CN108833514A - Audit log processing method, device and Log Audit System based on block chain - Google Patents

Audit log processing method, device and Log Audit System based on block chain Download PDF

Info

Publication number
CN108833514A
CN108833514A CN201810559010.7A CN201810559010A CN108833514A CN 108833514 A CN108833514 A CN 108833514A CN 201810559010 A CN201810559010 A CN 201810559010A CN 108833514 A CN108833514 A CN 108833514A
Authority
CN
China
Prior art keywords
log
audit
audit log
block chain
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810559010.7A
Other languages
Chinese (zh)
Inventor
卢肖
王明博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongan Information Technology Service Co Ltd
Original Assignee
Zhongan Information Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongan Information Technology Service Co Ltd filed Critical Zhongan Information Technology Service Co Ltd
Priority to CN201810559010.7A priority Critical patent/CN108833514A/en
Publication of CN108833514A publication Critical patent/CN108833514A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses audit log processing method, device and the Log Audit Systems based on block chain in a kind of log audit server.The audit log processing method includes:Receive the audit log from one or more application;And the first request of storage audit log is sent to the block catenary system for including block chain network, so that audit log is stored in the block chain created by block chain network by the node in block chain network.By means of the present invention, the store function of audit log can be realized using the intelligent contract run on block chain, so as to be ensured that audit log can resist attack, can not distort by means of advantage specific to block chain technology, and then ensure its Information Security and accuracy.

Description

Audit log processing method, device and Log Audit System based on block chain
Technical field
The present invention relates to block chain fields, it particularly relates to a kind of audit log processing method based on block chain, dress It sets and Log Audit System.
Background technique
The audit of system log refers to all behaviors by being occurred in acquisition information system, to spies such as safety, risks Determine scene and special record is provided, for the safety of systems analyst's assessment system, integrality, reliability and consistency.Day The content of will generally comprises following element:Whose (Who) at what time (When) on what system (Where) to specific Resource has done any operation (What).For example, user Zhang San has approved number on financial system on December 1st, 2017 is 20171201001 financial approval entry.Analyzing these audit logs can help to have permission the system for checking audit log point Analysis personnel have found illegal operation of the user to system, to identify some security risks.
For banking and insurance business industry, the audit log of system often relates to treasury trade and operation, therefore audits day The storage of will is particularly important.For example,《(tentative) is guided in insurance company's information system security management》In the 43rd and four With regard to clear stipulaties in 14:According to the requirement of internal control and audit, information system correlation log is saved, and takes and suitably arranges Applying ensures that log content is not deleted, modifies or covers;It audits to host system, is examined even if properly managing and analyzing processing Meter record, should carry out focal point auditing to use of important user behavior, abnormal operation and important system order etc..
The storage of traditional audit log is log to be fallen into system file or database, schedule backup.But with black Objective activity be becoming increasingly rampant with it is hidden, there is also the possibility attacked and distorted for traditional Log Audit System itself.In addition, although Traditional log audit is usually executed by the user with permission, but these users for possessing permission still can modify audit Journal file not can guarantee can not distorting for audit log so yet.
Block chain (Block Chain) technology is a kind of equity (peer-to-peer) network based on decentralization, Cryptography Principles are combined with common recognition mechanism, the data to ensure distributed each node are coherent and continue, realize information i.e. When verifying, traceable, difficulty distort and can not shield, thus create a set of privacy, efficiently, the shareable value system of safety.Area This decentralization of block chain, come into the open, the characteristic of transparence exactly stores characteristic required for audit log, therefore, can be with Block chain technology is applied to Log Audit System, to solve the disadvantages mentioned above of traditional Log Audit System.
Summary of the invention
The shortcomings that can not distorting of audit log, this hair are not can guarantee in view of above-mentioned traditional Log Audit System Audit log can be simply and reliablely stored on block chain by the bright one kind that provides using the advantages of block catenary system itself And the scheme of audit log is read from block chain as needed.
The first aspect of the present invention provides the audit log processing based on block chain in a kind of log audit server Method, the method includes:Receive the audit log from one or more application;And to the block including block chain network Catenary system sends the first request for storing the audit log, so that the node in the block chain network is by the audit day Will is stored in the block chain by block chain network creation.
The second aspect of the present invention provides the audit log processing method in a kind of block catenary system, the block linkwork System includes block chain network, the method includes:Receive the first request of the storage audit log from log audit server; And the audit log is stored in the block chain by block chain network creation based on first request.
The third aspect of the present invention provides the audit log processing based on block chain in a kind of log audit server Device, described device include:Logger module receives the audit log from one or more application;And chain interaction Module sends the first request for storing the audit log to the block catenary system for including block chain network, so that described The audit log is stored in the block chain by block chain network creation by the node in block chain network.
The fourth aspect of the present invention provides the audit log processing unit in a kind of block catenary system, the block linkwork System includes block chain network, and described device includes:Interface module receives the storage audit log from log audit server First request;And log processing module, the audit log is stored in by the block based on first request In the block chain of chain network creation.
The fifth aspect of the present invention provides a kind of Log Audit System based on block chain, including:First audit log Processing unit, the first audit log processing unit are located in audit log server, and including:Logger module, It receives the audit log from one or more application;And chain interactive module, it is communicatively coupled with logger module, and The first request for storing the audit log is sent to the block catenary system for including block chain network;Second audit log processing dress It sets, the second audit log processing device is located in the block catenary system, and including:Interface module, with the chain Interactive module is communicatively coupled, and receives first request of the storage audit log from the chain interactive module;With And log processing module, it is communicatively coupled with the interface module, and stored the audit log based on first request In the block chain created by the block chain network.
The sixth aspect of the present invention provides a kind of log audit server, including:Processor;And storage equipment, institute Stating storage equipment includes the computer instruction being stored thereon, the computer instruction when being executed by the processor so that The processor executes following operation:Receive the audit log from one or more application;And to including block chain network Block catenary system send the first request for storing the audit log so that the node in the block chain network will be described Audit log is stored in the block chain by block chain network creation.
The seventh aspect of the present invention provides a kind of block catenary system, and the block catenary system includes block chain network, institute Stating block catenary system includes:Processor;And storage equipment, the storage equipment includes the computer instruction being stored thereon, The computer instruction by the processor when being executed, so that the processor executes following operation:It receives and is examined from log Count the first request of the storage audit log of server;And the audit log is stored in and is created by the block chain network Block chain in.
Finally, the eighth aspect of the present invention and the 9th aspect each provide a kind of computer readable storage medium, wrap The computer instruction being stored thereon is included, the computer instruction is when being executed by processor, so that the processor executes sheet The method of the first aspect and second aspect of invention.
By means of in log audit server provided by the present invention based on the audit log processing method of block chain, area The audit log processing unit based on block chain in audit log processing method, log audit server in block catenary system, Audit log processing unit, Log Audit System in block catenary system, log audit server, block catenary system, Yi Jixiang The computer-readable medium answered can realize the store function of audit log using the intelligent contract run on block chain, from And it can be ensured that audit log can resist attack, can not distort by means of advantage specific to block chain technology, and then really Protect its Information Security and accuracy.
Detailed description of the invention
Fig. 1 shows the design synoptic chart according to the Log Audit System of one embodiment;
Fig. 2 shows according to the audit log processing side based on block chain in the log audit server of one embodiment Method;
Fig. 3 shows the audit log processing method in the block catenary system according to one embodiment;
Fig. 4 shows what being stored in audit log in the audit log processing method of Fig. 3 was created by block chain network Step in block chain;And
Fig. 5 shows the first audit log processing unit and block in the log audit server according to one embodiment The block diagram of the second audit log processing device in catenary system.
Specific embodiment
Carry out technical solution in the embodiment of the present invention progress clearly below in conjunction with the attached drawing of one embodiment of the present of invention Chu, complete description.Described embodiment is only a part of the embodiments of the present invention, instead of all the embodiments.Base In the embodiment of the present invention, those of ordinary skill in the art without making creative work it is obtained it is all its Its embodiment, shall fall within the protection scope of the present invention.
Fig. 1 shows the design synoptic chart of the Log Audit System 100 according to one embodiment.Using 14, using 15, answer It is different application with 16 etc., for example, can be respectively core insurance system, financial system etc., in the user's operation of these applications These are in application, the computer where application can automatically be stored the user behavior of application in the form of log, so as to day Audit is transferred afterwards.These audit logs are stored in from traditionally it is different in local computer or database, in the present invention In devise log audit server 11 as storage log medium.As shown in figure 1 it can be seen that, log audit server 11 are communicatively coupled with application 14, using 15, using 16 etc., these, which are applied, can be located on identical/different computer on hardware. 3 applications are illustrated only in Fig. 1, however, it is understood by those of ordinary skill in the art that, in other embodiments, log audit clothes Business device 11 can be communicatively coupled with any number of application.In the present embodiment, log audit server 11 has RestAPI interface, will by calling RestAPI interface after doing HMAC signature using log content of the 14-16 to user behavior Audit log active push after signature is to log audit server 11.Since different applications often has different log lattice Formula, therefore in order to carry out unification to journal format, in the present embodiment, unified standard interface respectively is called using 14-16, thus Audit log can be pushed to log audit server 11 according to unified format.In the present embodiment, audit log is interior It is as follows to hold format:App=% (app) s&creator=% (creator) s&creator_ip=% (creator_ip) s&op =% (op) s&re src=% (resrc) s&result=% (result) s&timestamp=% (timestamp) d, In, the primary fields of audit log include:
A) creator, user's unique designation (ID) of application system, only receives ascii character set, non-Chinese;
B) creator_ip triggers the User IP of log recording;
C) app, the application system of log ownership, the i.e. application name of access log audit server and access token are one by one It is corresponding;
D) op, audit movement;
E) resrc, audit act on resource in the unique designation (ID) of application system, only receive ascii character set, Non- Chinese;
F) resrc_desc, resource description;
G) result of result, user's operation are success or failure, and are defaulted successfully;
H) timestamp, timestamp, calculate the signature are used;
I) sig, log signature, application system make HMAC signature to log content.
In other embodiments, the audit log of other content formats can be used.In addition, use in the present embodiment It is using 14-16 by calling RestAPI interface to give audit log active push to log audit server, however other In embodiment, log audit server 11 can also actively receive audit log from using 14-16, or can even pass through hand Dynamic operation will be transmitted to log audit server 11 using the audit log of 14-16.It can be by all audit days using 14-16 Will is all pushed to log audit server, alternatively, can be configured to the type of the audit log pushed, only by emphasis row Log audit server is pushed to for, the relevant audit log of important scenes.In addition, can also be according to from day using 14-16 Audit log corresponding with instruction is pushed to log audit server 11 by the instruction of will audit server 11.
In the present embodiment, log audit server 11 receives carry out the audit log of self-application 14-16 after, first to examine It counts log and carries out signature verification, to determine the audit log actually from application 14-16 (without being intercepted by external illegal program And be modified).Then, audit log is stored in the log in log audit server 11 by 11 one side of log audit server In library 110;On the other hand, audit log is sent to the block catenary system 12 communicated to connect with log audit server 11, with So that audit log is stored on the block chain of the creation of block chain network 121 included in block catenary system 12.In this implementation In example, block catenary system 12 is to pacify science and technology by crowd to release " peace chain cloud ", provides the service of block chain network for enterprise, thus Enterprise does not need the various technical details of concern block chain network, and only needs to pay close attention to what oneself was carried out in block chain network Business.In other embodiments, block chain network 121 can be any other block chain, as long as belonging to contract chain. Block chain network 121 is diagrammatically illustrated in Fig. 1 to be made of three nodes 1211,1212 and 1213, but art technology Personnel should be appreciated that a block chain network can be made of two nodes or more than three nodes.Block catenary system 12 Also it can return to whether audit log is successfully stored the response message on block chain to log audit server 11.Log audit After server 11 receives the response message, for the audit log that success stores, the corresponding audit log in log library 110 Cochain pass flag is made at entry.In other embodiments, it can also be not provided with log library 110, but only by audit log It is stored on the block chain of the creation of block chain network 121.
Audit user 13 be audit movement user and the client of log audit server 11.Audit user 13 points are two classes:Administrator and ordinary user, administrator are the administrators of auditing system, he can also audit all applications examine Count log.The groundwork of administrator have creation access log audit server 11 application (for application create access key with Secret), the permission of the audit log of distributing user access application creates and safeguards that necessary audit action lists are (such as fixed Adopted series of standards movement:Creation, access, update, deletion etc.).And common log audit user may only check administrator The audit log of the application of distribution.
When the user 13 that audits audits to audit log, user 13 is audited first from log audit server 11 Inquiry log list in log library 110 can pass through the filter conditions such as inputting date, keyword, Apply Names, action behavior To position specific log.If the entry of the audit log of inquiry has cochain pass flag, illustrate the audit of the entry Chain audit operation is supported in log.Next, log audit server 11 can also according to audit user 13 inquiry request come with Block catenary system 12 communicates, and extracts audit log from the block chain that block chain network 121 creates.User 13 audit by by day Will audit server 11 return the audit log being stored in log library 110 and the audit log being stored on block chain into Row compares, so that it may which whether the data for verifying audit log are tampered.Audit log in log library 110 and it is stored in block In the case that the data of audit log on chain are inconsistent, illustrate that the record in log library 110 has the possibility that is tampered, then this When be subject to the audit log being stored on block chain and audit operation.
In other embodiments, log audit server 11 can not also include log library 110, can be received by institute The audit log for carrying out self-application 14-16 is directly stored via communicating with block catenary system 12 onto block chain, as audit user 13 when needing to audit to audit log, reads the number of audit log directly from block chain via log audit server 11 According to.
Next how audit log is stored in log library 110 and block chain by detailed description log audit server 11 On the block chain that network 121 creates and how to read in log library 110 and the audit log of the storage on block chain.Fig. 2 shows The audit log processing method based on block chain in the log audit server 11 according to one embodiment is gone out, wherein empty Wire frame representation can choose the step of execution.From figure 2 it can be seen that the method 200 in Fig. 2 includes the following steps:
Firstly, in step s 201, receiving the audit log from one or more application.As described above, it audits Log can be by application 14-16 via calling RestAPI interface come active push to log audit server 11, can also be by day 11 active of will audit server is received from application 14-16.
Next, the audit log received is stored in log library in step S202.This is an optional step Suddenly, that is to say, that the audit log received may not necessarily be stored in log library.But audit log is stored in log More preferably, this is because can first be transferred from log library to be checked when the user that audits needs to inquire audit log in library Audit log audit, and in case of need, for example need to verify correctness to certain log recording, audit user Instruction just is sent to log audit server 11 to transfer another copy record of the audit log from block chain.In this way, whole The speed of a system can get a promotion.
In step S203, the first request of storage audit log is sent to the block catenary system for including block chain network. Specifically, the standard interface for calling the audit log intelligence contract of block chain, so that the node in block chain network will be examined It counts log and audit log intelligence contract is written.The characteristics of intelligent contract of contract chain is utilized in this step is by audit log Data be stored on block chain.
Above step has been completed that the storage to the audit log of application operates.
Next, this method receives the second request from the user in step S204, the second request includes audit log Inquiry request, including characteristic information associated with audit log to be checked.Specifically, it is examined when audit user needs to inquire Log is counted the second request can be sent to log audit server 11, correspondingly, in log audit server 11 when being audited Side receives the second request from the user.The request may include audit log inquiry request and user information, wherein auditing Log query request may include characteristic information associated with audit log to be checked, such as user inputs in client The characteristic informations such as keyword, date, Apply Names, action behavior.
In step S204, although being not shown in Fig. 2, the second request can also include user information, such as the ID of user Equal identification informations are also analyzed user information, after receiving the second request including user information to determine user Search access right.That is, dividing on the basis of having been allocated for access privilege the user information received Analysis, it can be determined that whether user has permission to access audit log to be checked.After determining that user has permission, just carry out down The step 205 in face.
Step S205 is corresponding with step S202 and an optional step.After receiving the second request of user, In step S205, audit log to be checked is read from log library based on characteristic information.For example, according to keyword, the date, The characteristic informations such as Apply Names, action behavior position specific log recording in log library.
In step S206, audit log to be checked is also read from block chain based on characteristic information.Specifically, The standard interface that audit log intelligence contract is called based on the relevant characteristic information of audit log, from audit log intelligence The audit log is inquired in block chain where contract.
In addition, this method can also comprise the steps of although being not shown in Fig. 2:
After receiving audit log in step s 201, to the signature in audit log (as described referring to Fig.1 above , signed by application) it is verified.In this way, determining that the audit log is true log recording.Also, to signature Verification pass through in the case where, just carry out step S202 and step S203.
In addition, can also receive indicates whether audit log is successfully stored in block chain after step S203 Response message.If the response message instruction audit log received is successfully stored in block chain, right in log library Corresponding Audit Journal entries make cochain pass flag.
The foregoing describe the audit log processing methods based on block chain in log audit server 11.Next turn The audit log processing method 300 in the block catenary system according to one embodiment is shown to Fig. 3 and Fig. 4, Fig. 3, Fig. 4 is shown The step that is stored in audit log in the block chain created by block chain network in the audit log processing method of Fig. 3 400.As can see in Fig. 3, the method in Fig. 3 includes the following steps:
In step S301, the first request of the storage audit log from log audit server 11 is received.The step Corresponding to the step S203 in Fig. 2.Then, in step s 302, audit log is stored in by block chain based on the first request In the block chain of network creation.
As shown in Figure 4, step S302 specifically includes following steps:
In step S3021, log intelligence contract of auditing at the node in block chain network, by audit log Audit log intelligence contract is written.Wherein, the intelligent contract of audit log is defined in system initialization, and in block chain In each node at disposed or installed.Therefore after the standard interface of called audit log intelligence contract, audit log Intelligent contract is performed.In step S3022, audit log intelligence contract is broadcasted in a manner of block to area at the node Other nodes in block chain network.Herein, multiple intelligent contracts can be collected into the cache pool at node and is packaged into area Block.When other nodes in block chain network receive the block, each node executes common recognition algorithm, in the feelings reached common understanding Under condition, step S3023 is executed, block is added in the block chain for each node in block chain network, thus will examine Meter log is stored in block chain.That is, the data of the audit log are distributed and store the institute in block chain network Have on node, thus ensures the safety and reliability of storage.
Fig. 3 is returned to, if the request of the inquiry audit log from log audit server 11 is received, in step In S303, examined based on characteristic information associated with audit log to be checked included in request to be read from block chain Count log.Specifically, it is audited based on characteristic information associated with audit log to be checked log intelligence contract, To read audit log to be checked from block chain.
In addition, this method can also comprise the steps of although being not shown in Fig. 3:
After the first request that step S301 receives the storage audit log from log audit server, also to log The private key of the user of audit server is verified, to determine that user has the permission being stored in audit log in block chain. In the case where being verified, just audit log is stored in block chain to private key.Audit log is deposited in step S302 After storage is in the block chain created by block chain network, also send whether audit log is successfully deposited to audit log server Store up the response message in block chain, that is, the response message for the cochain that whether succeeds.
The log audit server 11 in Fig. 1 is described referring next to Fig. 5 and the realization in block catenary system 12 is above-mentioned The modules of method.As shown in Figure 5, in the present embodiment, log audit server 11 includes at the first audit log Manage device 51.It includes logger module 510, is communicatively coupled with application 14-16, carrys out examining for self-application 14-16 to receive Count log.In certain embodiments, logger module 510 can sign the HMAC made using 14-16 in audit log Name is verified, to confirm that audit log is true.First audit log processing unit 51 further includes and logger module The 510 chain interactive modules 511 being communicatively coupled, the interface mould with the second audit log processing device 52 in block catenary system 12 Block 521 is communicatively coupled, to send the first request of storage audit log to the block catenary system 12 for including block chain network, with So that audit log is stored in the block chain created by block chain network by the node in block chain network.Specifically, chain Interactive module 511 calls the standard interface of the audit log intelligence contract of block chain, so that the node in block chain network will Audit log intelligence contract is written in audit log, thus by being stored in block chain in node broadcasts to block chain network.This Outside, logger module 510 is also communicatively coupled (being not shown in Fig. 5) with log library, so that the audit log received is stored In log library.In certain embodiments, chain interactive module 511 also receives the audit from the second audit log processing device 52 Whether log is successfully stored the response message in block chain, and returns it into logger module 510, if audit log It is successfully stored in block chain, then cochain is made by entry of the logger module 510 to the audit log in log library Pass flag.In other embodiments, in the case where being not provided with log library, logger module 510 will not be with log library It is communicatively coupled.
In addition, the first audit log processing unit 51 further includes user interactive module 512, the client with audit user 13 End and logger module 510 are communicatively coupled, for receives from audit user 13 including audit log inquiry request Second request, audit log inquiry request includes characteristic information associated with audit log to be checked, for example, keyword, Date, Apply Names, action behavior etc..In the present embodiment, the first audit log processing unit 51 further includes user configuration mould Block 513 is used to configure user right, such as can distribute the audit for checking different application to different grades of audit user 13 The permission of log.After receiving the second request, the second request is sent to user configuration module 513 by user interactive module 512, User configuration module 513 analyzes user information (such as the identification informations such as User ID) included in the second request, with Determine the search access right of user.User configuration module 513 determine user to audit log to be checked have search access right it Afterwards, user interactive module 512 is returned result to, the second request of the user is sent to log and remembered by user interactive module 512 Record module 510.
In the present embodiment be arranged log library 110 in the case where, 510 one side of logger module according to characteristic information come Audit log to be checked is read from log library 110, and second request is on the other hand sent to chain interactive module 511, chain Interactive module 511 calls the standard interface of the audit log intelligence contract of block chain based on characteristic information, thus from block chain It is middle to read audit log to be checked, and the audit log inquired is sent to logger module 510, by log recording mould Block 510 is examined what is inquired from the audit log (if log library is arranged) inquired in log library and from block chain Meter log is sent respectively to user interactive module 512, and returns to audit user 13, at this point, audit user 13 can be to careful Meter log compares and/or audits.
In the present embodiment, the block catenary system 12 in Fig. 1 includes the second audit log processing device 52 comprising with the The interface module 521 and lead to interface module 521 that chain interactive module 511 in one audit log processing device 51 is communicatively coupled Believe the log processing module 522 of coupling.Interface module 521 receives the storage from the first audit log processing unit 51 and audits day First request of will, and send it to log processing module 522.Log processing module 522 will then be examined based on the first request Meter log is stored in the block chain created by block chain network.Specifically, interface module 521 is receiving chain interactive module After the call request of the standard interface of the 511 calling audit log intelligence contracts sent, log processing module is forwarded it to 522, log processing module 522 is audited log intelligence contract at the node in block chain network, and audit log is write Enter audit log intelligence contract, broadcasts audit log intelligence contract into block chain network in a manner of block at node Other nodes, and block is added in the block chain for each node in block chain network, thus by audit log It is stored on each distributed node of block chain network.In certain embodiments, interface module 521 is also to log audit service The private key of the user of device is verified, to determine that user has the permission being stored in audit log in block chain.To private key Be verified in the case where, just audit log is stored in block chain.In certain embodiments, log processing module 522 Also send whether audit log is successfully stored the response message in block chain to interface module 521, interface module 521 should Response message returns to chain interactive module 511.
In addition, interface module 521, which receives, comes from chain interactive module 511 when the user 13 that audits needs to inquire audit log Call request, and be transmitted to log processing module 522, log processing module 522 based on include in call request with it is to be checked The associated characteristic information of the audit log of inquiry is come log intelligence contract of auditing, to read to be checked examine from block chain Log is counted, and read audit log is returned into chain interactive module 511 via interface module 521.
The foregoing describe the audit log processing methods and log audit in log audit server and block catenary system The first audit log processing unit in server and the second audit log processing device in block catenary system.In addition, another In one side, the invention proposes a kind of Log Audit Systems based on block chain, including:First audit log processing unit, First audit log processing unit is located in audit log server, and including:Logger module receives and comes from one Or the audit log of multiple applications;And chain interactive module, it is communicatively coupled with logger module, and to including block link network The block catenary system of network sends the first request for storing the audit log;Second audit log processing device, the second audit day Will processing unit is located in block catenary system, and including:Interface module is communicatively coupled with chain interactive module, and receives and From the first request of the storage audit log of chain interactive module;And log processing module, it is communicatively coupled with interface module, and Audit log is stored in the block chain created by block chain network based on the first request.
In another aspect, the invention also provides a kind of log audit servers, including processor;And storage is set Standby, storage equipment includes the computer instruction being stored thereon, and computer instruction is when being executed by processor, so that processor is held The following operation of row:Receive the audit log from one or more application;And to the block catenary system including block chain network The first request for sending storage audit log, so that audit log is stored in by block link network by the node in block chain network In the block chain of network creation.
In another aspect, the invention also provides a kind of block catenary system, block catenary system includes block chain network, area Block catenary system includes processor;And storage equipment, storage equipment includes the computer instruction being stored thereon, computer instruction When being executed by processor, so that processor executes following operation:Receive the storage audit log from log audit server First request;And audit log is stored in the block chain created by block chain network.
In another aspect, the invention also provides a kind of computer readable storage mediums, including the meter being stored thereon Calculation machine instruction, computer instruction when being executed by processor so that in processor execution journal audit server based on block The audit log processing method of chain.
In another aspect, the invention also provides a kind of computer readable storage mediums, including the meter being stored thereon The instruction of calculation machine, computer instruction is when being executed by processor, so that processor executes the audit log processing in block catenary system Method.
It is compared with traditional log audit method with auditing system, at the audit log proposed by the present invention based on block chain Reason method has the following advantages that:The solution of the present invention is simple and convenient, can direct can not usurp using block chain distributed storage Change, securely and reliably, the characteristics such as can trace to the source, audit log is stored in block chain, to guarantee that the safety of audit log can By storage, solves the disadvantage that traditional Log Audit System.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by computer program instructions and/or hardware device come implementation flow chart And/or process and/or box in each of block diagram flowchart and or block diagram and flowchart and or block diagram.It calculates Machine program can be stored in visible computer readable medium, for example, CD-ROM, floppy disk, hard disk, digital versatile disc (DVD), The storage equipment of Blu-ray Disc or other forms.Information can store any time on readable medium.It is appreciated that the calculating Machine readable instruction can also be stored in network server, on the platform of cloud, in order to user's use.Alternatively, with hardware Circuit realize embodiment in, hardware circuit be, for example, field programmable gate array (FPGA), specific integrated circuit (ASIC), can Any group of programmed logic device (PLD), field programmable logic device (EPLD), discrete logic unit, hardware, firmware etc. It closes to realize.Although the operation in flowchart and or block diagram is described with particular order, this and should not be construed require it is such Operation is completed with shown particular order or with sequential order, or executes the operation of all diagrams to obtain expected result. In some cases, multitask or parallel processing can be beneficial.
" embodiment ", " one embodiment ", " some embodiments " or " other embodiments " is referred in the present specification Indicate that in conjunction with the embodiments described special characteristic, structure or characteristic are included at least some of embodiment, and not necessarily It is in all embodiments.Each appearance of " embodiment ", " one embodiment " or " some embodiments " not all necessarily refers to Identical embodiment.If specification statement " possibility ", " can " or " can with " include component, feature, structure or characteristic, The specific components, feature, structure or characteristic do not require that.If specification or claims refer to " one " or " one It is a " element, then it is not offered as that there is only one in element.If specification or claims refer to " multiple " element, It can indicate the element of " two " and " two or more ".Similarly, although foregoing description contains certain specific implementation details, But this simultaneously should not be construed as limiting any the scope of the claims, and should be interpreted that the particular implementation that can be directed to specific invention The description of example.The certain features described in different embodiments in this specification also may be integrally incorporated in single embodiment.Conversely, The various features described in the context of single embodiment can also be discretely in multiple embodiments or suitable group any Implement in conjunction.

Claims (34)

1. the audit log processing method based on block chain in a kind of log audit server, the method includes:
Receive the audit log from one or more application;And
The first request for storing the audit log is sent to the block catenary system for including block chain network, so that the block The audit log is stored in the block chain by block chain network creation by the node in chain network.
2. audit log processing method according to claim 1, wherein sent out to the block catenary system for including block chain network The first request for sending the storage audit log includes:The standard interface of the audit log intelligence contract of the block chain is called, So that the audit log intelligence contract is written in the audit log by the node in the block chain network.
3. audit log processing method according to claim 2, further includes:
The second request from the user is received, second request includes audit log inquiry request, the audit log inquiry Request includes characteristic information associated with audit log to be checked;And
The standard interface of the audit log intelligence contract is called, based on the characteristic information to read from the block chain The audit log to be checked.
4. audit log processing method according to claim 1, further includes:
The audit log is stored in log library;
The second request from the user is received, second request includes audit log inquiry request, the audit log inquiry Request includes characteristic information associated with audit log to be checked;And
The audit log to be checked is read from the log library based on the characteristic information.
5. audit log processing method according to claim 3 or 4, wherein second request further includes user information, The method also includes:
The user information is analyzed, with the search access right of the determination user.
6. audit log processing method according to claim 1, further includes:
After receiving the audit log, the signature in the audit log is verified;And
In the case where the verification to the signature passes through, first request is sent to the block catenary system.
7. audit log processing method according to claim 1, further includes:
Receiving indicates whether the audit log is successfully stored the response message in the block chain.
8. the audit log processing method in a kind of block catenary system, the block catenary system includes block chain network, the side Method includes:
Receive the first request of the storage audit log from log audit server;And
The audit log is stored in the block chain by block chain network creation based on first request.
9. audit log processing method according to claim 8, wherein request based on described first by the audit log It is stored in the block chain by block chain network creation and includes:
It audits at the node in the block chain network log intelligence contract, examines audit log write-in is described Count log intelligence contract;
The audit log intelligence contract is broadcasted to its into the block chain network at the node in a manner of block Its node;And
The block is added in the block chain for each node in the block chain network.
10. audit log processing method according to claim 9, further includes:
It is executed based on the characteristic information associated with audit log to be checked from the log audit server described Audit log intelligence contract, to read the audit log from the block chain.
11. audit log processing method according to claim 8, further includes:
After the first request for receiving the storage audit log, to the log audit included in first request The private key of the user of server is verified;And
In the case where being verified, the audit log is stored in the block chain to the private key.
12. audit log processing method according to claim 8, further includes:
The response the letter whether audit log is successfully stored in the block chain is sent to the log audit server Breath.
13. the audit log processing unit based on block chain in a kind of log audit server, described device include:
Logger module receives the audit log from one or more application;And
Chain interactive module sends the first request for storing the audit log to the block catenary system for including block chain network, So that the audit log is stored in the area created by the block chain network by the node in the block chain network In block chain.
14. audit log processing unit according to claim 13, wherein the chain interactive module is to including block link network The first of the block catenary system transmission storage audit log of network is requested:The chain interactive module calls the block chain Audit log intelligence contract standard interface so that institute is written in the audit log by node in the block chain network State audit log intelligence contract.
15. audit log processing unit according to claim 14, further includes:
User interactive module receives the second request from the user, and second request includes audit log inquiry request, institute Stating audit log inquiry request includes characteristic information associated with audit log to be checked;And wherein
The chain interactive module is also used to call the standard interface of the audit log intelligence contract based on the characteristic information, To read the audit log to be checked from the block chain.
16. audit log processing unit according to claim 13, wherein the logger module is also used to will be described Audit log is stored in log library, and the audit log processing unit further includes user interactive module, and reception comes from User second request, it is described second request include audit log inquiry request, the audit log inquiry request include with to The associated characteristic information of the audit log of inquiry;And wherein
The logger module is also used to read described to be checked examine from the log library based on the characteristic information Count log.
17. audit log processing unit according to claim 15 or 16, wherein second request further includes user's letter Breath, the audit log processing unit further includes user configuration module, is analyzed the user information, described in determination The search access right of user.
18. the audit log processing unit in a kind of block catenary system, the block catenary system includes block chain network, the dress Set including:
Interface module receives the first request of the storage audit log from log audit server;And
The audit log is stored in by block chain network creation by log processing module based on first request In block chain.
19. audit log processing unit according to claim 18, wherein the log processing module is used for:Described It audits at node in block chain network log intelligence contract, the audit log intelligence is written into the audit log Contract;The audit log intelligence contract is broadcasted to its into the block chain network at the node in a manner of block Its node;And the block is added in the block chain for each node in the block chain network.
20. audit log processing unit according to claim 19, wherein the log processing module is also used to based on next The audit log intelligence is executed from the characteristic information associated with audit log to be checked of the log audit server Energy contract, to read the audit log from the block chain.
21. a kind of Log Audit System based on block chain, including:
First audit log processing unit, the first audit log processing unit is located in audit log server, and wraps It includes:
Logger module receives the audit log from one or more application;And
Chain interactive module is communicatively coupled with logger module, and deposits to the block catenary system transmission for including block chain network Store up the first request of the audit log;
Second audit log processing device, the second audit log processing device is located in the block catenary system, and wraps It includes:
Interface module is communicatively coupled with the chain interactive module, and it is described careful to receive the storage from the chain interactive module Count first request of log;And
Log processing module is communicatively coupled with the interface module, and is deposited the audit log based on first request Storage is in the block chain created by the block chain network.
22. Log Audit System according to claim 21, wherein the chain interactive module is to including block chain network It includes that the chain interactive module calls examining for the block chain that block catenary system, which sends and stores the first request of the audit log, The standard interface of log intelligence contract is counted, also, the log processing module executes at the node in the block chain network The audit log intelligence contract is written in the audit log by audit log intelligence contract, will be described at the node Audit log intelligence contract broadcasts other nodes into the block chain network in a manner of block, and is directed to the block The block is added in the block chain each node in chain network.
23. Log Audit System according to claim 21 further includes user interactive module, from the user the is received Two requests, second request include audit log inquiry request, and the audit log inquiry request includes examining with to be checked Count the associated characteristic information of log, wherein the chain interactive module calls the audit log based on the characteristic information The standard interface of intelligent contract, and the log processing module is based on the feature associated with audit log to be checked Information executes the audit log intelligence contract, to read the audit log from the block chain.
24. Log Audit System according to claim 21, the first audit log processing unit further includes user's friendship Mutual module, the user interactive module receive the second request from the user, and second request includes that audit log inquiry is asked It asks, the audit log inquiry request includes characteristic information associated with audit log to be checked, and wherein, the day The audit log is stored in log library by will logging modle, and is read from the log library based on the characteristic information The audit log to be checked.
25. a kind of log audit server, including:
Processor;And
Equipment is stored, the storage equipment includes the computer instruction being stored thereon, and the computer instruction is by the place When managing device execution, so that the processor executes following operation:
Receive the audit log from one or more application;And
The first request for storing the audit log is sent to the block catenary system for including block chain network, so that the block The audit log is stored in the block chain by block chain network creation by the node in chain network.
26. log audit server according to claim 25, wherein sent out to the block catenary system for including block chain network The first request for sending the storage audit log includes:The standard interface of the audit log intelligence contract of the block chain is called, So that the audit log intelligence contract is written in the audit log by the node in the block chain network.
27. log audit server according to claim 26, wherein described instruction by the processor execute when, The processor is also made to execute following operation:
The second request from the user is received, second request includes audit log inquiry request, the audit log inquiry Request includes characteristic information associated with audit log to be checked;And
The standard interface of the audit log intelligence contract is called, based on the characteristic information to read from the block chain The audit log to be checked.
28. log audit server according to claim 25, wherein described instruction by the processor execute when, The processor is also made to execute following operation:
The audit log is stored in log library;
The second request from the user is received, second request includes audit log inquiry request, the audit log inquiry Request includes characteristic information associated with audit log to be checked;And
The audit log to be checked is read from the log library based on the characteristic information.
29. the log audit server according to claim 27 or 28, wherein second request is also believed comprising user Breath, described instruction analyze the processor to the user information, with determination when being executed by the processor The search access right of the user.
30. a kind of block catenary system, the block catenary system includes block chain network, and the block catenary system includes:
Processor;And
Equipment is stored, the storage equipment includes the computer instruction being stored thereon, and the computer instruction is by the place When managing device execution, so that the processor executes following operation:
Receive the first request of the storage audit log from log audit server;And
The audit log is stored in the block chain by block chain network creation.
31. block catenary system according to claim 30, wherein being stored in the audit log by the block link network Network creation block chain in operation include:
It audits at the node in the block chain network log intelligence contract, examines audit log write-in is described Count log intelligence contract;
The audit log intelligence contract is broadcasted to its into the block chain network at the node in a manner of block Its node;And
The block is added in the block chain for each node in the block chain network.
32. block catenary system according to claim 31, wherein the computer instruction is executed by the processor When, also make the processor execute following operation:
It is executed based on the characteristic information associated with audit log to be checked from the log audit server described Audit log intelligence contract, to read the audit log from the block chain.
33. a kind of computer readable storage medium, including the computer instruction being stored thereon, the computer instruction is being located When managing device execution, so that the processor perform claim requires method described in any one of 1-7.
34. a kind of computer readable storage medium, including the computer instruction being stored thereon, the computer instruction is being located When managing device execution, so that the processor perform claim requires method described in any one of 8-12.
CN201810559010.7A 2018-06-01 2018-06-01 Audit log processing method, device and Log Audit System based on block chain Pending CN108833514A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810559010.7A CN108833514A (en) 2018-06-01 2018-06-01 Audit log processing method, device and Log Audit System based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810559010.7A CN108833514A (en) 2018-06-01 2018-06-01 Audit log processing method, device and Log Audit System based on block chain

Publications (1)

Publication Number Publication Date
CN108833514A true CN108833514A (en) 2018-11-16

Family

ID=64146849

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810559010.7A Pending CN108833514A (en) 2018-06-01 2018-06-01 Audit log processing method, device and Log Audit System based on block chain

Country Status (1)

Country Link
CN (1) CN108833514A (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109656778A (en) * 2018-11-28 2019-04-19 金蝶软件(中国)有限公司 Data capture method, device, computer equipment and storage medium
CN109815203A (en) * 2019-02-12 2019-05-28 山东超越数控电子股份有限公司 A kind of log audit method and system based on block chain
CN109815747A (en) * 2019-01-17 2019-05-28 重庆金融资产交易所有限责任公司 Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain
CN109886037A (en) * 2019-01-21 2019-06-14 江汉大学 A kind of electronic evidence auditing method based on block chain
CN109977089A (en) * 2019-03-13 2019-07-05 深圳壹账通智能科技有限公司 Blog management method, device, computer equipment and computer readable storage medium
CN110048828A (en) * 2019-04-17 2019-07-23 江苏全链通信息科技有限公司 Log storing method and system based on data center
CN110263585A (en) * 2019-06-26 2019-09-20 腾讯科技(深圳)有限公司 Test monitoring and managing method, device, equipment and storage medium
CN110389861A (en) * 2019-07-23 2019-10-29 宿州星尘网络科技有限公司 Intelligent backup system for audit log
CN110400223A (en) * 2019-07-26 2019-11-01 中国工商银行股份有限公司 Interactive log based on block chain encrypts, transfers, Anti-theft method, apparatus
CN110489313A (en) * 2019-07-04 2019-11-22 平安科技(深圳)有限公司 Operation log recording method, device and storage medium based on block chain
CN111061685A (en) * 2019-11-21 2020-04-24 腾讯科技(深圳)有限公司 Log query method and device, node equipment and storage medium
CN111092745A (en) * 2019-10-12 2020-05-01 深圳壹账通智能科技有限公司 Log processing method and device based on block chain, computer equipment and storage medium
CN111143837A (en) * 2019-12-25 2020-05-12 天津南大通用数据技术股份有限公司 Method for storing database security audit record
CN111490978A (en) * 2020-03-27 2020-08-04 武汉大学 Distributed log auditing system and method based on state channel
CN111917761A (en) * 2020-07-28 2020-11-10 安徽高山科技有限公司 Data security protection method based on block chain cloud computing
CN112235243A (en) * 2020-09-10 2021-01-15 李文华 Log audit security platform based on Web application security
CN112306983A (en) * 2020-11-18 2021-02-02 武汉德尔达科技有限公司 Ship electronic turbine log system and data protection method
US10936581B2 (en) 2019-08-30 2021-03-02 Advanced New Technologies Co., Ltd. Blockchain transaction processing method and apparatus
WO2021036170A1 (en) * 2019-08-30 2021-03-04 创新先进技术有限公司 Blockchain transaction processing method and apparatus
CN112448946A (en) * 2020-11-09 2021-03-05 北京工业大学 Log auditing method and device based on block chain
CN112667748A (en) * 2021-03-16 2021-04-16 杭州链城数字科技有限公司 Block chain all-in-one machine facing audit service, data processing method and device
CN112732480A (en) * 2020-12-29 2021-04-30 中钞信用卡产业发展有限公司杭州区块链技术研究院 Database management method, device, equipment and storage medium
CN113836237A (en) * 2021-09-30 2021-12-24 北京中经惠众科技有限公司 Method and device for auditing data operation of database
CN114826657A (en) * 2022-03-10 2022-07-29 新华三信息安全技术有限公司 Block chain-based security audit system and audit method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107329884A (en) * 2017-06-30 2017-11-07 郑州云海信息技术有限公司 The access auditing method and system of a kind of storage system
CN107707410A (en) * 2017-10-26 2018-02-16 上海点融信息科技有限责任公司 Configure method, information processor and the readable storage medium storing program for executing of system audit service
CN108038389A (en) * 2017-12-08 2018-05-15 福建亿榕信息技术有限公司 Method and device based on the storage e-file audit-trail daily record of block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107329884A (en) * 2017-06-30 2017-11-07 郑州云海信息技术有限公司 The access auditing method and system of a kind of storage system
CN107707410A (en) * 2017-10-26 2018-02-16 上海点融信息科技有限责任公司 Configure method, information processor and the readable storage medium storing program for executing of system audit service
CN108038389A (en) * 2017-12-08 2018-05-15 福建亿榕信息技术有限公司 Method and device based on the storage e-file audit-trail daily record of block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘敖迪,等: "区块链技术及其在信息安全领域的研究进展", 《软件学报》 *

Cited By (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109656778A (en) * 2018-11-28 2019-04-19 金蝶软件(中国)有限公司 Data capture method, device, computer equipment and storage medium
CN109656778B (en) * 2018-11-28 2022-07-12 金蝶软件(中国)有限公司 Data acquisition method and device, computer equipment and storage medium
CN109815747A (en) * 2019-01-17 2019-05-28 重庆金融资产交易所有限责任公司 Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain
CN109886037A (en) * 2019-01-21 2019-06-14 江汉大学 A kind of electronic evidence auditing method based on block chain
CN109886037B (en) * 2019-01-21 2023-06-09 江汉大学 Electronic evidence auditing method based on blockchain
CN109815203A (en) * 2019-02-12 2019-05-28 山东超越数控电子股份有限公司 A kind of log audit method and system based on block chain
CN109977089A (en) * 2019-03-13 2019-07-05 深圳壹账通智能科技有限公司 Blog management method, device, computer equipment and computer readable storage medium
CN110048828A (en) * 2019-04-17 2019-07-23 江苏全链通信息科技有限公司 Log storing method and system based on data center
CN110826111B (en) * 2019-06-26 2021-08-13 腾讯科技(深圳)有限公司 Test supervision method, device, equipment and storage medium
CN110263585A (en) * 2019-06-26 2019-09-20 腾讯科技(深圳)有限公司 Test monitoring and managing method, device, equipment and storage medium
CN110263585B (en) * 2019-06-26 2024-04-26 腾讯科技(深圳)有限公司 Test supervision method, device, equipment and storage medium
CN110826111A (en) * 2019-06-26 2020-02-21 腾讯科技(深圳)有限公司 Test supervision method, device, equipment and storage medium
CN110489313B (en) * 2019-07-04 2022-07-19 平安科技(深圳)有限公司 Operation log recording method and device based on block chain and storage medium
CN110489313A (en) * 2019-07-04 2019-11-22 平安科技(深圳)有限公司 Operation log recording method, device and storage medium based on block chain
CN110389861A (en) * 2019-07-23 2019-10-29 宿州星尘网络科技有限公司 Intelligent backup system for audit log
CN110389861B (en) * 2019-07-23 2022-08-19 安徽朵朵云网络科技有限公司 Intelligent backup system for audit logs
CN110400223A (en) * 2019-07-26 2019-11-01 中国工商银行股份有限公司 Interactive log based on block chain encrypts, transfers, Anti-theft method, apparatus
CN110400223B (en) * 2019-07-26 2022-05-17 中国工商银行股份有限公司 Block chain-based interactive log encryption, calling and anti-theft method and device
US10936581B2 (en) 2019-08-30 2021-03-02 Advanced New Technologies Co., Ltd. Blockchain transaction processing method and apparatus
WO2021036170A1 (en) * 2019-08-30 2021-03-04 创新先进技术有限公司 Blockchain transaction processing method and apparatus
WO2021068488A1 (en) * 2019-10-12 2021-04-15 深圳壹账通智能科技有限公司 Blockchain-based log processing method and apparatus, computer device, and storage medium
CN111092745A (en) * 2019-10-12 2020-05-01 深圳壹账通智能科技有限公司 Log processing method and device based on block chain, computer equipment and storage medium
CN111061685B (en) * 2019-11-21 2022-07-22 腾讯科技(深圳)有限公司 Log query method and device, node equipment and storage medium
CN111061685A (en) * 2019-11-21 2020-04-24 腾讯科技(深圳)有限公司 Log query method and device, node equipment and storage medium
CN111143837A (en) * 2019-12-25 2020-05-12 天津南大通用数据技术股份有限公司 Method for storing database security audit record
CN111490978B (en) * 2020-03-27 2021-02-19 武汉大学 Distributed log auditing system and method based on state channel
CN111490978A (en) * 2020-03-27 2020-08-04 武汉大学 Distributed log auditing system and method based on state channel
CN111917761A (en) * 2020-07-28 2020-11-10 安徽高山科技有限公司 Data security protection method based on block chain cloud computing
CN111917761B (en) * 2020-07-28 2022-09-13 安徽高山科技有限公司 Data security protection method based on block chain cloud computing
CN112235243A (en) * 2020-09-10 2021-01-15 李文华 Log audit security platform based on Web application security
CN112448946A (en) * 2020-11-09 2021-03-05 北京工业大学 Log auditing method and device based on block chain
CN112448946B (en) * 2020-11-09 2024-03-19 北京工业大学 Log auditing method and device based on block chain
CN112306983A (en) * 2020-11-18 2021-02-02 武汉德尔达科技有限公司 Ship electronic turbine log system and data protection method
CN112306983B (en) * 2020-11-18 2024-04-09 武汉德尔达科技有限公司 Ship electronic turbine log system and data protection method
CN112732480A (en) * 2020-12-29 2021-04-30 中钞信用卡产业发展有限公司杭州区块链技术研究院 Database management method, device, equipment and storage medium
CN112667748B (en) * 2021-03-16 2021-07-13 杭州链城数字科技有限公司 Block chain all-in-one machine facing audit service, data processing method and device
CN112667748A (en) * 2021-03-16 2021-04-16 杭州链城数字科技有限公司 Block chain all-in-one machine facing audit service, data processing method and device
CN113836237A (en) * 2021-09-30 2021-12-24 北京中经惠众科技有限公司 Method and device for auditing data operation of database
CN114826657A (en) * 2022-03-10 2022-07-29 新华三信息安全技术有限公司 Block chain-based security audit system and audit method
CN114826657B (en) * 2022-03-10 2024-02-09 新华三信息安全技术有限公司 Block chain-based security audit system and audit method

Similar Documents

Publication Publication Date Title
CN108833514A (en) Audit log processing method, device and Log Audit System based on block chain
Ryu et al. A blockchain-based decentralized efficient investigation framework for IoT digital forensics
US10540264B2 (en) Computerized method and end-to-end “Pilot as a service” system for controlling start-up/enterprise interactions
US20200349281A1 (en) Dynamic management of data with context-based processing
Khan et al. Cloud log forensics: Foundations, state of the art, and future directions
JP2022529967A (en) Extracting data from the blockchain network
US20210112101A1 (en) Data set and algorithm validation, bias characterization, and valuation
CN111598574A (en) Intelligent service transaction oriented supervision method and supervision interface
CN111639914A (en) Block chain case information management method and device, electronic equipment and storage medium
US11507291B2 (en) Data block-based system and methods for predictive models
KR102032780B1 (en) A management system of country risk indicators and their items using Block Chain for proving their sources
TWM555500U (en) Info-security joint defense system
CN111241104A (en) Operation auditing method and device, electronic equipment and computer-readable storage medium
CN111274276A (en) Operation auditing method and device, electronic equipment and computer-readable storage medium
US11888986B2 (en) Insight generation using personal identifiable information (PII) footprint modeling
Barati et al. Privacy-aware cloud ecosystems and GDPR compliance
CN114372098A (en) Platform and method for protecting and mining power data middling station private data based on privileged account management
KR20200063295A (en) The abcd-type apparatus and method of block chain for management of research funds by using randomized mesh blockchain type verifier module and smart tcv type blockchain mediation module
US20200387843A1 (en) Risk management of processes utilizing personal data
CN113672479A (en) Data sharing method and device and computer equipment
US11880372B2 (en) Distributed metadata definition and storage in a database system for public trust ledger smart contracts
Dorigo Security information and event management
Barati et al. Design and verification of privacy patterns for business process models
WO2019106177A1 (en) Automated logging
US11947694B2 (en) Dynamic virtual honeypot utilizing honey tokens and data masking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181116

WD01 Invention patent application deemed withdrawn after publication