CN108833514A - Audit log processing method, device and Log Audit System based on block chain - Google Patents
Audit log processing method, device and Log Audit System based on block chain Download PDFInfo
- Publication number
- CN108833514A CN108833514A CN201810559010.7A CN201810559010A CN108833514A CN 108833514 A CN108833514 A CN 108833514A CN 201810559010 A CN201810559010 A CN 201810559010A CN 108833514 A CN108833514 A CN 108833514A
- Authority
- CN
- China
- Prior art keywords
- log
- audit
- audit log
- block chain
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Debugging And Monitoring (AREA)
Abstract
The invention discloses audit log processing method, device and the Log Audit Systems based on block chain in a kind of log audit server.The audit log processing method includes:Receive the audit log from one or more application;And the first request of storage audit log is sent to the block catenary system for including block chain network, so that audit log is stored in the block chain created by block chain network by the node in block chain network.By means of the present invention, the store function of audit log can be realized using the intelligent contract run on block chain, so as to be ensured that audit log can resist attack, can not distort by means of advantage specific to block chain technology, and then ensure its Information Security and accuracy.
Description
Technical field
The present invention relates to block chain fields, it particularly relates to a kind of audit log processing method based on block chain, dress
It sets and Log Audit System.
Background technique
The audit of system log refers to all behaviors by being occurred in acquisition information system, to spies such as safety, risks
Determine scene and special record is provided, for the safety of systems analyst's assessment system, integrality, reliability and consistency.Day
The content of will generally comprises following element:Whose (Who) at what time (When) on what system (Where) to specific
Resource has done any operation (What).For example, user Zhang San has approved number on financial system on December 1st, 2017 is
20171201001 financial approval entry.Analyzing these audit logs can help to have permission the system for checking audit log point
Analysis personnel have found illegal operation of the user to system, to identify some security risks.
For banking and insurance business industry, the audit log of system often relates to treasury trade and operation, therefore audits day
The storage of will is particularly important.For example,《(tentative) is guided in insurance company's information system security management》In the 43rd and four
With regard to clear stipulaties in 14:According to the requirement of internal control and audit, information system correlation log is saved, and takes and suitably arranges
Applying ensures that log content is not deleted, modifies or covers;It audits to host system, is examined even if properly managing and analyzing processing
Meter record, should carry out focal point auditing to use of important user behavior, abnormal operation and important system order etc..
The storage of traditional audit log is log to be fallen into system file or database, schedule backup.But with black
Objective activity be becoming increasingly rampant with it is hidden, there is also the possibility attacked and distorted for traditional Log Audit System itself.In addition, although
Traditional log audit is usually executed by the user with permission, but these users for possessing permission still can modify audit
Journal file not can guarantee can not distorting for audit log so yet.
Block chain (Block Chain) technology is a kind of equity (peer-to-peer) network based on decentralization,
Cryptography Principles are combined with common recognition mechanism, the data to ensure distributed each node are coherent and continue, realize information i.e.
When verifying, traceable, difficulty distort and can not shield, thus create a set of privacy, efficiently, the shareable value system of safety.Area
This decentralization of block chain, come into the open, the characteristic of transparence exactly stores characteristic required for audit log, therefore, can be with
Block chain technology is applied to Log Audit System, to solve the disadvantages mentioned above of traditional Log Audit System.
Summary of the invention
The shortcomings that can not distorting of audit log, this hair are not can guarantee in view of above-mentioned traditional Log Audit System
Audit log can be simply and reliablely stored on block chain by the bright one kind that provides using the advantages of block catenary system itself
And the scheme of audit log is read from block chain as needed.
The first aspect of the present invention provides the audit log processing based on block chain in a kind of log audit server
Method, the method includes:Receive the audit log from one or more application;And to the block including block chain network
Catenary system sends the first request for storing the audit log, so that the node in the block chain network is by the audit day
Will is stored in the block chain by block chain network creation.
The second aspect of the present invention provides the audit log processing method in a kind of block catenary system, the block linkwork
System includes block chain network, the method includes:Receive the first request of the storage audit log from log audit server;
And the audit log is stored in the block chain by block chain network creation based on first request.
The third aspect of the present invention provides the audit log processing based on block chain in a kind of log audit server
Device, described device include:Logger module receives the audit log from one or more application;And chain interaction
Module sends the first request for storing the audit log to the block catenary system for including block chain network, so that described
The audit log is stored in the block chain by block chain network creation by the node in block chain network.
The fourth aspect of the present invention provides the audit log processing unit in a kind of block catenary system, the block linkwork
System includes block chain network, and described device includes:Interface module receives the storage audit log from log audit server
First request;And log processing module, the audit log is stored in by the block based on first request
In the block chain of chain network creation.
The fifth aspect of the present invention provides a kind of Log Audit System based on block chain, including:First audit log
Processing unit, the first audit log processing unit are located in audit log server, and including:Logger module,
It receives the audit log from one or more application;And chain interactive module, it is communicatively coupled with logger module, and
The first request for storing the audit log is sent to the block catenary system for including block chain network;Second audit log processing dress
It sets, the second audit log processing device is located in the block catenary system, and including:Interface module, with the chain
Interactive module is communicatively coupled, and receives first request of the storage audit log from the chain interactive module;With
And log processing module, it is communicatively coupled with the interface module, and stored the audit log based on first request
In the block chain created by the block chain network.
The sixth aspect of the present invention provides a kind of log audit server, including:Processor;And storage equipment, institute
Stating storage equipment includes the computer instruction being stored thereon, the computer instruction when being executed by the processor so that
The processor executes following operation:Receive the audit log from one or more application;And to including block chain network
Block catenary system send the first request for storing the audit log so that the node in the block chain network will be described
Audit log is stored in the block chain by block chain network creation.
The seventh aspect of the present invention provides a kind of block catenary system, and the block catenary system includes block chain network, institute
Stating block catenary system includes:Processor;And storage equipment, the storage equipment includes the computer instruction being stored thereon,
The computer instruction by the processor when being executed, so that the processor executes following operation:It receives and is examined from log
Count the first request of the storage audit log of server;And the audit log is stored in and is created by the block chain network
Block chain in.
Finally, the eighth aspect of the present invention and the 9th aspect each provide a kind of computer readable storage medium, wrap
The computer instruction being stored thereon is included, the computer instruction is when being executed by processor, so that the processor executes sheet
The method of the first aspect and second aspect of invention.
By means of in log audit server provided by the present invention based on the audit log processing method of block chain, area
The audit log processing unit based on block chain in audit log processing method, log audit server in block catenary system,
Audit log processing unit, Log Audit System in block catenary system, log audit server, block catenary system, Yi Jixiang
The computer-readable medium answered can realize the store function of audit log using the intelligent contract run on block chain, from
And it can be ensured that audit log can resist attack, can not distort by means of advantage specific to block chain technology, and then really
Protect its Information Security and accuracy.
Detailed description of the invention
Fig. 1 shows the design synoptic chart according to the Log Audit System of one embodiment;
Fig. 2 shows according to the audit log processing side based on block chain in the log audit server of one embodiment
Method;
Fig. 3 shows the audit log processing method in the block catenary system according to one embodiment;
Fig. 4 shows what being stored in audit log in the audit log processing method of Fig. 3 was created by block chain network
Step in block chain;And
Fig. 5 shows the first audit log processing unit and block in the log audit server according to one embodiment
The block diagram of the second audit log processing device in catenary system.
Specific embodiment
Carry out technical solution in the embodiment of the present invention progress clearly below in conjunction with the attached drawing of one embodiment of the present of invention
Chu, complete description.Described embodiment is only a part of the embodiments of the present invention, instead of all the embodiments.Base
In the embodiment of the present invention, those of ordinary skill in the art without making creative work it is obtained it is all its
Its embodiment, shall fall within the protection scope of the present invention.
Fig. 1 shows the design synoptic chart of the Log Audit System 100 according to one embodiment.Using 14, using 15, answer
It is different application with 16 etc., for example, can be respectively core insurance system, financial system etc., in the user's operation of these applications
These are in application, the computer where application can automatically be stored the user behavior of application in the form of log, so as to day
Audit is transferred afterwards.These audit logs are stored in from traditionally it is different in local computer or database, in the present invention
In devise log audit server 11 as storage log medium.As shown in figure 1 it can be seen that, log audit server
11 are communicatively coupled with application 14, using 15, using 16 etc., these, which are applied, can be located on identical/different computer on hardware.
3 applications are illustrated only in Fig. 1, however, it is understood by those of ordinary skill in the art that, in other embodiments, log audit clothes
Business device 11 can be communicatively coupled with any number of application.In the present embodiment, log audit server 11 has
RestAPI interface, will by calling RestAPI interface after doing HMAC signature using log content of the 14-16 to user behavior
Audit log active push after signature is to log audit server 11.Since different applications often has different log lattice
Formula, therefore in order to carry out unification to journal format, in the present embodiment, unified standard interface respectively is called using 14-16, thus
Audit log can be pushed to log audit server 11 according to unified format.In the present embodiment, audit log is interior
It is as follows to hold format:App=% (app) s&creator=% (creator) s&creator_ip=% (creator_ip) s&op
=% (op) s&re src=% (resrc) s&result=% (result) s×tamp=% (timestamp) d,
In, the primary fields of audit log include:
A) creator, user's unique designation (ID) of application system, only receives ascii character set, non-Chinese;
B) creator_ip triggers the User IP of log recording;
C) app, the application system of log ownership, the i.e. application name of access log audit server and access token are one by one
It is corresponding;
D) op, audit movement;
E) resrc, audit act on resource in the unique designation (ID) of application system, only receive ascii character set,
Non- Chinese;
F) resrc_desc, resource description;
G) result of result, user's operation are success or failure, and are defaulted successfully;
H) timestamp, timestamp, calculate the signature are used;
I) sig, log signature, application system make HMAC signature to log content.
In other embodiments, the audit log of other content formats can be used.In addition, use in the present embodiment
It is using 14-16 by calling RestAPI interface to give audit log active push to log audit server, however other
In embodiment, log audit server 11 can also actively receive audit log from using 14-16, or can even pass through hand
Dynamic operation will be transmitted to log audit server 11 using the audit log of 14-16.It can be by all audit days using 14-16
Will is all pushed to log audit server, alternatively, can be configured to the type of the audit log pushed, only by emphasis row
Log audit server is pushed to for, the relevant audit log of important scenes.In addition, can also be according to from day using 14-16
Audit log corresponding with instruction is pushed to log audit server 11 by the instruction of will audit server 11.
In the present embodiment, log audit server 11 receives carry out the audit log of self-application 14-16 after, first to examine
It counts log and carries out signature verification, to determine the audit log actually from application 14-16 (without being intercepted by external illegal program
And be modified).Then, audit log is stored in the log in log audit server 11 by 11 one side of log audit server
In library 110;On the other hand, audit log is sent to the block catenary system 12 communicated to connect with log audit server 11, with
So that audit log is stored on the block chain of the creation of block chain network 121 included in block catenary system 12.In this implementation
In example, block catenary system 12 is to pacify science and technology by crowd to release " peace chain cloud ", provides the service of block chain network for enterprise, thus
Enterprise does not need the various technical details of concern block chain network, and only needs to pay close attention to what oneself was carried out in block chain network
Business.In other embodiments, block chain network 121 can be any other block chain, as long as belonging to contract chain.
Block chain network 121 is diagrammatically illustrated in Fig. 1 to be made of three nodes 1211,1212 and 1213, but art technology
Personnel should be appreciated that a block chain network can be made of two nodes or more than three nodes.Block catenary system 12
Also it can return to whether audit log is successfully stored the response message on block chain to log audit server 11.Log audit
After server 11 receives the response message, for the audit log that success stores, the corresponding audit log in log library 110
Cochain pass flag is made at entry.In other embodiments, it can also be not provided with log library 110, but only by audit log
It is stored on the block chain of the creation of block chain network 121.
Audit user 13 be audit movement user and the client of log audit server 11.Audit user
13 points are two classes:Administrator and ordinary user, administrator are the administrators of auditing system, he can also audit all applications examine
Count log.The groundwork of administrator have creation access log audit server 11 application (for application create access key with
Secret), the permission of the audit log of distributing user access application creates and safeguards that necessary audit action lists are (such as fixed
Adopted series of standards movement:Creation, access, update, deletion etc.).And common log audit user may only check administrator
The audit log of the application of distribution.
When the user 13 that audits audits to audit log, user 13 is audited first from log audit server 11
Inquiry log list in log library 110 can pass through the filter conditions such as inputting date, keyword, Apply Names, action behavior
To position specific log.If the entry of the audit log of inquiry has cochain pass flag, illustrate the audit of the entry
Chain audit operation is supported in log.Next, log audit server 11 can also according to audit user 13 inquiry request come with
Block catenary system 12 communicates, and extracts audit log from the block chain that block chain network 121 creates.User 13 audit by by day
Will audit server 11 return the audit log being stored in log library 110 and the audit log being stored on block chain into
Row compares, so that it may which whether the data for verifying audit log are tampered.Audit log in log library 110 and it is stored in block
In the case that the data of audit log on chain are inconsistent, illustrate that the record in log library 110 has the possibility that is tampered, then this
When be subject to the audit log being stored on block chain and audit operation.
In other embodiments, log audit server 11 can not also include log library 110, can be received by institute
The audit log for carrying out self-application 14-16 is directly stored via communicating with block catenary system 12 onto block chain, as audit user
13 when needing to audit to audit log, reads the number of audit log directly from block chain via log audit server 11
According to.
Next how audit log is stored in log library 110 and block chain by detailed description log audit server 11
On the block chain that network 121 creates and how to read in log library 110 and the audit log of the storage on block chain.Fig. 2 shows
The audit log processing method based on block chain in the log audit server 11 according to one embodiment is gone out, wherein empty
Wire frame representation can choose the step of execution.From figure 2 it can be seen that the method 200 in Fig. 2 includes the following steps:
Firstly, in step s 201, receiving the audit log from one or more application.As described above, it audits
Log can be by application 14-16 via calling RestAPI interface come active push to log audit server 11, can also be by day
11 active of will audit server is received from application 14-16.
Next, the audit log received is stored in log library in step S202.This is an optional step
Suddenly, that is to say, that the audit log received may not necessarily be stored in log library.But audit log is stored in log
More preferably, this is because can first be transferred from log library to be checked when the user that audits needs to inquire audit log in library
Audit log audit, and in case of need, for example need to verify correctness to certain log recording, audit user
Instruction just is sent to log audit server 11 to transfer another copy record of the audit log from block chain.In this way, whole
The speed of a system can get a promotion.
In step S203, the first request of storage audit log is sent to the block catenary system for including block chain network.
Specifically, the standard interface for calling the audit log intelligence contract of block chain, so that the node in block chain network will be examined
It counts log and audit log intelligence contract is written.The characteristics of intelligent contract of contract chain is utilized in this step is by audit log
Data be stored on block chain.
Above step has been completed that the storage to the audit log of application operates.
Next, this method receives the second request from the user in step S204, the second request includes audit log
Inquiry request, including characteristic information associated with audit log to be checked.Specifically, it is examined when audit user needs to inquire
Log is counted the second request can be sent to log audit server 11, correspondingly, in log audit server 11 when being audited
Side receives the second request from the user.The request may include audit log inquiry request and user information, wherein auditing
Log query request may include characteristic information associated with audit log to be checked, such as user inputs in client
The characteristic informations such as keyword, date, Apply Names, action behavior.
In step S204, although being not shown in Fig. 2, the second request can also include user information, such as the ID of user
Equal identification informations are also analyzed user information, after receiving the second request including user information to determine user
Search access right.That is, dividing on the basis of having been allocated for access privilege the user information received
Analysis, it can be determined that whether user has permission to access audit log to be checked.After determining that user has permission, just carry out down
The step 205 in face.
Step S205 is corresponding with step S202 and an optional step.After receiving the second request of user,
In step S205, audit log to be checked is read from log library based on characteristic information.For example, according to keyword, the date,
The characteristic informations such as Apply Names, action behavior position specific log recording in log library.
In step S206, audit log to be checked is also read from block chain based on characteristic information.Specifically,
The standard interface that audit log intelligence contract is called based on the relevant characteristic information of audit log, from audit log intelligence
The audit log is inquired in block chain where contract.
In addition, this method can also comprise the steps of although being not shown in Fig. 2:
After receiving audit log in step s 201, to the signature in audit log (as described referring to Fig.1 above
, signed by application) it is verified.In this way, determining that the audit log is true log recording.Also, to signature
Verification pass through in the case where, just carry out step S202 and step S203.
In addition, can also receive indicates whether audit log is successfully stored in block chain after step S203
Response message.If the response message instruction audit log received is successfully stored in block chain, right in log library
Corresponding Audit Journal entries make cochain pass flag.
The foregoing describe the audit log processing methods based on block chain in log audit server 11.Next turn
The audit log processing method 300 in the block catenary system according to one embodiment is shown to Fig. 3 and Fig. 4, Fig. 3, Fig. 4 is shown
The step that is stored in audit log in the block chain created by block chain network in the audit log processing method of Fig. 3
400.As can see in Fig. 3, the method in Fig. 3 includes the following steps:
In step S301, the first request of the storage audit log from log audit server 11 is received.The step
Corresponding to the step S203 in Fig. 2.Then, in step s 302, audit log is stored in by block chain based on the first request
In the block chain of network creation.
As shown in Figure 4, step S302 specifically includes following steps:
In step S3021, log intelligence contract of auditing at the node in block chain network, by audit log
Audit log intelligence contract is written.Wherein, the intelligent contract of audit log is defined in system initialization, and in block chain
In each node at disposed or installed.Therefore after the standard interface of called audit log intelligence contract, audit log
Intelligent contract is performed.In step S3022, audit log intelligence contract is broadcasted in a manner of block to area at the node
Other nodes in block chain network.Herein, multiple intelligent contracts can be collected into the cache pool at node and is packaged into area
Block.When other nodes in block chain network receive the block, each node executes common recognition algorithm, in the feelings reached common understanding
Under condition, step S3023 is executed, block is added in the block chain for each node in block chain network, thus will examine
Meter log is stored in block chain.That is, the data of the audit log are distributed and store the institute in block chain network
Have on node, thus ensures the safety and reliability of storage.
Fig. 3 is returned to, if the request of the inquiry audit log from log audit server 11 is received, in step
In S303, examined based on characteristic information associated with audit log to be checked included in request to be read from block chain
Count log.Specifically, it is audited based on characteristic information associated with audit log to be checked log intelligence contract,
To read audit log to be checked from block chain.
In addition, this method can also comprise the steps of although being not shown in Fig. 3:
After the first request that step S301 receives the storage audit log from log audit server, also to log
The private key of the user of audit server is verified, to determine that user has the permission being stored in audit log in block chain.
In the case where being verified, just audit log is stored in block chain to private key.Audit log is deposited in step S302
After storage is in the block chain created by block chain network, also send whether audit log is successfully deposited to audit log server
Store up the response message in block chain, that is, the response message for the cochain that whether succeeds.
The log audit server 11 in Fig. 1 is described referring next to Fig. 5 and the realization in block catenary system 12 is above-mentioned
The modules of method.As shown in Figure 5, in the present embodiment, log audit server 11 includes at the first audit log
Manage device 51.It includes logger module 510, is communicatively coupled with application 14-16, carrys out examining for self-application 14-16 to receive
Count log.In certain embodiments, logger module 510 can sign the HMAC made using 14-16 in audit log
Name is verified, to confirm that audit log is true.First audit log processing unit 51 further includes and logger module
The 510 chain interactive modules 511 being communicatively coupled, the interface mould with the second audit log processing device 52 in block catenary system 12
Block 521 is communicatively coupled, to send the first request of storage audit log to the block catenary system 12 for including block chain network, with
So that audit log is stored in the block chain created by block chain network by the node in block chain network.Specifically, chain
Interactive module 511 calls the standard interface of the audit log intelligence contract of block chain, so that the node in block chain network will
Audit log intelligence contract is written in audit log, thus by being stored in block chain in node broadcasts to block chain network.This
Outside, logger module 510 is also communicatively coupled (being not shown in Fig. 5) with log library, so that the audit log received is stored
In log library.In certain embodiments, chain interactive module 511 also receives the audit from the second audit log processing device 52
Whether log is successfully stored the response message in block chain, and returns it into logger module 510, if audit log
It is successfully stored in block chain, then cochain is made by entry of the logger module 510 to the audit log in log library
Pass flag.In other embodiments, in the case where being not provided with log library, logger module 510 will not be with log library
It is communicatively coupled.
In addition, the first audit log processing unit 51 further includes user interactive module 512, the client with audit user 13
End and logger module 510 are communicatively coupled, for receives from audit user 13 including audit log inquiry request
Second request, audit log inquiry request includes characteristic information associated with audit log to be checked, for example, keyword,
Date, Apply Names, action behavior etc..In the present embodiment, the first audit log processing unit 51 further includes user configuration mould
Block 513 is used to configure user right, such as can distribute the audit for checking different application to different grades of audit user 13
The permission of log.After receiving the second request, the second request is sent to user configuration module 513 by user interactive module 512,
User configuration module 513 analyzes user information (such as the identification informations such as User ID) included in the second request, with
Determine the search access right of user.User configuration module 513 determine user to audit log to be checked have search access right it
Afterwards, user interactive module 512 is returned result to, the second request of the user is sent to log and remembered by user interactive module 512
Record module 510.
In the present embodiment be arranged log library 110 in the case where, 510 one side of logger module according to characteristic information come
Audit log to be checked is read from log library 110, and second request is on the other hand sent to chain interactive module 511, chain
Interactive module 511 calls the standard interface of the audit log intelligence contract of block chain based on characteristic information, thus from block chain
It is middle to read audit log to be checked, and the audit log inquired is sent to logger module 510, by log recording mould
Block 510 is examined what is inquired from the audit log (if log library is arranged) inquired in log library and from block chain
Meter log is sent respectively to user interactive module 512, and returns to audit user 13, at this point, audit user 13 can be to careful
Meter log compares and/or audits.
In the present embodiment, the block catenary system 12 in Fig. 1 includes the second audit log processing device 52 comprising with the
The interface module 521 and lead to interface module 521 that chain interactive module 511 in one audit log processing device 51 is communicatively coupled
Believe the log processing module 522 of coupling.Interface module 521 receives the storage from the first audit log processing unit 51 and audits day
First request of will, and send it to log processing module 522.Log processing module 522 will then be examined based on the first request
Meter log is stored in the block chain created by block chain network.Specifically, interface module 521 is receiving chain interactive module
After the call request of the standard interface of the 511 calling audit log intelligence contracts sent, log processing module is forwarded it to
522, log processing module 522 is audited log intelligence contract at the node in block chain network, and audit log is write
Enter audit log intelligence contract, broadcasts audit log intelligence contract into block chain network in a manner of block at node
Other nodes, and block is added in the block chain for each node in block chain network, thus by audit log
It is stored on each distributed node of block chain network.In certain embodiments, interface module 521 is also to log audit service
The private key of the user of device is verified, to determine that user has the permission being stored in audit log in block chain.To private key
Be verified in the case where, just audit log is stored in block chain.In certain embodiments, log processing module 522
Also send whether audit log is successfully stored the response message in block chain to interface module 521, interface module 521 should
Response message returns to chain interactive module 511.
In addition, interface module 521, which receives, comes from chain interactive module 511 when the user 13 that audits needs to inquire audit log
Call request, and be transmitted to log processing module 522, log processing module 522 based on include in call request with it is to be checked
The associated characteristic information of the audit log of inquiry is come log intelligence contract of auditing, to read to be checked examine from block chain
Log is counted, and read audit log is returned into chain interactive module 511 via interface module 521.
The foregoing describe the audit log processing methods and log audit in log audit server and block catenary system
The first audit log processing unit in server and the second audit log processing device in block catenary system.In addition, another
In one side, the invention proposes a kind of Log Audit Systems based on block chain, including:First audit log processing unit,
First audit log processing unit is located in audit log server, and including:Logger module receives and comes from one
Or the audit log of multiple applications;And chain interactive module, it is communicatively coupled with logger module, and to including block link network
The block catenary system of network sends the first request for storing the audit log;Second audit log processing device, the second audit day
Will processing unit is located in block catenary system, and including:Interface module is communicatively coupled with chain interactive module, and receives and
From the first request of the storage audit log of chain interactive module;And log processing module, it is communicatively coupled with interface module, and
Audit log is stored in the block chain created by block chain network based on the first request.
In another aspect, the invention also provides a kind of log audit servers, including processor;And storage is set
Standby, storage equipment includes the computer instruction being stored thereon, and computer instruction is when being executed by processor, so that processor is held
The following operation of row:Receive the audit log from one or more application;And to the block catenary system including block chain network
The first request for sending storage audit log, so that audit log is stored in by block link network by the node in block chain network
In the block chain of network creation.
In another aspect, the invention also provides a kind of block catenary system, block catenary system includes block chain network, area
Block catenary system includes processor;And storage equipment, storage equipment includes the computer instruction being stored thereon, computer instruction
When being executed by processor, so that processor executes following operation:Receive the storage audit log from log audit server
First request;And audit log is stored in the block chain created by block chain network.
In another aspect, the invention also provides a kind of computer readable storage mediums, including the meter being stored thereon
Calculation machine instruction, computer instruction when being executed by processor so that in processor execution journal audit server based on block
The audit log processing method of chain.
In another aspect, the invention also provides a kind of computer readable storage mediums, including the meter being stored thereon
The instruction of calculation machine, computer instruction is when being executed by processor, so that processor executes the audit log processing in block catenary system
Method.
It is compared with traditional log audit method with auditing system, at the audit log proposed by the present invention based on block chain
Reason method has the following advantages that:The solution of the present invention is simple and convenient, can direct can not usurp using block chain distributed storage
Change, securely and reliably, the characteristics such as can trace to the source, audit log is stored in block chain, to guarantee that the safety of audit log can
By storage, solves the disadvantage that traditional Log Audit System.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be by computer program instructions and/or hardware device come implementation flow chart
And/or process and/or box in each of block diagram flowchart and or block diagram and flowchart and or block diagram.It calculates
Machine program can be stored in visible computer readable medium, for example, CD-ROM, floppy disk, hard disk, digital versatile disc (DVD),
The storage equipment of Blu-ray Disc or other forms.Information can store any time on readable medium.It is appreciated that the calculating
Machine readable instruction can also be stored in network server, on the platform of cloud, in order to user's use.Alternatively, with hardware
Circuit realize embodiment in, hardware circuit be, for example, field programmable gate array (FPGA), specific integrated circuit (ASIC), can
Any group of programmed logic device (PLD), field programmable logic device (EPLD), discrete logic unit, hardware, firmware etc.
It closes to realize.Although the operation in flowchart and or block diagram is described with particular order, this and should not be construed require it is such
Operation is completed with shown particular order or with sequential order, or executes the operation of all diagrams to obtain expected result.
In some cases, multitask or parallel processing can be beneficial.
" embodiment ", " one embodiment ", " some embodiments " or " other embodiments " is referred in the present specification
Indicate that in conjunction with the embodiments described special characteristic, structure or characteristic are included at least some of embodiment, and not necessarily
It is in all embodiments.Each appearance of " embodiment ", " one embodiment " or " some embodiments " not all necessarily refers to
Identical embodiment.If specification statement " possibility ", " can " or " can with " include component, feature, structure or characteristic,
The specific components, feature, structure or characteristic do not require that.If specification or claims refer to " one " or " one
It is a " element, then it is not offered as that there is only one in element.If specification or claims refer to " multiple " element,
It can indicate the element of " two " and " two or more ".Similarly, although foregoing description contains certain specific implementation details,
But this simultaneously should not be construed as limiting any the scope of the claims, and should be interpreted that the particular implementation that can be directed to specific invention
The description of example.The certain features described in different embodiments in this specification also may be integrally incorporated in single embodiment.Conversely,
The various features described in the context of single embodiment can also be discretely in multiple embodiments or suitable group any
Implement in conjunction.
Claims (34)
1. the audit log processing method based on block chain in a kind of log audit server, the method includes:
Receive the audit log from one or more application;And
The first request for storing the audit log is sent to the block catenary system for including block chain network, so that the block
The audit log is stored in the block chain by block chain network creation by the node in chain network.
2. audit log processing method according to claim 1, wherein sent out to the block catenary system for including block chain network
The first request for sending the storage audit log includes:The standard interface of the audit log intelligence contract of the block chain is called,
So that the audit log intelligence contract is written in the audit log by the node in the block chain network.
3. audit log processing method according to claim 2, further includes:
The second request from the user is received, second request includes audit log inquiry request, the audit log inquiry
Request includes characteristic information associated with audit log to be checked;And
The standard interface of the audit log intelligence contract is called, based on the characteristic information to read from the block chain
The audit log to be checked.
4. audit log processing method according to claim 1, further includes:
The audit log is stored in log library;
The second request from the user is received, second request includes audit log inquiry request, the audit log inquiry
Request includes characteristic information associated with audit log to be checked;And
The audit log to be checked is read from the log library based on the characteristic information.
5. audit log processing method according to claim 3 or 4, wherein second request further includes user information,
The method also includes:
The user information is analyzed, with the search access right of the determination user.
6. audit log processing method according to claim 1, further includes:
After receiving the audit log, the signature in the audit log is verified;And
In the case where the verification to the signature passes through, first request is sent to the block catenary system.
7. audit log processing method according to claim 1, further includes:
Receiving indicates whether the audit log is successfully stored the response message in the block chain.
8. the audit log processing method in a kind of block catenary system, the block catenary system includes block chain network, the side
Method includes:
Receive the first request of the storage audit log from log audit server;And
The audit log is stored in the block chain by block chain network creation based on first request.
9. audit log processing method according to claim 8, wherein request based on described first by the audit log
It is stored in the block chain by block chain network creation and includes:
It audits at the node in the block chain network log intelligence contract, examines audit log write-in is described
Count log intelligence contract;
The audit log intelligence contract is broadcasted to its into the block chain network at the node in a manner of block
Its node;And
The block is added in the block chain for each node in the block chain network.
10. audit log processing method according to claim 9, further includes:
It is executed based on the characteristic information associated with audit log to be checked from the log audit server described
Audit log intelligence contract, to read the audit log from the block chain.
11. audit log processing method according to claim 8, further includes:
After the first request for receiving the storage audit log, to the log audit included in first request
The private key of the user of server is verified;And
In the case where being verified, the audit log is stored in the block chain to the private key.
12. audit log processing method according to claim 8, further includes:
The response the letter whether audit log is successfully stored in the block chain is sent to the log audit server
Breath.
13. the audit log processing unit based on block chain in a kind of log audit server, described device include:
Logger module receives the audit log from one or more application;And
Chain interactive module sends the first request for storing the audit log to the block catenary system for including block chain network,
So that the audit log is stored in the area created by the block chain network by the node in the block chain network
In block chain.
14. audit log processing unit according to claim 13, wherein the chain interactive module is to including block link network
The first of the block catenary system transmission storage audit log of network is requested:The chain interactive module calls the block chain
Audit log intelligence contract standard interface so that institute is written in the audit log by node in the block chain network
State audit log intelligence contract.
15. audit log processing unit according to claim 14, further includes:
User interactive module receives the second request from the user, and second request includes audit log inquiry request, institute
Stating audit log inquiry request includes characteristic information associated with audit log to be checked;And wherein
The chain interactive module is also used to call the standard interface of the audit log intelligence contract based on the characteristic information,
To read the audit log to be checked from the block chain.
16. audit log processing unit according to claim 13, wherein the logger module is also used to will be described
Audit log is stored in log library, and the audit log processing unit further includes user interactive module, and reception comes from
User second request, it is described second request include audit log inquiry request, the audit log inquiry request include with to
The associated characteristic information of the audit log of inquiry;And wherein
The logger module is also used to read described to be checked examine from the log library based on the characteristic information
Count log.
17. audit log processing unit according to claim 15 or 16, wherein second request further includes user's letter
Breath, the audit log processing unit further includes user configuration module, is analyzed the user information, described in determination
The search access right of user.
18. the audit log processing unit in a kind of block catenary system, the block catenary system includes block chain network, the dress
Set including:
Interface module receives the first request of the storage audit log from log audit server;And
The audit log is stored in by block chain network creation by log processing module based on first request
In block chain.
19. audit log processing unit according to claim 18, wherein the log processing module is used for:Described
It audits at node in block chain network log intelligence contract, the audit log intelligence is written into the audit log
Contract;The audit log intelligence contract is broadcasted to its into the block chain network at the node in a manner of block
Its node;And the block is added in the block chain for each node in the block chain network.
20. audit log processing unit according to claim 19, wherein the log processing module is also used to based on next
The audit log intelligence is executed from the characteristic information associated with audit log to be checked of the log audit server
Energy contract, to read the audit log from the block chain.
21. a kind of Log Audit System based on block chain, including:
First audit log processing unit, the first audit log processing unit is located in audit log server, and wraps
It includes:
Logger module receives the audit log from one or more application;And
Chain interactive module is communicatively coupled with logger module, and deposits to the block catenary system transmission for including block chain network
Store up the first request of the audit log;
Second audit log processing device, the second audit log processing device is located in the block catenary system, and wraps
It includes:
Interface module is communicatively coupled with the chain interactive module, and it is described careful to receive the storage from the chain interactive module
Count first request of log;And
Log processing module is communicatively coupled with the interface module, and is deposited the audit log based on first request
Storage is in the block chain created by the block chain network.
22. Log Audit System according to claim 21, wherein the chain interactive module is to including block chain network
It includes that the chain interactive module calls examining for the block chain that block catenary system, which sends and stores the first request of the audit log,
The standard interface of log intelligence contract is counted, also, the log processing module executes at the node in the block chain network
The audit log intelligence contract is written in the audit log by audit log intelligence contract, will be described at the node
Audit log intelligence contract broadcasts other nodes into the block chain network in a manner of block, and is directed to the block
The block is added in the block chain each node in chain network.
23. Log Audit System according to claim 21 further includes user interactive module, from the user the is received
Two requests, second request include audit log inquiry request, and the audit log inquiry request includes examining with to be checked
Count the associated characteristic information of log, wherein the chain interactive module calls the audit log based on the characteristic information
The standard interface of intelligent contract, and the log processing module is based on the feature associated with audit log to be checked
Information executes the audit log intelligence contract, to read the audit log from the block chain.
24. Log Audit System according to claim 21, the first audit log processing unit further includes user's friendship
Mutual module, the user interactive module receive the second request from the user, and second request includes that audit log inquiry is asked
It asks, the audit log inquiry request includes characteristic information associated with audit log to be checked, and wherein, the day
The audit log is stored in log library by will logging modle, and is read from the log library based on the characteristic information
The audit log to be checked.
25. a kind of log audit server, including:
Processor;And
Equipment is stored, the storage equipment includes the computer instruction being stored thereon, and the computer instruction is by the place
When managing device execution, so that the processor executes following operation:
Receive the audit log from one or more application;And
The first request for storing the audit log is sent to the block catenary system for including block chain network, so that the block
The audit log is stored in the block chain by block chain network creation by the node in chain network.
26. log audit server according to claim 25, wherein sent out to the block catenary system for including block chain network
The first request for sending the storage audit log includes:The standard interface of the audit log intelligence contract of the block chain is called,
So that the audit log intelligence contract is written in the audit log by the node in the block chain network.
27. log audit server according to claim 26, wherein described instruction by the processor execute when,
The processor is also made to execute following operation:
The second request from the user is received, second request includes audit log inquiry request, the audit log inquiry
Request includes characteristic information associated with audit log to be checked;And
The standard interface of the audit log intelligence contract is called, based on the characteristic information to read from the block chain
The audit log to be checked.
28. log audit server according to claim 25, wherein described instruction by the processor execute when,
The processor is also made to execute following operation:
The audit log is stored in log library;
The second request from the user is received, second request includes audit log inquiry request, the audit log inquiry
Request includes characteristic information associated with audit log to be checked;And
The audit log to be checked is read from the log library based on the characteristic information.
29. the log audit server according to claim 27 or 28, wherein second request is also believed comprising user
Breath, described instruction analyze the processor to the user information, with determination when being executed by the processor
The search access right of the user.
30. a kind of block catenary system, the block catenary system includes block chain network, and the block catenary system includes:
Processor;And
Equipment is stored, the storage equipment includes the computer instruction being stored thereon, and the computer instruction is by the place
When managing device execution, so that the processor executes following operation:
Receive the first request of the storage audit log from log audit server;And
The audit log is stored in the block chain by block chain network creation.
31. block catenary system according to claim 30, wherein being stored in the audit log by the block link network
Network creation block chain in operation include:
It audits at the node in the block chain network log intelligence contract, examines audit log write-in is described
Count log intelligence contract;
The audit log intelligence contract is broadcasted to its into the block chain network at the node in a manner of block
Its node;And
The block is added in the block chain for each node in the block chain network.
32. block catenary system according to claim 31, wherein the computer instruction is executed by the processor
When, also make the processor execute following operation:
It is executed based on the characteristic information associated with audit log to be checked from the log audit server described
Audit log intelligence contract, to read the audit log from the block chain.
33. a kind of computer readable storage medium, including the computer instruction being stored thereon, the computer instruction is being located
When managing device execution, so that the processor perform claim requires method described in any one of 1-7.
34. a kind of computer readable storage medium, including the computer instruction being stored thereon, the computer instruction is being located
When managing device execution, so that the processor perform claim requires method described in any one of 8-12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810559010.7A CN108833514A (en) | 2018-06-01 | 2018-06-01 | Audit log processing method, device and Log Audit System based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810559010.7A CN108833514A (en) | 2018-06-01 | 2018-06-01 | Audit log processing method, device and Log Audit System based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108833514A true CN108833514A (en) | 2018-11-16 |
Family
ID=64146849
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810559010.7A Pending CN108833514A (en) | 2018-06-01 | 2018-06-01 | Audit log processing method, device and Log Audit System based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108833514A (en) |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109656778A (en) * | 2018-11-28 | 2019-04-19 | 金蝶软件(中国)有限公司 | Data capture method, device, computer equipment and storage medium |
CN109815203A (en) * | 2019-02-12 | 2019-05-28 | 山东超越数控电子股份有限公司 | A kind of log audit method and system based on block chain |
CN109815747A (en) * | 2019-01-17 | 2019-05-28 | 重庆金融资产交易所有限责任公司 | Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain |
CN109886037A (en) * | 2019-01-21 | 2019-06-14 | 江汉大学 | A kind of electronic evidence auditing method based on block chain |
CN109977089A (en) * | 2019-03-13 | 2019-07-05 | 深圳壹账通智能科技有限公司 | Blog management method, device, computer equipment and computer readable storage medium |
CN110048828A (en) * | 2019-04-17 | 2019-07-23 | 江苏全链通信息科技有限公司 | Log storing method and system based on data center |
CN110263585A (en) * | 2019-06-26 | 2019-09-20 | 腾讯科技(深圳)有限公司 | Test monitoring and managing method, device, equipment and storage medium |
CN110389861A (en) * | 2019-07-23 | 2019-10-29 | 宿州星尘网络科技有限公司 | Intelligent backup system for audit log |
CN110400223A (en) * | 2019-07-26 | 2019-11-01 | 中国工商银行股份有限公司 | Interactive log based on block chain encrypts, transfers, Anti-theft method, apparatus |
CN110489313A (en) * | 2019-07-04 | 2019-11-22 | 平安科技(深圳)有限公司 | Operation log recording method, device and storage medium based on block chain |
CN111061685A (en) * | 2019-11-21 | 2020-04-24 | 腾讯科技(深圳)有限公司 | Log query method and device, node equipment and storage medium |
CN111092745A (en) * | 2019-10-12 | 2020-05-01 | 深圳壹账通智能科技有限公司 | Log processing method and device based on block chain, computer equipment and storage medium |
CN111143837A (en) * | 2019-12-25 | 2020-05-12 | 天津南大通用数据技术股份有限公司 | Method for storing database security audit record |
CN111490978A (en) * | 2020-03-27 | 2020-08-04 | 武汉大学 | Distributed log auditing system and method based on state channel |
CN111917761A (en) * | 2020-07-28 | 2020-11-10 | 安徽高山科技有限公司 | Data security protection method based on block chain cloud computing |
CN112235243A (en) * | 2020-09-10 | 2021-01-15 | 李文华 | Log audit security platform based on Web application security |
CN112306983A (en) * | 2020-11-18 | 2021-02-02 | 武汉德尔达科技有限公司 | Ship electronic turbine log system and data protection method |
US10936581B2 (en) | 2019-08-30 | 2021-03-02 | Advanced New Technologies Co., Ltd. | Blockchain transaction processing method and apparatus |
WO2021036170A1 (en) * | 2019-08-30 | 2021-03-04 | 创新先进技术有限公司 | Blockchain transaction processing method and apparatus |
CN112448946A (en) * | 2020-11-09 | 2021-03-05 | 北京工业大学 | Log auditing method and device based on block chain |
CN112667748A (en) * | 2021-03-16 | 2021-04-16 | 杭州链城数字科技有限公司 | Block chain all-in-one machine facing audit service, data processing method and device |
CN112732480A (en) * | 2020-12-29 | 2021-04-30 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Database management method, device, equipment and storage medium |
CN113836237A (en) * | 2021-09-30 | 2021-12-24 | 北京中经惠众科技有限公司 | Method and device for auditing data operation of database |
CN114826657A (en) * | 2022-03-10 | 2022-07-29 | 新华三信息安全技术有限公司 | Block chain-based security audit system and audit method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107329884A (en) * | 2017-06-30 | 2017-11-07 | 郑州云海信息技术有限公司 | The access auditing method and system of a kind of storage system |
CN107707410A (en) * | 2017-10-26 | 2018-02-16 | 上海点融信息科技有限责任公司 | Configure method, information processor and the readable storage medium storing program for executing of system audit service |
CN108038389A (en) * | 2017-12-08 | 2018-05-15 | 福建亿榕信息技术有限公司 | Method and device based on the storage e-file audit-trail daily record of block chain |
-
2018
- 2018-06-01 CN CN201810559010.7A patent/CN108833514A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107329884A (en) * | 2017-06-30 | 2017-11-07 | 郑州云海信息技术有限公司 | The access auditing method and system of a kind of storage system |
CN107707410A (en) * | 2017-10-26 | 2018-02-16 | 上海点融信息科技有限责任公司 | Configure method, information processor and the readable storage medium storing program for executing of system audit service |
CN108038389A (en) * | 2017-12-08 | 2018-05-15 | 福建亿榕信息技术有限公司 | Method and device based on the storage e-file audit-trail daily record of block chain |
Non-Patent Citations (1)
Title |
---|
刘敖迪,等: "区块链技术及其在信息安全领域的研究进展", 《软件学报》 * |
Cited By (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109656778A (en) * | 2018-11-28 | 2019-04-19 | 金蝶软件(中国)有限公司 | Data capture method, device, computer equipment and storage medium |
CN109656778B (en) * | 2018-11-28 | 2022-07-12 | 金蝶软件(中国)有限公司 | Data acquisition method and device, computer equipment and storage medium |
CN109815747A (en) * | 2019-01-17 | 2019-05-28 | 重庆金融资产交易所有限责任公司 | Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain |
CN109886037A (en) * | 2019-01-21 | 2019-06-14 | 江汉大学 | A kind of electronic evidence auditing method based on block chain |
CN109886037B (en) * | 2019-01-21 | 2023-06-09 | 江汉大学 | Electronic evidence auditing method based on blockchain |
CN109815203A (en) * | 2019-02-12 | 2019-05-28 | 山东超越数控电子股份有限公司 | A kind of log audit method and system based on block chain |
CN109977089A (en) * | 2019-03-13 | 2019-07-05 | 深圳壹账通智能科技有限公司 | Blog management method, device, computer equipment and computer readable storage medium |
CN110048828A (en) * | 2019-04-17 | 2019-07-23 | 江苏全链通信息科技有限公司 | Log storing method and system based on data center |
CN110826111B (en) * | 2019-06-26 | 2021-08-13 | 腾讯科技(深圳)有限公司 | Test supervision method, device, equipment and storage medium |
CN110263585A (en) * | 2019-06-26 | 2019-09-20 | 腾讯科技(深圳)有限公司 | Test monitoring and managing method, device, equipment and storage medium |
CN110263585B (en) * | 2019-06-26 | 2024-04-26 | 腾讯科技(深圳)有限公司 | Test supervision method, device, equipment and storage medium |
CN110826111A (en) * | 2019-06-26 | 2020-02-21 | 腾讯科技(深圳)有限公司 | Test supervision method, device, equipment and storage medium |
CN110489313B (en) * | 2019-07-04 | 2022-07-19 | 平安科技(深圳)有限公司 | Operation log recording method and device based on block chain and storage medium |
CN110489313A (en) * | 2019-07-04 | 2019-11-22 | 平安科技(深圳)有限公司 | Operation log recording method, device and storage medium based on block chain |
CN110389861A (en) * | 2019-07-23 | 2019-10-29 | 宿州星尘网络科技有限公司 | Intelligent backup system for audit log |
CN110389861B (en) * | 2019-07-23 | 2022-08-19 | 安徽朵朵云网络科技有限公司 | Intelligent backup system for audit logs |
CN110400223A (en) * | 2019-07-26 | 2019-11-01 | 中国工商银行股份有限公司 | Interactive log based on block chain encrypts, transfers, Anti-theft method, apparatus |
CN110400223B (en) * | 2019-07-26 | 2022-05-17 | 中国工商银行股份有限公司 | Block chain-based interactive log encryption, calling and anti-theft method and device |
US10936581B2 (en) | 2019-08-30 | 2021-03-02 | Advanced New Technologies Co., Ltd. | Blockchain transaction processing method and apparatus |
WO2021036170A1 (en) * | 2019-08-30 | 2021-03-04 | 创新先进技术有限公司 | Blockchain transaction processing method and apparatus |
WO2021068488A1 (en) * | 2019-10-12 | 2021-04-15 | 深圳壹账通智能科技有限公司 | Blockchain-based log processing method and apparatus, computer device, and storage medium |
CN111092745A (en) * | 2019-10-12 | 2020-05-01 | 深圳壹账通智能科技有限公司 | Log processing method and device based on block chain, computer equipment and storage medium |
CN111061685B (en) * | 2019-11-21 | 2022-07-22 | 腾讯科技(深圳)有限公司 | Log query method and device, node equipment and storage medium |
CN111061685A (en) * | 2019-11-21 | 2020-04-24 | 腾讯科技(深圳)有限公司 | Log query method and device, node equipment and storage medium |
CN111143837A (en) * | 2019-12-25 | 2020-05-12 | 天津南大通用数据技术股份有限公司 | Method for storing database security audit record |
CN111490978B (en) * | 2020-03-27 | 2021-02-19 | 武汉大学 | Distributed log auditing system and method based on state channel |
CN111490978A (en) * | 2020-03-27 | 2020-08-04 | 武汉大学 | Distributed log auditing system and method based on state channel |
CN111917761A (en) * | 2020-07-28 | 2020-11-10 | 安徽高山科技有限公司 | Data security protection method based on block chain cloud computing |
CN111917761B (en) * | 2020-07-28 | 2022-09-13 | 安徽高山科技有限公司 | Data security protection method based on block chain cloud computing |
CN112235243A (en) * | 2020-09-10 | 2021-01-15 | 李文华 | Log audit security platform based on Web application security |
CN112448946A (en) * | 2020-11-09 | 2021-03-05 | 北京工业大学 | Log auditing method and device based on block chain |
CN112448946B (en) * | 2020-11-09 | 2024-03-19 | 北京工业大学 | Log auditing method and device based on block chain |
CN112306983A (en) * | 2020-11-18 | 2021-02-02 | 武汉德尔达科技有限公司 | Ship electronic turbine log system and data protection method |
CN112306983B (en) * | 2020-11-18 | 2024-04-09 | 武汉德尔达科技有限公司 | Ship electronic turbine log system and data protection method |
CN112732480A (en) * | 2020-12-29 | 2021-04-30 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Database management method, device, equipment and storage medium |
CN112667748B (en) * | 2021-03-16 | 2021-07-13 | 杭州链城数字科技有限公司 | Block chain all-in-one machine facing audit service, data processing method and device |
CN112667748A (en) * | 2021-03-16 | 2021-04-16 | 杭州链城数字科技有限公司 | Block chain all-in-one machine facing audit service, data processing method and device |
CN113836237A (en) * | 2021-09-30 | 2021-12-24 | 北京中经惠众科技有限公司 | Method and device for auditing data operation of database |
CN114826657A (en) * | 2022-03-10 | 2022-07-29 | 新华三信息安全技术有限公司 | Block chain-based security audit system and audit method |
CN114826657B (en) * | 2022-03-10 | 2024-02-09 | 新华三信息安全技术有限公司 | Block chain-based security audit system and audit method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108833514A (en) | Audit log processing method, device and Log Audit System based on block chain | |
Ryu et al. | A blockchain-based decentralized efficient investigation framework for IoT digital forensics | |
US10540264B2 (en) | Computerized method and end-to-end “Pilot as a service” system for controlling start-up/enterprise interactions | |
US20200349281A1 (en) | Dynamic management of data with context-based processing | |
Khan et al. | Cloud log forensics: Foundations, state of the art, and future directions | |
JP2022529967A (en) | Extracting data from the blockchain network | |
US20210112101A1 (en) | Data set and algorithm validation, bias characterization, and valuation | |
CN111598574A (en) | Intelligent service transaction oriented supervision method and supervision interface | |
CN111639914A (en) | Block chain case information management method and device, electronic equipment and storage medium | |
US11507291B2 (en) | Data block-based system and methods for predictive models | |
KR102032780B1 (en) | A management system of country risk indicators and their items using Block Chain for proving their sources | |
TWM555500U (en) | Info-security joint defense system | |
CN111241104A (en) | Operation auditing method and device, electronic equipment and computer-readable storage medium | |
CN111274276A (en) | Operation auditing method and device, electronic equipment and computer-readable storage medium | |
US11888986B2 (en) | Insight generation using personal identifiable information (PII) footprint modeling | |
Barati et al. | Privacy-aware cloud ecosystems and GDPR compliance | |
CN114372098A (en) | Platform and method for protecting and mining power data middling station private data based on privileged account management | |
KR20200063295A (en) | The abcd-type apparatus and method of block chain for management of research funds by using randomized mesh blockchain type verifier module and smart tcv type blockchain mediation module | |
US20200387843A1 (en) | Risk management of processes utilizing personal data | |
CN113672479A (en) | Data sharing method and device and computer equipment | |
US11880372B2 (en) | Distributed metadata definition and storage in a database system for public trust ledger smart contracts | |
Dorigo | Security information and event management | |
Barati et al. | Design and verification of privacy patterns for business process models | |
WO2019106177A1 (en) | Automated logging | |
US11947694B2 (en) | Dynamic virtual honeypot utilizing honey tokens and data masking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181116 |
|
WD01 | Invention patent application deemed withdrawn after publication |