CN116450176A - Version updating method and device, electronic equipment and storage medium - Google Patents

Version updating method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN116450176A
CN116450176A CN202310373058.XA CN202310373058A CN116450176A CN 116450176 A CN116450176 A CN 116450176A CN 202310373058 A CN202310373058 A CN 202310373058A CN 116450176 A CN116450176 A CN 116450176A
Authority
CN
China
Prior art keywords
file
updated
update
version
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310373058.XA
Other languages
Chinese (zh)
Inventor
卢宏伟
刘叶楠
潘斌
曹青
徐建升
萧展辉
杨漾
徐律冠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Southern Power Grid Digital Platform Technology Guangdong Co ltd
Original Assignee
China Southern Power Grid Digital Platform Technology Guangdong Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Southern Power Grid Digital Platform Technology Guangdong Co ltd filed Critical China Southern Power Grid Digital Platform Technology Guangdong Co ltd
Priority to CN202310373058.XA priority Critical patent/CN116450176A/en
Publication of CN116450176A publication Critical patent/CN116450176A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Information Transfer Between Computers (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a version updating method, a version updating device, electronic equipment and a storage medium. The method comprises the following steps: responding to the version updating instruction, and acquiring a target updating file and a file version identifier of the equipment to be updated, which correspond to the equipment identifier in the version updating instruction; determining a current version identification of an associated device to be updated associated with the device to be updated; when the current version identifier is inconsistent with the file version identifier, acquiring an update file to be used, corresponding to the associated equipment to be updated, which is consistent with the file version identifier; when the software updating is carried out on the associated equipment to be updated based on the update file to be used, determining the current accumulated update time length, and generating early warning prompt information when the current accumulated update time length is longer than the expected update time length. The problem of manually updating and maintaining equipment in the prior art, which leads to high cost and low efficiency, is solved, and the effect of improving the updating accuracy and the updating effectiveness of the equipment is achieved while the updating cost of the equipment is reduced.

Description

Version updating method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of computer processing technologies, and in particular, to a version updating method, a version updating device, an electronic device, and a storage medium.
Background
With the development of network technology, intelligent internet devices have penetrated the aspect of daily work of enterprises, and enterprises need not only daily maintenance on hardware (servers, electronic computers) of the devices, but also unscheduled maintenance on software versions of the devices.
At present, some enterprises' devices cannot directly access to an external network, but only access to an internal local area network, and when updating and maintaining the devices, the files used for maintenance need to be manually downloaded, copied to the internal network, and then manually updated and maintained. This manual update and maintenance method consumes a lot of cost and has a problem of low update efficiency.
Disclosure of Invention
The invention provides a version updating method, a version updating device, electronic equipment and a storage medium, so that the technical effects of improving the accuracy and the effectiveness of equipment updating are achieved while the equipment updating cost is reduced.
According to an aspect of the present invention, there is provided a version updating method, the method comprising:
responding to a version updating instruction, acquiring a target updating file of equipment to be updated of software corresponding to equipment identification in the version updating instruction, and determining a file version identification of the target updating file;
Determining a current version identification of associated equipment to be updated associated with the equipment to be updated;
when the current version identifier is inconsistent with the file version identifier, acquiring an update file to be used, corresponding to the associated equipment to be updated, which is consistent with the file version identifier;
and when the associated equipment to be updated is subjected to software updating based on the update file to be used, determining the current accumulated update time length, and generating early warning prompt information when the current accumulated update time length is detected to be longer than the expected update time length.
According to another aspect of the present invention, there is provided a version updating apparatus including:
the system comprises a target update file acquisition module, a file update module and a file update module, wherein the target update file acquisition module is used for responding to a version update instruction, acquiring a target update file of equipment to be updated corresponding to equipment identification in the version update instruction, and determining a file version identification of the target update file;
the current version identification determining module is used for determining the current version identification of the to-be-updated associated equipment associated with the to-be-updated software equipment;
the to-be-used update file acquisition module is used for acquiring to-be-used update files which are corresponding to the to-be-updated associated equipment and are consistent with the file version identifiers when the current version identifiers are inconsistent with the file version identifiers;
And the early warning prompt information generation module is used for determining the current accumulated update time length when the to-be-updated associated equipment is subjected to software update based on the to-be-used update file, so as to generate early warning prompt information when the current accumulated update time length is detected to be longer than the expected update time length.
According to another aspect of the present invention, there is provided an electronic apparatus including:
at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the version updating method according to any one of the embodiments of the present invention.
According to another aspect of the present invention, there is provided a computer readable storage medium storing computer instructions for causing a processor to implement a version update method according to any one of the embodiments of the present invention when executed.
According to the technical scheme, the target update file of the equipment to be updated, which corresponds to the equipment identifier in the version update instruction, is obtained by responding to the version update instruction, and the file version identifier of the target update file is determined; determining a current version identification of an associated device to be updated associated with the device to be updated; when the current version identifier is inconsistent with the file version identifier, acquiring an update file to be used, corresponding to the associated equipment to be updated, which is consistent with the file version identifier; when the associated equipment to be updated is updated based on the update files to be used, the current accumulated update time length is determined, early warning prompt information is generated when the current accumulated update time length is longer than the expected update time length, the problems of high cost and low efficiency caused by manually updating and maintaining the equipment in the prior art are solved, the purposes that the target update files and the file version identifiers of the associated equipment to be updated are automatically acquired, then the current version identifiers and the file version identifiers of the associated equipment to be updated, which are associated with the equipment to be updated, are compared, when the comparison is inconsistent, the update files to be used, which are corresponding to the associated equipment to be updated and are consistent with the file version identifiers, are automatically acquired, the software update is performed on the associated equipment to be updated based on the update files to be used, the equipment update cost is reduced, the current accumulated update time length of the software update is recorded in real time, and the early warning prompt information is generated when the current accumulated update time length is longer than the expected update time length, so that the software update is effectively monitored based on the early warning prompt information, and the accuracy and the effectiveness of the software update are improved.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the invention or to delineate the scope of the invention. Other features of the present invention will become apparent from the description that follows.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a version updating method according to a first embodiment of the present invention;
fig. 2 is a schematic structural diagram of a version updating device according to a third embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device implementing a version updating method according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
Fig. 1 is a flowchart of a version updating method according to an embodiment of the present invention, where the embodiment is applicable to a case of updating a server, the method may be performed by a version updating device, and the version updating device may be implemented in the form of hardware and/or software, and the version updating device may be configured in a computing device. As shown in fig. 1, the method includes:
S110, responding to the version updating instruction, acquiring a target updating file of the equipment to be updated, corresponding to the equipment identifier in the version updating instruction, and determining the file version identifier of the target updating file.
Where the version update instruction may refer to a program or code for instructing execution of a version update. The device to be updated may be a network device, an office device, a digital device, a video device, etc. which needs to be updated with software, for example, may be a server. The device identification includes a single identification and a category identification, the single identification may be used to characterize the device's uniqueness, e.g., identification: a1 may characterize the server 1. Category identification may also characterize the type of device, e.g., identification: the host service may characterize server 1, server 2, server 3, etc. The target update file may be a software installation package, such as a patch package that consolidates software, or a file that upgrades software. The file format may be rar, com, exe, msi, etc. The file version identification may be used to characterize the uniqueness of the file version, and may be represented by version serial numbers of 1.0, 1.1, 1.11, 2.0, etc., for example.
In this embodiment, the version update instruction may be automatically issued by the device to be updated, or may be generated by the user triggering the version update control on the system page. When the system receives the version update instruction, it may be considered that the version update instruction is responded to. At this time, the device identifier carried in the version updating instruction may be parsed, if the device identifier is a single identifier, the number of devices to be updated corresponding to the device identifier is one, and if the device identifier is a category identifier, the number of devices to be updated corresponding to the device identifier may be one or more. The software installation package for updating the device to be updated can be automatically acquired and used as a target update file, and the file version identification of the target update file is recorded, wherein the version of the target update file is higher than the current version of the device to be updated, so that the device to be updated is updated based on the target update file.
For example, when receiving an operation and maintenance command (i.e., version update command) of any one of a technical party, a research party, a testing party and a system management party, or when a target server automatically sends out a version update command, an installation package (i.e., a target update file) of operation and maintenance server software of the target server (i.e., a device to be updated in software) is automatically obtained after the installation package is issued by a software platform, and a software version serial number (i.e., a file version identifier) of the target update file is recorded, so that the operation and maintenance of the target server is performed based on the target update file, batch maintenance update of the servers of all parties is realized, and the working efficiency of all parties is improved.
In this embodiment, obtaining a target update file of a device to be updated corresponding to a device identifier in a version update instruction includes: analyzing the version updating instruction to obtain the equipment identifier carried on the version updating instruction; and acquiring a target update file of the equipment to be updated, corresponding to the equipment identifier, based on the edge computing network, so as to update the software of the equipment to be updated based on the target update file when the detection result of detecting the target update file is passed.
The edge computing network may include a computing center, a user terminal, an edge server, an edge device, and the like. The edge server may be a single-layer server or a multi-layer server, and the edge server may be divided into a server of a base station or a wireless access point layer, a server of a switch or a gateway layer, a small-sized or local computing center, and the like. The edge devices may include thermometers, smart cameras, smart televisions, sensors, etc., the edge devices are used to collect data,
in practical application, the device identifier carried on the medium version updating instruction can be obtained by analyzing the version updating instruction, so as to determine the device to be updated, which is matched with the device identifier. And initiating at the edge side through the edge computing network, and searching a new software installation package of the equipment to be updated corresponding to the equipment identifier as a target update file. The edge calculation is used for reducing the intermediate transmission process, improving the network service response, reducing the network bandwidth requirement and improving the data processing efficiency, thereby reducing the data processing and the data transmission delay of the whole system. Further, the target update file may be detected by: acquiring preset detection conditions; and detecting the target update file based on a preset detection condition to determine a detection result.
The preset detection condition may be a script or plug-in for detecting a file. The preset detection condition corresponds to at least one detection item of function detection, patch detection and security hole detection. The test item may be a performance index that checks the installation package with a set method.
In this embodiment, a preset detection condition may be invoked from a preset position, and then function detection, patch detection, security hole detection, and the like may be performed on the target update file according to the preset detection condition, so as to obtain a detection result. If the detection result is passed, the target update file is safe and complete, and the device to be updated is updated by the target update file. If the detection result is that the target update file does not pass, the risk exists, the target update file corresponding to the device to be updated can be acquired again based on the edge computing network, and the detection is based on the acquired target update file.
In this embodiment, if the detection result of detecting the target update file is failed, the target update file is deleted, and the target update file corresponding to the device to be updated is obtained based on the edge computing network and re-executed.
Specifically, if the detection result of detecting the target update file is that the target update file does not pass, it is indicated that the target update file has a security risk, in order to reduce the buffer occupation, the target update file may be deleted, and the step of acquiring the target update file corresponding to the device to be updated by the edge computing network is re-executed, so as to obtain the target update file.
The target update file of the device to be updated may be obtained by downloading the target update file on line through an edge computing network, or may be obtained from a preset location. And carrying out integrity check on the target updated file, such as virus receiving and other means, so as to obtain a detection result. If the detection result is safe (namely passing), the target update file is considered to have no safety risk, the target update file is reserved, and then the target update file is downloaded to the equipment to be updated. If the detection result is unsafe (i.e. not passed), deleting the target update file, and re-executing the step of acquiring the target update file of the equipment to be updated based on the edge computing network, and recording the software version serial number (i.e. file version identification) of the target update file.
S120, determining the current version identification of the to-be-updated associated device associated with the to-be-updated software device.
The device to be updated may be a device that is affected by version change of the device to be updated, for example, the device to be updated may be associated with the device to be updated under multiple application programs.
In this embodiment, it may be determined that the device to be updated is associated with the device to be updated, and the number of the devices to be updated may be one or more. And taking the software version number in the associated equipment to be updated as the current version identifier.
And S130, when the current version identification is inconsistent with the file version identification, acquiring an update file to be used, corresponding to the associated equipment to be updated, which is consistent with the file version identification.
In this embodiment, the current version identifier of the software in the associated device to be updated is compared with the file version identifier, and whether the versions are consistent is determined. If the file version identifiers are inconsistent, the associated equipment to be updated is required to be updated, at the moment, the associated equipment to be updated can be marked as a state to be operated and maintained, and an installation file corresponding to the associated equipment to be updated and consistent with the file version identifiers is obtained to be used as an update file to be used, so that the associated equipment to be updated is updated in software based on the update file to be used.
For example, if it is determined that the current software version serial number (current version identifier) of the associated device to be updated is the same as the software version serial number of the target server, it is indicated that the user of the associated device to be updated has previously operated and maintained the version through other channels, and repeated operation and maintenance are not required. If the serial numbers are different, the fact that the associated equipment to be updated does not run and maintain software is indicated, and the associated equipment to be updated needs to be marked as a state to be run and maintained. And acquiring software installation packages (namely, update files to be used) of all the associated devices to be updated marked as the to-be-operated and maintenance states, wherein the software version serial numbers of the associated devices to be updated are the same as those of the target update files, so that the corresponding associated devices to be updated are operated and maintained based on the software installation packages.
It should be noted that, in practical application, in the process of acquiring the update file to be used, the location where the update file to be used is stored needs to be acquired. In order to improve the software updating efficiency, the installation file to be used can be downloaded and stored in a preset position (such as a local system), can be directly called from the preset position and used when the software updating is needed, and can be obtained from a release platform or application software as the update file to be used if the installation file does not exist in the preset position.
In this embodiment, obtaining an update file to be used corresponding to an associated device to be updated and corresponding to a file version identifier includes: if the to-be-used update file consistent with the file version identification is not stored in the preset storage position corresponding to the to-be-updated associated equipment, determining a source address corresponding to the to-be-used update file; and storing the update file to be used to a preset storage position based on the source address so as to acquire the update file to be used from the preset storage position.
The preset storage position may be a preset space for storing the file, which may be a uniform storage position or a designated storage position. For example, it may be a cache, disk, database, etc. The source address may refer to a source from which the update file is downloaded, such as a URL (Uniform Resource Locator ) address, or may be application software on which the update file is published.
In practical application, whether the update file to be used corresponding to the association equipment to be updated is stored in a preset storage position corresponding to the association equipment to be updated or not can be searched, if not, the update file to be used can be obtained from a source address corresponding to the update file to be used, and the update file to be used is downloaded and stored in the preset storage position so as to obtain the update file to be used from the preset storage position.
For example, the designated storage location (i.e., the preset storage location) of all the devices to be updated marked as the devices to be operated and maintained may be searched, and whether a local software installation package consistent with the file version identifier exists in the designated storage location is determined, if so, the local software installation package is designated as the update file to be used of the corresponding devices to be updated. If the software installation package is not available, marking the corresponding associated equipment to be updated as the state to be acquired, and retrieving the source communication address (namely the source address) of the software installation package corresponding to the current version identification of the associated equipment to be updated marked as the state to be acquired. Further, the update file to be used of the corresponding associated equipment to be updated is obtained based on the source communication address.
It should be noted that, the preset storage location may be disposed on the server, and when the to-be-used update file corresponding to the to-be-updated association device and corresponding to the file version identifier is obtained, the to-be-updated association device may request to obtain the to-be-used update file from the preset storage location of the server. For example, if the communication protocols of the to-be-updated associated device and the server are the same, the to-be-used update file may be directly called, and if the communication protocols of the to-be-updated associated device and the server are different, the to-be-used update file may be downloaded through a download channel of the server.
In this embodiment, obtaining an update file to be used corresponding to an associated device to be updated and corresponding to a file version identifier includes: determining the server type of the associated equipment to be updated based on the communication address type of the associated equipment to be updated; and acquiring the update file to be used based on the target acquisition mode corresponding to the server type.
The communication address type may be a type of network communication protocol, for example, TCP/IP protocol, IPX/SPX protocol, netBEUI protocol, etc. The server type includes a primary server or a secondary server.
In this embodiment, the server type of the associated device to be updated may be determined by the communication address type of the associated device to be updated. For example, if the TCP/IP protocol, the server type may be the primary server. The ways in which the associated devices to be updated of different server types acquire the update files to be used are different. Optionally, the preset storage location is disposed on a target server, and a server type of the target server is a main server. Based on the target acquisition mode corresponding to the server type, the implementation mode for acquiring the update file to be used can be as follows: if the server type is the main server, a direct acquisition instruction is sent to the associated equipment to be updated, so that the associated equipment to be updated acquires the update file to be used from a preset storage position based on the direct acquisition instruction; and if the server type is the auxiliary server, sending an indirect acquisition instruction to the associated equipment to be updated, so that the associated equipment to be updated acquires the update file to be used from a preset storage position based on the indirect acquisition instruction.
Specifically, if the server type of the associated device to be updated is the main server, a direct acquisition instruction may be sent to the associated device to be updated, and the update file to be used is called from the preset storage location without downloading. If the server type of the associated equipment to be updated is the auxiliary server, an indirect acquisition instruction can be sent to the associated equipment to be updated, and the associated equipment to be updated downloads the update file to be used from a preset storage position.
For example, after obtaining the update file to be used based on the source address, the update file to be used may be backed up to the main server and the preset storage location may be recorded. The associated equipment to be updated can be divided into a main server and an auxiliary server according to the communication address of the associated equipment to be updated. If the associated device to be updated is of the main server type, a reference command (i.e. a direct acquisition instruction) is sent to the associated device to be updated, wherein the reference command comprises a preset storage position, and the preset storage position is a storage channel. The software installation package may be invoked from a preset storage location based on the reference command. If the associated equipment to be updated is of an auxiliary server type, sending an adjustment command (namely an indirect acquisition instruction) to the associated equipment to be updated, wherein the adjustment command comprises a preset storage position which is a downloading channel, and based on the adjustment command, downloading a software installation package from the preset storage position to obtain an update file to be used. The benefits of this arrangement are: aiming at different main servers and auxiliary servers, different update file acquisition modes are adopted, so that network security is improved.
And S140, determining the current accumulated update time length when the associated equipment to be updated is updated based on the update file to be used, and generating early warning prompt information when the current accumulated update time length is detected to be longer than the expected update time length.
The early warning prompt information can include a communication address type, a current version identifier, a file version identifier, accumulated update duration and the like. The warning device can perform warning in various forms such as popup windows, mails, short messages, telephones and the like, and the specific form is not limited.
In this embodiment, when the update file to be used is used to update the software of the associated device to be updated, the updated accumulated duration may be recorded in real time. Comparing the current accumulated update time length with the expected update time length, if the current accumulated update time length is longer than the expected update time length, the update time length is possibly overlong, the risk of unsuccessful update exists, an early warning function can be automatically triggered at the moment, early warning prompt information is generated, and the current accumulated update time length can be included in the early warning prompt information. If the software updating is detected to be completed, the to-be-used updating file can be marked as a history updating file, the history updating file can be deleted, and the to-be-updated associated equipment is restarted, so that the to-be-updated associated equipment returns to a normal working state, and the storage space is saved. For example, the current version identifier corresponding to the associated device to be updated can be recorded in real time, if the current version identifier is consistent with the file version identifier, the file to be updated is deleted, and the updated information is sent to the system control end.
Illustratively, it is determined whether a current accumulated update duration for software updating of the associated device to be updated exceeds a preset operation and maintenance extremum (i.e., an expected update duration). If the current accumulated update time length exceeds the expected update time length, judging whether the current version identifier of the equipment to be updated is the same as the file version identifier corresponding to the equipment to be updated, if so, ending the operation and maintenance, and if not, sending an abnormal early warning signal (namely early warning prompt information) to the system control end. The abnormal early warning signal can be a desktop popup window which is directly displayed, or a user terminal corresponding to the associated equipment to be updated, which needs software update, can be read through a sub-server list in the management terminal equipment, and a reminding mail is sent to the user terminal. And the user in the working group can be reminded of temporarily disabling the associated equipment to be updated, which needs software update, in the expected maintenance time by directly using the working group of the communication software, so that the effectiveness of equipment update is ensured.
According to the technical scheme, a target update file of equipment to be updated of software corresponding to equipment identification in a version update instruction is obtained through responding to the version update instruction, and the file version identification of the target update file is determined; determining a current version identification of an associated device to be updated associated with the device to be updated; when the current version identifier is inconsistent with the file version identifier, acquiring an update file to be used, corresponding to the associated equipment to be updated, which is consistent with the file version identifier; when the associated equipment to be updated is updated based on the update files to be used, the current accumulated update time length is determined, early warning prompt information is generated when the current accumulated update time length is longer than the expected update time length, the problems of high cost and low efficiency caused by manually updating and maintaining the equipment in the prior art are solved, the purposes that the target update files and the file version identifiers of the associated equipment to be updated are automatically acquired, then the current version identifiers and the file version identifiers of the associated equipment to be updated, which are associated with the equipment to be updated, are compared, when the comparison is inconsistent, the update files to be used, which are corresponding to the associated equipment to be updated and are consistent with the file version identifiers, are automatically acquired, the software update is performed on the associated equipment to be updated based on the update files to be used, the equipment update cost is reduced, the current accumulated update time length of the software update is recorded in real time, and the early warning prompt information is generated when the current accumulated update time length is longer than the expected update time length, so that the software update is effectively monitored based on the early warning prompt information, and the accuracy and the effectiveness of the software update are improved.
Example two
As an alternative embodiment of the foregoing embodiment, a specific application scenario example is given to make the technical solution of the embodiment of the present invention further clear to those skilled in the art. In particular, reference may be made to the following details.
The technical scheme can be implemented by a service level operation and maintenance system based on the DevOps, and when an operation and maintenance command (i.e. a version update command) of any one of a technical party, a research and development party, a testing party and a system management party or a version update command automatically sent by a target server is received, the operation and maintenance of the target server (i.e. an installation package of a to-be-operated and maintained software update device) is manually obtained or automatically obtained after an installation package is issued by a preset software platform to be operated and maintained (i.e. a target update file), and a software version serial number (i.e. a file version identifier) of the target update file is recorded so as to operate and maintain the target server based on the target update file. The software installation package can be a security reinforcement file of the software, and can also be an upgrade package for operating and maintaining a software version. The implementation manner of obtaining the target update file of the target server may be: acquiring a target update file of a target server based on an edge computing network, and recording a file version identifier of the target update file; and carrying out integrity check on the target update file to obtain a check result, if the check result is safe, reserving the target update file, if the check result is unsafe, deleting the target update file, and re-executing the operation of acquiring the target update file of the target server based on the edge computing network.
On the basis of the scheme, further, the current software version serial numbers (i.e. the current version identifiers) of all the sub-servers (i.e. the associated devices to be updated) associated with the target server are searched, whether the current version identifiers of the sub-servers are identical to the file version identifiers is judged, if so, it is indicated that the sub-servers have been operated and maintained in advance through other channels, and repeated operation and maintenance are not needed. If the sub servers are different, the sub servers are not operated and maintained, and the different sub servers can be marked as to-be-operated and maintained. And acquiring all server software installation packages (namely, update files to be used) which are marked as sub-servers to be operated and maintained and correspond to the file version identifiers. The implementation manner of obtaining the update files to be used of all the sub-servers marked as the states to be operated and maintained may be: searching all appointed storage positions of the sub servers marked as the states to be operated and maintained, judging whether local software installation packages to be operated and maintained exist in the appointed storage positions, and if so, appointing the local software installation packages to be operated and maintained as update files to be used; if not, marking the corresponding sub-server as a state to be acquired. Retrieving a source communication address of a software installation package corresponding to a current version identifier of a sub-server marked as a state to be acquired; and acquiring the update files to be used of the corresponding sub-servers based on the source communication address, backing up the update files to be used to the target server, and recording a storage channel and a downloading channel of the update files to be used, wherein the storage channel and the downloading channel are understood as preset storage positions. Dividing the sub servers into a main server and an auxiliary server according to the communication address type of each sub server. Sending a direct acquisition instruction to a sub-server which is a main server, wherein the direct acquisition instruction comprises a storage channel, and calling an update file to be used from the storage channel of a target server based on the direct acquisition instruction; and sending an indirect acquisition command to the sub-server serving as the auxiliary server, wherein the indirect acquisition command comprises a downloading channel, and downloading the update file to be used from the downloading channel of the target server based on the indirect acquisition command.
On the basis of the scheme, when the associated equipment to be updated is updated based on the update file to be used, software update information is sent to the system control end, wherein the software update information comprises a file version identifier, start operation and maintenance time and expected operation and maintenance time. The software update information can be a directly displayed desktop popup window, or a user terminal corresponding to the associated equipment to be updated, which needs software update, can be read through a sub-server list in the management terminal equipment, and a reminding mail is sent to the user terminal. And the user in the working group can be reminded of temporarily disabling the associated equipment to be updated, which needs software update, in the expected maintenance time by directly using the working group of the communication software, so that the effectiveness of equipment update is ensured. And judging whether the current accumulated update time length for updating the software of the associated equipment to be updated exceeds the preset running and expected update time length or not when the software of the associated equipment to be updated is updated based on the update file to be used. If the current accumulated update time length exceeds the expected update time length, judging whether the current version identifier of the equipment to be updated is the same as the file version identifier corresponding to the equipment to be updated, if so, ending the operation and maintenance, and if not, sending early warning prompt information to a system control terminal. The early warning prompt information can be directly displayed on the desktop popup window at the management terminal equipment, so that any one of a technical party, a research and development party, a testing party and a system management party can be directly seen. Meanwhile, mails can be synchronously sent to technical parties, research and development parties, testing parties, system management parties and the like, so that each party can conveniently arrange the investigation time of each sub-server and work arrangement of each party in the later period. And the current version identification corresponding to the associated equipment to be updated can be recorded in real time, if the current version identification is consistent with the file version identification, the file to be updated is deleted, and updated information is sent to the system control end, so that the storage space is saved.
According to the embodiment, the target update file and the file version identifier of the target server are obtained to maintain and update the target server, whether the current version identifiers of all the sub servers associated with the target server are identical to the file version identifiers or not is judged, maintenance and update of the sub servers are achieved, the current version identifiers of the sub servers are identical to the file version identifiers, batch maintenance and update of the servers of all the parties are achieved, and working efficiency of all the parties is improved.
Example III
Fig. 2 is a schematic structural diagram of a version updating device according to a third embodiment of the present invention. As shown in fig. 2, the apparatus includes: the system comprises a target update file acquisition module 210, a current version identification determination module 220, an update file to be used acquisition module 230 and an early warning prompt information generation module 240.
The target update file obtaining module 210 is configured to obtain a target update file of a device to be updated corresponding to a device identifier in a version update instruction in response to the version update instruction, and determine a file version identifier of the target update file; a current version identifier determining module 220, configured to determine a current version identifier of a device to be updated associated with the device to be updated; the update file to be used acquisition module 230 is configured to acquire an update file to be used corresponding to the associated device to be updated, where the update file to be used corresponds to the file version identifier, when the current version identifier and the file version identifier are inconsistent; the early warning prompt information generating module 240 is configured to determine a current accumulated update duration when the associated device to be updated is updated with software based on the update file to be used, so as to generate early warning prompt information when the current accumulated update duration is detected to be longer than an expected update duration.
According to the technical scheme, a target update file of equipment to be updated of software corresponding to equipment identification in a version update instruction is obtained through responding to the version update instruction, and the file version identification of the target update file is determined; determining a current version identification of an associated device to be updated associated with the device to be updated; when the current version identifier is inconsistent with the file version identifier, acquiring an update file to be used, corresponding to the associated equipment to be updated, which is consistent with the file version identifier; when the associated equipment to be updated is updated based on the update files to be used, the current accumulated update time length is determined, early warning prompt information is generated when the current accumulated update time length is longer than the expected update time length, the problems of high cost and low efficiency caused by manually updating and maintaining the equipment in the prior art are solved, the purposes that the target update files and the file version identifiers of the associated equipment to be updated are automatically acquired, then the current version identifiers and the file version identifiers of the associated equipment to be updated, which are associated with the equipment to be updated, are compared, when the comparison is inconsistent, the update files to be used, which are corresponding to the associated equipment to be updated and are consistent with the file version identifiers, are automatically acquired, the software update is performed on the associated equipment to be updated based on the update files to be used, the equipment update cost is reduced, the current accumulated update time length of the software update is recorded in real time, and the early warning prompt information is generated when the current accumulated update time length is longer than the expected update time length, so that the software update is effectively monitored based on the early warning prompt information, and the accuracy and the effectiveness of the software update are improved.
On the basis of the above apparatus, optionally, the target update file acquisition module 210 includes a device identification determining unit and a target update file determining unit.
The device identification determining unit is used for analyzing the version updating instruction to obtain a device identification carried on the version updating instruction;
and the target update file determining unit is used for acquiring a target update file of the equipment to be updated corresponding to the equipment identifier based on an edge computing network, so that when the detection result of detecting the target update file is passing, the software update is performed on the equipment to be updated based on the target update file.
On the basis of the above device, optionally, the target update file obtaining module 210 further includes a preset detection condition determining unit and a detection unit.
The preset detection condition determining unit is used for acquiring preset detection conditions; the preset detection conditions correspond to at least one detection item of function detection, patch detection and security hole detection;
and the detection unit is used for detecting the target update file based on the preset detection condition so as to determine a detection result.
On the basis of the above device, optionally, the target update file obtaining module 210 further includes a deleting unit.
And the deleting unit is used for deleting the target update file if the detection result of the target update file is not passed, and re-executing the target update file corresponding to the to-be-updated software equipment based on the edge computing network.
On the basis of the above device, optionally, the update file to be used acquisition module 230 includes a source address determining unit and an update file to be used determining unit.
The source address determining unit is used for determining a source address corresponding to the update file to be used if the update file to be used, which is consistent with the file version identifier, is not stored in a preset storage position corresponding to the associated equipment to be updated;
and the update file to be used determining unit is used for storing the update file to be used to the preset storage position based on the source address so as to acquire the update file to be used from the preset storage position.
On the basis of the above device, optionally, the update file to be used acquisition module 230 further includes a server type determining unit and an update file to be used acquisition unit.
The server type determining unit is used for determining the server type of the associated equipment to be updated based on the communication address type of the associated equipment to be updated; wherein the server type comprises a main server or an auxiliary server;
and the update file to be used acquisition unit is used for acquiring the update file to be used based on a target acquisition mode corresponding to the server type.
On the basis of the device, optionally, the to-be-used update file acquisition unit comprises a direct acquisition unit and an indirect acquisition unit.
The direct acquisition unit is used for sending a direct acquisition instruction to the associated equipment to be updated if the server type is a main server, so that the associated equipment to be updated acquires the update file to be used from a preset storage position based on the direct acquisition instruction; the preset storage position is deployed on a target server, and the server type of the target server is a main server;
and the indirect acquisition unit is used for sending an indirect acquisition instruction to the associated equipment to be updated if the server type is an auxiliary server, so that the associated equipment to be updated acquires the update file to be used from a preset storage position based on the indirect acquisition instruction.
The version updating device provided by the embodiment of the invention can execute the version updating method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
Example IV
Fig. 3 is a schematic structural diagram of an electronic device implementing a version updating method according to an embodiment of the present invention. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. Electronic equipment may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 3, the electronic device 10 includes at least one processor 11, and a memory, such as a Read Only Memory (ROM) 12, a Random Access Memory (RAM) 13, etc., communicatively connected to the at least one processor 11, in which the memory stores a computer program executable by the at least one processor, and the processor 11 may perform various appropriate actions and processes according to the computer program stored in the Read Only Memory (ROM) 12 or the computer program loaded from the storage unit 18 into the Random Access Memory (RAM) 13. In the RAM 13, various programs and data required for the operation of the electronic device 10 may also be stored. The processor 11, the ROM 12 and the RAM 13 are connected to each other via a bus 14. An input/output (I/O) interface 15 is also connected to bus 14.
Various components in the electronic device 10 are connected to the I/O interface 15, including: an input unit 16 such as a keyboard, a mouse, etc.; an output unit 17 such as various types of displays, speakers, and the like; a storage unit 18 such as a magnetic disk, an optical disk, or the like; and a communication unit 19 such as a network card, modem, wireless communication transceiver, etc. The communication unit 19 allows the electronic device 10 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunication networks.
The processor 11 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 11 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, digital Signal Processors (DSPs), and any suitable processor, controller, microcontroller, etc. The processor 11 performs the various methods and processes described above, such as the version-up method.
In some embodiments, the version updating method may be implemented as a computer program tangibly embodied on a computer-readable storage medium, such as the storage unit 18. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 10 via the ROM 12 and/or the communication unit 19. When the computer program is loaded into RAM 13 and executed by processor 11, one or more steps of the version updating method described above may be performed. Alternatively, in other embodiments, the processor 11 may be configured to perform the version update method in any other suitable way (e.g. by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for carrying out methods of the present invention may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be implemented. The computer program may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) through which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service are overcome.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present invention may be performed in parallel, sequentially, or in a different order, so long as the desired results of the technical solution of the present invention are achieved, and the present invention is not limited herein.
The above embodiments do not limit the scope of the present invention. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the scope of the present invention.

Claims (10)

1. A version updating method, comprising:
responding to a version updating instruction, acquiring a target updating file of equipment to be updated of software corresponding to equipment identification in the version updating instruction, and determining a file version identification of the target updating file;
determining a current version identification of associated equipment to be updated associated with the equipment to be updated;
when the current version identifier is inconsistent with the file version identifier, acquiring an update file to be used, corresponding to the associated equipment to be updated, which is consistent with the file version identifier;
And when the associated equipment to be updated is subjected to software updating based on the update file to be used, determining the current accumulated update time length, and generating early warning prompt information when the current accumulated update time length is detected to be longer than the expected update time length.
2. The method of claim 1, wherein the obtaining a target update file for a device to be software updated corresponding to a device identification in the version update instruction comprises:
analyzing the version updating instruction to obtain a device identifier carried on the version updating instruction;
and acquiring a target update file of the equipment to be updated corresponding to the equipment identifier based on an edge computing network, and performing software update on the equipment to be updated based on the target update file when the detection result of the target update file is passing.
3. The method of claim 2, wherein the detecting the target update file comprises:
acquiring preset detection conditions; the preset detection conditions correspond to at least one detection item of function detection, patch detection and security hole detection;
And detecting the target update file based on the preset detection condition to determine a detection result.
4. The method as recited in claim 2, further comprising:
and if the detection result of the detection of the target update file is not passed, deleting the target update file, and re-executing the edge-based computing network to acquire the target update file corresponding to the equipment to be updated.
5. The method of claim 1, wherein the obtaining the update file to be used corresponding to the association device to be updated and consistent with the file version identifier includes:
if the to-be-used update file consistent with the file version identifier is not stored in the preset storage position corresponding to the to-be-updated associated equipment, determining a source address corresponding to the to-be-used update file;
and storing the update file to be used to the preset storage position based on the source address so as to acquire the update file to be used from the preset storage position.
6. The method of claim 5, wherein the obtaining the update file to be used corresponding to the association device to be updated and consistent with the file version identifier includes:
Determining the server type of the associated equipment to be updated based on the communication address type of the associated equipment to be updated; wherein the server type comprises a main server or an auxiliary server;
and acquiring the update file to be used based on a target acquisition mode corresponding to the server type.
7. The method according to claim 6, wherein the obtaining the update file to be used based on the target obtaining manner corresponding to the server type includes:
if the server type is a main server, sending a direct acquisition instruction to the associated equipment to be updated, so that the associated equipment to be updated acquires the update file to be used from a preset storage position based on the direct acquisition instruction; the preset storage position is deployed on a target server, and the server type of the target server is a main server;
and if the server type is an auxiliary server, sending an indirect acquisition instruction to the associated equipment to be updated, so that the associated equipment to be updated acquires the update file to be used from a preset storage position based on the indirect acquisition instruction.
8. A version updating device, comprising:
The system comprises a target update file acquisition module, a file update module and a file update module, wherein the target update file acquisition module is used for responding to a version update instruction, acquiring a target update file of equipment to be updated corresponding to equipment identification in the version update instruction, and determining a file version identification of the target update file;
the current version identification determining module is used for determining the current version identification of the to-be-updated associated equipment associated with the to-be-updated software equipment;
the to-be-used update file acquisition module is used for acquiring to-be-used update files which are corresponding to the to-be-updated associated equipment and are consistent with the file version identifiers when the current version identifiers are inconsistent with the file version identifiers;
and the early warning prompt information generation module is used for determining the current accumulated update time length when the to-be-updated associated equipment is subjected to software update based on the to-be-used update file, so as to generate early warning prompt information when the current accumulated update time length is detected to be longer than the expected update time length.
9. An electronic device, the electronic device comprising:
at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the version updating method of any of claims 1-7.
10. A computer readable storage medium storing computer instructions for causing a processor to implement the version updating method of any one of claims 1-7 when executed.
CN202310373058.XA 2023-03-29 2023-03-29 Version updating method and device, electronic equipment and storage medium Pending CN116450176A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310373058.XA CN116450176A (en) 2023-03-29 2023-03-29 Version updating method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310373058.XA CN116450176A (en) 2023-03-29 2023-03-29 Version updating method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116450176A true CN116450176A (en) 2023-07-18

Family

ID=87129640

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310373058.XA Pending CN116450176A (en) 2023-03-29 2023-03-29 Version updating method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116450176A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117424893A (en) * 2023-12-19 2024-01-19 深圳竹云科技股份有限公司 Data transmission method, device, computer equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117424893A (en) * 2023-12-19 2024-01-19 深圳竹云科技股份有限公司 Data transmission method, device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110086658B (en) Interface switching method and device and computer readable storage medium
CN114328132A (en) Method, device, equipment and medium for monitoring state of external data source
CN116450176A (en) Version updating method and device, electronic equipment and storage medium
CN114389969A (en) Client test method and device, electronic equipment and storage medium
CN115840956A (en) File processing method, device, server and medium
CN116614495A (en) Data uploading method, device, equipment, storage medium and program product
CN113641544B (en) Method, apparatus, device, medium and product for detecting application state
CN116957822B (en) Form detection method and device, electronic equipment and storage medium
CN116561179A (en) Data query method, device, equipment and program product
CN116545905A (en) Service health detection method and device, electronic equipment and storage medium
CN116627432A (en) Front-end application automatic deployment method, device, equipment and medium
CN116301997A (en) Upgrading method, device, equipment and medium of controller
CN113596011B (en) Flow identification method and device, computing device and medium
CN115766697A (en) File downloading method, device, equipment and storage medium
CN115203158A (en) Data comparison method, device, equipment and storage medium
CN111475322A (en) Method and device for positioning stuck thread, computer equipment and readable storage medium
CN116094908B (en) Log file storage method, device, equipment and storage medium
CN118018405A (en) Upgrading method and device of Internet of things equipment, server and storage medium
CN117290179B (en) Method, device, equipment and storage medium for determining event timeout state
CN116627442A (en) Version update prompting method, device, equipment and medium of application program interface
CN116820658B (en) Cloud application page rendering method, device, equipment and storage medium
CN115757275A (en) Asset information management method and device, electronic equipment and storage medium
CN115237497A (en) Application component processing method, device, equipment and storage medium
CN117093274A (en) Application running stack analysis method, device, equipment and storage medium
CN117112354A (en) Early warning method, device, equipment and storage medium of application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination