CN113010854A - Authorization file monitoring method and device - Google Patents

Authorization file monitoring method and device Download PDF

Info

Publication number
CN113010854A
CN113010854A CN202110243201.4A CN202110243201A CN113010854A CN 113010854 A CN113010854 A CN 113010854A CN 202110243201 A CN202110243201 A CN 202110243201A CN 113010854 A CN113010854 A CN 113010854A
Authority
CN
China
Prior art keywords
server
authorization
files
file
authorization file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110243201.4A
Other languages
Chinese (zh)
Inventor
蔡兵克
张泳
刘伟
赵振标
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110243201.4A priority Critical patent/CN113010854A/en
Publication of CN113010854A publication Critical patent/CN113010854A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an authorized file monitoring method and device, and belongs to the technical field of cloud computing. The method for monitoring the authorization file comprises the following steps: generating an execution script according to the authorization file using strategy; sending the execution script to each server in the server cluster so that each server runs the execution script; receiving server parameters and the number of actual authorization files obtained by running the execution script by each server, and determining the number of standard authorization files of each server according to an authorization file use strategy corresponding to the actual authorization files of each server and the server parameters of each server; and outputting early warning information according to the comparison result of the number of the standard authorization files of each server and the number of the corresponding actual authorization files. The method and the system can comprehensively monitor the use condition of the authorization file, timely initiate accurate early warning for a manager to make a decision, reduce the labor cost and avoid legal risks.

Description

Authorization file monitoring method and device
Technical Field
The invention relates to the technical field of cloud computing, in particular to an authorized file monitoring method and device.
Background
Software licenses describe the legal rights associated with authorizing the use of digital material, and non-compliance with the terms of a software license agreement typically results in criminal control associated with licensing intellectual property and copyrighted material.
A software license is a form contract with a user by a software author to specify and limit the rights of the software user to use the software (or its source code), and the obligations the author shall make. Common software licenses include: GPL licenses, BSD licenses, and private software licenses, among others.
License, i.e. an authorization file, is generally used in commercial software to authorize a paying user so that the paying user normally uses the complete functions of the software. The division into lifetime licenses and annual licenses can be roughly divided according to the time of license usage, and can generally be calculated by the number of usage.
The authorization document is a carrier for the enterprise to purchase and use the legality mark and identification of the commercial software, and the software supplier usually declares the calculation method of license authorization, the item of constraint supply such as validity period and the like and needing the legal right of both parties in the license or the purchase contract, and uses the license (or the serial number, the registration code and the like) form as the implementation carrier of the declaration.
Different business software has different calculation modes for licenses, and for a small enterprise, a manager can manually manage the number of purchased licenses and the number of used licenses, but for a large enterprise with intensive technologies, such as the financial industry, the communication industry, the Internet industry and the like, the large enterprise has millions of servers, each server has different configuration, the license calculation modes of the business software are different, and the management is almost impossible simply through manual account checking. Meanwhile, as the intellectual property law further increases the protection on intellectual property, whether the license use condition is excessive is also a risk in the aspects of law and check faced by enterprise managers.
Disclosure of Invention
The embodiment of the invention mainly aims to provide an authorization file monitoring method and device, so that the use condition of an authorization file is comprehensively monitored, accurate early warning is timely initiated for a manager to make a decision, the labor cost is reduced, and the legal risk is avoided.
In order to achieve the above object, an embodiment of the present invention provides an authorization file monitoring method, including:
generating an execution script according to the authorization file using strategy;
sending the execution script to each server in the server cluster so that each server runs the execution script;
receiving server parameters and the number of actual authorization files obtained by running the execution script by each server, and determining the number of standard authorization files of each server according to an authorization file use strategy corresponding to the actual authorization files of each server and the server parameters of each server;
and outputting early warning information according to the comparison result of the number of the standard authorization files of each server and the number of the corresponding actual authorization files.
The embodiment of the present invention further provides an authorized file monitoring apparatus, including:
the execution script generation module is used for generating an execution script according to the authorization file use strategy;
the script sending module is used for sending the execution script to each server in the server cluster so as to enable each server to run the execution script;
the standard authorization file determining module is used for receiving server parameters and the number of actual authorization files acquired by running the execution script of each server, and determining the number of the standard authorization files of each server according to an authorization file use strategy corresponding to the actual authorization files of each server and the server parameters of each server;
and the early warning output module is used for outputting early warning information according to the comparison result of the number of the standard authorization files of each server and the number of the corresponding actual authorization files.
The embodiment of the invention also provides computer equipment which comprises a memory, a processor and a computer program which is stored on the memory and runs on the processor, wherein the steps of the authorization file monitoring method are realized when the processor executes the computer program.
The embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the authorization file monitoring method.
The authorization file monitoring method and device provided by the embodiment of the invention firstly generate the execution script according to the authorization file use strategy, then receive the server parameters and the actual authorization file quantity obtained by the server running the execution script, and then determine the standard authorization file quantity according to the authorization file use strategy and the server parameters corresponding to the actual authorization file to output the early warning information, so that the use condition of the authorization file can be comprehensively monitored, accurate early warning is timely initiated for a manager to make a decision, the labor cost is reduced, and the legal risk is avoided.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a flow chart of a method for monitoring an authorization document according to an embodiment of the invention;
FIG. 2 is a flow chart of a method for monitoring an authorization document in another embodiment of the present invention;
FIG. 3 is a flow chart of determining a number of standard authorization files in an embodiment of the present invention;
FIG. 4 is a block diagram of an authorized document monitoring apparatus according to an embodiment of the present invention;
FIG. 5 is a block diagram of an authorized document monitoring device according to another embodiment of the present invention;
fig. 6 is a block diagram showing the structure of a computer device in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As will be appreciated by one skilled in the art, embodiments of the present invention may be embodied as a system, apparatus, device, method, or computer program product. Accordingly, the present disclosure may be embodied in the form of: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
In view of the difficulties in counting the number of authorized files of outsourcing business software, low accuracy, insufficient timeliness, high labor cost, uncontrollable overall use condition of the authorized files, lack of early warning mechanism, easy triggering of compliance mechanism and causing legal risks in the prior art, the embodiment of the invention provides an authorized file monitoring method, which can dynamically collect the use condition of the authorized files of the appointed outsourcing business software at regular time by an agent (execution script) deployed in an enterprise server cluster, can support flexible expansion and contraction capacity without interrupting external services, actively initiates early warning mails for decision making of an enterprise manager according to a threshold (standard authorized file number) preset by a user, can comprehensively monitor and intelligently manage the use condition of the authorized files, timely initiate accurate early warning for decision making of the manager, reduce cost for enterprises, avoid risks and improve enterprise management capability, the system helps enterprises to promote resource integration and reasonably plan purchasing plans, so that the enterprise management is more scientific, refined and intelligent, and the productivity of the enterprises is improved through science and technology.
Fig. 1 is a flowchart of an authorization file monitoring method according to an embodiment of the present invention. Fig. 2 is a flowchart of an authorization file monitoring method in another embodiment of the present invention. As shown in fig. 1 and 2, the method for monitoring an authorization file includes:
s101: and generating an execution script according to the authorization file using the strategy.
Before executing S101, the user enters an authorization file usage policy at the input client, and the input client sends the authorization file usage policy to the core application server. And when the S101 is executed, the core application server converts the authorization file using strategy into an execution script through the compiler, and uploads the execution script to the distribution server.
S102: and sending the execution script to each server in the server cluster so that each server runs the execution script.
In specific implementation, the distribution server distributes the execution script to each server in the server cluster through GTP (general file transfer platform) according to the information of each server registered in the node table. Each server in the server cluster may include a service cluster and a terminal device.
S103: and receiving server parameters and the number of actual authorization files acquired by running the execution script of each server, and determining the number of standard authorization files of each server according to an authorization file use strategy corresponding to the actual authorization file of each server and the server parameters of each server.
In one embodiment, the receiving the server parameters and the number of actual authorization files acquired by running the execution script by each server includes: and receiving the server parameters and the actual authorization file quantity acquired by each server running the execution script from the authorization file registration directory.
In specific implementation, the execution scripts deployed on each server are triggered at regular time, and actively traverse the registration files under the authorization file registration directory according to a preset program to acquire information such as the mac address, the server parameters, the actual authorization file quantity and the like of the server, and push the information into the message queue of the message server. The message server is used for maintaining a message service queue as a factory production message of the message, the core application server regularly consumes the message in the message queue, the authorization file messages of different outsourcing software are distinguished according to different topics (topic) in the message, and information such as a server unique identifier (such as a mac address), server parameters and the number of actual authorization files in the message is analyzed.
Fig. 3 is a flow chart of determining the number of standard authorization files in an embodiment of the present invention. As shown in fig. 3, determining the number of standard authorization files of each server according to the authorization file usage policy corresponding to the actual authorization file of each server and the server parameter of each server includes:
s201: and determining the server core of each server according to the server parameters of each server.
In specific implementation, the server parameter may be the number of CPUs, and the number of server cores may be determined according to the number of CPUs based on the correspondence between the CPUs and the server cores. For example, 1 CPU corresponds to 8 server cores.
S202: and determining the number of the standard authorization files of each server according to the authorization file use strategy corresponding to the actual authorization file of each server and the server core of each server.
For example, the authorization file usage policy of one of the servers is that 1 authorization file a corresponds to 8 server cores, 1 authorization file B corresponds to 16 server cores, 2 CPUs are installed on the server, and 1 CPU corresponds to 8 server cores, so that the server has 16 server cores, the number of standard authorization files of the authorization file a is 2, and the number of standard authorization files of the authorization file B is 1.
S104: and outputting early warning information according to the comparison result of the number of the standard authorization files of each server and the number of the corresponding actual authorization files.
In one embodiment, S104 includes: determining the threshold range of the authorization file of each server according to the actual number of the authorization files of each server; and outputting early warning information according to the comparison result of the number of the standard authorization files of each server and the corresponding authorization file threshold range.
For example, when the number of standard authorization files of one of the servers is not within the authorization file threshold range of the server, the early warning information including the unique identifier of the server is output to an external output client, an enterprise manager is notified to perform emergency treatment on the server, and the enterprise operator can periodically analyze the use condition of the authorization files on the external output client, grasp the use distribution and the number of current outsourced software, reasonably integrate and adjust enterprise resources, and promote enterprise resources and reasonable configuration. When the number of the actual authorization files is smaller than that of the standard authorization files, the early warning information is output. When the standard authorized file number of the server is within the authorized file threshold range of the server, only the service condition and the distribution condition of the current authorized file are notified to the enterprise manager by the mail.
The execution subject of the authorization file monitoring method shown in fig. 1 may be a server. As can be seen from the flow shown in fig. 1, the authorization file monitoring method according to the embodiment of the present invention first generates an execution script according to the authorization file usage policy, then receives the server parameters and the actual number of authorization files obtained by the server running the execution script, and then determines the standard number of authorization files according to the authorization file usage policy and the server parameters corresponding to the actual authorization files to output the warning information, so as to comprehensively monitor the usage of the authorization files, timely initiate an accurate warning for the administrator to make a decision, reduce the labor cost, and avoid the legal risk.
The specific process of the embodiment of the invention is as follows:
1. and generating an execution script according to the authorization file using strategy, and sending the execution script to each server in the server cluster.
2. And each server runs the execution script, and obtains the server parameters and the actual authorization file number from the authorization file registration directory.
3. And receiving the server parameters and the actual number of the authorization files from each server, and determining the server core of each server according to the server parameters of each server.
4. And determining the number of the standard authorization files of each server according to the authorization file use strategy corresponding to the actual authorization file of each server and the server core of each server.
5. And determining the threshold range of the authorization file of each server according to the actual number of the authorization files of each server.
6. And outputting early warning information according to the comparison result of the number of the standard authorization files of each server and the corresponding authorization file threshold range.
In summary, the method for monitoring the authorization file provided by the embodiment of the present invention has the following beneficial effects:
1. the universality is strong: the method is suitable for the requirements of various industries on the management of the authorization files of different outsourced business software.
2. The operation is simple: the intelligent monitoring of the use condition of the authorization file of the appointed outsourced software can be completed only by inputting the use strategy of the authorization file according to the license authorization scheme of the outsourced software.
3. The timeliness is high: and monitoring the registration condition and the logout condition of the authorization file of each node in real time through an execution script deployed in the cluster, dynamically collecting information and feeding the information back to the server side for analysis and use in real time.
4. The accuracy is high: the method solves the problems that manual statistics is easy to make mistakes and omit, and the actual use condition of an enterprise cannot be dynamically updated and fed back, and accurately counts the use condition of the authorization file in real time through the execution script.
5. The cost is low: can help the enterprise to release a large amount of human costs of this work, practice thrift the spending of enterprise, promote the performance of enterprises.
6. And (3) assisting enterprise managers to make decisions: the method can provide a reasonable optimization strategy by combining the use conditions of purchasing and using the authorization file of the enterprise, guide the decision of an enterprise manager, reasonably promote the resource integration, reasonably plan the purchasing plan, and enable the enterprise management to be more scientific and refined.
7. Timely early warning: when the using condition of the authorization file reaches the early warning threshold value, an enterprise manager can be notified automatically in time in the forms of mails, information and the like, and the triggering of a compliance mechanism and the legal risk are avoided.
Fig. 4 is a block diagram of an authorization file monitoring apparatus according to an embodiment of the present invention. Fig. 5 is a block diagram of an authorization document monitoring device according to another embodiment of the invention. As shown in fig. 4 to 5, the authorization document monitoring apparatus includes:
the execution script generation module is used for generating an execution script according to the authorization file use strategy;
the script sending module is used for sending the execution script to each server in the server cluster so as to enable each server to run the execution script;
the standard authorization file determining module is used for receiving server parameters and the number of actual authorization files acquired by running the execution script of each server, and determining the number of the standard authorization files of each server according to an authorization file use strategy corresponding to the actual authorization files of each server and the server parameters of each server;
and the early warning output module is used for outputting early warning information according to the comparison result of the number of the standard authorization files of each server and the number of the corresponding actual authorization files.
In one embodiment, the standard authorization file determining module is specifically configured to:
and receiving the server parameters and the actual number of the authorization files, which are acquired by each server from the authorization file registration directory by running the execution script.
In one embodiment, the standard authorization file determination module comprises:
the server core determining unit is used for determining the server core of each server according to the server parameters of each server;
the standard authorization file unit is used for determining the number of the standard authorization files of each server according to the authorization file use strategy corresponding to the actual authorization file of each server and the server core of each server.
In one embodiment, the warning output module includes:
the authorization file threshold range unit is used for determining the authorization file threshold range of each server according to the actual authorization file number of each server;
and the early warning output unit is used for outputting early warning information according to the comparison result of the number of the standard authorization files of each server and the corresponding authorization file threshold range.
As shown in fig. 5, in practical applications, the authorization file monitoring apparatus includes a core application server 3, a distribution server 4 and a message server 8. The core application server 3 comprises an execution script generation module, a standard authorization file determination module and an early warning output module; the distribution server 4 comprises a script sending module and the message server 8 comprises a standard authorization file determining module.
During specific implementation, a user inputs an authorization file using strategy 1 into an input client 2, the input client 2 sends the authorization file using strategy 1 to a core application server 3, the core application server 3 converts the authorization file using strategy 1 into an execution script 5 through a compiler, and the execution script 5 is uploaded to a distribution server 4. The distribution server 4 distributes the execution script 5 to the service cluster 6 and the terminal device 7 in the server cluster through GTP (general file transfer platform) according to the respective server information registered in the node table thereof. The server cluster pushes the information of the mac address, the server parameters, the actual authorization file quantity and the like of the server to the message queue of the message server 8. The core application server 3 obtains the information of the mac address, the server parameters, the actual authorization file quantity and the like of the server from the message server 8, determines the standard authorization file quantity of each server according to the authorization file use strategy corresponding to the actual authorization file of each server and the server parameters of each server, and outputs the early warning information to the external output client 9 according to the comparison result of the standard authorization file quantity of each server and the corresponding actual authorization file quantity.
To sum up, the authorization file monitoring device of the embodiment of the invention generates the execution script according to the authorization file usage policy, receives the server parameters and the actual authorization file number obtained by the server running the execution script, and determines the standard authorization file number according to the authorization file usage policy and the server parameters corresponding to the actual authorization file to output the early warning information, so that the usage condition of the authorization file can be comprehensively monitored, accurate early warning can be timely initiated for a manager to make a decision, the labor cost is reduced, and the legal risk is avoided.
The embodiment of the invention also provides a specific implementation mode of the computer equipment, which can realize all the steps in the authorization file monitoring method in the embodiment. Fig. 6 is a block diagram of a computer device in an embodiment of the present invention, and referring to fig. 6, the computer device specifically includes the following:
a processor (processor)601 and a memory (memory) 602.
The processor 601 is configured to call a computer program in the memory 602, and when the processor executes the computer program, the processor implements all the steps in the authorization file monitoring method in the foregoing embodiment, for example, when the processor executes the computer program, the processor implements the following steps:
generating an execution script according to the authorization file using strategy;
sending the execution script to each server in the server cluster so that each server runs the execution script;
receiving server parameters and the number of actual authorization files obtained by running the execution script by each server, and determining the number of standard authorization files of each server according to an authorization file use strategy corresponding to the actual authorization files of each server and the server parameters of each server;
and outputting early warning information according to the comparison result of the number of the standard authorization files of each server and the number of the corresponding actual authorization files.
To sum up, the computer device of the embodiment of the present invention generates the execution script according to the authorization file usage policy, receives the server parameters and the actual number of authorization files obtained by the server running the execution script, and determines the standard number of authorization files according to the authorization file usage policy and the server parameters corresponding to the actual authorization files to output the warning information, so as to monitor the usage of the authorization files comprehensively, initiate an accurate warning in time for the administrator to make a decision, reduce the labor cost, and avoid the legal risk.
An embodiment of the present invention further provides a computer-readable storage medium capable of implementing all steps in the authorized file monitoring method in the foregoing embodiment, where the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, all steps of the authorized file monitoring method in the foregoing embodiment are implemented, for example, when the processor executes the computer program, the following steps are implemented:
generating an execution script according to the authorization file using strategy;
sending the execution script to each server in the server cluster so that each server runs the execution script;
receiving server parameters and the number of actual authorization files obtained by running the execution script by each server, and determining the number of standard authorization files of each server according to an authorization file use strategy corresponding to the actual authorization files of each server and the server parameters of each server;
and outputting early warning information according to the comparison result of the number of the standard authorization files of each server and the number of the corresponding actual authorization files.
To sum up, the computer-readable storage medium of the embodiment of the present invention generates the execution script according to the authorization file usage policy, receives the server parameters and the actual number of authorization files obtained by the server running the execution script, and determines the standard number of authorization files according to the authorization file usage policy and the server parameters corresponding to the actual authorization files to output the warning information, so as to comprehensively monitor the usage of the authorization files, timely initiate an accurate warning for the administrator to make a decision, reduce the labor cost, and avoid the legal risk.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Those of skill in the art will further appreciate that the various illustrative logical blocks, units, and steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate the interchangeability of hardware and software, various illustrative components, elements, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design requirements of the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present embodiments.
The various illustrative logical blocks, or elements, or devices described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor, an Application Specific Integrated Circuit (ASIC), a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other similar configuration.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. For example, a storage medium may be coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC, which may be located in a user terminal. In the alternative, the processor and the storage medium may reside in different components in a user terminal.
In one or more exemplary designs, the functions described above in connection with the embodiments of the invention may be implemented in hardware, software, firmware, or any combination of the three. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media that facilitate transfer of a computer program from one place to another. Storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, such computer-readable media can include, but is not limited to, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store program code in the form of instructions or data structures and which can be read by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Additionally, any connection is properly termed a computer-readable medium, and, thus, is included if the software is transmitted from a website, server, or other remote source via a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wirelessly, e.g., infrared, radio, and microwave. Such discs (disk) and disks (disc) include compact disks, laser disks, optical disks, DVDs, floppy disks and blu-ray disks where disks usually reproduce data magnetically, while disks usually reproduce data optically with lasers. Combinations of the above may also be included in the computer-readable medium.

Claims (10)

1. An authorized document monitoring method, comprising:
generating an execution script according to the authorization file using strategy;
sending the execution script to each server in a server cluster so that each server runs the execution script;
receiving server parameters and the number of actual authorization files obtained by running the execution script by each server, and determining the number of standard authorization files of each server according to an authorization file use strategy corresponding to the actual authorization files of each server and the server parameters of each server;
and outputting early warning information according to the comparison result of the number of the standard authorization files of each server and the number of the corresponding actual authorization files.
2. The method for monitoring the authorization file according to claim 1, wherein receiving the server parameters and the number of the actual authorization files obtained by each server running the execution script comprises:
and receiving the server parameters and the actual number of the authorization files, which are acquired by each server from the authorization file registration directory by running the execution script.
3. The method for monitoring the authorization file according to claim 2, wherein the determining the number of the standard authorization files of each server according to the authorization file usage policy corresponding to the actual authorization file of each server and the server parameters of each server comprises:
determining a server core of each server according to the server parameters of each server;
and determining the number of the standard authorization files of each server according to the authorization file use strategy corresponding to the actual authorization file of each server and the server core of each server.
4. The method for monitoring the authorization files according to claim 2, wherein outputting the warning information according to the comparison result of the number of the standard authorization files of each server and the number of the corresponding actual authorization files comprises:
determining the threshold range of the authorization file of each server according to the actual number of the authorization files of each server;
and outputting early warning information according to the comparison result of the number of the standard authorization files of each server and the corresponding authorization file threshold range.
5. An authorized document monitoring device, comprising:
the execution script generation module is used for generating an execution script according to the authorization file use strategy;
the script sending module is used for sending the execution script to each server in the server cluster so as to enable each server to run the execution script;
the standard authorization file determining module is used for receiving server parameters and the number of actual authorization files obtained by running the execution script by each server, and determining the number of the standard authorization files of each server according to an authorization file use strategy corresponding to the actual authorization files of each server and the server parameters of each server;
and the early warning output module is used for outputting early warning information according to the comparison result of the number of the standard authorization files of each server and the number of the corresponding actual authorization files.
6. The device for monitoring the authorization file according to claim 5, wherein the standard authorization file determining module is specifically configured to:
and receiving the server parameters and the actual number of the authorization files, which are acquired by each server from the authorization file registration directory by running the execution script.
7. The authorization document monitoring device according to claim 6, characterized in that the standard authorization document determination module comprises:
the server core determining unit is used for determining the server core of each server according to the server parameters of each server;
the standard authorization file unit is used for determining the number of the standard authorization files of each server according to the authorization file use strategy corresponding to the actual authorization file of each server and the server core of each server.
8. The authorized document monitoring device of claim 6, wherein the warning output module comprises:
the authorization file threshold range unit is used for determining the authorization file threshold range of each server according to the actual authorization file number of each server;
and the early warning output unit is used for outputting early warning information according to the comparison result of the number of the standard authorization files of each server and the corresponding authorization file threshold range.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and running on the processor, characterized in that the processor implements the steps of the authorization document monitoring method according to any of claims 1 to 4 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the authorization document monitoring method according to any of claims 1 to 4.
CN202110243201.4A 2021-03-05 2021-03-05 Authorization file monitoring method and device Pending CN113010854A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110243201.4A CN113010854A (en) 2021-03-05 2021-03-05 Authorization file monitoring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110243201.4A CN113010854A (en) 2021-03-05 2021-03-05 Authorization file monitoring method and device

Publications (1)

Publication Number Publication Date
CN113010854A true CN113010854A (en) 2021-06-22

Family

ID=76406180

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110243201.4A Pending CN113010854A (en) 2021-03-05 2021-03-05 Authorization file monitoring method and device

Country Status (1)

Country Link
CN (1) CN113010854A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9617596D0 (en) * 1996-08-22 1996-10-02 Icl Personal Systems Oy Software licence management
CN101430749A (en) * 2008-10-31 2009-05-13 金蝶软件(中国)有限公司 Software permission monitoring method, system and electronic equipment
CN101887377A (en) * 2009-05-13 2010-11-17 佳能株式会社 License management system and licence managing method
CN103186738A (en) * 2011-12-30 2013-07-03 英业达集团(天津)电子技术有限公司 Software license management and control method and system for software resources, creating device and starting device
CN103220166A (en) * 2013-03-21 2013-07-24 汉柏科技有限公司 License management method of server cluster
CN112307522A (en) * 2020-10-30 2021-02-02 苏州浪潮智能科技有限公司 Method and device for realizing maintenance service in software system and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9617596D0 (en) * 1996-08-22 1996-10-02 Icl Personal Systems Oy Software licence management
CN101430749A (en) * 2008-10-31 2009-05-13 金蝶软件(中国)有限公司 Software permission monitoring method, system and electronic equipment
CN101887377A (en) * 2009-05-13 2010-11-17 佳能株式会社 License management system and licence managing method
CN103186738A (en) * 2011-12-30 2013-07-03 英业达集团(天津)电子技术有限公司 Software license management and control method and system for software resources, creating device and starting device
CN103220166A (en) * 2013-03-21 2013-07-24 汉柏科技有限公司 License management method of server cluster
CN112307522A (en) * 2020-10-30 2021-02-02 苏州浪潮智能科技有限公司 Method and device for realizing maintenance service in software system and storage medium

Similar Documents

Publication Publication Date Title
US9521151B2 (en) Automated and policy driven optimization of cloud infrastructure through delegated actions
JP2020017256A (en) System for performing verification in block chain
US20200007464A1 (en) Method and management system of distributed computation
CN108804909B (en) Method for carrying out block chaining evidence storage processing on detection data
WO2016041120A1 (en) Risk control method and system for internet financing fund and project progress
CN104035939A (en) Flexible monitoring frame with peculiar independent rule engine
US20130332587A1 (en) Method and a system for on-boarding, administration and communication between cloud providers and tenants in a share-all multi-tenancy environment
US20170346798A1 (en) Key negotiation method and system, network entity and computer storage medium
KR102009336B1 (en) Apparatus, method and computer program for cloud scrapping using pre-scrapped bigdata
CN110991981A (en) Application method of research and development cloud platform
KR101600257B1 (en) Nuclear power plants configuration management apparatus
US20150188787A1 (en) Integrated solution for application data layer coverage discovery and gap analysis
JP7039652B2 (en) Abnormal server service processing method and equipment
CN113010854A (en) Authorization file monitoring method and device
CN112232856A (en) Traffic processing method and device based on diversion and electronic equipment
CN111126947A (en) Integrated management method, device, medium and electronic equipment for business data
US20100077025A1 (en) Workflow automation & request processing
CN112150299B (en) Annuity data processing method, annuity data processing device, medium and electronic equipment
US10771586B1 (en) Custom access controls
CN111061789A (en) Smart power grids capital construction information management system
US11132242B1 (en) Scalable actions for user data requests
CN114443594A (en) Network security data interaction method, system, device and storage medium
CN113542103B (en) Method and device for monitoring invitations of accounts in social communication group and mobile terminal
US20230274230A1 (en) Plan validation and policy checks for information technology environments
US20160246813A1 (en) System and method for machine information life cycle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination