Method for safely updating application, business server, cluster and storage medium

A server and transfer server technology, applied in the field of big data, can solve the problem of data communication data being tampered with

Active Publication Date: 2020-03-27
中科有讯(北京)科技有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, there is a problem of data tampering in the data communication related to the upgrade

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for safely updating application, business server, cluster and storage medium
  • Method for safely updating application, business server, cluster and storage medium
  • Method for safely updating application, business server, cluster and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0154] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some, not all, embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0155] In some application scenarios, HTTP sessions can be established between servers, and multiple data transmissions can be performed during a single session. For the security of data transmission, the server can encrypt the data transmitted each time. During a single session, the same password (secret key) is used for multiple encryptions. However, since the password and secret key used during a single session remain unchanged, the secret key of the encryption algorithm can be deduced by int...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for safely updating an application, a business server, a cluster and a storage medium. The method comprises the steps that a second application in a transit server sends a second instruction acquisition request to a data collection server; the data collection server takes the second instruction as unencrypted data in response to the second instruction acquisition request, and performs encryption processing based on a double-layer encryption mode to obtain an encryption result corresponding to the second instruction; an encryption result corresponding to the second instruction is sent to the second application, wherein the second instruction comprises at least one of an instruction for downloading update data of the second application, an instruction for updating the second application, an instruction for backing up the second application, an instruction for running the updated second application and an instruction for downloading the update data of thefirst application; and the second application receives an encryption result corresponding to the second instruction and executes the second instruction.

Description

technical field [0001] This application relates to the field of big data technology, and in particular to a method for safely updating applications, a business server, a cluster, and a storage medium. Background technique [0002] In scenarios such as Artificial Intelligence for IT Operations (AIOPS) or application performance monitoring, server clusters can deploy a large number of distributed applications. Here, the distributed application may be, for example, a collection application (such as a probe for monitoring a service server), a data processing application (such as an agent for analyzing data collected by the probe), and the like. Currently, in order to upgrade the collection application, the collection application is usually directly connected to a management server that manages the upgrade package. The collection application can obtain the upgrade package from the management server. In some scenarios, the upgrade packages and instructions between the collection...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/65G06F21/60
CPCG06F8/65G06F21/602
Inventor 张春利杨继进赵耀路学军刘妍杨继臻卢欣彤
Owner 中科有讯(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products