CN109582315A - Service privatization method, apparatus, computer equipment and storage medium - Google Patents

Service privatization method, apparatus, computer equipment and storage medium Download PDF

Info

Publication number
CN109582315A
CN109582315A CN201811255524.XA CN201811255524A CN109582315A CN 109582315 A CN109582315 A CN 109582315A CN 201811255524 A CN201811255524 A CN 201811255524A CN 109582315 A CN109582315 A CN 109582315A
Authority
CN
China
Prior art keywords
service
installation kit
server
mirror image
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811255524.XA
Other languages
Chinese (zh)
Inventor
林海涛
刘建夏
张文康
张红光
向宇波
宋乐侃
王莉
王天天
王磊
喻友平
吴甜
沈俊宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201811255524.XA priority Critical patent/CN109582315A/en
Publication of CN109582315A publication Critical patent/CN109582315A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/63Image based installation; Cloning; Build to order

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses service privatization method, apparatus, computer equipment and storage mediums, and wherein method includes: to be compiled to the service code got;Based on compiling as a result, by docker container engine technique, the mirror image of service is made;The installation kit of service is generated according to mirror image, and installation kit is stored to predetermined position, and after being downloaded on the server of user so as to installation kit, when the key for getting user disposes request, the deployment of service on the server is completed according to installation kit.Using scheme of the present invention, development and maintenance cost etc. can reduce.

Description

Service privatization method, apparatus, computer equipment and storage medium
[technical field]
The present invention relates to Computer Applied Technologies, in particular to service privatization method, apparatus, computer equipment and storage Medium.
[background technique]
Artificial intelligence (AI, Artificial Intelligence) technology is being widely used at present, be related to business, The every field such as finance, security protection, entertainment, relatively common service provider case are publicly-owned cloud services, and many companies both provide AI open platform, but in the case where bank finance, security protection etc. are related to the scene of private data, service privatization is deployed to client and (uses Family) computer room is only client and needs most and optimal solution.
For industry in terms of the deployment of service privatization, the mode generallyd use is will to service (software) to run directly at present In the operating system (OS, Operating System) of client server, by using the side such as different editions deployment package or patch Formula removes the different os releases of compatible different clients server.In deployment services on client server, pass through middleware or agency The modes such as software establish clustered machine interface channel, by operating one to more than one servers, will service according to certain sequential placement Onto the clusters of machines of client.
But the customer group that service privatization faces is very big, the os release of the server of each client may be different Sample, service are run directly on the OS of client server, need to be adapted to centos, Ubuntu, redhat and suse etc. more The operating system of kind version, the development and maintenance cost in the software compatibility are very high.In addition, due to being related to deep learning The complex environment of frame relies on, and relies on graphics processor (GPU, Graphics Processing to a certain extent The hardware supporteds such as Unit), therefore dispose difficult, and these environment of curstomer's site deployed in real time are needed, to increase Lower deployment cost etc..
[summary of the invention]
In view of this, the present invention provides service privatization method, apparatus, computer equipment and storage mediums.
Specific technical solution is as follows:
A kind of service privatization method, comprising:
The service code got is compiled;
Based on compiling as a result, by docker container engine technique, the mirror image of the service is made;
The installation kit of the service is generated according to the mirror image, and the installation kit is stored to predetermined position, with toilet It states after installation kit is downloaded on the server of user, when the key for getting user disposes request, according to the installation kit Complete deployment of the service on the server.
According to one preferred embodiment of the present invention, this method further comprises: in code compilation process, according at least two The Code obfuscation tool of language carries out Code obfuscation encryption.
According to one preferred embodiment of the present invention, this method further comprises: right before the mirror image of the production service Binary system in the compiling result executes program and carries out shell adding protection.
According to one preferred embodiment of the present invention, this method further comprises: before the installation kit for generating the service, obtaining The machine fingerprint for taking the server generates permission according to the machine fingerprint and controls certificate.
According to one preferred embodiment of the present invention, this method further comprises: right before the installation kit for generating the service In the mirror image by deep learning train come kernel model file be encrypted.
According to one preferred embodiment of the present invention, this method further comprises: before the installation kit for generating the service, obtaining Take the machine fingerprint of the server;
The described kernel model file is encrypted includes: to generate encryption key according to the machine fingerprint, The kernel model file is encrypted using the encryption key.
According to one preferred embodiment of the present invention, this method further comprises: raw before the installation kit for generating the service At configuration file needed for the service starting, the installation kit is generated according to the mirror image and the configuration file.
A kind of service privatization method, comprising:
After the installation kit of service is downloaded on the server of user, the key deployment request of user, the peace are obtained Dress packet is is compiled to the code of the service got, and based on compiling as a result, by docker container engine technique, After the mirror image for producing the service, according to the installation kit for the service that the mirror image generates;
Deployment of the service on the server is completed according to the installation kit.
According to one preferred embodiment of the present invention, described that the service is completed on the server according to the installation kit Deployment includes:
The configuration file in the installation kit is read, the service is completed on the server according to the configuration file Deployment.
According to one preferred embodiment of the present invention, it is carried in the installation kit and has permission control certificate, the permission control card What the machine fingerprint of the server got according to book generated;
This method further comprises: controlling certificate according to the permission when service arrangement and tests server progress permission Card.
According to one preferred embodiment of the present invention, this method further comprises: passing through depth when needing to run in the service When the kernel model file that learning training comes out, if the kernel model file has carried out encryption, it is decrypted.
According to one preferred embodiment of the present invention, this method further comprises following one or whole:
According to the self-service operation and maintenance tools that the service provides, service O&M is carried out;
According to the open source shipyard tool that the service provides, the visualized management of docker container is carried out.
A kind of service privatization device, comprising: code compilation unit, mirror image production unit and installation kit generation unit;
The code compilation unit, for being compiled to the service code got;
The mirror image production unit, for, as a result, by docker container engine technique, making the service based on compiling Mirror image;
The installation kit generation unit, for generating the installation kit of the service according to the mirror image, and by the installation Predetermined position is arrived in packet storage, after being downloaded on the server of user so as to the installation kit, when the key portion for getting user When administration's request, deployment of the service on the server is completed according to the installation kit.
According to one preferred embodiment of the present invention, the code compilation unit is further used for, in code compilation process, root According to the Code obfuscation tool of at least two language, Code obfuscation encryption is carried out.
According to one preferred embodiment of the present invention, the mirror image production unit is further used for, in the mirror for making the service Before picture, program is executed to the binary system in the compiling result and carries out shell adding protection.
According to one preferred embodiment of the present invention, the installation kit generation unit is further used for, and is generating the service Before installation kit, the machine fingerprint of the server is obtained, permission is generated according to the machine fingerprint and controls certificate.
According to one preferred embodiment of the present invention, the installation kit generation unit is further used for, and is generating the service Before installation kit, in the mirror image by deep learning train come kernel model file be encrypted.
According to one preferred embodiment of the present invention, the installation kit generation unit is further used for, and is generating the service Before installation kit, the machine fingerprint of the server is obtained, encryption key is generated according to the machine fingerprint, utilizes the encryption Kernel model file described in key pair is encrypted.
According to one preferred embodiment of the present invention, the installation kit generation unit is further used for, and is generating the service Before installation kit, configuration file needed for generating the service starting generates institute according to the mirror image and the configuration file State installation kit.
A kind of service privatization device, comprising: request unit and service arrangement unit;
The request unit, for obtaining user after the installation kit of service is downloaded on the server of user A key dispose request, the installation kit is to be compiled to the code of the service got, and based on compiling as a result, logical Docker container engine technique is crossed, after the mirror image for producing the service, according to the installation for the service that the mirror image generates Packet;
The service arrangement unit, for completing deployment of the service on the server according to the installation kit.
According to one preferred embodiment of the present invention, the service arrangement unit reads the configuration file in the installation kit, root Deployment of the service on the server is completed according to the configuration file.
According to one preferred embodiment of the present invention, it is carried in the installation kit and has permission control certificate, the permission control card What the machine fingerprint of the server got according to book generated;
The service arrangement unit is further used for, and controls certificate to the service according to the permission in service arrangement Device carries out Authority Verification.
According to one preferred embodiment of the present invention, the service arrangement unit is further used for, when needing to run the service In by deep learning train come kernel model file when, if the kernel model file has carried out encryption, into Row decryption processing.
According to one preferred embodiment of the present invention, the service arrangement unit is further used for executing following one or whole:
According to the self-service operation and maintenance tools that the service provides, service O&M is carried out;
According to the open source shipyard tool that the service provides, the visualized management of docker container is carried out.
A kind of computer equipment, including memory, processor and be stored on the memory and can be in the processor The computer program of upper operation, the processor realize method as described above when executing described program.
A kind of computer readable storage medium is stored thereon with computer program, real when described program is executed by processor Now method as described above.
It can be seen that based on above-mentioned introduction using scheme of the present invention, by introducing docker container engine technique, solution The service of having determined needs the problem of multi version OS of compatible subscribers, to reduce development and maintenance cost, and, it can be achieved that service Key deployment greatly reduce deployment difficulty, and reduce lower deployment cost so that complicated mapping out the work becomes simple Deng.
[Detailed description of the invention]
Fig. 1 is the flow chart of service privatization method first embodiment of the present invention.
Fig. 2 is the flow chart of service privatization method second embodiment of the present invention.
Fig. 3 is that the whole of service privatization method of the present invention realizes process schematic.
Fig. 4 is the composed structure schematic diagram of service privatization device first embodiment of the present invention.
Fig. 5 is the composed structure schematic diagram of service privatization device second embodiment of the present invention.
Fig. 6 shows the block diagram for being suitable for the exemplary computer system/server 12 for being used to realize embodiment of the present invention.
[specific embodiment]
A kind of service privatization mode is proposed in the present invention, the service can be AI service etc..
In order to be clearer and more clear technical solution of the present invention, hereinafter, referring to the drawings and the embodiments, to institute of the present invention The scheme of stating is further described.
Obviously, described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on the present invention In embodiment, those skilled in the art's all other embodiment obtained without creative efforts, all Belong to the scope of protection of the invention.
Fig. 1 is the flow chart of service privatization method first embodiment of the present invention.As shown in Figure 1, including following tool Body implementation.
In 101, the service code got is compiled.
In 102, based on compiling as a result, by docker container engine technique, the mirror image of service is made.
In 103, the installation kit of service is generated according to the mirror image, and installation kit is stored to predetermined position, to pacify After dress coating downloads on the server of user, when the key for getting user disposes request, complete to service according to installation kit Deployment on the server.
Service code can be obtained, and it is compiled, to obtain compiling result.It later, can be based on compiling as a result, logical Docker container engine technique is crossed, the mirror image of service is made.
Current service privatization mode is the direct operation service of OS based on user (client) server, needs to be compatible with The OS of multiple versions needs to put into a large amount of compatible development and maintenance cost etc..
By the docker container engine technique of open source in the present embodiment, service production is mirrored into, when operation does not depend on In host OS, to realize service and the decoupling of os release, avoid the research and development for servicing compatible multi version OS and maintenance at This, it is only necessary to solve deployment compatibility of the docker on multi version OS, such as offline deployment docker environment, this part work It is very low to make cost.
, it can be achieved that the automated production of mirror image and version management in terms of mirror image production, the code that coding can be completed from Code storage is self-service to pull compiler server, and the automatic production etc. of mirror image, and recordable clothes are realized by the Jib technology of open source Business version information and mirror image relevant information.In this way, research staff is not necessarily to hand-made mirror image, and can safeguard required Version information etc., greatly reduce research and development cost, improve efficiency of research and development.
The different function of service can correspond to different service modules, can calculate dependence according to the dependence of intermodule Tree, and then the required configuration file of service starting can be generated according to dependent tree, it may include service module version in configuration file, open The information such as dynamic sequence and Starting mode, according to the installation kit of the producible services such as the mirror image and configuration file got.
The installation kit of generation can be stored to predetermined position, such as storage to specified external document storage server, for Family is downloaded, and the downloading can be downloading manually.After installation kit is downloaded on the server of user, user is being got Key when disposing request, service deployment on the server can be completed automatically according to installation kit.
Under privatization scene, the intellectual property of service needs to be protected, therefore further provides in the present embodiment Following safety prevention measure.
In code compilation process, it can be carried out at Code obfuscation encryption according to the Code obfuscation tool of at least two language Reason.
Such as, it is possible to provide the Code obfuscation tool of 4 kinds of language such as c, c++, java and python, it can be according to different services The language of module, is respectively adopted the Code obfuscation tool of corresponding language, and generation is automatically completed in code compilation process Code obscures encryption, to prevent from obtaining source code by decompiling.
Before the mirror image of production service, can also program be executed to the binary system in compiling result and carry out shell adding protection.Journey After sequence shell adding, then the automated production of mirror image is carried out, dis-assembling analysis or dynamic analysis to program can be prevented, protect software Safety is substantially improved in copyright.
In addition, generate service installation kit before, can also in mirror image by deep learning train come core mould Type file is encrypted, to achieve the purpose that protect kernel model document knowledge property right.
For example, the machine fingerprint of server can be obtained, encryption key is generated according to the machine fingerprint got, utilizes generation Encryption key kernel model file is encrypted.Server refers to the server to deployment services, how to obtain machine Device fingerprint is the prior art, and the machine fingerprint of different server is typically different.Encryption key can dynamic generation, can be referred to according to machine Line, which calculates, to be generated.
Under privatization scene, permission control is to ensure the necessary means of the business equity of developer, as developer issues card Book (license) give user, describe can which hardware device, what time period in, using which type of service.
The authority control method based on license is also provided that in the present embodiment, before the installation kit for generating service, The machine fingerprint of server can be obtained, and permission control certificate can be generated according to the machine fingerprint got.It is providing based on clothes It is engaged in except the common permission control ability of device, service module and this 3 kinds of dimensions of time, may further provide based on Service Instance Several and query rate per second (QPS: Queries Per Second) the permission control of dimension can control how many of user's deployment Service Instance and oncurrent processing ability meet more control scenes.It is tested in addition, carrying out permission to server in service arrangement When card, the security hardening of Secure Socket Layer (SSL, Secure Sockets Layer) two-way authentication can be used, prevent from forging visitor The request of family end or server-side response, control around permission.
Fig. 2 is the flow chart of service privatization method second embodiment of the present invention.As shown in Fig. 2, including following tool Body implementation.
In 201, after the installation kit of service is downloaded on the server of user, the key deployment for obtaining user is asked It asks, the installation kit is to be compiled to the code of the service got, and be based on compiling as a result, passing through docker container engine Technology, after the mirror image for producing service, according to the installation kit for the service that mirror image generates.
In 202, the deployment of service on the server is completed according to installation kit.
It in current service privatization mode, needs to carry out complicated operation, input complicated order or calls different Script, step by step go deployment services and preparing environment etc..
A key deployment tool is provided in the present embodiment, need to only be executed calling starting script and be issued key deployment request, Can be completed service mapping out the work on a server, including to service environment deployment support, as TensorFlow, PaddlePaddle, GPU drive environment etc..After the completion of Servers-all is performed both by, that is, complete entire cluster service Deployment, subsequent work include that upgrading, rollback, shutdown etc. all only need to can control the reality of entire cluster in the operation of middle control machine It is existing.
The standard of customizable modular modularization arranges file knot, Starting mode and the log output of each service module Standard etc., so that the deployment criteria of all modules is the same.As previously mentioned, needing to generate service in installation kit production Configuration file needed for starting, wherein may include the information such as service module version, boot sequence and Starting mode, in service department When administration, configuration file can be read, the deployment of service on the server is completed according to information therein.
In addition, can also carry out permission when service arrangement to server according to the permission control certificate carried in installation kit and test Card, Authority Verification pass through, then continue subsequent processing.
When need in operation service by deep learning train come kernel model file when, if kernel model file into Encryption is gone, it is also necessary to be decrypted, manner of decryption corresponding with cipher mode can be used and be decrypted.
In existing service privatization mode, often lack the relevant tool of O&M, when breaking down so as to cause service It can not find in time, or service O&M is realized by command line mode, maloperation is easy to appear, in addition, service fault reason When location difficulty, especially more machines, can not express statistic service the core index such as performance and stability.
In the present embodiment, the self-service operation and maintenance tools that can be provided according to service carry out service O&M, comprising: take by acquisition Be engaged in log, performance, the stability of Analysis Service, based on the modes such as serve port inspection, log keyword match visit it is living and Service availability monitoring carries out early warning etc. by channels such as short message and mails.
In addition, the open source shipyard tool that can be also provided according to service, carries out the visualized management of docker container, from And the operation management container service for allowing user self-service, including restart container, it is scalable hold, stop service, connection container hold Row shell etc..
In summary it introduces, Fig. 3 is the whole realization process schematic of service privatization method of the present invention, specific real Referring now to aforementioned related description, repeat no more.
It should be noted that for the various method embodiments described above, for simple description, being all expressed as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described, because according to According to the present invention, certain steps can use other sequences or carry out simultaneously.Secondly, those skilled in the art should also know that, The embodiments described in the specification are all preferred embodiments, and not necessarily the present invention must for related actions and modules Must.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiments.
In short, by introducing docker container engine technique, solving clothes using scheme described in embodiment of the present invention method The problem of business needs the multi version OS of compatible subscribers, to reduce development and maintenance cost, and, it can be achieved that the key serviced Deployment, so that complicated mapping out the work becomes simple, greatly reduce deployment difficulty, and reduce lower deployment cost etc..
In addition, by self-service operation and maintenance tools etc., reducing user's O&M pipe using scheme described in embodiment of the present invention method The cost of service is managed, it is simple and convenient.
In addition, using scheme described in embodiment of the present invention method, by carrying out Code obfuscation, program shell adding and core mould The processing such as type file encryption, improves the safety of service, ensure that the intellectual property of service, also, control by permission, protects The business equity etc. of developer is demonstrate,proved.
It from overall plan, more improves more efficient, runs through entire privatization process, the installation including automation packs Make, self-service downloading and deployment and self-service O&M etc., the very efficient quick execution of whole flow process, does not need excessive artificial Intervention, do not need deployment assistant director's waiting go on business to user's computer room deployment etc., substantially reduce the privatization period.
The introduction about embodiment of the method above, below by way of Installation practice, to scheme of the present invention carry out into One step explanation.
Fig. 4 is the composed structure schematic diagram of service privatization device first embodiment of the present invention.As shown in figure 4, packet It includes: code compilation unit 401, mirror image production unit 402 and installation kit generation unit 403.
Code compilation unit 401, for being compiled to the service code got.
Mirror image production unit 402, for, as a result, by docker container engine technique, making the mirror of service based on compiling Picture.
Installation kit generation unit 403 is stored for generating the installation kit of service according to mirror image, and by installation kit to pre-determined bit It sets, after being downloaded on the server of user so as to installation kit, when the key for getting user disposes request, according to installation kit Complete the deployment of service on the server.
Code compilation unit 401 can obtain service code, and be compiled to it, to obtain compiling result.Later, mirror As production unit 402 can make the mirror image of service based on compiling as a result, by docker container engine technique.
By the docker container engine technique of open source, service production is mirrored into, independent of host OS when operation, To realize service and the decoupling of os release, the research and development and maintenance cost for servicing compatible multi version OS are avoided.
Wherein, in code compilation process, code compilation unit 401 can also be according to the Code obfuscation work of at least two language Tool carries out Code obfuscation encryption.
Before the mirror image of production service, mirror image production unit 402 can also execute program to the binary system in compiling result Carry out shell adding protection.
Installation kit generation unit 403 can obtain the machine fingerprint of server, according to machine before the installation kit for generating service Device fingerprint generates permission and controls certificate.In addition, installation kit generation unit 403 can also in mirror image by deep learning train come Kernel model file be encrypted.For example, obtaining the machine fingerprint of server, it is close to generate encryption according to machine fingerprint Key is encrypted kernel model file using encryption key.
The different function of service can correspond to different service modules, and installation kit generation unit 403 can also be according to intermodule Dependence calculates dependent tree, and then generates the required configuration file of service starting according to dependent tree, can wrap in configuration file The information such as the module release containing service, boot sequence and Starting mode, can give birth to according to the mirror image and configuration file etc. that get At the installation kit of service, and the installation kit of generation can be stored to predetermined position, such as store to specified external file and store clothes Business device, is downloaded for user.
Fig. 5 is the composed structure schematic diagram of service privatization device second embodiment of the present invention.As shown in figure 5, packet It includes: request unit 501 and service arrangement unit 502.
Request unit 501, for obtaining user's after the installation kit of service is downloaded on the server of user The deployment request of one key, the installation kit are to be compiled to the code of the service got, and be based on compiling as a result, passing through Docker container engine technique, after the mirror image for producing service, according to the installation kit for the service that mirror image generates.
Service arrangement unit 502, for completing the deployment of service on the server according to installation kit.
Wherein, the configuration file in installation kit can be read in service arrangement unit 502, completes service according to configuration file and is taking The deployment being engaged on device.
It can also be carried in installation kit and have permission control certificate, the machine of the server got according to permission control certificate What fingerprint generated, correspondingly, service arrangement unit 502 can control certificate according to permission in service arrangement and weigh to server Limit verifying.
When need in operation service by deep learning train come kernel model file when, if kernel model file into Encryption is gone, service arrangement unit 502 also needs first to be decrypted.
In addition, service arrangement unit 502 can also further execute following one or whole:
According to the self-service operation and maintenance tools that service provides, service O&M is carried out, comprising: by acquiring serve log, analysis clothes Performance, the stability of business carry out visiting living and service availability prison based on modes such as serve port inspection, log keyword matchs Control carries out early warning etc. by channels such as short message and mails;
According to the open source shipyard tool that service provides, the visualized management of docker container is carried out, so that with Family can be self-service operation management container service, including restart container, it is scalable hold, stop service, connection container execute shell Deng.
The specific workflow of Fig. 4 and Fig. 5 shown device embodiment please refers to the related description in preceding method embodiment, It repeats no more.
In short, by introducing docker container engine technique, solving clothes using scheme described in apparatus of the present invention embodiment The problem of business needs the multi version OS of compatible subscribers, to reduce development and maintenance cost, and, it can be achieved that the key serviced Deployment, so that complicated mapping out the work becomes simple, greatly reduce deployment difficulty, and reduce lower deployment cost etc..
In addition, by self-service operation and maintenance tools etc., reducing user's O&M pipe using scheme described in apparatus of the present invention embodiment The cost of service is managed, it is simple and convenient.
In addition, using scheme described in apparatus of the present invention embodiment, by carrying out Code obfuscation, program shell adding and core mould The processing such as type file encryption, improves the safety of service, ensure that the intellectual property of service, also, control by permission, protects The business equity etc. of developer is demonstrate,proved.
It from overall plan, more improves more efficient, runs through entire privatization process, the installation including automation packs Make, self-service downloading and deployment and self-service O&M etc., the very efficient quick execution of whole flow process, does not need excessive artificial Intervention, do not need deployment assistant director's waiting go on business to user's computer room deployment etc., substantially reduce the privatization period.
Fig. 6 shows the block diagram for being suitable for the exemplary computer system/server 12 for being used to realize embodiment of the present invention. The computer system/server 12 that Fig. 6 is shown is only an example, should not function and use scope to the embodiment of the present invention Bring any restrictions.
As shown in fig. 6, computer system/server 12 is showed in the form of universal computing device.Computer system/service The component of device 12 can include but is not limited to: one or more processor (processing unit) 16, memory 28, connect not homology The bus 18 of system component (including memory 28 and processor 16).
Bus 18 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC) Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Computer system/server 12 typically comprises a variety of computer system readable media.These media, which can be, appoints What usable medium that can be accessed by computer system/server 12, including volatile and non-volatile media, it is moveable and Immovable medium.
Memory 28 may include the computer system readable media of form of volatile memory, such as random access memory Device (RAM) 30 and/or cache memory 32.Computer system/server 12 may further include it is other it is removable/no Movably, volatile/non-volatile computer system storage medium.Only as an example, storage system 34 can be used for reading and writing Immovable, non-volatile magnetic media (Fig. 6 do not show, commonly referred to as " hard disk drive ").It, can although being not shown in Fig. 6 To provide the disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk "), and it is non-volatile to moving Property CD (such as CD-ROM, DVD-ROM or other optical mediums) read and write CD drive.In these cases, each drive Dynamic device can be connected by one or more data media interfaces with bus 18.Memory 28 may include at least one program Product, the program product have one group of (for example, at least one) program module, these program modules are configured to perform the present invention The function of each embodiment.
Program/utility 40 with one group of (at least one) program module 42 can store in such as memory 28 In, such program module 42 includes --- but being not limited to --- operating system, one or more application program, other programs It may include the realization of network environment in module and program data, each of these examples or certain combination.Program mould Block 42 usually executes function and/or method in embodiment described in the invention.
Computer system/server 12 can also be (such as keyboard, sensing equipment, aobvious with one or more external equipments 14 Show device 24 etc.) communication, it is logical that the equipment interacted with the computer system/server 12 can be also enabled a user to one or more Letter, and/or with the computer system/server 12 any is set with what one or more of the other calculating equipment was communicated Standby (such as network interface card, modem etc.) communicates.This communication can be carried out by input/output (I/O) interface 22.And And computer system/server 12 can also pass through network adapter 20 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, such as internet) communication.As shown in fig. 6, network adapter 20 passes through bus 18 communicate with other modules of computer system/server 12.It should be understood that although not shown in the drawings, computer can be combined Systems/servers 12 use other hardware and/or software module, including but not limited to: microcode, device driver, at redundancy Manage unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
The program that processor 16 is stored in memory 28 by operation, at various function application and data Reason, such as realize the method in Fig. 1 or embodiment illustrated in fig. 2.
The present invention discloses a kind of computer readable storage mediums, are stored thereon with computer program, the program quilt Processor will realize the method in embodiment as shown in Figure 1 or 2 when executing.
It can be using any combination of one or more computer-readable media.Computer-readable medium can be calculating Machine readable signal medium or computer readable storage medium.Computer readable storage medium for example can be --- but it is unlimited In system, device or the device of --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or any above combination.It calculates The more specific example (non exhaustive list) of machine readable storage medium storing program for executing includes: electrical connection with one or more conducting wires, just Taking formula computer disk, hard disk, random access memory (RAM), read-only memory (ROM), erasable type may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In this document, computer readable storage medium can be it is any include or storage journey The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including --- but It is not limited to --- electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be Any computer-readable medium other than computer readable storage medium, which can send, propagate or Transmission is for by the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited In --- wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++, Further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion Divide and partially executes or executed on a remote computer or server completely on the remote computer on the user computer.? Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) or Wide area network (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as mentioned using Internet service It is connected for quotient by internet).
In several embodiments provided by the present invention, it should be understood that disclosed device and method etc. can pass through Other modes are realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, Only a kind of logical function partition, there may be another division manner in actual implementation.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at one In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute the present invention The part steps of embodiment the method.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. it is various It can store the medium of program code.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the present invention.

Claims (26)

1. a kind of service privatization method characterized by comprising
The service code got is compiled;
Based on compiling as a result, by docker container engine technique, the mirror image of the service is made;
The installation kit of the service is generated according to the mirror image, and the installation kit is stored to predetermined position, so as to the peace After dress coating downloads on the server of user, when the key for getting user disposes request, completed according to the installation kit Deployment of the service on the server.
2. the method according to claim 1, wherein
This method further comprises: in code compilation process, according to the Code obfuscation tool of at least two language, carrying out code Obscure encryption.
3. the method according to claim 1, wherein
This method further comprises: before the mirror image of the production service, executing to the binary system in the compiling result Program carries out shell adding protection.
4. the method according to claim 1, wherein
This method further comprises: before the installation kit for generating the service, the machine fingerprint of the server is obtained, according to The machine fingerprint generates permission and controls certificate.
5. the method according to claim 1, wherein
This method further comprises: before the installation kit for generating the service, training to deep learning is passed through in the mirror image Kernel model file out is encrypted.
6. according to the method described in claim 5, it is characterized in that,
This method further comprises: before the installation kit for generating the service, obtaining the machine fingerprint of the server;
The described kernel model file is encrypted includes: to generate encryption key according to the machine fingerprint, is utilized The kernel model file is encrypted in the encryption key.
7. the method according to claim 1, wherein
This method further comprises: before the installation kit for generating the service, configuration text needed for generating the service starting Part generates the installation kit according to the mirror image and the configuration file.
8. a kind of service privatization method characterized by comprising
After the installation kit of service is downloaded on the server of user, the key deployment request of user, the installation kit are obtained To be compiled to the code of the service got, and based on compiling as a result, being made by docker container engine technique Out after the mirror image of the service, according to the installation kit for the service that the mirror image generates;
Deployment of the service on the server is completed according to the installation kit.
9. according to the method described in claim 8, it is characterized in that,
It is described the deployment of the service on the server is completed according to the installation kit to include:
The configuration file in the installation kit is read, portion of the service on the server is completed according to the configuration file Administration.
10. according to the method described in claim 8, it is characterized in that,
It is carried in the installation kit and has permission control certificate, the server got according to the permission control certificate What machine fingerprint generated;
This method further comprises: controlling certificate according to the permission when service arrangement and carries out Authority Verification to the server.
11. according to the method described in claim 8, it is characterized in that,
This method further comprises: when need to run in the service by deep learning train come kernel model file When, if the kernel model file has carried out encryption, it is decrypted.
12. according to the method described in claim 8, it is characterized in that,
This method further comprises following one or whole:
According to the self-service operation and maintenance tools that the service provides, service O&M is carried out;
According to the open source shipyard tool that the service provides, the visualized management of docker container is carried out.
13. a kind of service privatization device characterized by comprising code compilation unit, mirror image production unit and installation kit Generation unit;
The code compilation unit, for being compiled to the service code got;
The mirror image production unit, for, as a result, by docker container engine technique, making the mirror of the service based on compiling Picture;
The installation kit generation unit is deposited for generating the installation kit of the service according to the mirror image, and by the installation kit It stores up to predetermined position, after being downloaded on the server of user so as to the installation kit, disposes and ask when the key for getting user When asking, deployment of the service on the server is completed according to the installation kit.
14. device according to claim 13, which is characterized in that
The code compilation unit is further used for, in code compilation process, according to the Code obfuscation work of at least two language Tool carries out Code obfuscation encryption.
15. device according to claim 13, which is characterized in that
The mirror image production unit is further used for, before the mirror image for making the service, to two in the compiling result System executes program and carries out shell adding protection.
16. device according to claim 13, which is characterized in that
The installation kit generation unit is further used for, and before the installation kit for generating the service, obtains the server Machine fingerprint generates permission according to the machine fingerprint and controls certificate.
17. device according to claim 13, which is characterized in that
The installation kit generation unit is further used for, before the installation kit for generating the service, to passing through in the mirror image Deep learning trains the kernel model file come and is encrypted.
18. device according to claim 17, which is characterized in that
The installation kit generation unit is further used for, and before the installation kit for generating the service, obtains the server Machine fingerprint is generated encryption key according to the machine fingerprint, is carried out using the encryption key to the kernel model file Encryption.
19. device according to claim 13, which is characterized in that
The installation kit generation unit is further used for, and before the installation kit for generating the service, generates the service starting Required configuration file generates the installation kit according to the mirror image and the configuration file.
20. a kind of service privatization device characterized by comprising request unit and service arrangement unit;
The request unit, for obtaining the one of user after the installation kit of service is downloaded on the server of user Key deployment request, the installation kit are to be compiled to the code of the service got, and be based on compiling as a result, passing through Docker container engine technique, after the mirror image for producing the service, according to the installation kit for the service that the mirror image generates;
The service arrangement unit, for completing deployment of the service on the server according to the installation kit.
21. device according to claim 20, which is characterized in that
The service arrangement unit reads the configuration file in the installation kit, completes the service according to the configuration file and exists Deployment on the server.
22. device according to claim 20, which is characterized in that
It is carried in the installation kit and has permission control certificate, the server got according to the permission control certificate What machine fingerprint generated;
The service arrangement unit is further used for, in service arrangement according to the permission control certificate to the server into Row Authority Verification.
23. device according to claim 20, which is characterized in that
The service arrangement unit is further used for, when need to run in the service by deep learning train come core When model file, if the kernel model file has carried out encryption, it is decrypted.
24. device according to claim 20, which is characterized in that
The service arrangement unit is further used for executing following one or whole:
According to the self-service operation and maintenance tools that the service provides, service O&M is carried out;
According to the open source shipyard tool that the service provides, the visualized management of docker container is carried out.
25. a kind of computer equipment, including memory, processor and it is stored on the memory and can be on the processor The computer program of operation, which is characterized in that the processor is realized when executing described program as any in claim 1~12 Method described in.
26. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that described program is processed The method as described in any one of claim 1~12 is realized when device executes.
CN201811255524.XA 2018-10-26 2018-10-26 Service privatization method, apparatus, computer equipment and storage medium Pending CN109582315A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811255524.XA CN109582315A (en) 2018-10-26 2018-10-26 Service privatization method, apparatus, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811255524.XA CN109582315A (en) 2018-10-26 2018-10-26 Service privatization method, apparatus, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109582315A true CN109582315A (en) 2019-04-05

Family

ID=65920880

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811255524.XA Pending CN109582315A (en) 2018-10-26 2018-10-26 Service privatization method, apparatus, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109582315A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110175033A (en) * 2019-05-24 2019-08-27 北京百度网讯科技有限公司 Service arrangement method and apparatus and serving starting method and device
CN110297653A (en) * 2019-07-02 2019-10-01 浪潮云信息技术有限公司 A kind of method of container service upgrading
CN110413294A (en) * 2019-08-06 2019-11-05 中国工商银行股份有限公司 Service delivery system, method, apparatus and equipment
CN111124646A (en) * 2019-12-23 2020-05-08 百度国际科技(深圳)有限公司 Privatization transformation implementation method and device, electronic equipment and storage medium
CN111459506A (en) * 2020-03-02 2020-07-28 平安科技(深圳)有限公司 Deployment method, device, medium and electronic equipment of deep learning platform cluster
CN111857738A (en) * 2020-08-05 2020-10-30 北京千丁互联科技有限公司 Privatization deployment method and device
CN112148297A (en) * 2020-08-26 2020-12-29 广州市保伦电子有限公司 Intelligent server encryption and packaging method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078858A (en) * 2012-12-31 2013-05-01 上海同岩土木工程科技有限公司 Web service and signature certificate-based software trial authorization method
CN106095408A (en) * 2016-05-31 2016-11-09 浙江网新恒天软件有限公司 A kind of system and method for data monitoring and Code automatic build and deployment
CN107609394A (en) * 2017-08-28 2018-01-19 上海移卓网络科技有限公司 Tamper resistant method, storage device and the device of Android installation kits
CN107678756A (en) * 2017-09-29 2018-02-09 千寻位置网络有限公司 A kind of Web based on Docker applies a key dissemination method
CN107896230A (en) * 2017-12-26 2018-04-10 车智互联(北京)科技有限公司 A kind of system for supporting high concurrent order to perform passage
US20180173512A1 (en) * 2016-12-19 2018-06-21 International Business Machines Corporation Optimized Creation of Distributed Storage and Distributed Processing Clusters on Demand
CN108196843A (en) * 2018-01-09 2018-06-22 成都睿码科技有限责任公司 Visualization Docker containers compile the O&M method of deployment automatically
CN108282513A (en) * 2017-12-08 2018-07-13 广州视源电子科技股份有限公司 Server disposition method, system, storage medium and computer equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078858A (en) * 2012-12-31 2013-05-01 上海同岩土木工程科技有限公司 Web service and signature certificate-based software trial authorization method
CN106095408A (en) * 2016-05-31 2016-11-09 浙江网新恒天软件有限公司 A kind of system and method for data monitoring and Code automatic build and deployment
US20180173512A1 (en) * 2016-12-19 2018-06-21 International Business Machines Corporation Optimized Creation of Distributed Storage and Distributed Processing Clusters on Demand
CN107609394A (en) * 2017-08-28 2018-01-19 上海移卓网络科技有限公司 Tamper resistant method, storage device and the device of Android installation kits
CN107678756A (en) * 2017-09-29 2018-02-09 千寻位置网络有限公司 A kind of Web based on Docker applies a key dissemination method
CN108282513A (en) * 2017-12-08 2018-07-13 广州视源电子科技股份有限公司 Server disposition method, system, storage medium and computer equipment
CN107896230A (en) * 2017-12-26 2018-04-10 车智互联(北京)科技有限公司 A kind of system for supporting high concurrent order to perform passage
CN108196843A (en) * 2018-01-09 2018-06-22 成都睿码科技有限责任公司 Visualization Docker containers compile the O&M method of deployment automatically

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张博等: "《常用黑客攻防技术大全》", 31 January 2011, 中国铁道出版社 *
许云峰等: "《大数据技术及行业应用》", 31 August 2016, 北京邮电大学出版社 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110175033A (en) * 2019-05-24 2019-08-27 北京百度网讯科技有限公司 Service arrangement method and apparatus and serving starting method and device
CN110297653A (en) * 2019-07-02 2019-10-01 浪潮云信息技术有限公司 A kind of method of container service upgrading
CN110413294A (en) * 2019-08-06 2019-11-05 中国工商银行股份有限公司 Service delivery system, method, apparatus and equipment
CN110413294B (en) * 2019-08-06 2023-09-12 中国工商银行股份有限公司 Service release system, method, device and equipment
CN111124646A (en) * 2019-12-23 2020-05-08 百度国际科技(深圳)有限公司 Privatization transformation implementation method and device, electronic equipment and storage medium
CN111124646B (en) * 2019-12-23 2023-03-14 百度国际科技(深圳)有限公司 Privatization transformation implementation method and device, electronic equipment and storage medium
CN111459506A (en) * 2020-03-02 2020-07-28 平安科技(深圳)有限公司 Deployment method, device, medium and electronic equipment of deep learning platform cluster
CN111459506B (en) * 2020-03-02 2023-10-13 平安科技(深圳)有限公司 Deep learning platform cluster deployment method and device, medium and electronic equipment
CN111857738A (en) * 2020-08-05 2020-10-30 北京千丁互联科技有限公司 Privatization deployment method and device
CN112148297A (en) * 2020-08-26 2020-12-29 广州市保伦电子有限公司 Intelligent server encryption and packaging method and device

Similar Documents

Publication Publication Date Title
CN109582315A (en) Service privatization method, apparatus, computer equipment and storage medium
CN110414268A (en) Access control method, device, equipment and storage medium
CN101589397B (en) Cryptographic key containers on USB token
CN110088742A (en) Use the logical repositories service of encrypted configuration data
CN106575243A (en) Hypervisor-hosted virtual machine forensics
CN109597677A (en) Method and apparatus for handling information
CN109344568A (en) Document handling method and device based on block chain
CN109997143A (en) The safety of sensitive data is shared
CN109271358A (en) Data summarization method, querying method, device, equipment and storage medium
CN109800475A (en) Automatic Pilot data processing method, device, equipment and computer storage medium
CN107886320A (en) It is a kind of to handle the method, equipment and computer-readable storage medium for tying up card
CN109783374A (en) Code process method, apparatus, equipment and the computer storage medium in automatic Pilot field
CN107873125A (en) Active/standby devices scramble is shown
CN107305613A (en) Protect the system and method for the voice data transmission from microphone to application process
JP2020501239A (en) Web server protection from malicious client applications
CN106202220A (en) The method of data and device in a kind of reading object storage system
CN108228312A (en) The system and method that code is performed by interpreter
CN109657167A (en) Collecting method, device, server and storage medium
CN107368339A (en) Container entrance program operating method, system, equipment and storage medium
US8972745B2 (en) Secure data handling in a computer system
CN109522683A (en) Software source tracing method, system, computer equipment and storage medium
CN111222181B (en) AI model supervision method, system, server and storage medium
CN109582320A (en) Write yard method and terminal device
CN109635558A (en) Access control method, device and system
CN111030816A (en) Authentication method and device for access platform of evidence obtaining equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination