WO2017071425A1 - 版本更新方法及装置 - Google Patents

版本更新方法及装置 Download PDF

Info

Publication number
WO2017071425A1
WO2017071425A1 PCT/CN2016/099240 CN2016099240W WO2017071425A1 WO 2017071425 A1 WO2017071425 A1 WO 2017071425A1 CN 2016099240 W CN2016099240 W CN 2016099240W WO 2017071425 A1 WO2017071425 A1 WO 2017071425A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
version
update
policy
grayscale publishing
Prior art date
Application number
PCT/CN2016/099240
Other languages
English (en)
French (fr)
Inventor
魏庆华
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2017071425A1 publication Critical patent/WO2017071425A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality

Definitions

  • the embodiments of the present invention relate to the field of Internet technologies, and in particular, to a version update method and apparatus.
  • an application can be referred to as an application.
  • developers usually publish an updated version of the application in grayscale.
  • the updated version is released by using the grayscale publishing method
  • a part of the test terminal is extracted from the terminal using the application, and an updated version is sent to the test terminal to remind the user of the test terminal to update the version. If the updated version is used by the test terminal and runs stably, the transmission range of the updated version is gradually expanded, and finally the updated version is delivered to all terminals using the application.
  • the random extraction method is used to determine that the test terminal is not targeted, resulting in the failure to obtain comprehensive and effective testing of the updated version, and there is a greater risk in the case of large-scale updates.
  • an embodiment of the present invention provides a version update method and apparatus.
  • the technical solution is as follows:
  • a version update method comprising:
  • the grayscale publishing policy is a policy for screening a terminal in a grayscale publishing process
  • the update configuration corresponding to the updated version is sent to the terminal.
  • a version update apparatus comprising:
  • An obtaining module configured to obtain a grayscale publishing policy corresponding to an updated version of the application, where the grayscale publishing policy is a policy for screening a terminal in a grayscale publishing process;
  • a receiving module configured to receive a version update request sent by the terminal, where the application is installed in the terminal;
  • a first detecting module configured to detect whether the terminal information carried in the version update request meets the grayscale publishing policy
  • an update module configured to send, to the terminal, an update configuration corresponding to the updated version, if the terminal information meets the grayscale publishing policy.
  • a server comprising: a processor and a memory, the memory storing one or more program instructions, the processor being configured to execute the one Or one or more program instructions, the one or more program instructions being used to implement the following operations;
  • the grayscale publishing policy is a policy for screening a terminal in a grayscale publishing process
  • the update configuration corresponding to the updated version is sent to the terminal.
  • the terminal After receiving the version update request sent by each terminal, and detecting whether the terminal information carried in the version update request meets the preset grayscale publishing policy, when the terminal information conforms to the grayscale publishing policy, the terminal sends an update configuration corresponding to the updated version to the terminal.
  • the terminal to update solve the problem that the prior art adopts random extraction to determine the lack of pertinence of the test terminal, resulting in the comprehensive and effective test of the updated version, and the problem of large risk in the case of large-scale update;
  • the grayscale publishing strategy specifically filters the test terminals, enabling the updated version to be fully tested, improving the stability of the updated version and reducing the risk of large-scale updates.
  • FIG. 1 is a schematic structural diagram of an implementation environment provided by an embodiment of the present invention.
  • FIG. 2 is a flowchart of a method for updating a version provided by an embodiment of the present invention
  • FIG. 3A is a flowchart of a method for updating a version provided by another embodiment of the present invention.
  • 3B, 3D, 3E and 3F are flowcharts showing a terminal information detecting process involved in the version updating method provided in FIG. 3A;
  • FIG. 3C is a flowchart showing an update configuration delivery process involved in the version update method provided in FIG. 3A;
  • 3G is a flow chart showing the anti-harassment process involved in the version update method provided in FIG. 3A;
  • FIG. 4 is a structural block diagram of a version update apparatus according to an embodiment of the present invention.
  • FIG. 5 is a structural block diagram of a version update apparatus according to another embodiment of the present invention.
  • FIG. 6 is a block diagram showing the structure of a grayscale issuing server according to another embodiment of the present invention.
  • FIG. 1 is a schematic structural diagram of an implementation environment provided by an embodiment of the present invention.
  • the implementation environment includes a grayscale publishing server 120 and at least one terminal 140.
  • the grayscale distribution server 120 is a background server that performs grayscale publishing for the application.
  • Grayscale publishing is an application publishing method that publishes an updated version of an application in a gradually expanding scope.
  • the application is installed in at least one terminal 140.
  • the grayscale publishing server 120 is configured to issue an updated version of the application to a portion of the selected terminal 140.
  • the grayscale publishing server 120 can be a server cluster, a server cluster composed of multiple servers, or a cloud computing center.
  • the grayscale publishing server 120 establishes a connection with at least one terminal 140 through a wired network or a wireless network.
  • the terminal 140 can be a mobile phone, a tablet computer, an e-book reader, an MP3 (Moving Picture Experts Group Audio Layer III) player, and an MP4 (Moving Picture Experts Group Audio Layer IV). Standard audio level 4) Players, laptops and desktop computers, etc.
  • the terminal 140 is installed with An application corresponding to the grayscale distribution server 120.
  • the application may be a communication application, a social application, a game application, a video playback application, a news client or an application store, etc., and the embodiment of the present invention does not limit the type of the application.
  • the wireless or wired network described above uses standard communication techniques and/or protocols.
  • the network is usually the Internet, but can also be any network, including but not limited to a Local Area Network (LAN), a Metropolitan Area Network (MAN), a Wide Area Network (WAN), a mobile, a wired or a wireless. Any combination of networks, private networks, or virtual private networks).
  • data exchanged over a network is represented using techniques and/or formats including Hyper Text Markup Language (HTML), Extensible Markup Language (XML), and the like.
  • SSL Secure Socket Layer
  • TLS Transport Layer Security
  • VPN Virtual Private Network
  • IPsec Internet Protocol Security
  • Regular encryption techniques are used to encrypt all or some of the links.
  • the above described data communication techniques may also be replaced or supplemented using custom and/or dedicated data communication techniques.
  • FIG. 2 shows a flowchart of a method for updating a version provided by an embodiment of the present invention.
  • This embodiment is exemplified by applying the version update method to the grayscale distribution server 120 shown in FIG. 1.
  • the method includes:
  • Step 202 Obtain a grayscale publishing policy corresponding to an updated version of the application.
  • This grayscale publishing strategy is a strategy for screening terminals in the grayscale publishing process.
  • the server is configured to determine, according to the grayscale publishing policy, a part of the terminal that installs the application as a test terminal, and preferentially provide the test terminal with an updated version of the application.
  • Step 204 Receive a version update request sent by the terminal, where the application is installed in the terminal.
  • the version update request is a first type version update request or a second type version update request, where the first type version update request is a request that the user manually triggers the terminal to send, and the second type version update request is the terminal according to the predetermined Update the request that the policy automatically sends.
  • the predetermined update policy is automatically updated at power on or updated every predetermined time interval.
  • Step 206 Detect whether the terminal information carried in the version update request conforms to the grayscale publishing policy.
  • Step 208 If the terminal information conforms to the grayscale publishing policy, the terminal updates the update configuration corresponding to the updated version.
  • the terminal that receives the updated version performs version update according to the update configuration, and sends feedback information to the server according to the actual update and usage.
  • the version update method receives the version update request sent by each terminal, and detects whether the terminal information carried in the version update request conforms to a preset grayscale publishing policy, and the terminal information conforms to the grayscale.
  • the update configuration corresponding to the updated version is sent to the terminal for updating by the terminal; the prior art adopts a random extraction method to determine that the test terminal lacks pertinence, and the updated version cannot be comprehensively and effectively tested.
  • the screening of the test terminal is targeted according to the grayscale publishing strategy, so that the updated version can be fully tested, the stability of the updated version is improved, and the large-scale update is reduced. risk.
  • FIG. 3A shows a flowchart of a method for updating a version provided by another embodiment of the present invention.
  • This embodiment is exemplified by applying the version update method to the grayscale distribution server 120 shown in FIG. 1.
  • the method includes:
  • Step 301 Obtain a grayscale publishing policy corresponding to an updated version of the application.
  • the update configuration corresponding to the updated version and the corresponding grayscale publishing policy can be sent to the grayscale publishing server corresponding to the application through the pre-built grayscale publishing platform. in.
  • the grayscale publishing server is configured to filter the test terminal in the grayscale publishing process according to the grayscale publishing policy
  • the grayscale publishing policy may be a policy formulated for the version of the application (issuing the updated version to using the specified version) Terminal), a policy for the geographical distribution of the terminal (issuing the updated version to the terminal in the designated area), a policy for the network situation of the terminal (issuing the updated version to the terminal in the specified network connection state) or the user for the user At least one of a feature-making policy (issuing an updated version to a user having a specified user feature).
  • the grayscale publishing platform may be presented in the form of a web, where the grayscale publishing platform includes: an uploading entry of an update configuration, a setting entry of a grayscale level, and a setting entry of a grayscale publishing policy. and many more.
  • the developer releases the gray version of the updated version it only needs to select the corresponding update configuration, input the gray level of the grayscale release, and set the corresponding grayscale publishing strategy.
  • the gray level is used to indicate the number of test terminals that successfully activate the updated version.
  • the grayscale publishing server After receiving the data such as the update configuration and the grayscale publishing policy issued by the grayscale publishing platform, the grayscale publishing server can perform grayscale publishing according to the data.
  • Step 302 Receive a version update request sent by the terminal, where the application is installed in the terminal.
  • the terminal with the application installed may send a first version update request to the grayscale publishing server when detecting that the user manually obtains the updated version; or may automatically send the second version update to the grayscale publishing server according to the predetermined update policy in the application. request.
  • the grayscale publishing server receives the version update request sent by each terminal.
  • the terminal in the embodiment of the present invention actively pulls the update configuration from the grayscale publishing server in real time, and does not need to establish a long connection channel with the grayscale publishing server, thereby avoiding terminal traffic consumed by maintaining the long connection channel. And the problem of occupying the process space of the terminal.
  • Step 303 Detect whether the terminal information carried in the version update request complies with the grayscale publishing policy.
  • the version update request sent by the terminal carries the terminal information, and the grayscale publishing server determines whether to send the update configuration to the terminal according to the terminal information.
  • the terminal information includes, but is not limited to, at least one of a current version identifier of an application installed in the terminal, a geographic location of the terminal, a current network connection status of the terminal, a user identifier of the corresponding user of the terminal, and a terminal device type.
  • the grayscale publishing server acquires the terminal information, and detects whether the terminal information conforms to a pre-defined grayscale publishing policy. When the terminal information conforms to a preset grayscale publishing policy, the terminal is determined to be a test terminal, and the following steps are performed. 304; When the terminal information does not meet the pre-defined grayscale publishing policy, that is, the terminal is determined not to be the test terminal, and the grayscale publishing server does not send the corresponding update configuration to the terminal.
  • the developer needs to install and run the update configuration using the terminal with the specified historical version, and evaluate the update version according to the operation status, that is, the grayscale publishing policy is applied to the version of the application, and the grayscale publishing server
  • the grayscale publishing server When detecting whether the terminal information conforms to the grayscale publishing policy, as shown in FIG. 3B, the following steps may be included.
  • Step 303A Acquire a current version identifier included in the terminal information, where the current version identifier is a version identifier of an application installed in the terminal.
  • the grayscale publishing server When the terminal sends a version update request to the grayscale publishing server, the current version identifier of the application installed in the terminal is added to the terminal information. Correspondingly, the grayscale publishing server acquires the current version identifier included in the terminal information.
  • the current version identifier may be a version number of the application.
  • the grayscale publishing server obtains the current version number included in the terminal information as ver 5.2.1.
  • Step 303B Acquire a target version identifier included in the grayscale publishing policy.
  • the grayscale publishing server obtains the target version identifier included in the grayscale publishing policy, where the target version identifier is at least one historical version identifier.
  • the grayscale publishing server obtains the target version numbers included in the grayscale publishing policy as ver5.1.1 and ver 5.2.1.
  • Step 303C If the current version identifier is consistent with the target version identifier, determine that the terminal information conforms to the grayscale publishing policy.
  • the grayscale publishing server detects whether the obtained current version identifier is consistent with the target version identifier. If the current version identifier is consistent with the target version identifier, the grayscale publishing server determines that the terminal information conforms to the grayscale publishing policy, that is, the terminal is the target testing terminal.
  • the current version identifier is the same as the target version identifier.
  • the target version identifier contains multiple historical version identifiers
  • the current version identifier is Consistent target version identifiers: Multiple historical version identifiers contain the current version identifier.
  • Step 304 If the terminal information conforms to the grayscale publishing policy, the terminal updates the update configuration corresponding to the updated version.
  • the version update request sent by the terminal received by the grayscale publishing server may be automatically sent by the terminal according to the predetermined update policy in the application, that is, the user may not want to perform the version update.
  • the user causes interference, so in order to avoid interference to the user, the grayscale publishing server needs to further determine the type of the version update request.
  • this step may include the following steps.
  • step 304A if the version update request is the first type version update request, the update configuration corresponding to the update version is directly sent to the terminal.
  • the first type version update request is a request that the user manually triggers the terminal to send.
  • the application includes a manual update button, and when the user clicks the manual update button, the terminal sends a first type version update request to the grayscale publishing server.
  • the first type update request is sent by the user manually, indicating that the user is very willing to update the version.
  • the update configuration corresponding to the updated version is sent to the terminal, the possibility that the user installs the update configuration is extremely high, and Does not cause interference to users.
  • Step 304B If the version update request is the second type version update request, send the update reminder information to the terminal, where the terminal is configured to display the update reminder information according to the preset reminder policy; when receiving the confirmation update information sent by the terminal, send the update information to the terminal. Update the update configuration corresponding to the version.
  • the second type version update request is a request that the terminal automatically sends according to a predetermined update policy.
  • the predetermined update policy is automatically updated at power on or updated every predetermined time interval.
  • the preset reminding policy includes at least one of a reminder period, a reminder effective time, and a reminder invalidation time.
  • the reminder period included in the preset reminder policy is every 6 hours/time
  • the reminder effective time is 00:00:00 on October 13, 2015
  • the reminder expiration time is 23:59 on October 15, 2015.
  • the terminal will be sent every 6 hours when the user uses the application during the time period from 00:00:00 on October 13, 2015 to 23:59:59 on October 15, 2015.
  • the reminder information is updated, and the update reminder information can be displayed in the form of a pop-up window.
  • the terminal receives the confirmation trigger update command triggered by the user
  • the terminal sends the confirmation update information to the grayscale distribution server, and instructs the grayscale distribution server to send the update configuration corresponding to the updated version to the terminal.
  • the preset reminding policy may be set by the user in the update setting page corresponding to the application, or may be set by the developer and sent to the terminal together with the second type version update request, in the embodiment of the present invention. This is not limited.
  • Step 305 Real-time monitoring of the updated version of the real-time indicator data, the real-time indicator data is generated according to the data fed back by each terminal.
  • the feedback data sent by each terminal is received, and the feedback data may be sent when the terminal downloads the update configuration, installs the update configuration, activates the application after installing the update configuration, and flashes back after installing the update configuration.
  • the grayscale publishing server summarizes the received feedback data to generate a real-time indicator data table shown in Table 1.
  • the foregoing information is included in the real-time indicator data as an example.
  • the real-time indicator data may further include a terminal network distribution, a terminal geographical distribution, and a crash occurrence location. (java layer, native layer) statistics and the like, which are not limited by the embodiment of the present invention.
  • Step 306 If the activation amount of the updated version included in the real-time indicator data reaches the preset gray level, the update configuration is stopped.
  • the developer When setting the grayscale publishing strategy, the developer sets the grayscale level corresponding to the grayscale publishing.
  • the grayscale publishing server detects in real time whether the activation amount of the updated version included in the real-time indicator data reaches a preset gray level, and if the activation amount of the updated version reaches a preset gray level, indicating that the grayscale publishing task is completed, then Stop sending update configurations to avoid wasting resources caused by excessive publishing.
  • Step 307 If the crash rate of the updated version included in the real-time indicator data reaches a preset threshold, the configuration of the update is stopped.
  • the crash rate can be calculated according to the number of crash reports/activation amount, which is used to indicate the proportion of the application crash after installing the update configuration.
  • the grayscale publishing server detects in real time whether the crash rate of the updated version included in the real-time indicator data reaches a preset threshold. When the crash rate reaches a preset threshold, it indicates that the update configuration has a serious defect, and the grayscale release will cause more The application cannot be used by the terminal. Therefore, in order to prevent more terminals from using the application, the grayscale publishing server starts the hemostasis system and stops sending the update configuration to any terminal.
  • the grayscale publishing server can also monitor other data included in the real-time indicator data, thereby discovering defects existing in the updated version, and presenting them to the developer in time for the developer to solve, and the whole grayscale publishing process is more complete. Intuitive and intelligent, it can significantly improve the efficiency of grayscale publishing.
  • the version update method receives the version update request sent by each terminal, and detects whether the terminal information carried in the version update request conforms to a preset grayscale publishing policy, and the terminal information conforms to the grayscale.
  • the update configuration corresponding to the updated version is sent to the terminal for updating by the terminal; the prior art adopts a random extraction method to determine that the test terminal lacks pertinence, and the updated version cannot be comprehensively and effectively tested.
  • the screening of the test terminal is targeted according to the grayscale publishing strategy, so that the updated version can be fully tested, the stability of the updated version is improved, and the large-scale update is reduced. risk.
  • the grayscale publishing server can collect and monitor the updated version of the real-time indicator data in real time, and automatically stop the grayscale publishing when detecting that the activation amount of the updated version included in the real-time indicator data reaches the preset grayscale level. That is to ensure that the grayscale release reaches a predetermined index, while avoiding waste of resources caused by excessive publishing.
  • the grayscale publishing server can collect and monitor the updated version of the real-time indicator data in real time, and automatically stop the grayscale publishing when detecting that the crash rate of the updated version included in the real-time indicator data reaches a preset threshold, thereby avoiding When there is a problem with the update configuration, further grayscale is caused by the release The problem of large-area application crashes.
  • the gradation issuing server may also send the update configuration to the terminal in the specified area.
  • the foregoing step 303 may further include the following steps.
  • Step 303D Acquire a geographic location of the terminal included in the terminal information.
  • the location of the terminal may be the latitude and longitude coordinates of the terminal or the location of the terminal by using the GPS (Global Positioning System).
  • GPS Global Positioning System
  • the location of the terminal is taken as an example.
  • the terminal locates the city where the terminal is located as the area A through the GPS, and adds the terminal city to the terminal information, and sends the information to the grayscale publishing server. Accordingly, the grayscale publishing server can obtain the city where the terminal is located.
  • Step 303E Acquire a target area included in the grayscale publishing policy.
  • the grayscale publishing policy preset by the developer includes a target area in which the update configuration is delivered, and the target area may be at least one set of latitude and longitude coordinates, at least one city, province, or country, etc., which is not limited by the present invention.
  • the grayscale publishing server After obtaining the geographic location of the terminal included in the terminal information, the grayscale publishing server further acquires the target area included in the grayscale publishing policy.
  • the target area included in the grayscale publishing strategy is Jiangsu province.
  • Step 303F If the geographic location of the terminal belongs to the target area, determine that the terminal information conforms to the grayscale publishing policy.
  • the grayscale publishing server obtains the geographic location and the target area of the terminal, and detects whether the geographic location of the terminal belongs to the target area. When the geographic location of the terminal belongs to the target area, it is determined that the terminal information conforms to the grayscale publishing policy.
  • the grayscale publishing server can implement the update configuration to the terminal in the designated area, so that the grayscale publishing is more targeted.
  • the grayscale publishing server may send an update configuration to the terminal in the designated area according to the grayscale publishing policy, thereby improving the accuracy of the specified geographical update version test.
  • the terminal Since downloading the update configuration requires more traffic, when the terminal is connected to the WI-FI (WIreless-FIdelity), the terminal is more likely to download the update configuration; and when the terminal is connected to the mobile communication network, Sending an update configuration to the terminal, because the terminal is in the mobile communication network The traffic is limited, and the terminal is less likely to download the updated configuration, resulting in lower grayscale publishing efficiency.
  • the foregoing step 303 is also performed. The following steps can be included.
  • Step 303G Acquire a current network connection status included in the terminal information, where the current network connection status includes connecting to the WI-FI and connecting to the mobile communication network.
  • the terminal information sent by the terminal to the grayscale publishing server carries the current network connection state of the terminal, and the current network connection state includes connecting to the WI-FI and connecting to the mobile communication network. Further, when the current network connection status is connected to the mobile communication network state, the terminal information may also carry the operator identifier.
  • the grayscale publishing server can obtain the current network connection status.
  • Step 303H Acquire a target network connection state included in the grayscale publishing policy.
  • the target network connection state can be set to connect to the WI-FI, that is, only when the terminal is connected to the WI-FI. , the update configuration is delivered to the terminal.
  • the grayscale publishing policy set by the developer may also be to send an update configuration to the terminal using the designated mobile communication network, which is not limited in this embodiment of the present invention.
  • Step 303I If the current network connection status is consistent with the target network connection status, determine that the terminal information conforms to the grayscale publishing policy.
  • the grayscale publishing server determines that the terminal information conforms to the grayscale publishing policy.
  • the grayscale publishing server may send an update configuration to the terminal that specifies the network connection state according to the grayscale publishing policy, so as to avoid the problem that the user cannot update in time because the user is not connected to the WI-FI when the user is prompted to update. .
  • Step 303 can also include the following steps.
  • Step 303J Acquire a user identifier included in the terminal information.
  • the user ID can be an account registered in the application.
  • Step 303K The user portrait system searches for a user label corresponding to the user identifier, and the user portrait system stores a user label corresponding to each user identifier.
  • the user portrait system in the grayscale publishing server generates a corresponding user label for each user, and maintains the correspondence between each user identifier and the user label, illustratively, the user identifier.
  • the correspondence with the user label can be as shown in Table 2.
  • the grayscale publishing server searches for the user label corresponding to the user identifier through the user portrait system.
  • the grayscale publishing server obtains the user identifier as “Zhangsan”, and searches for the user label corresponding to the user identifier through the user portrait system as “student, game, home”.
  • Step 303L Acquire a target user tag included in the grayscale publishing policy.
  • the grayscale publishing server After obtaining the user label, the grayscale publishing server obtains the target user label included in the grayscale publishing policy. For example, the grayscale publishing server obtains the target user labels included in the grayscale publishing policy as “game” and “anime”.
  • Step 303M Detect whether there is a user identifier that matches the target user label in the user label corresponding to the user identifier.
  • step 303N is performed; if the user identifier corresponding to the target user label does not exist in the user label corresponding to the user identifier, determining that the terminal information does not meet the gray level
  • the policy is released, that is, the update configuration is not delivered to the terminal.
  • step 303N if there is a user identifier matching the target user label in the user label corresponding to the user identifier, it is determined that the terminal information conforms to the grayscale publishing policy.
  • the user portrait system can accurately locate the target user group, making the grayscale release more targeted, and can significantly improve the comprehensiveness of the updated version test, and help the developer to find and solve the defects in the updated version in time.
  • the grayscale publishing server can be combined according to a customized target user label.
  • the household portrait system determines the terminal that receives the updated configuration, implements accurate delivery of the updated configuration, and improves the comprehensiveness and pertinence of the updated version test.
  • the developer sets the grayscale publishing policy for the updated version, it can set at least two grayscale publishing policies in parallel for the same update version.
  • the first grayscale publishing policy is to deliver the update configuration to the terminal of the region A
  • the second gray is to deliver the update configuration to the user who is marked as the game by the user. Since some of the terminals simultaneously satisfy the first grayscale publishing policy and the second grayscale publishing policy, if the same update configuration is issued twice to the user in a short time. Not only will it cause harassment to users, but it will also affect the accuracy of real-time indicator data.
  • the following steps may be further included:
  • Step 308 Detect whether the terminal is included in the anti-harassment list.
  • the database in the grayscale publishing server maintains an anti-harassment list, and the anti-harassment list records the terminal identifier of the terminal that has delivered the updated configuration.
  • Step 309 If the terminal information meets any one of the at least two gray-scale publishing policies, and the terminal does not include the terminal in the anti-harassment list, the update configuration corresponding to the updated version is sent to the terminal.
  • the gray-scale publishing server delivers the update configuration corresponding to the updated version to the terminal.
  • step 310 the terminal is added to the anti-harassment list.
  • the grayscale publishing server After the grayscale publishing server sends the updated configuration corresponding to the updated version to the terminal, the terminal is added to the anti-harassment list, and the grayscale publishing server is no longer even if the terminal information of the terminal satisfies other parallel grayscale publishing policies.
  • the update configuration is delivered to implement the "multi-task parallel mutual exclusion" to avoid harassing the user caused by repeatedly delivering the same update configuration.
  • the grayscale publishing service may evenly distribute the grayscale publishing policies according to the preset grayscale level and the number of grayscale publishing policies.
  • the test terminal is not limited by this embodiment of the present invention.
  • the grayscale publishing server maintains the anti-harassment list, and implements "multi-task parallel mutual exclusion" when the same updated version corresponds to at least two parallel grayscale publishing policies, thereby avoiding user harassment and improving grayscale publishing. accuracy.
  • the version update method provided by each of the foregoing embodiments is applicable not only to a large-scale grayscale release in the release phase of the release, but also to a small-scale internal test in the beta update phase.
  • a small-scale internal test developer can request a specified terminal to update the version
  • the version update method is applicable to each stage of the application development process, and is not only applicable to the version update gray-scale release stage, and the embodiment of the present invention does not The composition is limited.
  • FIG. 4 is a structural block diagram of a version update apparatus according to an embodiment of the present invention.
  • the version update apparatus provided in this embodiment may be implemented as all or part of the grayscale distribution server 120 in FIG. 1 by software, hardware or a combination of both.
  • the device includes:
  • the obtaining module 410 is configured to obtain a grayscale publishing policy corresponding to the updated version of the application; the grayscale publishing policy is a policy for screening the terminal in the grayscale publishing process;
  • the receiving module 420 is configured to receive a version update request sent by the terminal, where the application is installed in the terminal;
  • the first detecting module 430 is configured to detect whether the terminal information carried in the version update request meets a grayscale publishing policy
  • the update module 440 is configured to send an update configuration corresponding to the updated version to the terminal if the terminal information conforms to the grayscale publishing policy.
  • FIG. 5 is a structural block diagram of a version updating apparatus according to another embodiment of the present invention.
  • the version update apparatus provided in this embodiment may be implemented as all or part of the grayscale distribution server 120 in FIG. 1 by software, hardware or a combination of both.
  • the device includes:
  • the obtaining module 510 is configured to obtain a grayscale publishing policy corresponding to the updated version of the application; the grayscale publishing policy is a policy for screening the terminal in the grayscale publishing process;
  • the receiving module 520 is configured to receive a version update request sent by the terminal, where the application program is installed in the terminal;
  • the first detecting module 530 is configured to detect whether the terminal information carried in the version update request meets a grayscale publishing policy
  • the update module 540 is configured to send an update configuration corresponding to the updated version to the terminal if the terminal information conforms to the grayscale publishing policy.
  • the first detecting module 530 includes:
  • a first detecting unit 531 configured to acquire a current version identifier included in the terminal information, where The current version identifier is a version identifier of the application installed in the terminal; obtaining a target version identifier included in the grayscale publishing policy; if the current version identifier is consistent with the target version identifier, determining the The terminal information conforms to the grayscale publishing policy;
  • a second detecting unit 532 configured to acquire a geographic location of the terminal included in the terminal information, acquire a target area included in the grayscale publishing policy, and determine the terminal if the geographic location of the terminal belongs to the target area
  • the information conforms to the grayscale publishing strategy
  • the third detecting unit 533 is configured to acquire a current network connection state included in the terminal information, where the current network connection state includes connecting to a wireless fidelity WI-FI and connecting to a carrier network; acquiring the grayscale publishing policy Determining the target network connection status; if the current network connection status is consistent with the target network connection status, determining that the terminal information conforms to the grayscale publishing policy;
  • the fourth detecting unit 534 is configured to acquire a user identifier included in the terminal information, and search for a user identifier corresponding to the user identifier by using a user portrait system, where the user portrait system stores the corresponding corresponding to each user identifier. a user tag; the target user tag included in the grayscale publishing policy is obtained; and the user tag corresponding to the target user tag is detected in the user tag corresponding to the user identifier; if the user identifier corresponds to the user tag If there is a user identifier that matches the target user label, it is determined that the terminal information conforms to the grayscale publishing policy.
  • the grayscale publishing policy corresponding to the updated version is at least two in parallel;
  • the device further includes:
  • the second detecting module 550 is configured to detect whether the terminal is included in the anti-harassment list
  • the update module 540 is further configured to: if the terminal information meets any one of the at least two grayscale publishing policies, and the anti-harassment list does not include the terminal, perform the The step of issuing an update configuration corresponding to the updated version;
  • the adding module 560 is configured to add the terminal to the anti-harassment list.
  • the device further includes:
  • the monitoring module 570 is configured to monitor, in real time, real-time indicator data of the updated version, where the real-time indicator data is generated according to data fed back by each terminal;
  • the first stopping module 580 is configured to stop sending the update configuration if the activation amount of the updated version included in the real-time indicator data reaches a preset gray level;
  • the second stopping module 590 is configured to stop delivering the update configuration if the crash crash rate of the updated version included in the real-time indicator data reaches a preset threshold.
  • the version update request includes a first type version update request and a second type version update request, where the first type version update request is a request that the user manually triggers the terminal to send, the second type version update The request is a request that the terminal automatically sends according to a predetermined update policy;
  • the update module 540 includes:
  • the first update unit 541 is configured to: if the version update request is the first type version update request, directly send the update configuration corresponding to the update version to the terminal.
  • the second update unit 542 is configured to: if the version update request is the second type version update request, send update reminder information to the terminal, where the terminal is configured to display the update reminder information according to a preset reminder policy. Transmitting the update configuration corresponding to the updated version to the terminal when receiving the confirmation update information sent by the terminal;
  • the preset reminder policy includes at least one of a reminder period, a reminder effective time, and a reminder invalidation time.
  • version update apparatus provided by the foregoing embodiment performs the version update
  • only the division of each of the foregoing functional modules is illustrated.
  • the function allocation may be completed by different functional modules as needed.
  • the internal structure of the device is divided into different functional modules to complete all or part of the functions described above.
  • version update device and the version update method embodiment provided by the foregoing embodiments are in the same concept, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.
  • FIG. 6 is a schematic structural diagram of a grayscale publishing server provided in an embodiment of the present invention.
  • the grayscale publishing server can be used to implement the version updating method in the above various embodiments, or the grayscale publishing server is used to implement a version updating device. Specifically:
  • the grayscale publishing server 600 includes a central processing unit (English: central processing unit, CPU for short) 601, including a random access memory (English: random-access memory, abbreviated as: RAM) 602, and a read-only memory (English: read only memory)
  • the system memory 604 of the ROM 603 is abbreviated, and the system bus 605 is connected to the system memory 604 and the central processing unit 601.
  • the grayscale publishing server 600 also includes a basic input/output (input/output, i.e., I/O) system 606 that facilitates transfer of information between various devices within the computer, and for storing the operating system 613, the application 614, and The mass storage device 607 of the other program module 615.
  • I/O basic input/output
  • the basic input/output system 606 includes a display 608 for displaying information and an input device 609 such as a mouse, keyboard for inputting information by the user. Both display 608 and input device 609 are coupled to central processing unit 601 via an input and output controller 610 coupled to system bus 605.
  • the basic input/output system 606 can also include an input output controller 610 for receiving and processing input from a plurality of other devices, such as a keyboard, mouse, or electronic stylus. Similarly, input and output controller 610 also provides output to a display screen, printer, or other type of output device.
  • the mass storage device 607 is connected to the central processing unit 601 by a mass storage controller (not shown) connected to the system bus 605.
  • the mass storage device 607 and its associated computer readable medium provide non-volatile storage for the grayscale publishing server 600. That is, the mass storage device 607 can include a computer readable medium (not shown) such as a hard disk or a CD-ROM drive.
  • Computer readable media may comprise computer storage media and communication media.
  • Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
  • Computer storage medium includes RAM, ROM, erasable programmable read only memory (English: erasable programmable read only memory, referred to as: EPROM), electrically erasable programmable read-only memory (English: electrically erasable programmable read-only) : EEPROM), flash memory or other solid state storage technologies, CD-ROM, DVD or other optical storage, tape cartridges, tape, disk storage or other magnetic storage devices.
  • EPROM erasable programmable read only memory
  • EEPROM electrically erasable programmable read-only memory
  • flash memory or other solid state storage technologies, CD-ROM, DVD or other optical storage, tape cartridges, tape, disk storage or other magnetic storage devices.
  • the system memory 604 and mass storage device 607 described above may
  • the grayscale distribution server 600 can also be operated by a remote computer connected to the network through a network such as the Internet. That is, the grayscale publishing server 600 may be connected to the network 612 through a network interface unit 611 connected to the system bus 605, or may be connected to other types of networks or remote computer systems using the network interface unit 611 (not shown) ).
  • the above memory also includes one or more programs, one or more programs stored in the memory, configured to be executed by the CPU for implementing the functions of the grayscale issue server referred to herein.
  • the computer readable storage medium may include a read only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk, and the like.

Abstract

本发明公开了一种版本更新方法及装置,属于互联网技术领域。所述方法包括:获取应用程序的更新版本所对应的灰度发布策略;接收终端发送的版本更新请求,该终端中安装有该应用程序;检测版本更新请求中携带的终端信息是否符合灰度发布策略;若终端信息符合灰度发布策略,则向终端下发更新版本对应的更新配置。本发明解决了现有技术采用随机抽取的方式进行灰度发布,缺乏针对性,导致更新版本无法得到全面的测试,在大规模更新的情况下存在较大风险的问题;达到了根据灰度发布策略有针对性地选择进行测试的终端,使得更新版本能够得到全面的测试,提高了更新版本稳定性,降低了大规模更新时的风险。

Description

版本更新方法及装置
本申请要求于2015年10月29日提交中国专利局、申请号为201510724155.4、发明名称为“版本更新方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明实施例涉及互联网技术领域,特别涉及一种版本更新方法及装置。
背景技术
随着互联网技术的不断发展,终端中应用程序(Application)的版本更新频率越来越高。应用程序可以简称为应用,为了保证更新版本的稳定性,开发人员通常采用灰度发布的方式发布应用的更新版本。
采用灰度发布的方式发布更新版本时,通常采用随机抽取的方式,从使用该应用的终端中抽取部分测试终端,并向测试终端发送更新版本,提醒测试终端的用户进行版本更新。若更新版本经过测试终端的使用并运行稳定,则逐步扩大更新版本的发送范围,最终将更新版本下发至所有使用该应用的终端。
采用随机抽取的方式确定测试终端缺乏针对性,导致更新版本无法得到全面、有效的测试,在大规模更新的情况下存在较大风险。
发明内容
为了解决现有技术存在的问题,本发明实施例提供了一种版本更新方法及装置。所述技术方案如下:
根据本发明实施例的第一方面,提供了一种版本更新方法,所述方法包括:
获取应用程序的更新版本所对应的灰度发布策略,所述灰度发布策略是用于在灰度发布过程中筛选终端的策略;
接收终端发送的版本更新请求,所述终端中安装有所述应用程序;
检测所述版本更新请求中携带的终端信息是否符合所述灰度发布策略;
若所述终端信息符合所述灰度发布策略,则向所述终端下发所述更新版本对应的更新配置。
根据本发明实施例的第二方面,提供了一种版本更新装置,所述装置包括:
获取模块,用于获取应用程序的更新版本所对应的灰度发布策略,所述灰度发布策略是用于在灰度发布过程中筛选终端的策略;
接收模块,用于接收终端发送的版本更新请求,所述终端中安装有所述应用程序;
第一检测模块,用于检测所述版本更新请求中携带的终端信息是否符合所述灰度发布策略;
更新模块,用于若所述终端信息符合所述灰度发布策略,则向所述终端下发所述更新版本对应的更新配置。
根据本发明实施例的第三方面,提供了一种服务器,所述服务器包括:处理器和存储器,所述存储器存储有一个或一个以上的程序指令,所述处理器被配置为执行所述一个或一个以上的程序指令,所述一个或一个以上的程序指令用于实现如下操作;
获取应用程序的更新版本所对应的灰度发布策略,所述灰度发布策略是用于在灰度发布过程中筛选终端的策略;
接收终端发送的版本更新请求,所述终端是安装有所述应用程序的终端;
检测所述版本更新请求中携带的终端信息是否符合所述灰度发布策略;
若所述终端信息符合所述灰度发布策略,则向所述终端下发所述更新版本对应的更新配置。
本发明实施例提供的技术方案带来的有益效果是:
通过接收各个终端发送的版本更新请求,并检测版本更新请求中携带的终端信息是否符合预设的灰度发布策略,在终端信息符合灰度发布策略时,向终端下发更新版本对应的更新配置供终端进行更新;解决了现有技术采用随机抽取的方式确定测试终端缺乏针对性,导致更新版本无法得到全面和有效的测试,在大规模更新的情况下存在较大风险的问题;达到了根据灰度发布策略有针对性地筛选测试终端,使得更新版本能够得到全面的测试,提高了更新版本的稳定性,降低了大规模更新时的风险。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明 的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1示出了本发明实施例提供的一种实施环境的结构示意图;
图2示出了本发明一个实施例提供的版本更新方法的方法流程图;
图3A示出了本发明另一个实施例提供的版本更新方法的方法流程图;
图3B、3D、3E和3F示出了图3A提供的版本更新方法所涉及的终端信息检测过程的流程图;
图3C示出了图3A提供的版本更新方法所涉及的更新配置下发过程的流程图;
图3G示出了图3A提供的版本更新方法所涉及的防骚扰过程的流程图;
图4示出了本发明一个实施例提供的版本更新装置的结构方框图;
图5示出了本发明另一个实施例提供的版本更新装置的结构方框图;
图6示出了本发明另一个实施例提供的灰度发布服务器的结构方框图。
具体实施方式
为使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明实施方式作进一步地详细描述。
请参考图1,其示出了本发明实施例提供的一种实施环境的结构示意图。该实施环境包括:灰度发布服务器120和至少一个终端140。
灰度发布服务器120为应用程序进行灰度发布的后台服务器。灰度发布是将应用程序的更新版本按照逐渐扩大的范围进行发布的应用发布方式。至少一个终端140中安装有该应用程序。该灰度发布服务器120用于向一部分被选中的终端140发布该应用程序的更新版本。灰度发布服务器120可以是一台服务器、多台服务器组成的服务器集群或云计算中心。
灰度发布服务器120与至少一个终端140之间通过有线网络或无线网络建立连接。
终端140可以是手机、平板电脑、电子书阅读器、MP3(Moving Picture Experts Group Audio Layer III,动态影像专家压缩标准音频层面3)播放器、MP4(Moving Picture Experts Group Audio Layer IV,动态影像专家压缩标准音频层面4)播放器、膝上型便携计算机和台式计算机等等。终端140中安装有 与灰度发布服务器120对应的应用程序。该应用程序可以为通信类应用程序、社交类应用程序、游戏类应用程序、视频播放类应用程序、新闻客户端或应用商店等等,本发明实施例并不对应用程序的类型进行限定。
可选的,上述的无线网络或有线网络使用标准通信技术和/或协议。网络通常为因特网、但也可以是任何网络,包括但不限于局域网(Local Area Network,LAN)、城域网(Metropolitan Area Network,MAN)、广域网(Wide Area Network,WAN)、移动、有线或者无线网络、专用网络或者虚拟专用网络的任何组合)。在一些实施例中,使用包括超文本标记语言(Hyper Text Mark-up Language,HTML)、可扩展标记语言(Extensible Markup Language,XML)等的技术和/或格式来代表通过网络交换的数据。此外还可以使用诸如安全套接字层(Secure Socket Layer,SSL)、传输层安全(Trassport Layer Security,TLS)、虚拟专用网络(Virtual Private Network,VPN)、网际协议安全(Internet Protocol Security,IPsec)等常规加密技术来加密所有或者一些链路。在另一些实施例中,还可以使用定制和/或专用数据通信技术取代或者补充上述数据通信技术。
请参考图2,其示出了本发明一个实施例提供的版本更新方法的方法流程图。本实施例以该版本更新方法应用于图1所示的灰度发布服务器120中来举例说明。该方法包括:
步骤202,获取应用程序的更新版本所对应的灰度发布策略。
该灰度发布策略是用于在灰度发布过程中筛选终端的策略。
服务器用于根据该灰度发布策略,将安装该应用程序的一部分终端确定为测试终端,并优先向测试终端提供该应用程序的更新版本。
步骤204,接收终端发送的版本更新请求,该终端中安装有该应用程序。
可选地,该版本更新请求是第一类型版本更新请求或第二类型版本更新请求,其中,第一类型版本更新请求是用户手动触发终端发送的请求,第二类型版本更新请求是终端根据预定更新策略自动发送的请求。
可选地,预定更新策略是开机时自动更新或每隔预定时间间隔进行更新。
步骤206,检测版本更新请求中携带的终端信息是否符合灰度发布策略。
步骤208,若终端信息符合灰度发布策略,则向该终端下发更新版本对应的更新配置。
相应的,接收到该更新版本的终端根据更新配置进行版本更新,并根据实际的更新和使用情况向服务器发送反馈信息。
综上所述,本实施例提供的版本更新方法,通过接收各个终端发送的版本更新请求,并检测版本更新请求中携带的终端信息是否符合预设的灰度发布策略,在终端信息符合灰度发布策略时,向终端下发更新版本对应的更新配置供终端进行更新;解决了现有技术采用随机抽取的方式确定测试终端缺乏针对性,导致更新版本无法得到全面和有效的测试,在大规模更新的情况下存在较大风险的问题;达到了根据灰度发布策略有针对性地筛选测试终端,使得更新版本能够得到全面的测试,提高了更新版本的稳定性,降低了大规模更新时的风险。
请参考图3A,其示出了本发明另一个实施例提供的版本更新方法的方法流程图。本实施例以该版本更新方法应用于图1所示的灰度发布服务器120中来举例说明。该方法包括:
步骤301,获取应用程序的更新版本所对应的灰度发布策略。
开发人员对应用程序的更新版本进行灰度发布时,可以通过预先构建的灰度发布平台,将更新版本对应的更新配置和相应的灰度发布策略一同下发到应用程序对应的灰度发布服务器中。
其中,灰度发布服务器用于根据该灰度发布策略筛选在灰度发布过程中的测试终端,该灰度发布策略可以是针对应用程序的版本制定的策略(下发更新版本至使用指定版本的终端)、针对终端的地域分布制定的策略(下发更新版本至指定区域的终端)、针对终端的网络情况制定的策略(下发更新版本至处于指定网络连接状态的终端)或针对用户的用户特征制定的策略(下发更新版本至具有指定用户特征的用户)中的至少一种。
作为一种可能的实现方式,该灰度发布平台可以以web的形式进行呈现,该灰度发布平台中包含:更新配置的上传入口、灰度量级的设置入口和灰度发布策略的设置入口等等。开发人员进行更新版本灰度发布时,只需要选择相应的更新配置、输入灰度发布的灰度量级并设置相应的灰度发布策略即可。灰度量级用于指示成功激活该更新版本的测试终端的数量要求。
灰度发布服务器接收到灰度发布平台下发的更新配置、灰度发布策略等数据后,即可根据这些数据进行灰度发布。
步骤302,接收终端发送的版本更新请求,该终端中安装有该应用程序。
安装有应用程序的终端,可以在检测到用户手动获取更新版本时向灰度发布服务器发送第一版本更新请求;也可以根据应用程序中的预定更新策略自动向灰度发布服务器发送第二版本更新请求。对应的,灰度发布服务器接收各个终端发送的版本更新请求。
需要说明的是,本发明实施例中的终端是实时主动的从灰度发布服务器中拉取更新配置,不需要与灰度发布服务器建立长连接通道,避免了维持长连接通道所耗费的终端流量,以及占用终端的进程空间的问题。
步骤303,检测版本更新请求中携带的终端信息是否符合灰度发布策略。
终端发送的版本更新请求中携带有终端信息,灰度发布服务器根据该终端信息确定是否向该终端下发更新配置。
该终端信息中包括但不限于:终端中安装的应用程序的当前版本标识、终端地理位置、终端当前网络连接状态、该终端对应用户的用户标识和终端设备类型中的至少一种。
灰度发布服务器获取该终端信息,并检测该终端信息是否符合预先制定的灰度发布策略,当终端信息符合预先制定的灰度发布策略时,即确定该终端为测试终端,并执行下述步骤304;当终端信息不符合预先制定的灰度发布策略时,即确定该终端不是测试终端,灰度发布服务器也不会向该终端发送相应的更新配置。
作为一种可能的实现方式,开发人员需要使用指定历史版本的终端安装并运行更新配置,并根据运行情况对更新版本进行评估,即针对应用程序的版本制定了灰度发布策略,灰度发布服务器在检测终端信息是否符合灰度发布策略时,如图3B所示,可以包括如下步骤。
步骤303A,获取终端信息中包含的当前版本标识,当前版本标识是终端中安装的应用程序的版本标识。
终端向灰度发布服务器发送版本更新请求时,将终端中安装的应用程序的当前版本标识添加到终端信息中。相应的,灰度发布服务器获取终端信息中包含的当前版本标识。
其中,该当前版本标识可以为应用程序的版本号。比如,灰度发布服务器获取到终端信息中包含的当前版本号为ver 5.2.1。
步骤303B,获取灰度发布策略中包含的目标版本标识。
灰度发布服务器获取该灰度发布策略中包含的目标版本标识,其中,该目标版本标识为至少一个历史版本标识。
比如,灰度发布服务器获取该灰度发布策略中包含的目标版本号为ver5.1.1和ver 5.2.1。
步骤303C,若当前版本标识与目标版本标识一致,则确定终端信息符合灰度发布策略。
灰度发布服务器检测获取到的当前版本标识与目标版本标识是否一致,若当前版本标识与目标版本标识一致,灰度发布服务器确定终端信息符合灰度发布策略,即该终端为目标测试终端。
其中,当目标版本标识为唯一的历史版本标识时,当前版本标识与目标版本标识一致指当前版本标识与目标版本标识完全相同;当目标版本标识中包含多个历史版本标识时,当前版本标识与目标版本标识一致是指:多个历史版本标识中包含当前版本标识。
步骤304,若终端信息符合灰度发布策略,则向该终端下发更新版本对应的更新配置。
由于灰度发布服务器接收的终端发送的版本更新请求可能是终端根据应用程序中的预定更新策略自动发送的,即用户可能不想进行版本更新,此时,若直接向终端下发更新配置,会对用户造成干扰,所以为了避免对用户造成干扰,灰度发布服务器需要进一步确定版本更新请求的类型。
作为一种可能实现方式,如图3C所示,本步骤可以包括如下步骤。
步骤304A,若版本更新请求为第一类型版本更新请求,则直接向终端发送更新版本对应的更新配置。
其中,第一类型版本更新请求是用户手动触发终端发送的请求。
比如,应用程序中包含手动更新按钮,当用户点击该手动更新按钮时,终端即向灰度发布服务器发送第一类型版本更新请求。
由于该第一类型版本更新请求是用户手动触发终端发送的,表明用户进行版本更新的意愿极高,此时向终端发送更新版本对应的更新配置后,用户安装更新配置的可能性极高,且不会对用户造成干扰。
步骤304B,若版本更新请求为第二类型版本更新请求,则向终端发送更新提醒信息,终端用于根据预设提醒策略显示更新提醒信息;当接收到终端发送的确认更新信息时,向终端发送更新版本对应的更新配置。
其中,第二类型版本更新请求是终端根据预定更新策略自动发送的请求。可选地,预定更新策略是开机时自动更新或每隔预定时间间隔进行更新。
可选地,该预设提醒策略包括提醒周期、提醒生效时间和提醒失效时间中的至少一种。
比如,该预设提醒策略中包含的提醒周期为每6小时/次、提醒生效时间为2015年10月13日00时00分00秒以及提醒失效时间为2015年10月15日23时59分59秒,终端即在2015年10月13日00时00分00秒到2015年10月15日23时59分59秒这个时间段内,在用户使用该应用程序时,每隔6小时发送一次更新提醒信息,该更新提醒信息可以以弹窗的形式进行显示。当终端接收到用户触发的确认更新指令时,即向灰度发布服务器发送确认更新信息,指示灰度发布服务器向终端发送更新版本对应的更新配置。
需要说明的是,该预设提醒策略可以由用户自行在应用程序对应的更新设置页面中进行设置,也可以由开发人员设置,并与第二类型版本更新请求一同发送至终端,本发明实施例并不对此进行限定。
步骤305,实时监控更新版本的实时指标数据,该实时指标数据是根据各个终端反馈的数据汇总生成的。
灰度发布服务器进行灰度发布时,接收各个终端发送的反馈数据,该反馈数据可以是终端下载更新配置、安装更新配置、安装更新配置后激活应用、安装更新配置后闪退时发送的。
灰度发布服务器对接收到的反馈数据进行汇总,生成表一所示的实时指标数据表格。
下发量 下载量 安装量 激活量 Crash率
14531 14325 13279 13250 0.01%
表一
需要说明的是,本实施例仅以实时指标数据中包含上述信息为例进行示意性说明,在实际使用过程中,该实时指标数据中还可以包括终端网络分布、终端地理位置分布、crash发生位置(java层、native层)统计数据等等,本发明实施例并不对此进行限定。
步骤306,若实时指标数据中包含的更新版本的激活量达到预设灰度量级,则停止下发更新配置。
开发人员在设置灰度发布策略的同时,设置了灰度发布对应的灰度量级, 灰度发布服务器实时检测实时指标数据中包含的更新版本的激活量是否达到预设灰度量级,若更新版本的激活量是否达到预设灰度量级,表示灰度发布任务已完成,则停止下发更新配置,避免过度发布造成的资源浪费。
步骤307,若实时指标数据中包含的更新版本的crash率达到预设阈值,则停止下发更新配置。
其中,该crash率可以根据crash上报数量/激活量计算得到,该crash率用于指示安装更新配置后该应用程序的崩溃比例。
灰度发布服务器实时检测实时指标数据中包含的更新版本的crash率是否达到预设阈值,当crash率达到预设阈值时,表明更新配置存在较为严重的缺陷,继续进行灰度发布会导致更多终端无法使用应用程序。所以,为了避免更多的终端无法使用应用程序,灰度发布服务器启动止血系统,停止向任何终端下发更新配置。
需要说明的是,灰度发布服务器还可以对实时指标数据中包含的其他数据进行监控,从而发现更新版本中存在的缺陷,并及时展现给开发人员,方便开发人员解决,整个灰度发布过程更加直观且智能化,能够显著提高灰度发布的效率。
综上所述,本实施例提供的版本更新方法,通过接收各个终端发送的版本更新请求,并检测版本更新请求中携带的终端信息是否符合预设的灰度发布策略,在终端信息符合灰度发布策略时,向终端下发更新版本对应的更新配置供终端进行更新;解决了现有技术采用随机抽取的方式确定测试终端缺乏针对性,导致更新版本无法得到全面和有效的测试,在大规模更新的情况下存在较大风险的问题;达到了根据灰度发布策略有针对性地筛选测试终端,使得更新版本能够得到全面的测试,提高了更新版本的稳定性,降低了大规模更新时的风险。
本实施例中,灰度发布服务器能够实时收集并监控更新版本的实时指标数据,并在检测到实时指标数据中包含的更新版本的激活量达到预设灰度量级时,自动停止灰度发布,即保证了灰度发布达到预定指标,同时避免过度发布造成的资源浪费。
本实施例中,灰度发布服务器能够实时收集并监控更新版本的实时指标数据,并在检测到实时指标数据中包含的更新版本的crash率达到预设阈值时,自动停止灰度发布,避免了当更新配置存在问题时,进一步灰度发布所造成的 大面积应用崩溃的问题。
与上述实施例不同的是,灰度发布服务器也可以仅将更新配置下发到指定地域的终端,作为另一种可能的实现方式,如图3D所示,上述步骤303还可以包括如下步骤。
步骤303D,获取终端信息中包含的终端地理位置。
该终端地理位置可以是终端通过GPS(Global Positioning System,全球定位系统)定位得到的经纬度坐标或终端所在城市等等,本实施例以该终端地理位置为终端所在城市为例进行说明。
比如,终端通过GPS定位到终端所在城市为地区A,并将终端所在城市添加到终端信息,发送至灰度发布服务器,相应的,灰度发布服务器可以获取到终端所在城市。
步骤303E,获取灰度发布策略中包含的目标区域。
开发人员预先设置的灰度发布策略中,包含下发更新配置的目标区域,该目标区域可以为至少一组经纬度坐标、至少一个城市、省份或国家等等,本发明并不对此进行限定。
灰度发布服务器获取到终端信息中包含的终端地理位置后,进一步获取灰度发布策略中包含的目标区域。比如,灰度发布策略中包含的目标区域为江苏省。
步骤303F,若终端地理位置属于目标区域,则确定终端信息符合灰度发布策略。
灰度发布服务器获取到终端地理位置和目标区域,检测该终端地理位置是否属于目标区域,当终端地理位置属于目标区域,则确定终端信息符合灰度发布策略。
显而易见的,通过预先设定针对地域的灰度发布策略,灰度发布服务器能够实现向指定区域内的终端下发更新配置,使得灰度发布更具有针对性。
本实施例中,灰度发布服务器可以根据灰度发布策略向指定区域的终端发送更新配置,提高了指定地域更新版本测试的精准性。
由于下载更新配置需要耗费较多流量,当在终端连接到WI-FI(WIreless-FIdelity,无线保真)时,终端下载该更新配置的可能性较高;而当在终端连接到移动通信网络时向终端下发更新配置,由于终端在移动通信网络 的流量有限,终端下载该更新配置的可能性较低,导致灰度发布效率较低,为了进一步提高灰度发布的效率,作为一种可能的实现方式,如图3E所示,上述步骤303还可以包括如下步骤。
步骤303G,获取终端信息中包含的当前网络连接状态,当前网络连接状态包括连接到WI-FI和连接到移动通信网络。
终端向灰度发布服务器发送的终端信息中,携带有终端的当前网络连接状态,该当前网络连接状态包括连接到WI-FI和连接到移动通信网络。进一步的,在当前网络连接状态为连接到移动通信网络状态时,该终端信息中还可以携带有运营商标识。
相应的,灰度发布服务器可以获取到该当前网络连接状态。
步骤303H,获取灰度发布策略中包含的目标网络连接状态。
作为一种可能的实现方式,为了提高更新配置的下载量,开发人员预先设置灰度发布策略时,可以将目标网络连接状态设置为连接到WI-FI,即仅在终端连接到WI-FI时,才向终端下发更新配置。
需要说明的是,开发人员设置的灰度发布策略也可以是向使用指定移动通信网络的终端发送更新配置,本发明实施例并不对此构成限定。
步骤303I,若当前网络连接状态与目标网络连接状态一致,则确定终端信息符合灰度发布策略。
当当前网络连接状态与目标网络连接状态一致时,灰度发布服务器即确定终端信息符合灰度发布策略。
本实施例中,灰度发布服务器可以根据灰度发布策略向指定网络连接状态的终端发送更新配置,避免了提醒用户进行更新时,由于用户未连接WI-FI,导致用户无法及时进行更新的问题。
不同的用户使用应用程序时,对应用程序中不同板块的关注程度不同,比如,当应用程序为视频客户端一类的应用时,用户可以对不同视频类型板块的关注和使用程度不同,有些用户可能关注“娱乐板块”,而有些用户可能关注“游戏板块”。当对视频客户端中的某些板块进行更新时,为了实现更加精准的灰度下发,提高更新版本测试的全面性和针对性,作为一种可能的实现方式,如图3F所示,上述步骤303还可以包括如下步骤。
步骤303J,获取终端信息中包含的用户标识。
该用户标识可以为在应用程序中注册得到的帐号。
步骤303K,通过用户画像系统查找与用户标识对应的用户标签,用户画像系统中存储有各个用户标识各自对应的用户标签。
根据用户的个人信息以及用户使用应用程序的偏好信息,灰度发布服务器中的用户画像系统为各个用户生成相应的用户标签,并维护各个用户标识与用户标签的对应关系,示意性的,用户标识与用户标签的对应关系可以如表二所示。
用户标识 用户标签
Zhangsan 学生、游戏、宅
Lisi 技术控、程序员
Wangwu NBA、评论员
表二
相应的,灰度发布服务器获取到用户标识后,通过用户画像系统查找与用户标识对应的用户标签。
比如,灰度发布服务器获取到用户标识为“Zhangsan”,并通过用户画像系统查找与用户标识对应的用户标签为“学生、游戏、宅”。
步骤303L,获取灰度发布策略中包含的目标用户标签。
灰度发布服务器获取到用户标签后,获取灰度发布策略中包含的目标用户标签,比如,灰度发布服务器获取到灰度发布策略中包含的目标用户标签为“游戏”和“动漫”。
步骤303M,检测用户标识对应的用户标签中是否存在与目标用户标签匹配的用户标识。
若用户标识对应的用户标签中存在与目标用户标签匹配的用户标识,则执行步骤303N;若用户标识对应的用户标签中不存在与目标用户标签匹配的用户标识,则确定终端信息不符合灰度发布策略,即不向该终端下发更新配置。
步骤303N,若用户标识对应的用户标签中存在与目标用户标签匹配的用户标识,则确定终端信息符合灰度发布策略。
显而易见的,通过用户画像系统可以精准定位目标用户群体,使得灰度发布更具针对性,且能够显著提高更新版本测试的全面性,有助于开发人员及时发现并解决更新版本中存在的缺陷。
本实施例中,灰度发布服务器可以根据自定义的目标用户标签,并结合用 户画像系统,确定接收更新配置的终端,实现更新配置的精准投放,提高更新版本测试的全面性和针对性。
开发人员为更新版本设置灰度发布策略时,可以为同一更新版本设置并行的至少两个灰度发布策略,比如,第一灰度发布策略为向地区A的终端下发更新配置,第二灰度发布策略为向用户标签为游戏的用户下发更新配置,由于部分终端同时满足第一灰度发布策略和第二灰度发布策略,若在短时间内向这部分用户下发两次相同更新配置,不仅会对用户造成骚扰,同时会影响实时指标数据的准确性。为了避免上述问题,作为一种可能的实现方式,如图3G所示,上述步骤303之后,还可以包括如下步骤:
步骤308,检测防骚扰名单中是否包含该终端。
灰度发布服务器中的数据库维护有防骚扰名单,该防骚扰名单中记载有已经下发过更新配置的终端的终端标识。
步骤309,若终端信息符合至少两个灰度发布策略中的任意一个,且防骚扰名单中不包含该终端,则向该终端下发更新版本对应的更新配置。
若防骚扰名单中不包含该终端,则表明还未向该终端下发过更新配置,灰度发布服务器即向该终端下发更新版本对应的更新配置。
步骤310,将该终端添加到防骚扰名单中。
灰度发布服务器向该终端下发更新版本对应的更新配置后,将该终端添加到防骚扰名单中,后续即使该终端的终端信息满足其他并行的灰度发布策略,灰度发布服务器也不再下发更新配置,从而实现“多任务并行互斥”,避免重复下发相同的更新配置对用户造成的骚扰。
需要说明的是,当同一更新版本并行设置有多个灰度发布策略时,灰度发布服务还可以根据预设的灰度量级和灰度发布策略的数量,为各个灰度发布策略均匀分配测试终端,本发明实施例并不对此进行限定。
本实施例中,灰度发布服务器通过维护防骚扰名单,在同一更新版本对应至少两个并行灰度发布策略时,实现“多任务并行互斥”,避免用户受到骚扰,并提高灰度发布的准确性。
需要说明的是,上述各个实施例提供的版本更新方法,不仅适用于版本更新发布阶段较大规模的灰度发布,还适用于版本更新内测阶段的小规模内测 (小规模内测时开发人员可以要求指定终端进行版本更新),即该版本更新方法适用于应用开发过程中各个阶段,并不仅仅适用于版本更新灰度发布阶段,本发明实施例并不对此构成限定。
以下为本发明的装置实施例,装置实施例中未详尽描述的细节,可以参考上述一一对应的方法实施例。
请参考图4,其示出了本发明一个实施例提供的版本更新装置的结构方框图。本实施例提供的版本更新装置可以通过软件、硬件或者两者的结合实现成为图1中灰度发布服务器120的全部或一部分。该装置包括:
获取模块410,用于获取应用程序的更新版本所对应的灰度发布策略;所述灰度发布策略是用于在灰度发布过程中筛选终端的策略;
接收模块420,用于接收终端发送的版本更新请求,终端中安装有应用程序;
第一检测模块430,用于检测版本更新请求中携带的终端信息是否符合灰度发布策略;
更新模块440,用于若终端信息符合灰度发布策略,则向终端下发更新版本对应的更新配置。
请参考图5,其示出了本发明另一个实施例提供的版本更新装置的结构方框图。本实施例提供的版本更新装置可以通过软件、硬件或者两者的结合实现成为图1中灰度发布服务器120的全部或一部分。该装置包括:
获取模块510,用于获取应用程序的更新版本所对应的灰度发布策略;所述灰度发布策略是用于在灰度发布过程中筛选终端的策略;
接收模块520,用于接收终端发送的版本更新请求,终端中安装有应用程序;
第一检测模块530,用于检测版本更新请求中携带的终端信息是否符合灰度发布策略;
更新模块540,用于若终端信息符合灰度发布策略,则向终端下发更新版本对应的更新配置。
可选地,所述第一检测模块530,包括:
第一检测单元531,用于获取所述终端信息中包含的当前版本标识,所述 当前版本标识是所述终端中安装的所述应用程序的版本标识;获取所述灰度发布策略中包含的目标版本标识;若所述当前版本标识与所述目标版本标识一致,则确定所述终端信息符合所述灰度发布策略;
和/或;
第二检测单元532,用于获取所述终端信息中包含的终端地理位置;获取所述灰度发布策略中包含的目标区域;若所述终端地理位置属于所述目标区域,则确定所述终端信息符合所述灰度发布策略;
和/或;
第三检测单元533,用于获取所述终端信息中包含的当前网络连接状态,所述当前网络连接状态包括连接到无线保真WI-FI和连接到运营商网络;获取所述灰度发布策略中包含的目标网络连接状态;若所述当前网络连接状态与所述目标网络连接状态一致,则确定所述终端信息符合所述灰度发布策略;
和/或;
第四检测单元534,用于获取所述终端信息中包含的用户标识;通过用户画像系统查找与所述用户标识对应的用户标签,所述用户画像系统中存储有各个用户标识各自对应的所述用户标签;获取所述灰度发布策略中包含的目标用户标签;检测所述用户标识对应的用户标签中是否存在与所述目标用户标签匹配的用户标识;若所述用户标识对应的用户标签中存在与所述目标用户标签匹配的用户标识,则确定所述终端信息符合所述灰度发布策略。
可选地,所述更新版本所对应的所述灰度发布策略为并行的至少两个;
所述装置,还包括:
第二检测模块550,用于检测防骚扰名单中是否包含所述终端;
所述更新模块540,还用于若所述终端信息符合至少两个所述灰度发布策略中的任意一个,且所述防骚扰名单中不包含所述终端,则执行所述向所述终端下发所述更新版本对应的更新配置的步骤;
添加模块560,用于将所述终端添加到所述防骚扰名单中。
可选地,所述装置,还包括:
监控模块570,用于实时监控所述更新版本的实时指标数据,所述实时指标数据是根据各个终端反馈的数据汇总生成的;
第一停止模块580,用于若所述实时指标数据中包含的所述更新版本的激活量达到预设灰度量级,则停止下发所述更新配置;
第二停止模块590,用于若所述实时指标数据中包含的所述更新版本的崩溃crash率达到预设阈值,则停止下发所述更新配置。
可选地,所述版本更新请求包括第一类型版本更新请求和第二类型版本更新请求,所述第一类型版本更新请求是用户手动触发所述终端发送的请求,所述第二类型版本更新请求是所述终端根据预定更新策略自动发送的请求;
所述更新模块540,包括:
第一更新单元541,用于若所述版本更新请求为所述第一类型版本更新请求,则直接向所述终端发送所述更新版本对应的所述更新配置。
第二更新单元542,用于若所述版本更新请求为所述第二类型版本更新请求,则向所述终端发送更新提醒信息,所述终端用于根据预设提醒策略显示所述更新提醒信息;当接收到所述终端发送的确认更新信息时,向所述终端发送所述更新版本对应的所述更新配置;
其中,所述预设提醒策略包括提醒周期、提醒生效时间和提醒失效时间中的至少一种。
需要说明的是:上述实施例提供的版本更新装置在进行版本更新时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将设备的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的版本更新装置与版本更新方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
图6是本发明一个实施例中提供的灰度发布服务器的结构示意图。该灰度发布服务器可以用于实现上述各个实施例中的版本更新方法,或者说,该灰度发布服务器用于实现成为一个版本更新装置。具体来讲:
灰度发布服务器600包括中央处理单元(英文:central processing unit,简称:CPU)601、包括随机存取存储器(英文:random-access memory,简称:RAM)602和只读存储器(英文:read only memory,简称:ROM)603的系统存储器604,以及连接系统存储器604和中央处理单元601的系统总线605。灰度发布服务器600还包括帮助计算机内的各个器件之间传输信息的基本输入/输出(英文:input/output,简称:I/O)系统606,和用于存储操作系统613、应用程序614和其他程序模块615的大容量存储设备607。
基本输入/输出系统606包括有用于显示信息的显示器608和用于用户输入信息的诸如鼠标、键盘之类的输入设备609。其中显示器608和输入设备609都通过连接到系统总线605的输入输出控制器610连接到中央处理单元601。基本输入/输出系统606还可以包括输入输出控制器610以用于接收和处理来自键盘、鼠标、或电子触控笔等多个其他设备的输入。类似地,输入输出控制器610还提供输出到显示屏、打印机或其他类型的输出设备。
大容量存储设备607通过连接到系统总线605的大容量存储控制器(未示出)连接到中央处理单元601。大容量存储设备607及其相关联的计算机可读介质为灰度发布服务器600提供非易失性存储。也就是说,大容量存储设备607可以包括诸如硬盘或者CD-ROM驱动器之类的计算机可读介质(未示出)。
不失一般性,计算机可读介质可以包括计算机存储介质和通信介质。计算机存储介质包括以用于存储诸如计算机可读指令、数据结构、程序模块或其他数据等信息的任何方法或技术实现的易失性和非易失性、可移动和不可移动介质。计算机存储介质包括RAM、ROM、可擦除可编程只读寄存器(英文:erasable programmable read only memory,简称:EPROM)、带电可擦写可编程只读存储器(英文:electrically erasable programmable read-only,简称:EEPROM)、闪存或其他固态存储其技术,CD-ROM、DVD或其他光学存储、磁带盒、磁带、磁盘存储或其他磁性存储设备。当然,本领域技术人员可知计算机存储介质不局限于上述几种。上述的系统存储器604和大容量存储设备607可以统称为存储器。
根据本发明的各种实施例,灰度发布服务器600还可以通过诸如因特网等网络连接到网络上的远程计算机运行。也即灰度发布服务器600可以通过连接在系统总线605上的网络接口单元611连接到网络612,或者说,也可以使用网络接口单元611来连接到其他类型的网络或远程计算机系统(未示出)。
上述存储器还包括一个或者一个以上的程序,一个或者一个以上程序存储于存储器中,被配置由CPU执行,用于实现本文所涉及的灰度发布服务器的功能。
本领域普通技术人员可以理解上述实施例的版本更新方法中的全部或部分步骤是可以通过程序指令来控制相关的硬件来完成,该程序指令可以存储于 一计算机可读存储介质中,该计算机可读存储介质可以包括:只读存储器(ROM,Read Only Memory)、随机存取记忆体(RAM,Random Access Memory)、磁盘或光盘等。
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。
以上所述仅为本发明的较佳实施例,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (18)

  1. 一种版本更新方法,其特征在于,所述方法包括:
    获取应用程序的更新版本所对应的灰度发布策略,所述灰度发布策略是用于在灰度发布过程中筛选终端的策略;
    接收终端发送的版本更新请求,所述终端中安装有所述应用程序;
    检测所述版本更新请求中携带的终端信息是否符合所述灰度发布策略;
    若所述终端信息符合所述灰度发布策略,则向所述终端下发所述更新版本对应的更新配置。
  2. 根据权利要求1所述的方法,其特征在于,所述检测所述版本更新请求中携带的终端信息是否符合所述灰度发布策略,包括:
    获取所述终端信息中包含的当前版本标识,所述当前版本标识是所述终端中安装的所述应用程序的版本标识;
    获取所述灰度发布策略中包含的目标版本标识;
    若所述当前版本标识与所述目标版本标识一致,则确定所述终端信息符合所述灰度发布策略。
  3. 根据权利要求1所述的方法,其特征在于,所述检测所述版本更新请求中携带的终端信息是否符合所述灰度发布策略,包括:
    获取所述终端信息中包含的终端地理位置;
    获取所述灰度发布策略中包含的目标区域;
    若所述终端地理位置属于所述目标区域,则确定所述终端信息符合所述灰度发布策略。
  4. 根据权利要求1所述的方法,其特征在于,所述检测所述版本更新请求中携带的终端信息是否符合所述灰度发布策略,包括:
    获取所述终端信息中包含的当前网络连接状态,所述当前网络连接状态包括连接到无线保真WI-FI或连接到移动通信网络;
    获取所述灰度发布策略中包含的目标网络连接状态;
    若所述当前网络连接状态与所述目标网络连接状态一致,则确定所述终端 信息符合所述灰度发布策略。
  5. 根据权利要求1所述的方法,其特征在于,所述检测所述版本更新请求中携带的终端信息是否符合所述灰度发布策略,包括:
    获取所述终端信息中包含的用户标识;通过用户画像系统查找与所述用户标识对应的用户标签,所述用户画像系统中存储有各个用户标识各自对应的所述用户标签;获取所述灰度发布策略中包含的目标用户标签;检测所述用户标识对应的用户标签中是否存在与所述目标用户标签匹配的用户标识;若所述用户标识对应的用户标签中存在与所述目标用户标签匹配的用户标识,则确定所述终端信息符合所述灰度发布策略。
  6. 根据权利要求1至5任一所述的方法,其特征在于,所述更新版本所对应的所述灰度发布策略包括并行的至少两个;
    所述检测所述版本更新请求中携带的终端信息是否符合所述灰度发布策略之后,还包括:
    检测防骚扰名单中是否包含所述终端;
    若所述终端信息符合至少两个所述灰度发布策略中的任意一个,且所述防骚扰名单中不包含所述终端,则执行所述向所述终端下发所述更新版本对应的更新配置的步骤;
    将所述终端添加到所述防骚扰名单中。
  7. 根据权利要求1至5任一所述的方法,其特征在于,所述向所述终端下发所述更新版本对应的更新配置之后,还包括:
    实时监控所述更新版本的实时指标数据,所述实时指标数据是根据各个终端反馈的数据汇总生成的;
    若所述实时指标数据中包含的所述更新版本的激活量达到预设灰度量级,则停止下发所述更新配置;
    若所述实时指标数据中包含的所述更新版本的崩溃crash率达到预设阈值,则停止下发所述更新配置。
  8. 根据权利要求1至5任一所述的方法,其特征在于,所述版本更新请求 是第一类型版本更新请求或第二类型版本更新请求,所述第一类型版本更新请求是用户手动触发所述终端发送的请求,所述第二类型版本更新请求是所述终端根据预定更新策略自动发送的请求;
    所述向所述终端下发所述更新版本对应的更新配置,包括:
    若所述版本更新请求为所述第一类型版本更新请求,则直接向所述终端发送所述更新版本对应的所述更新配置;
    若所述版本更新请求为所述第二类型版本更新请求,则向所述终端发送更新提醒信息,所述终端用于根据预设提醒策略显示所述更新提醒信息;当接收到所述终端发送的确认更新信息时,向所述终端发送所述更新版本对应的所述更新配置。
  9. 一种版本更新装置,其特征在于,所述装置包括:
    获取模块,用于获取应用程序的更新版本所对应的灰度发布策略,所述灰度发布策略是用于在灰度发布过程中筛选终端的策略;
    接收模块,用于接收终端发送的版本更新请求,所述终端中安装有所述应用程序;
    第一检测模块,用于检测所述版本更新请求中携带的终端信息是否符合所述灰度发布策略;
    更新模块,用于若所述终端信息符合所述灰度发布策略,则向所述终端下发所述更新版本对应的更新配置。
  10. 根据权利要求9所述的装置,其特征在于,所述第一检测模块,包括:
    第一检测单元,用于获取所述终端信息中包含的当前版本标识,所述当前版本标识是所述终端中安装的所述应用程序的版本标识;获取所述灰度发布策略中包含的目标版本标识;若所述当前版本标识与所述目标版本标识一致,则确定所述终端信息符合所述灰度发布策略;
    和/或;
    第二检测单元,用于获取所述终端信息中包含的终端地理位置;获取所述灰度发布策略中包含的目标区域;若所述终端地理位置属于所述目标区域,则确定所述终端信息符合所述灰度发布策略;
    和/或;
    第三检测单元,用于获取所述终端信息中包含的当前网络连接状态,所述当前网络连接状态包括连接到无线保真WI-FI和连接到运营商网络;获取所述灰度发布策略中包含的目标网络连接状态;若所述当前网络连接状态与所述目标网络连接状态一致,则确定所述终端信息符合所述灰度发布策略;
    和/或;
    第四检测单元,用于获取所述终端信息中包含的用户标识;通过用户画像系统查找与所述用户标识对应的用户标签,所述用户画像系统中存储有各个用户标识各自对应的所述用户标签;获取所述灰度发布策略中包含的目标用户标签;检测所述用户标识对应的用户标签中是否存在与所述目标用户标签匹配的用户标识;若所述用户标识对应的用户标签中存在与所述目标用户标签匹配的用户标识,则确定所述终端信息符合所述灰度发布策略。
  11. 根据权利要求9或10所述的装置,其特征在于,所述更新版本所对应的所述灰度发布策略为并行的至少两个;
    所述装置,还包括:
    第二检测模块,用于检测防骚扰名单中是否包含所述终端;
    所述更新模块,还用于若所述终端信息符合至少两个所述灰度发布策略中的任意一个,且所述防骚扰名单中不包含所述终端,则向所述终端下发所述更新版本对应的更新配置;
    添加模块,用于将所述终端添加到所述防骚扰名单中。
  12. 根据权利要求9或10所述的装置,其特征在于,所述装置,还包括:
    监控模块,用于实时监控所述更新版本的实时指标数据,所述实时指标数据是根据各个终端反馈的数据汇总生成的;
    第一停止模块,用于若所述实时指标数据中包含的所述更新版本的激活量达到预设灰度量级,则停止下发所述更新配置;
    第二停止模块,用于若所述实时指标数据中包含的所述更新版本的崩溃crash率达到预设阈值,则停止下发所述更新配置。
  13. 根据权利要求9或10所述的装置,其特征在于,所述版本更新请求是第一类型版本更新请求或第二类型版本更新请求,所述第一类型版本更新请求 是用户手动触发所述终端发送的请求,所述第二类型版本更新请求是所述终端根据预定更新策略自动发送的请求;
    所述更新模块,包括:
    第一更新单元,用于若所述版本更新请求为所述第一类型版本更新请求,则直接向所述终端发送所述更新版本对应的所述更新配置。
    第二更新单元,用于若所述版本更新请求为所述第二类型版本更新请求,则向所述终端发送更新提醒信息,所述终端用于根据预设提醒策略显示所述更新提醒信息;当接收到所述终端发送的确认更新信息时,向所述终端发送所述更新版本对应的所述更新配置。
  14. 一种版本更新装置,其特征在于,所述装置包括:处理器和存储器,所述存储器存储有一个或一个以上的程序指令,所述处理器被配置为执行所述一个或一个以上的程序指令,所述一个或一个以上的程序指令用于实现如下操作;
    获取应用程序的更新版本所对应的灰度发布策略,所述灰度发布策略是用于在灰度发布过程中筛选终端的策略;
    接收终端发送的版本更新请求,所述终端是安装有所述应用程序的终端;
    检测所述版本更新请求中携带的终端信息是否符合所述灰度发布策略;
    若所述终端信息符合所述灰度发布策略,则向所述终端下发所述更新版本对应的更新配置。
  15. 根据权利要求14所述的装置,其特征在于,所述一个或一个以上的程序指令还用于实现如下操作:
    获取所述终端信息中包含的当前版本标识,所述当前版本标识是所述终端中安装的所述应用程序的版本标识;获取所述灰度发布策略中包含的目标版本标识;若所述当前版本标识与所述目标版本标识一致,则确定所述终端信息符合所述灰度发布策略;
    和/或;
    获取所述终端信息中包含的终端地理位置;获取所述灰度发布策略中包含的目标区域;若所述终端地理位置属于所述目标区域,则确定所述终端信息符合所述灰度发布策略;
    和/或;
    获取所述终端信息中包含的当前网络连接状态,所述当前网络连接状态包括连接到无线保真WI-FI或连接到移动通信网络;获取所述灰度发布策略中包含的目标网络连接状态;若所述当前网络连接状态与所述目标网络连接状态一致,则确定所述终端信息符合所述灰度发布策略;
    和/或;
    获取所述终端信息中包含的用户标识;通过用户画像系统查找与所述用户标识对应的用户标签,所述用户画像系统中存储有各个用户标识各自对应的所述用户标签;获取所述灰度发布策略中包含的目标用户标签;检测所述用户标识对应的用户标签中是否存在与所述目标用户标签匹配的用户标识;若所述用户标识对应的用户标签中存在与所述目标用户标签匹配的用户标识,则确定所述终端信息符合所述灰度发布策略。
  16. 根据权利要求14或15所述的装置,其特征在于,所述更新版本所对应的所述灰度发布策略为并行的至少两个;
    所述一个或一个以上的程序指令还用于实现如下操作:
    检测防骚扰名单中是否包含所述终端;
    若所述终端信息符合至少两个所述灰度发布策略中的任意一个,且所述防骚扰名单中不包含所述终端,则执行所述向所述终端下发所述更新版本对应的更新配置的步骤;
    将所述终端添加到所述防骚扰名单中。
  17. 根据权利要求14或15所述的装置,其特征在于,所述一个或一个以上的程序指令还用于实现如下操作:
    实时监控所述更新版本的实时指标数据,所述实时指标数据是根据各个终端反馈的数据汇总生成的;
    若所述实时指标数据中包含的所述更新版本的激活量达到预设灰度量级,则停止下发所述更新配置;
    若所述实时指标数据中包含的所述更新版本的崩溃crash率达到预设阈值,则停止下发所述更新配置。
  18. 根据权利要求14或15所述的装置,其特征在于,所述版本更新请求是第一类型版本更新请求或第二类型版本更新请求,所述第一类型版本更新请求是用户手动触发所述终端发送的请求,所述第二类型版本更新请求是所述终端根据预定更新策略自动发送的请求;
    所述一个或一个以上的程序指令还用于实现如下操作:
    若所述版本更新请求为所述第一类型版本更新请求,则直接向所述终端发送所述更新版本对应的所述更新配置;
    若所述版本更新请求为所述第二类型版本更新请求,则向所述终端发送更新提醒信息,所述终端用于根据预设提醒策略显示所述更新提醒信息;当接收到所述终端发送的确认更新信息时,向所述终端发送所述更新版本对应的所述更新配置。
PCT/CN2016/099240 2015-10-29 2016-09-18 版本更新方法及装置 WO2017071425A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510724155.4 2015-10-29
CN201510724155.4A CN106648562B (zh) 2015-10-29 2015-10-29 版本更新方法及装置

Publications (1)

Publication Number Publication Date
WO2017071425A1 true WO2017071425A1 (zh) 2017-05-04

Family

ID=58631285

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/099240 WO2017071425A1 (zh) 2015-10-29 2016-09-18 版本更新方法及装置

Country Status (2)

Country Link
CN (1) CN106648562B (zh)
WO (1) WO2017071425A1 (zh)

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147651A (zh) * 2017-05-18 2017-09-08 深圳房讯通信息技术有限公司 一种灰度发布系统及其发布方法
CN107179988A (zh) * 2017-05-15 2017-09-19 杭州时趣信息技术有限公司 一种软件项目迭代保障体系
CN109388414A (zh) * 2017-08-03 2019-02-26 合网络技术(北京)有限公司 软件升级方法及装置
CN109788029A (zh) * 2018-12-14 2019-05-21 平安信托有限责任公司 微服务的灰度调用方法、装置、终端及可读存储介质
CN109800017A (zh) * 2018-12-14 2019-05-24 中国平安财产保险股份有限公司 灰度发布方法、装置、计算机设备和存储介质
CN110046083A (zh) * 2018-01-17 2019-07-23 北京京东尚科信息技术有限公司 自动化灰度发布方法和装置
CN110377327A (zh) * 2019-06-19 2019-10-25 平安普惠企业管理有限公司 生产环境灰度发布监控方法、设备、存储介质及装置
CN110442361A (zh) * 2019-06-27 2019-11-12 五八有限公司 一种灰度发布方法、装置及电子设备
CN110569057A (zh) * 2019-09-12 2019-12-13 北京字节跳动网络技术有限公司 灰度发布方法、装置、电子设备及计算机可读介质
CN110661835A (zh) * 2018-06-29 2020-01-07 马上消费金融股份有限公司 一种灰度发布方法及其处理方法、节点及系统和存储装置
CN110750278A (zh) * 2019-09-24 2020-02-04 苏宁云计算有限公司 灰度发布方法、装置、路由设备和存储介质
CN110958314A (zh) * 2019-11-28 2020-04-03 盛业信息科技服务(深圳)有限公司 服务的灰度发布方法、装置和计算机设备
CN111090452A (zh) * 2019-11-11 2020-05-01 福建天泉教育科技有限公司 服务环境的切换方法及计算机可读存储介质
CN111090440A (zh) * 2018-10-23 2020-05-01 阿里巴巴集团控股有限公司 信息处理方法、系统、设备及存储介质
CN111290779A (zh) * 2020-03-04 2020-06-16 北京三快在线科技有限公司 灰度发布方法、装置、存储介质和电子设备
CN111314460A (zh) * 2020-02-13 2020-06-19 北京松果电子有限公司 服务迭代方法、服务迭代装置及存储介质
CN111338824A (zh) * 2020-02-27 2020-06-26 中国联合网络通信集团有限公司 灰度发布方法、装置、电子设备及存储介质
CN111586095A (zh) * 2020-03-26 2020-08-25 中国平安财产保险股份有限公司 基于微服务灰度发布方法、装置、计算机设备及存储介质
CN111723003A (zh) * 2020-05-18 2020-09-29 五八有限公司 一种灰度测试方法、装置、电子设备及存储介质
CN111736872A (zh) * 2020-06-22 2020-10-02 平安健康保险股份有限公司 灰度发布升级方法、装置、计算机系统及可读存储介质
CN111737128A (zh) * 2020-06-19 2020-10-02 北京百度网讯科技有限公司 线上测试方法及灰度分流设备、存储介质
CN111786885A (zh) * 2020-06-23 2020-10-16 中国工商银行股份有限公司 分布式全链路灰度路由方法及装置
CN111815401A (zh) * 2020-06-16 2020-10-23 上海悦易网络信息技术有限公司 一种订单流程控制的方法及设备
CN111897542A (zh) * 2020-08-31 2020-11-06 北京三快在线科技有限公司 一种灰度发布的方法及装置
CN112000348A (zh) * 2020-07-28 2020-11-27 金蝶医疗软件科技有限公司 服务灰度发布的控制方法、装置、计算机设备
CN112653579A (zh) * 2020-12-16 2021-04-13 中国人寿保险股份有限公司 一种基于OpenResty的灰度发布方法及相关设备
US10977025B2 (en) 2018-11-07 2021-04-13 Microsoft Technology Licensing, Llc Intelligent software asset classification for software update validation
CN112732274A (zh) * 2021-01-08 2021-04-30 上海汇付数据服务有限公司 基于灰度发布的容器应用发布方法以及管理平台
US11036615B2 (en) 2018-12-06 2021-06-15 Microsoft Technology Licensing, Llc Automatically performing and evaluating pilot testing of software
CN113051126A (zh) * 2019-12-27 2021-06-29 Oppo广东移动通信有限公司 画像构建方法、装置、设备及存储介质
CN113312257A (zh) * 2021-05-24 2021-08-27 深圳市中科明望通信软件有限公司 版本识别方法、装置、存储介质及计算机设备
CN114356401A (zh) * 2022-01-12 2022-04-15 江苏安超云软件有限公司 灰度发布方法、装置、电子设备及计算机可读存储介质
CN114385515A (zh) * 2022-03-24 2022-04-22 凯泰铭科技(北京)有限公司 保险运营平台的灰度发布方法、系统、装置

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107864175B (zh) * 2017-08-24 2021-06-04 平安普惠企业管理有限公司 灰度发布控制方法、装置、设备及存储介质
CN107832067B (zh) * 2017-10-27 2021-05-25 维沃移动通信有限公司 一种应用更新方法、移动终端和计算机可读存储介质
CN107967153B (zh) * 2017-12-13 2021-04-02 维沃移动通信有限公司 一种应用程序的管理方法及移动终端
CN108446222B (zh) * 2018-03-05 2021-11-02 百度在线网络技术(北京)有限公司 应用测试方法、装置及设备
CN109725928A (zh) * 2018-06-15 2019-05-07 平安普惠企业管理有限公司 灰度发布方法、装置、设备及可读存储介质
CN108965290A (zh) * 2018-07-10 2018-12-07 江苏满运软件科技有限公司 一种待普及功能的显示方法及系统
CN109343874B (zh) * 2018-08-30 2023-03-14 阿波罗智能技术(北京)有限公司 无人车升级方法、装置、设备及计算机可读存储介质
CN109471657A (zh) * 2018-09-07 2019-03-15 平安科技(深圳)有限公司 灰度发布方法、装置、计算机设备及计算机存储介质
CN109376322A (zh) * 2018-09-07 2019-02-22 平安科技(深圳)有限公司 一种灰度版本页面访问方法、装置、计算机设备及计算机存储介质
CN109462706A (zh) * 2018-12-20 2019-03-12 中国银行股份有限公司 一种处理方法及装置
CN111371938B (zh) * 2018-12-26 2021-07-16 华为终端有限公司 一种故障检测方法及电子设备
CN111381845B (zh) * 2018-12-28 2023-09-01 广州市百果园信息技术有限公司 软件灰度升级方法、装置、存储介质、终端和服务器
CN109787830B (zh) * 2019-01-21 2023-03-07 北京京东尚科信息技术有限公司 灰度发布控制方法、装置、系统、电子设备及存储介质
CN110245070A (zh) * 2019-05-07 2019-09-17 平安科技(深圳)有限公司 测试用户筛选方法、装置、计算机设备及存储介质
CN110647336A (zh) * 2019-08-13 2020-01-03 平安普惠企业管理有限公司 灰度发布方法、装置、计算机设备和存储介质
CN110532008A (zh) * 2019-08-29 2019-12-03 深圳前海环融联易信息科技服务有限公司 一种产品灰度发布方法、装置、计算机设备及存储介质
TWI780372B (zh) * 2019-10-30 2022-10-11 緯創資通股份有限公司 設備佈建系統及其方法
CN110784409B (zh) * 2019-10-31 2022-08-09 长沙水羊网络科技有限公司 一种基于Spring Cloud的微服务灰度发布方法
CN110908688A (zh) * 2019-11-26 2020-03-24 中国银行股份有限公司 应用程序的灰度发布方法及装置
CN113268366A (zh) * 2020-02-17 2021-08-17 斑马智行网络(香港)有限公司 内核运行方法、设备和系统
CN111679966A (zh) * 2020-04-27 2020-09-18 五八有限公司 灰度发布方法、装置、服务器及存储介质
CN111752597B (zh) * 2020-06-29 2024-02-27 深圳前海微众银行股份有限公司 业务的灰度发布方法、装置、设备及计算机可读存储介质
CN112040320B (zh) * 2020-08-31 2022-06-03 北京奇艺世纪科技有限公司 一种电视果应用的升级方法及装置
CN112416405A (zh) * 2020-11-30 2021-02-26 厦门亿联网络技术股份有限公司 音视频软件终端灰度升级方法、装置、终端设备及介质
CN112860288A (zh) * 2021-01-29 2021-05-28 上海二三四五网络科技有限公司 一种批量更新程序版本的控制方法及装置
CN113610637B (zh) * 2021-08-12 2023-07-04 上海通联金融服务有限公司 灰度算法支持下的智能路由发布的方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104579768A (zh) * 2014-12-29 2015-04-29 广州酷狗计算机科技有限公司 客户端升级方法和装置
CN104881734A (zh) * 2015-05-11 2015-09-02 广东小天才科技有限公司 一种基于灰度发布引导产品改进的方法、装置及系统
CN104966206A (zh) * 2015-05-12 2015-10-07 百度在线网络技术(北京)有限公司 对移动应用进行灰度发布的方法、装置和系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104579768A (zh) * 2014-12-29 2015-04-29 广州酷狗计算机科技有限公司 客户端升级方法和装置
CN104881734A (zh) * 2015-05-11 2015-09-02 广东小天才科技有限公司 一种基于灰度发布引导产品改进的方法、装置及系统
CN104966206A (zh) * 2015-05-12 2015-10-07 百度在线网络技术(北京)有限公司 对移动应用进行灰度发布的方法、装置和系统

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107179988A (zh) * 2017-05-15 2017-09-19 杭州时趣信息技术有限公司 一种软件项目迭代保障体系
CN107147651A (zh) * 2017-05-18 2017-09-08 深圳房讯通信息技术有限公司 一种灰度发布系统及其发布方法
CN109388414A (zh) * 2017-08-03 2019-02-26 合网络技术(北京)有限公司 软件升级方法及装置
CN110046083A (zh) * 2018-01-17 2019-07-23 北京京东尚科信息技术有限公司 自动化灰度发布方法和装置
CN110661835B (zh) * 2018-06-29 2023-05-02 马上消费金融股份有限公司 一种灰度发布方法及其处理方法、节点及系统和存储装置
CN110661835A (zh) * 2018-06-29 2020-01-07 马上消费金融股份有限公司 一种灰度发布方法及其处理方法、节点及系统和存储装置
CN111090440A (zh) * 2018-10-23 2020-05-01 阿里巴巴集团控股有限公司 信息处理方法、系统、设备及存储介质
CN111090440B (zh) * 2018-10-23 2023-06-20 阿里巴巴集团控股有限公司 信息处理方法、系统、设备及存储介质
US10977025B2 (en) 2018-11-07 2021-04-13 Microsoft Technology Licensing, Llc Intelligent software asset classification for software update validation
US11036615B2 (en) 2018-12-06 2021-06-15 Microsoft Technology Licensing, Llc Automatically performing and evaluating pilot testing of software
CN109788029A (zh) * 2018-12-14 2019-05-21 平安信托有限责任公司 微服务的灰度调用方法、装置、终端及可读存储介质
CN109800017A (zh) * 2018-12-14 2019-05-24 中国平安财产保险股份有限公司 灰度发布方法、装置、计算机设备和存储介质
CN109800017B (zh) * 2018-12-14 2023-08-22 中国平安财产保险股份有限公司 灰度发布方法、装置、计算机设备和存储介质
CN110377327A (zh) * 2019-06-19 2019-10-25 平安普惠企业管理有限公司 生产环境灰度发布监控方法、设备、存储介质及装置
CN110442361A (zh) * 2019-06-27 2019-11-12 五八有限公司 一种灰度发布方法、装置及电子设备
CN110442361B (zh) * 2019-06-27 2024-02-09 五八有限公司 一种灰度发布方法、装置及电子设备
CN110569057A (zh) * 2019-09-12 2019-12-13 北京字节跳动网络技术有限公司 灰度发布方法、装置、电子设备及计算机可读介质
CN110750278A (zh) * 2019-09-24 2020-02-04 苏宁云计算有限公司 灰度发布方法、装置、路由设备和存储介质
CN111090452A (zh) * 2019-11-11 2020-05-01 福建天泉教育科技有限公司 服务环境的切换方法及计算机可读存储介质
CN110958314A (zh) * 2019-11-28 2020-04-03 盛业信息科技服务(深圳)有限公司 服务的灰度发布方法、装置和计算机设备
CN113051126A (zh) * 2019-12-27 2021-06-29 Oppo广东移动通信有限公司 画像构建方法、装置、设备及存储介质
CN113051126B (zh) * 2019-12-27 2022-11-15 Oppo广东移动通信有限公司 画像构建方法、装置、设备及存储介质
CN111314460A (zh) * 2020-02-13 2020-06-19 北京松果电子有限公司 服务迭代方法、服务迭代装置及存储介质
CN111338824A (zh) * 2020-02-27 2020-06-26 中国联合网络通信集团有限公司 灰度发布方法、装置、电子设备及存储介质
CN111338824B (zh) * 2020-02-27 2023-08-15 中国联合网络通信集团有限公司 灰度发布方法、装置、电子设备及存储介质
CN111290779A (zh) * 2020-03-04 2020-06-16 北京三快在线科技有限公司 灰度发布方法、装置、存储介质和电子设备
CN111586095B (zh) * 2020-03-26 2023-09-19 中国平安财产保险股份有限公司 基于微服务灰度发布方法、装置、计算机设备及存储介质
CN111586095A (zh) * 2020-03-26 2020-08-25 中国平安财产保险股份有限公司 基于微服务灰度发布方法、装置、计算机设备及存储介质
CN111723003A (zh) * 2020-05-18 2020-09-29 五八有限公司 一种灰度测试方法、装置、电子设备及存储介质
CN111815401A (zh) * 2020-06-16 2020-10-23 上海悦易网络信息技术有限公司 一种订单流程控制的方法及设备
CN111815401B (zh) * 2020-06-16 2024-02-13 上海万物新生环保科技集团有限公司 一种订单流程控制的方法及设备
CN111737128A (zh) * 2020-06-19 2020-10-02 北京百度网讯科技有限公司 线上测试方法及灰度分流设备、存储介质
CN111736872A (zh) * 2020-06-22 2020-10-02 平安健康保险股份有限公司 灰度发布升级方法、装置、计算机系统及可读存储介质
CN111736872B (zh) * 2020-06-22 2023-07-14 平安健康保险股份有限公司 灰度发布升级方法、装置、计算机系统及可读存储介质
CN111786885B (zh) * 2020-06-23 2022-07-05 中国工商银行股份有限公司 分布式全链路灰度路由方法及装置
CN111786885A (zh) * 2020-06-23 2020-10-16 中国工商银行股份有限公司 分布式全链路灰度路由方法及装置
CN112000348A (zh) * 2020-07-28 2020-11-27 金蝶医疗软件科技有限公司 服务灰度发布的控制方法、装置、计算机设备
CN111897542A (zh) * 2020-08-31 2020-11-06 北京三快在线科技有限公司 一种灰度发布的方法及装置
CN112653579B (zh) * 2020-12-16 2023-05-23 中国人寿保险股份有限公司 一种基于OpenResty的灰度发布方法及相关设备
CN112653579A (zh) * 2020-12-16 2021-04-13 中国人寿保险股份有限公司 一种基于OpenResty的灰度发布方法及相关设备
CN112732274A (zh) * 2021-01-08 2021-04-30 上海汇付数据服务有限公司 基于灰度发布的容器应用发布方法以及管理平台
CN113312257A (zh) * 2021-05-24 2021-08-27 深圳市中科明望通信软件有限公司 版本识别方法、装置、存储介质及计算机设备
CN113312257B (zh) * 2021-05-24 2023-09-22 深圳市中科明望通信软件有限公司 版本识别方法、装置、存储介质及计算机设备
CN114356401A (zh) * 2022-01-12 2022-04-15 江苏安超云软件有限公司 灰度发布方法、装置、电子设备及计算机可读存储介质
CN114385515A (zh) * 2022-03-24 2022-04-22 凯泰铭科技(北京)有限公司 保险运营平台的灰度发布方法、系统、装置

Also Published As

Publication number Publication date
CN106648562B (zh) 2020-04-21
CN106648562A (zh) 2017-05-10

Similar Documents

Publication Publication Date Title
WO2017071425A1 (zh) 版本更新方法及装置
US11553301B2 (en) Systems and methods for deploying dynamic geofences based on content consumption levels in a geographic location
US9935847B2 (en) Dynamic grouping of managed devices
TWI640922B (zh) Method and device for providing application information in mobile terminal devices
US8694579B2 (en) Enterprise network system for programmable electronic displays
US20180189755A1 (en) Providing blockchain-based subscription-as-a-service management
US20210312498A1 (en) Systems and methods for optimizing message notification timing based on electronic content consumption associated with a geographic location
US9117191B2 (en) Automatic device inventory management for different types of devices
US9229771B2 (en) Cloud bursting and management of cloud-bursted applications
US11477602B2 (en) Systems and methods for optimizing and refining message notification timing
US20140149348A1 (en) Application program management method and apparatus using context information
TW201331877A (zh) 用於客戶裝置之遠端管理的應用程式商店介面
CN104579768A (zh) 客户端升级方法和装置
US9250774B2 (en) User interface push channel
WO2021179517A1 (zh) 小程序处理方法、装置、设备及存储介质
US10437575B2 (en) Aercloud application express and aercloud application express launcher
US11743155B2 (en) Systems and methods of monitoring and controlling remote assets
TW201814609A (zh) 一種資訊推送的方法和系統及用戶端和伺服器
WO2016110203A1 (zh) 一种文件路径的存储和本地文件的访问方法及装置
EP2979239A1 (en) Unifying cloud services for online sharing
US9717985B2 (en) Fragment-based mobile device application streaming utilizing crowd-sourcing
US9184994B2 (en) Downtime calculator
US11556120B2 (en) Systems and methods for monitoring performance of a building management system via log streams
EP3539075B1 (en) Multi-factor routing system for exchanging business transactions
WO2015149578A1 (en) Method and system for managing an informational site using a social networking application

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16858861

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 26.09.2018)

122 Ep: pct application non-entry in european phase

Ref document number: 16858861

Country of ref document: EP

Kind code of ref document: A1