/standby devices scramble is shown | |
CN107305613A (en) | Protect the system and method for the voice data transmission from microphone to application process | |
JP2020501239A (en) | Web server protection from malicious client applications | |
CN106202220A (en) | The method of data and device in a kind of reading object storage system | |
CN108228312A (en) | The system and method that code is performed by interpreter | |
CN109657167A (en) | Collecting method, device, server and storage medium | |
CN107368339A (en) | Container entrance program operating method, system, equipment and storage medium | |
US8972745B2 (en) | Secure data handling in a computer system | |
CN109522683A (en) | Software source tracing method, system, computer equipment and storage medium | |
CN111222181B (en) | AI model supervision method, system, server and storage medium | |
CN109582320A (en) | Write yard method and terminal device | |
CN109635558A (en) | Access control method, device and system | |
CN111030816A (en) | Authentication method and device for access platform of evidence obtaining equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |