09-01-2020 дата публикации
Номер: US20200012491A1
Автор:
Libei Yang,
Long Lin,
Xianwei Lin,
Haitao Jiang,
Jiandong Su,
YANG LIBEI,
LIN LONG,
LIN XIANWEI,
JIANG HAITAO,
SU JIANDONG,
Yang, Libei,
Lin, Long,
Lin, Xianwei,
Jiang, Haitao,
Su, Jiandong
Принадлежит:
A method of upgrading encryption machine, including: a controller for managing upgrading of encryption machine determines a first encryption machine to be upgraded; the controller transfers the data of the first encryption machine to a second encryption machine; and the controller sends an upgrade command for instructing the first encryption machine to conduct the upgrade to the first encryption machine. The above method solves the problem that in the process of upgrading the encryption machine in the conventional techniques, the operation is extremely complicated, which is easy to cause an operation error and interruption of user service. 1. A method , comprising:determining, by a controller for managing upgrading of encryption machine, a first encryption machine to be upgraded;transferring, by the controller, data of the first encryption machine to a second encryption machine; andsending, by the controller, an upgrade command for instructing the first encryption machine to conduct upgrade, to the first encryption machine.2. The method of further comprising:receiving, by the controller, a result of upgrade operation returned by the first encryption machine.3. The method of claim 1 , wherein transferring by the controller the data of the first encryption machine to the second encryption machine comprises:sending, by the controller, a first data backup command for instructing the first encryption machine to conduct data backup, to the first encryption machine;receiving, by the controller, first data returned by the first encryption machine, the first data being backup data obtained by backing up the data of the first encryption machine;sending, by the controller, a first data import command for instructing the second encryption machine to import the first data, to the second encryption machine; andreceiving, by the controller, an import result regarding the first data returned by the second encryption machine.4. The method of claim 3 , further comprising:storing, by ...
Подробнее