Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software authorization method and system based on cluster deployment

A software authorization and cluster deployment technology, applied in the information field, can solve problems such as high sales cost and long deployment time, and achieve the effects of reducing deployment costs, improving adaptability, and reducing issuance authorization costs

Active Publication Date: 2019-07-05
AEROSPACE INFORMATION
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problems of long release and deployment time and high sales cost of software authorization for cluster deployment existing in the background technology, the present invention provides a method and system for software authorization based on cluster deployment. The master node in the deployment performs regular deployment, and through the communication between the master node and each slave node in the cluster deployment, each slave node copies the master node software configuration parameters, authorization files, etc., and then realizes the software authorization of the entire cluster deployment ; The software authorization method based on cluster deployment includes:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authorization method and system based on cluster deployment
  • Software authorization method and system based on cluster deployment
  • Software authorization method and system based on cluster deployment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Exemplary embodiments of the present invention will now be described with reference to the drawings; however, the present invention may be embodied in many different forms and are not limited to the embodiments described herein, which are provided for the purpose of exhaustively and completely disclosing the present invention. invention and fully convey the scope of the invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings do not limit the present invention. In the figures, the same units / elements are given the same reference numerals.

[0033] Unless otherwise specified, the terms (including scientific and technical terms) used herein have the commonly understood meanings to those skilled in the art. In addition, it can be understood that terms defined by commonly used dictionaries should be understood to have consistent meanings in the context of their related fields, and should not be understood as idealized or over...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software authorization method and system based on cluster deployment. The method comprises the steps of conducting software authorization on a main node; configuring an information configuration item and an authorization file which are the same as those of the master node for the slave node; acquiring program encryption strings of the master node and the slave node, comparing items in the two program encryption strings one by one, and if comparison is consistent, normally starting software authorization at the slave node, wherein the system comprises an authorizationunit, a slave node configuration unit, a program encryption string acquisition unit and a comparison unit, using the authorization unit for carrying out software authorization on the main node; usingthe slave node configuration unit for configuring an information configuration item and an authorization file which are the same as those of the master node for the slave node; using the program encryption string obtaining unit for obtaining program encryption strings of a master node and a slave node; using the comparison unit for comparing whether the two program encryption strings are consistent or not; according to the method and the system, the issuing deployment cost of the cluster environment is reduced, and the flexibility of software is improved.

Description

technical field [0001] The present invention relates to the field of information technology, and more specifically, to a software authorization method and system based on cluster deployment. Background technique [0002] Informatization has become an indispensable part of an enterprise, and all aspects of production, sales, and service are based on information systems. Moreover, the larger the enterprise, the higher the availability and performance of the software used in its informatization. According to the traditional method, adding memory and CPU processing speed to the server can no longer meet the requirements of availability, business volume and concurrency. In order to enable software to meet the high availability and high concurrency requirements of enterprises, cluster technology emerged as the times require. Through cluster deployment, the scalability and high availability of applications can be increased. If the current cluster can no longer meet the concurren...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F8/60H04L29/08H04L9/32
CPCG06F8/60G06F21/121H04L9/3247H04L67/1044
Inventor 曹召换秦占明王奎杰赵雪芹
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products