CN107547221B - Method and equipment for providing log information - Google Patents

Method and equipment for providing log information Download PDF

Info

Publication number
CN107547221B
CN107547221B CN201610481868.7A CN201610481868A CN107547221B CN 107547221 B CN107547221 B CN 107547221B CN 201610481868 A CN201610481868 A CN 201610481868A CN 107547221 B CN107547221 B CN 107547221B
Authority
CN
China
Prior art keywords
log information
application
user equipment
network
access request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610481868.7A
Other languages
Chinese (zh)
Other versions
CN107547221A (en
Inventor
庄黎黎
侯立军
陈超
王训印
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Lianshang Network Technology Co Ltd
Original Assignee
Shanghai Lianshang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Lianshang Network Technology Co Ltd filed Critical Shanghai Lianshang Network Technology Co Ltd
Priority to CN201610481868.7A priority Critical patent/CN107547221B/en
Publication of CN107547221A publication Critical patent/CN107547221A/en
Application granted granted Critical
Publication of CN107547221B publication Critical patent/CN107547221B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The application aims to provide a method and equipment for providing log information; acquiring log information of user equipment; providing the log information to the user equipment in a network connection dimension. Compared with the prior art, the method and the device have the advantages that the system log information can be subjected to refined matching in combination with actual application scenes and requirements, and the log information based on the network dimension is provided, so that corresponding users can acquire the history of the user equipment or the application conditions of each application in real time, for example, under the scene that the user equipment starts VPN application protection, the log information such as corresponding security log events in the VPN network dimension can be provided for the corresponding users based on the specific network connection dimension through the method for providing the log information. Therefore, diversified and refined experiences of human-computer interaction can be enhanced and optimized based on the application.

Description

Method and equipment for providing log information
Technical Field
The present application relates to the field of computers, and more particularly, to a technique for providing log information.
Background
As the user's demand for diversification and precision of his interaction with the smart terminal increases, the user wants to obtain more diverse related information about the current application of the user equipment. In the prior art, the related information of the application operation can be acquired through log information of user equipment, but in practical application, for a user, the readability of the log information is poor, and meanwhile, the requirement of a corresponding application scene for fine matching or presentation of the log information is lacked, for example, the providing and presentation of the related information of each corresponding operation are lacked under the condition that the user equipment is connected with different networks, so that the improvement and optimization of the human-computer interaction experience corresponding to the user are easily ignored. In addition, in a scenario where an existing user equipment starts VPN (Virtual Private Network) application protection, a real-time operation of VPN application protection mostly runs in the background, and a user cannot conveniently and intuitively know real-time security log information corresponding to the VPN application protection, which is not favorable for optimization of user experience.
Disclosure of Invention
The application aims to provide a method and equipment for providing log information.
According to an aspect of the present application, there is provided a method for providing log information, including:
acquiring log information of user equipment;
providing the log information to the user equipment in a network connection dimension.
According to an aspect of the present application, there is also provided a method for providing log information at a user equipment, including:
sending an application access request to corresponding network equipment;
receiving a corresponding application access result and log information returned by the network equipment based on the application access request;
and presenting the log information to the user equipment according to the network connection dimension.
According to another aspect of the present application, there is also provided an apparatus for providing log information, including:
the first device is used for acquiring log information of user equipment;
second means for providing the log information to the user equipment in a network connection dimension.
According to still another aspect of the present application, there is also provided a user equipment for providing log information, including:
a sixth means for sending an application access request to a corresponding network device;
a seventh means for receiving a corresponding application access result and log information returned by the network device based on the application access request;
an eighth means for presenting the log information to the user equipment in a network connection dimension.
According to another aspect of the present application, there is also provided a system for providing log information, wherein the system includes: according to another aspect of the present application, there is provided an apparatus for providing log information, and according to yet another aspect of the present application, there is provided a user equipment for providing log information.
Compared with the prior art, the method and the device for providing the log information of the user equipment obtain the log information of the user equipment and provide the log information to the user equipment according to the network connection dimension. Here, the operation may be completed at a user equipment end corresponding to the user, may be completed at a network equipment end corresponding to the user equipment, and may be completed by the user equipment and the network equipment in cooperation. Regardless of the specific application scenario, the log information provided to the ue matching the network connection dimension can be implemented. Therefore, the system log information can be subjected to refined matching according to actual application scenes and requirements, and the log information based on the network dimension is provided, so that corresponding users can acquire the history of the user equipment or the real-time application condition of each application, for example, in the scene that the user equipment starts VPN application protection, the log information such as corresponding security log events in the VPN network dimension can be provided to the corresponding users based on the specific network connection dimension through the method for providing the log information. Further, the obtained log information based on the network connection dimension may also provide reference information for a subsequent operation instruction of the user or a subsequent intelligent operation of the user equipment, for example, if it is determined that a current application operation is not running in a safe network state based on the log information based on the network connection dimension, the user may stop the operation, switch to another safer network connection mode, or other connectable networks, based on needs. Therefore, diversified and refined experiences of human-computer interaction can be enhanced and optimized based on the application.
In addition, the user equipment can acquire log information corresponding to the application access request sent by the user equipment, which is returned by the corresponding network equipment, and present the log information to the user equipment according to the network connection dimension. Here, through a specific presentation form, the history of the user equipment or the real-time application status of each application can be vividly presented in the user equipment, so that the presentation based on refined log information is facilitated for a user, meanwhile, the readability of the log information is improved through reasonable presentation of the log information, the user can quickly acquire and know the application status of each application in a certain network connection dimension, and further, the user can be helped to optimize other subsequent operation instructions.
Here, further, when the Network device is a VPN (Virtual Private Network) server, the log information may further include log information based on a corresponding VPN Network, for example, log information related to application security, and at this time, the application may present matched log information based on a connected Network, for example, a feature of the VPN Network itself, in a certain scenario, so as to further optimize user experience.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates an apparatus diagram of an apparatus for providing log information in accordance with an aspect of the subject application;
FIG. 2 illustrates a system diagram for providing log information in accordance with a preferred embodiment of the present application;
FIG. 3 illustrates a flow diagram of a method for providing log information in accordance with another aspect of the subject application;
fig. 4 shows a flowchart of a method for providing log information at a device side and a user equipment side according to a preferred embodiment of the present application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
Fig. 1 shows a device schematic of a device 1 for providing log information according to an aspect of the present application. Wherein the device 1 comprises a first means 11 and a second means 12.
Here, the device 1 includes various intelligent terminals, mobile intelligent devices, various personal computers, cloud servers, and the like, and meanwhile, it should be understood by those skilled in the art that the operation for providing log information described in the present application may be completed in user equipment, for example, in various mobile intelligent terminals; or in a network device, such as a cloud server, a transit server, or a VPN server; it may even be that part of the processing is done in the user equipment and another part of the processing is done in the corresponding network equipment, and thus the apparatus 1 for providing log information may comprise either the user equipment or the network equipment.
Specifically, the first device 11 obtains log information of the user equipment; the second means 12 provides the log information to the user equipment in a network connection dimension.
Here, preferably, in the respective embodiments, the device 1 corresponds to a network device, and at this time, for convenience of description, the device 1 and the network device may be used interchangeably.
At this time, the first device 11 of the network device acquires log information of the user equipment. Here, the device, the system, the service program, and the like generate corresponding event records during operation, each row of log records descriptions of related operations such as date, time, user, and action, and the log information of the ue includes an application log corresponding to an application currently running or historically running in the ue, or other system logs of the ue. Preferably, the network device may determine different types of log information needed based on different scenarios of different applications that the user device is running currently or during a historical period. If the user equipment is loaded and runs an application related to connection and protection of the wireless access point, at this time, the user equipment is performing experience operation related to wireless connection, for example, establishing connection with a target wireless access point or disconnecting the connection; for another example, in the use process of the target wireless access point, the related application protection program on the user equipment performs a security protection operation, log information corresponding to the operations is an object obtained by the first device 11, and based on this, the log information obtained by the network equipment and subsequently provided to the corresponding user equipment may be refined into various types of log information such as a connection log event, a security log event, a wireless access point experience log event, and the like based on the application scenario related to the wireless connection. Here, preferably, the network device may obtain and record corresponding access log information when receiving a corresponding application access request issued by the user device.
Then, the second means 12 of the network device provides the log information to the user equipment in the network connection dimension. Here, preferably, the network connection dimension includes any one of: wireless access points, mobile communication networks, wired connections, VPN (Virtual Private Network). Wherein the wireless access points include access points of various wireless networks including, but not limited to, wireless local area networks based on IEEE 802.11 family of standard protocols, such as IEEE 802.11b protocol based wireless local area networks, known as WiFi networks; the Mobile Communication network includes, but is not limited to, a GSM (Global System for Mobile Communication) network, a CDMA (Code Division Multiple Access) network, a 3G (3rd Generation, third Generation Mobile Communication) network, a 4G (4th Generation, fourth Generation Mobile Communication) network, a 5G (5th Generation, fifth Generation Mobile Communication) network, and the like; including but not limited to wired network connections implemented on coaxial cable, twisted pair, fiber optics, and the like. Here, preferably, the log information acquired by each network device includes one or more specific application event information, and further, when the log information occurs with the application event information corresponding to the log information, the network connection information corresponding to the user device is matched. For example, the log information may be matched with corresponding network connection information based on time information recorded in the log information, or one or more log information corresponding during the network connection may be matched for the network connection information. Then, the log information is provided to the user equipment according to the network connection dimension. For example, the corresponding log information is provided in sequence according to a time sequence corresponding to historical or real-time network connection. Further, preferably, each of the log information also corresponds to respective time information, and the time information may include time information of occurrence or completion of the application event information corresponding to the log information. Here, it is preferable that the network connection information, the time information corresponding to the network connection information, and the time information corresponding to the log information are all acquired from the log information.
Here, it should be understood by those skilled in the art that, in another corresponding embodiment, the apparatus 1 may also correspond to a corresponding user equipment, and in this case, for convenience of description, the apparatus 1 and the user equipment may be used interchangeably. Specifically, the first apparatus 11 of the user equipment acquires log information of the user equipment; at this time, the log information may include an application log recorded locally by the user equipment, or other system logs of the user equipment. Then, the user device may provide the log information to the corresponding user according to the corresponding network connection dimension based on the network connection information matched with the log information, for example, present the log information in an interface of the user device based on the network connection dimension.
Here, it should be understood by those skilled in the art that, in yet another corresponding embodiment, the respective operations of the device 1 may also be performed by the user equipment in cooperation with both ends of the network device.
Here, whether the device 1 corresponds to the user equipment, the network equipment, or a combination of the user equipment and the network equipment, the application can provide log information that matches the network connection dimension to the user equipment. Therefore, the system log information can be subjected to refined matching according to actual application scenes and requirements, and the log information based on the network dimension is provided, so that corresponding users can acquire the history of the user equipment or the real-time application condition of each application, for example, in the scene that the user equipment starts VPN application protection, the log information such as corresponding security log events in the VPN network dimension can be provided to the corresponding users based on the specific network connection dimension through the method for providing the log information. Further, the obtained log information based on the network connection dimension may also provide reference information for a subsequent operation instruction of the user or a subsequent intelligent operation of the user equipment, for example, if it is determined that a current application operation is not running in a safe network state based on the log information based on the network connection dimension, the user may stop the operation, switch to another safer network connection mode, or other connectable networks, based on needs. Therefore, diversified and refined experiences of human-computer interaction can be enhanced and optimized based on the application.
In a preferred embodiment (see fig. 1), the apparatus 1 further comprises third means 13 (not shown). The third device determines application event information corresponding to the log information; wherein the second device 12 provides the application event information to the user equipment in a network connection dimension.
Here, preferably, in this embodiment, the third device may correspond to a corresponding device of a network device, and may also correspond to a corresponding device of a user equipment.
Specifically, in practical applications, the device 1 may obtain the string information corresponding to the log information in units of lines or paragraphs, where each unit of the string information may correspond to one or more specific application event information. Here, the application event information may include, but is not limited to, information about an application currently or historically running by the user equipment, for example, event information about a corresponding application triggered based on an interaction operation of a user, and for example, event information about a corresponding application automatically triggered by the user equipment, or event information about a corresponding application implemented by a third-party device. Here, preferably, the application event information corresponding to the log information is determined, and then the application event information is provided to the user equipment according to the network connection dimension. For example, the application event information included in the log information is target network connection state information or current application protected information. And further matching the application event information with the corresponding network connection information when the application event information occurs. By analogy, further, history corresponding to a plurality of log information corresponding to the user equipment or real-time application event information is matched with respective network connection information, so that the application event information is provided to the user equipment according to network connection dimension. Here, it is preferable that time information of the application event information of the user equipment is simultaneously provided to the user equipment.
Preferably, the third apparatus includes a first unit (not shown) and a second unit (not shown), the first unit sending a log resolution request regarding the log information to a corresponding network device; and the second unit receives application event information corresponding to the log information returned by the network equipment based on the log analysis request.
Here, preferably, in this embodiment, the third device is a corresponding device of the user equipment.
Specifically, the corresponding application event information may be extracted from the log information of the ue based on a preset parsing rule. In this application, the parsing operation of the log information may be performed locally by the user equipment. In addition, in this embodiment, preferably, the first unit may also send a log analysis request about the log information to a corresponding network device, analyze the log information via the network device, and extract corresponding application event information; then, the second unit receives application event information corresponding to the log information returned by the network device based on the log analysis request.
Preferably, the third device determines the application event information corresponding to the log information according to the application related information corresponding to the log information. Specifically, the log information may include application-related information such as application identification information or application name information corresponding to the application event information, for example, a specific character string includes the application-related information, so that the application event information corresponding to the corresponding log information can be accurately identified according to the application-related information.
FIG. 2 illustrates a system diagram for providing log information in accordance with a preferred embodiment of the present application.
The device 1 shown in the figure is here a preferred embodiment of the device 1 shown in fig. 1. Wherein the apparatus 1 comprises a fourth means 14 ', a fifth means 15', a first means 11 'and a second author 12'. Specifically, the fourth device 14' receives an application access request sent by the user equipment; the fifth device 15' obtains an application access result corresponding to the application access request; the first device 11' obtains the log information of the user equipment 2; the second device 12' provides the application access result and the log information to the user equipment 2, wherein the log information is provided in a network connection dimension.
Here, the device 1 is preferably a network device, for example, a VPN server corresponding to the user device 2, and in this case, for convenience of description, the device 1 and the network device may be used interchangeably. In conjunction with this preferred device 1, the system for providing log information further comprises a user device 2 for providing log information. The user devices 2 include, but are not limited to, various mobile smart devices, various personal computers, and the like. Wherein the user equipment 2 comprises sixth means 16 ', seventh means 17 ' and eighth means 18 '. Here, the sixth means 16' sends an application access request to the corresponding network device; the seventh device 17' receives the corresponding application access result and the log information returned by the network device based on the application access request; the eighth means 18' presents the log information to the user equipment 2 in a network connection dimension.
Specifically, here, the sixth means 16 'of the user equipment 2 first sends an application access request to the corresponding network device, and correspondingly, the fourth means 14' of the network device receives the application access request sent by the user equipment 2. Here, the application access request may be an operation instruction actively issued by a user corresponding to the user device 2, for example, the user clicks to connect to some wireless access point information to request to connect to a corresponding wireless access point; or the user requests to acquire data information in a certain application program; the application access request may also be an operation automatically executed by the user equipment 2, for example, the user equipment 2 switches the currently connected wireless network in the background based on a certain application scenario, or a security application in the background of the user equipment 2 automatically starts to request a corresponding protection program. Here, the network device may include a server where the corresponding application is located, and may further include other third-party devices, such as a transit server, a VPN server, and the like.
Then, the fifth means 15' of the network device determines a corresponding application access result based on the application access request, where the application access result may be obtained locally at the network device or obtained from a corresponding other device, such as a real server corresponding to the application.
Then, preferably, when the network device obtains the application access request, the network device determines log information corresponding to the application access request based on analysis of the application access request and in combination with a preset analysis rule, for example, determines application event information corresponding to the log information.
Then, the second device 12' of the network device provides the log information corresponding to the application access request and the obtained application access result to the user equipment 2. When the log information and the application event information corresponding to the log information occur, the network connection information corresponding to the user equipment 2 is matched, that is, the log information is provided to the user equipment 2 according to the network connection dimension. Further, preferably, each of the log information also corresponds to respective time information, and the time information may include time information of occurrence or completion of the application event information corresponding to the log information.
The eighth means 18' then presents the log information to the user equipment 2 in the network connection dimension. Here, it is preferable that network information of current or historical connections can be presented in the user equipment 2, and further, based on the network connection dimension, the log information presented in the network equipment 2 and matched with each network can include all or part of the corresponding log information during the corresponding network connection, for example, all or part of the application event information. Further, preferably, the user equipment 2 may also correspondingly present connection period information corresponding to the current or historical connected network information; further, the log information, such as the time information corresponding to the application event information, is presented in a matching manner.
In this case, the eighth means 18' preferably present the log information to the user device 2 in a network connection dimension, wherein the log information with the same network connection dimension is arranged in a time dimension. Here, the arrangement of each network information in the user equipment 2 may be in the order of time, for example, the time closest to the current time is earlier; in addition, preferably, one or more pieces of the log information that may be included in the same network connection dimension may also be arranged in a time dimension, may be arranged in a sequence based on a time axis, or may be arranged in a reverse sequence, and further, the time information corresponding to each piece of the log information may also be correspondingly presented on the user equipment 2 in an area corresponding to the log information presentation area.
In this embodiment, the user equipment 2 may obtain log information corresponding to the application access request sent by the user equipment 2 and returned by the corresponding network equipment, and present the log information to the user equipment 2 according to the network connection dimension. Here, through a specific presentation form, the history of the user equipment 2 or the real-time application status of each application can be vividly presented in the user equipment 2, so that the presentation based on refined log information is convenient for a user, meanwhile, the reasonable presentation of the log information improves the readability of the log information, so that the user can quickly acquire and know the application status of each application in a certain network connection dimension, and further, the user can be helped to optimize other subsequent operation instructions.
Preferably, the sixth means is configured to intercept an application access request submitted by the user equipment 2, and forward the application access request to the network device; wherein the user equipment 2 further comprises ninth means (not shown). And the ninth device provides the application access result to the application corresponding to the application access request.
Specifically, in an actual scenario, an application access request submitted based on an application is sometimes not directly sent to a real server corresponding to the application. But other application programs in the user equipment 2 intercept the application access request, and the intercepted application access request is forwarded to the network equipment corresponding to the other application programs, and then the network equipment forwards the application access request to the real server corresponding to the application. For example, when the application access request needs to be backed up or stored, the application access request may be intercepted and forwarded to other transit servers. As another example, the network device may also be a VPN server. Wherein, the sixth means 16' intercepts an application access request submitted by the user equipment 2; and forwarding the application access request to the VPN server through a VPN connection between the user equipment 2 and the VPN server. At this time, the secure channel is connected through the VPN, so that the security protection of the data transmission corresponding to the application can be realized. Here, it is preferable that a VPN client corresponding to the VPN server is simultaneously installed in the user equipment 2, and the application access request is intercepted by the running VPN client and is further transmitted to the corresponding VPN server through a VPN connection. Further, the application access request detected to pass through the VPN server is sent to the real server corresponding to the application access request.
Then, when the application program corresponding to the network device in the user device 2 receives the application access result corresponding to the application access request, the application access result is provided to the real application actually corresponding to the application access request. For example, in a scenario where the network device is the VPN server, the VPN server first receives an application access result from a real server corresponding to the application access request, and the application access result is received by the VPN client corresponding to the user device 2 through the VPN connection, and finally, the VPN client provides the application access result to an application corresponding to the application access request.
In this embodiment, when the Network device is not a real server corresponding to the application access request, for example, when the Network device is a Virtual Private Network (VPN) server. At this time, preferably, the content of the log information may further include log information based on a corresponding VPN network, for example, log information related to application security, and at this time, in a certain scenario, based on a connected network, such as a feature of the VPN network itself, matched log information may be presented, so as to further optimize user experience.
More preferably, the sixth means of the user equipment 2 intercepts an application access request submitted by the user equipment 2; detecting whether the application access request meets a trigger condition for starting VPN connection; and if the triggering condition is met, forwarding the application access request to the VPN server through VPN connection between the user equipment 2 and the VPN server.
Specifically, the user equipment 2 may determine and select whether to enable a VPN connection to respond to an application access request by detecting the application access request of each application running thereon. If the application access request meets the trigger condition for starting VPN connection, forwarding the application access request to the VPN server through the VPN connection between the user equipment 2 and the VPN server; otherwise, the application access request is transmitted based on the common network connection. Preferably, the trigger condition may take into account the network security requirements of each application in the user equipment 2, for example, if the application with higher security level is used, a VPN connection is enabled by default; as another example, applications that need to enable VPN connectivity may be customized by the user. Therefore, the data transmission safety can be protected, unnecessary resource overhead is saved, and the preference information of the user is considered.
FIG. 3 illustrates a flow diagram of a method for providing log information in accordance with another aspect of the subject application. Wherein the method comprises step S31 and step S32.
Here, the device 1 includes various intelligent terminals, mobile intelligent devices, various personal computers, cloud servers, and the like, and meanwhile, it should be understood by those skilled in the art that the operation for providing log information described in the present application may be completed in user equipment, for example, in various mobile intelligent terminals; or in a network device, such as a cloud server, a transit server, or a VPN server; it may even be that part of the processing is done in the user equipment and another part of the processing is done in the corresponding network equipment, and thus the apparatus 1 for providing log information may comprise either the user equipment or the network equipment.
Specifically, in step S31, the device 1 acquires log information of the user device; in step S32, the device 1 provides the log information to the user device in a network connection dimension.
Here, preferably, in the respective embodiments, the device 1 corresponds to a network device, and at this time, for convenience of description, the device 1 and the network device may be used interchangeably.
At this time, the network device acquires log information of the user device. Here, the device, the system, the service program, and the like generate corresponding event records during operation, each row of log records descriptions of related operations such as date, time, user, and action, and the log information of the ue includes an application log corresponding to an application currently running or historically running in the ue, or other system logs of the ue. Preferably, the network device may determine different types of log information needed based on different scenarios of different applications that the user device is running currently or during a historical period. If the user equipment is loaded and runs an application related to connection and protection of the wireless access point, at this time, the user equipment is performing experience operation related to wireless connection, for example, establishing connection with a target wireless access point or disconnecting the connection; for another example, in the use process of the target wireless access point, the related application protection program on the user equipment performs security protection operation, the log information corresponding to the above operations is an object obtained by the device 1, and based on this, the network device obtains log information which is subsequently provided to the corresponding user equipment, and the log information can be refined into various types of log information such as a connection log event, a security log event, a wireless access point experience log event, and the like based on the application scene related to the wireless connection. Here, preferably, the network device may obtain and record corresponding access log information when receiving a corresponding application access request issued by the user device.
Then, the network device provides the log information to the user device in a network connection dimension. Here, preferably, the network connection dimension includes any one of: wireless access points, mobile communication networks, wired connections, VPN (Virtual Private Network). Wherein the wireless access points include access points of various wireless networks including, but not limited to, wireless local area networks based on IEEE 802.11 family of standard protocols, such as IEEE 802.11b protocol based wireless local area networks, known as WiFi networks; the Mobile Communication network includes, but is not limited to, a GSM (Global System for Mobile Communication) network, a CDMA (Code Division Multiple Access) network, a 3G (3rd Generation, third Generation Mobile Communication) network, a 4G (4th Generation, fourth Generation Mobile Communication) network, a 5G (5th Generation, fifth Generation Mobile Communication) network, and the like; including but not limited to wired network connections implemented on coaxial cable, twisted pair, fiber optics, and the like. Here, preferably, the log information acquired by each network device includes one or more specific application event information, and further, when the log information occurs with the application event information corresponding to the log information, the network connection information corresponding to the user device is matched. For example, the log information may be matched with corresponding network connection information based on time information recorded in the log information, or one or more log information corresponding during the network connection may be matched for the network connection information. Then, the log information is provided to the user equipment according to the network connection dimension. For example, the corresponding log information is provided in sequence according to a time sequence corresponding to historical or real-time network connection. Further, preferably, each of the log information also corresponds to respective time information, and the time information may include time information of occurrence or completion of the application event information corresponding to the log information. Here, it is preferable that the network connection information, the time information corresponding to the network connection information, and the time information corresponding to the log information are all acquired from the log information.
Here, it should be understood by those skilled in the art that, in another corresponding embodiment, the apparatus 1 may also correspond to a corresponding user equipment, and in this case, for convenience of description, the apparatus 1 and the user equipment may be used interchangeably. Specifically, the first apparatus 11 of the user equipment acquires log information of the user equipment; at this time, the log information may include an application log recorded locally by the user equipment, or other system logs of the user equipment. Then, the user device may provide the log information to the corresponding user according to the corresponding network connection dimension based on the network connection information matched with the log information, for example, present the log information in an interface of the user device based on the network connection dimension.
Here, it should be understood by those skilled in the art that, in yet another corresponding embodiment, the respective operations of the device 1 may also be performed by the user equipment in cooperation with both ends of the network device.
Here, whether the device 1 corresponds to the user equipment, the network equipment, or a combination of the user equipment and the network equipment, the application can provide log information that matches the network connection dimension to the user equipment. Therefore, the system log information can be subjected to refined matching according to actual application scenes and requirements, and the log information based on the network dimension is provided, so that corresponding users can acquire the history of the user equipment or the real-time application condition of each application, for example, in the scene that the user equipment starts VPN application protection, the log information such as corresponding security log events in the VPN network dimension can be provided to the corresponding users based on the specific network connection dimension through the method for providing the log information. Further, the obtained log information based on the network connection dimension may also provide reference information for a subsequent operation instruction of the user or a subsequent intelligent operation of the user equipment, for example, if it is determined that a current application operation is not running in a safe network state based on the log information based on the network connection dimension, the user may stop the operation, switch to another safer network connection mode, or other connectable networks, based on needs. Therefore, diversified and refined experiences of human-computer interaction can be enhanced and optimized based on the application.
In a preferred embodiment (refer to fig. 3), the method further comprises step S33 (not shown). In step S33, the device 1 determines application event information corresponding to the log information; wherein, in step S32, the device 1 provides the application event information to the user device in a network connection dimension.
Here, preferably, in this embodiment, the step S33 may be implemented on a network device side, or may be implemented on a user equipment side.
Specifically, in practical applications, the device 1 may obtain the string information corresponding to the log information in units of lines or paragraphs, where each unit of the string information may correspond to one or more specific application event information. Here, the application event information may include, but is not limited to, information about an application currently or historically running by the user equipment, for example, event information about a corresponding application triggered based on an interaction operation of a user, and for example, event information about a corresponding application automatically triggered by the user equipment, or event information about a corresponding application implemented by a third-party device. Here, preferably, the application event information corresponding to the log information is determined, and then the application event information is provided to the user equipment according to the network connection dimension. For example, the application event information included in the log information is target network connection state information or current application protected information. And further matching the application event information with the corresponding network connection information when the application event information occurs. By analogy, further, history corresponding to a plurality of log information corresponding to the user equipment or real-time application event information is matched with respective network connection information, so that the application event information is provided to the user equipment according to network connection dimension. Here, it is preferable that time information of the application event information of the user equipment is simultaneously provided to the user equipment.
Preferably, the step S33 includes a step S331 (not shown) and a step S332. (not shown), in step S331, the device 1 sends a log resolution request regarding the log information to a corresponding network device; in step S332, the device 1 receives application event information corresponding to the log information returned by the network device based on the log analysis request.
Here, preferably, in this embodiment, the step S33 may be implemented on the user equipment side.
Specifically, the corresponding application event information may be extracted from the log information of the ue based on a preset parsing rule. In this application, the parsing operation of the log information may be performed locally by the user equipment. In addition, in this embodiment, preferably, the user equipment may also send a log analysis request about the log information to a corresponding network device, analyze the log information via the network device, and extract corresponding application event information; and then, the user equipment receives application event information corresponding to the log information returned by the network equipment based on the log analysis request.
Preferably, in step S33, the device 1 determines the application event information corresponding to the log information according to the application-related information corresponding to the log information. Specifically, the log information may include application-related information such as application identification information or application name information corresponding to the application event information, for example, a specific character string includes the application-related information, so that the application event information corresponding to the corresponding log information can be accurately identified according to the application-related information.
Fig. 4 shows a flowchart of a method for providing log information at a device side and a user equipment side according to a preferred embodiment of the present application.
The device 1 shown in the figure is here a preferred embodiment of the device 1 shown in fig. 3. Here, preferably, the device 1 is a network device, for example, a VPN server corresponding to the user device 2, and in this case, for convenience of description, the device 1 and the network device may be used interchangeably. In conjunction with this preferred device 1, the system for providing log information further comprises a user device 2 for providing log information. The user devices 2 include, but are not limited to, various mobile smart devices, various personal computers, and the like.
Wherein the method includes step S41, step S42, step S44, step S43, and step S45. Here, in step S41, the user equipment 2 sends an application access request to the corresponding network equipment; next, in step S42, the network device obtains an application access result corresponding to the application access request; next, in step S44, the network device acquires log information of the user device 2; next, in step S43, the user equipment 2 receives the corresponding application access result and the log information returned by the network equipment based on the application access request; next, in step S45, the user device 2 presents the log information to the user device 2 in the network connection dimension.
Specifically, in step S41, an application access request is first sent by the user equipment 2 to the corresponding network equipment. Here, the application access request may be an operation instruction actively issued by a user corresponding to the user device 2, for example, the user clicks to connect to some wireless access point information to request to connect to a corresponding wireless access point; or the user requests to acquire data information in a certain application program; the application access request may also be an operation automatically executed by the user equipment 2, for example, the user equipment 2 switches the currently connected wireless network in the background based on a certain application scenario, or a security application in the background of the user equipment 2 automatically starts to request a corresponding protection program. Here, the network device may include a server where the corresponding application is located, and may further include other third-party devices, such as a transit server, a VPN server, and the like.
Next, in step S42, the network device determines a corresponding application access result based on the application access request, where the application access result is obtained locally at the network device or obtained from a corresponding other device, such as a real server corresponding to the application.
Next, in step S44, preferably, when acquiring the application access request, the network device determines log information corresponding to the application access request based on analysis of the application access request and in combination with a preset analysis rule, for example, determines application event information corresponding to the log information.
Next, in step S43, the user equipment 2 receives the corresponding application access result and the log information returned by the network equipment based on the application access request. When the log information and the application event information corresponding to the log information occur, the network connection information corresponding to the user equipment 2 is matched, that is, the log information is provided to the user equipment 2 according to the network connection dimension. Further, preferably, each of the log information also corresponds to respective time information, and the time information may include time information of occurrence or completion of the application event information corresponding to the log information.
Next, in step S45, the user device 2 presents the log information to the user device 2 in the network connection dimension. Here, it is preferable that network information of current or historical connections can be presented in the user equipment 2, and further, based on the network connection dimension, the log information presented in the network equipment 2 and matched with each network can include all or part of the corresponding log information during the corresponding network connection, for example, all or part of the application event information. Further, preferably, the user equipment 2 may also correspondingly present connection period information corresponding to the current or historical connected network information; further, the log information, such as the time information corresponding to the application event information, is presented in a matching manner.
Here, preferably, in step S45, the user device 2 presents the log information to the user device 2 in a network connection dimension, wherein the log information having the same network connection dimension is arranged in a time dimension. Here, the arrangement of each network information in the user equipment 2 may be in the order of time, for example, the time closest to the current time is earlier; in addition, preferably, one or more pieces of the log information that may be included in the same network connection dimension may also be arranged in a time dimension, may be arranged in a sequence based on a time axis, or may be arranged in a reverse sequence, and further, the time information corresponding to each piece of the log information may also be correspondingly presented on the user equipment 2 in an area corresponding to the log information presentation area.
In this embodiment, the user equipment 2 may obtain log information corresponding to the application access request sent by the user equipment 2 and returned by the corresponding network equipment, and present the log information to the user equipment 2 according to the network connection dimension. Here, through a specific presentation form, the history of the user equipment 2 or the real-time application status of each application can be vividly presented in the user equipment 2, so that the presentation based on refined log information is convenient for a user, meanwhile, the reasonable presentation of the log information improves the readability of the log information, so that the user can quickly acquire and know the application status of each application in a certain network connection dimension, and further, the user can be helped to optimize other subsequent operation instructions.
Preferably, in step S41, the network device intercepts the application access request submitted by the user equipment 2, and forwards the application access request to the network device; wherein the user equipment 2 further comprises step S47 (not shown). In step S47, the user equipment 2 provides the application access result to the application corresponding to the application access request.
Specifically, in an actual scenario, an application access request submitted based on an application is sometimes not directly sent to a real server corresponding to the application. But other application programs in the user equipment 2 intercept the application access request, and the intercepted application access request is forwarded to the network equipment corresponding to the other application programs, and then the network equipment forwards the application access request to the real server corresponding to the application. For example, when the application access request needs to be backed up or stored, the application access request may be intercepted and forwarded to other transit servers. As another example, the network device may also be a VPN server. The user equipment 2 intercepts an application access request submitted by the user equipment 2; and forwarding the application access request to the VPN server through a VPN connection between the user equipment 2 and the VPN server. At this time, the secure channel is connected through the VPN, so that the security protection of the data transmission corresponding to the application can be realized. Here, it is preferable that a VPN client corresponding to the VPN server is simultaneously installed in the user equipment 2, and the application access request is intercepted by the running VPN client and is further transmitted to the corresponding VPN server through a VPN connection. Further, the application access request detected to pass through the VPN server is sent to the real server corresponding to the application access request.
Then, when the application program corresponding to the network device in the user device 2 receives the application access result corresponding to the application access request, the application access result is provided to the real application actually corresponding to the application access request. For example, in a scenario where the network device is the VPN server, the VPN server first receives an application access result from a real server corresponding to the application access request, and the application access result is received by the VPN client corresponding to the user device 2 through the VPN connection, and finally, the VPN client provides the application access result to an application corresponding to the application access request.
In this embodiment, when the Network device is not a real server corresponding to the application access request, for example, when the Network device is a Virtual Private Network (VPN) server. At this time, preferably, the content of the log information may further include log information based on a corresponding VPN network, for example, log information related to application security, and at this time, in a certain scenario, based on a connected network, such as a feature of the VPN network itself, matched log information may be presented, so as to further optimize user experience.
More preferably, in step S41, the user equipment 2 intercepts an application access request submitted by the user equipment 2; detecting whether the application access request meets a trigger condition for starting VPN connection; and if the triggering condition is met, forwarding the application access request to the VPN server through VPN connection between the user equipment 2 and the VPN server.
Specifically, the user equipment 2 may determine and select whether to enable a VPN connection to respond to an application access request by detecting the application access request of each application running thereon. If the application access request meets the trigger condition for starting VPN connection, forwarding the application access request to the VPN server through the VPN connection between the user equipment 2 and the VPN server; otherwise, the application access request is transmitted based on the common network connection. Preferably, the trigger condition may take into account the network security requirements of each application in the user equipment 2, for example, if the application with higher security level is used, a VPN connection is enabled by default; as another example, applications that need to enable VPN connectivity may be customized by the user. Therefore, the data transmission safety can be protected, unnecessary resource overhead is saved, and the preference information of the user is considered.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (23)

1. A method for providing log information, wherein the method comprises:
acquiring log information of user equipment, wherein the log information comprises application program logs corresponding to applications currently running or historically running in the user equipment, or other system logs of the user equipment;
providing the log information to the user equipment according to the network connection dimension so as to present the log information matched with the network connection dimension at the user equipment.
2. The method of claim 1, wherein the method further comprises:
determining application event information corresponding to the log information;
wherein the providing the log information to the user equipment in a network connection dimension comprises:
providing the application event information to the user device in a network connection dimension.
3. The method of claim 2, wherein the determining application event information to which the log information corresponds comprises:
sending a log analysis request about the log information to corresponding network equipment;
and receiving application event information corresponding to the log information returned by the network equipment based on the log analysis request.
4. The method of claim 2, wherein the determining application event information to which the log information corresponds comprises:
and determining application event information corresponding to the log information according to the application related information corresponding to the log information.
5. The method of claim 1, wherein the network connection dimension comprises any of:
a wireless access point;
a mobile communication network;
a wired connection;
VPN。
6. the method of any of claims 1-5, wherein the method further comprises:
receiving an application access request sent by user equipment;
acquiring an application access result corresponding to the application access request;
wherein the acquiring of the log information of the user equipment comprises:
acquiring log information of the user equipment;
wherein the providing the log information to the user equipment in a network connection dimension comprises:
and providing an application access result and the log information to the user equipment, wherein the log information is provided according to a network connection dimension.
7. A method for providing log information at a user equipment, wherein the method comprises:
sending an application access request to corresponding network equipment;
receiving a corresponding application access result and log information returned by the network device based on the application access request, wherein the log information includes an application program log corresponding to an application currently running or historically running in the user device, or other system logs of the user device;
presenting the log information to the user equipment according to the network connection dimension so as to present the log information matched with the network connection dimension at the user equipment.
8. The method of claim 7, wherein the sending an application access request to a corresponding network device comprises:
intercepting an application access request submitted by user equipment, and forwarding the application access request to the network equipment;
wherein the method further comprises:
and providing the application access result to the application corresponding to the application access request.
9. The method of claim 8, wherein the network device is a VPN server;
wherein the sending of the application access request to the corresponding network device comprises:
intercepting an application access request submitted by user equipment;
forwarding the application access request to the VPN server through a VPN connection of the user device with the VPN server.
10. The method of claim 9, wherein the sending an application access request to a corresponding network device comprises:
intercepting an application access request submitted by user equipment;
detecting whether the application access request meets a trigger condition for starting VPN connection;
and if the triggering condition is met, forwarding the application access request to the VPN server through VPN connection between the user equipment and the VPN server.
11. The method of any of claims 7 to 10, wherein the presenting the log information to the user device in a network connection dimension comprises:
presenting the log information to the user equipment in a network connection dimension, wherein the log information with the same network connection dimension is arranged in a time dimension.
12. An apparatus for providing log information, wherein the apparatus comprises:
a first device, configured to obtain log information of a user equipment, where the log information includes an application log corresponding to an application currently running or historically running in the user equipment, or other system logs of the user equipment;
and second means for providing the log information to the user equipment in a network connection dimension to present the log information matching the network connection dimension at the user equipment.
13. The apparatus of claim 12, wherein the apparatus further comprises:
third means for determining application event information corresponding to the log information;
wherein the second means is for:
providing the application event information to the user device in a network connection dimension.
14. The apparatus of claim 13, wherein the third means comprises:
a first unit for transmitting a log parsing request regarding the log information to a corresponding network device;
and the second unit is used for receiving application event information corresponding to the log information returned by the network equipment based on the log analysis request.
15. The apparatus of claim 13, wherein the third means is for:
and determining application event information corresponding to the log information according to the application related information corresponding to the log information.
16. The device of claim 12, wherein the network connection dimension comprises any one of:
a wireless access point;
a mobile communication network;
a wired connection;
VPN。
17. the apparatus of any of claims 12 to 16, wherein the apparatus further comprises:
a fourth device, configured to receive an application access request sent by a user equipment;
a fifth device, configured to obtain an application access result corresponding to the application access request;
wherein the first means is for:
acquiring log information of the user equipment;
wherein the second means is for:
and providing an application access result and the log information to the user equipment, wherein the log information is provided according to a network connection dimension.
18. A user equipment for providing log information, wherein the apparatus comprises:
a sixth means for sending an application access request to a corresponding network device;
a seventh device, configured to receive a corresponding application access result and log information that are returned by the network device based on the application access request, where the log information includes an application log corresponding to an application currently running or historically running in the user equipment, or another system log of the user equipment;
and the eighth device is used for presenting the log information to the user equipment according to the network connection dimension so as to present the log information matched with the network connection dimension on the user equipment.
19. The apparatus of claim 18, wherein the sixth means is for:
intercepting an application access request submitted by user equipment, and forwarding the application access request to the network equipment;
wherein the apparatus further comprises:
ninth means for providing the application access result to the application corresponding to the application access request.
20. The device of claim 19, wherein the network device is a VPN server;
wherein the sixth means is for:
intercepting an application access request submitted by user equipment;
forwarding the application access request to the VPN server through a VPN connection of the user device with the VPN server.
21. The apparatus of claim 20, wherein the sixth means is for:
intercepting an application access request submitted by user equipment;
detecting whether the application access request meets a trigger condition for starting VPN connection;
and if the triggering condition is met, forwarding the application access request to the VPN server through VPN connection between the user equipment and the VPN server.
22. The apparatus of any of claims 18-21, wherein the eighth means is for:
presenting the log information to the user equipment in a network connection dimension, wherein the log information with the same network connection dimension is arranged in a time dimension.
23. A system for providing log information, comprising an apparatus as claimed in any of claims 12 to 17 and a user device as claimed in any of claims 18 to 22.
CN201610481868.7A 2016-06-27 2016-06-27 Method and equipment for providing log information Active CN107547221B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610481868.7A CN107547221B (en) 2016-06-27 2016-06-27 Method and equipment for providing log information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610481868.7A CN107547221B (en) 2016-06-27 2016-06-27 Method and equipment for providing log information

Publications (2)

Publication Number Publication Date
CN107547221A CN107547221A (en) 2018-01-05
CN107547221B true CN107547221B (en) 2021-06-25

Family

ID=60962115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610481868.7A Active CN107547221B (en) 2016-06-27 2016-06-27 Method and equipment for providing log information

Country Status (1)

Country Link
CN (1) CN107547221B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108235083B (en) * 2018-01-16 2021-08-24 海信视像科技股份有限公司 Television log information acquisition method and device
US10958585B2 (en) 2018-12-31 2021-03-23 Juniper Networks, Inc. Methods and apparatus for facilitating fault detection and/or predictive fault detection
US11138059B2 (en) * 2019-09-25 2021-10-05 Juniper Networks, Inc. Log analysis in vector space

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1825812A (en) * 2005-02-25 2006-08-30 华为技术有限公司 System and method for managing network web log information
CN102693307A (en) * 2012-05-24 2012-09-26 上海克而瑞信息技术有限公司 Website user access behavior recording and analyzing system
CN103685714A (en) * 2012-09-26 2014-03-26 华为技术有限公司 Terminal log generation method and terminal
CN105049251A (en) * 2015-07-23 2015-11-11 小米科技有限责任公司 Access log processing method and system, and equipment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101833570A (en) * 2010-03-23 2010-09-15 深圳市五巨科技有限公司 Method and device for optimizing page push of mobile terminal
CN101826984A (en) * 2010-04-08 2010-09-08 中兴通讯股份有限公司 Log information processing method and device thereof
CN102902752B (en) * 2012-09-20 2015-04-15 新浪网技术(中国)有限公司 Method and system for monitoring log
CN103353868B (en) * 2013-05-30 2018-05-11 百度在线网络技术(北京)有限公司 A kind of method and apparatus for the resource assessment information for being used to determine multimedia resource
US9049173B2 (en) * 2013-06-05 2015-06-02 Fortinet, Inc. Cloud based logging service
CN104967572B (en) * 2015-06-05 2019-04-12 小米科技有限责任公司 Network Access Method, device and equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1825812A (en) * 2005-02-25 2006-08-30 华为技术有限公司 System and method for managing network web log information
CN102693307A (en) * 2012-05-24 2012-09-26 上海克而瑞信息技术有限公司 Website user access behavior recording and analyzing system
CN103685714A (en) * 2012-09-26 2014-03-26 华为技术有限公司 Terminal log generation method and terminal
CN105049251A (en) * 2015-07-23 2015-11-11 小米科技有限责任公司 Access log processing method and system, and equipment

Also Published As

Publication number Publication date
CN107547221A (en) 2018-01-05

Similar Documents

Publication Publication Date Title
CN110300050B (en) Message pushing method and device, computer equipment and storage medium
US20210036907A1 (en) Methods and apparatuses for pushing a message
US10194274B2 (en) Method and device for providing wireless access point
CN106547634B (en) Cross-process communication method and device
US10728813B2 (en) Method and device for handing over user equipment among wireless access points
CN107743130B (en) Fingerprint matching method, device and system
US10863312B2 (en) Moving track sharing method and apparatus, and storage medium
US9612886B2 (en) Method and device for monitoring API function scheduling in mobile terminal
CN107547221B (en) Method and equipment for providing log information
US10623450B2 (en) Access to data on a remote device
US20200004785A1 (en) Automatic grouping based on user behavior
CN106658666B (en) Method and equipment for establishing wireless connection
CN104902033B (en) Log in address recording method and device
CN109286684B (en) Communication connection processing method and device, proxy server and storage medium
CN114500633A (en) Data forwarding method, related device, program product and data transmission system
US9270776B2 (en) Dynamically adjusting delivery of content between terminal device and server
CN113067802A (en) User identification method, device, equipment and computer readable storage medium
CN110177360B (en) Method and device for binding with wearable device
US9763082B2 (en) Optimizing setup for wireless devices
CN109831335B (en) Data monitoring method, monitoring terminal, storage medium and data monitoring system
CN110933070A (en) User identification method, system, equipment and computer readable storage medium
CN108289165B (en) Method and device for realizing camera control based on mobile phone and terminal equipment
CN109756393B (en) Information processing method, system, medium, and computing device
JP6412641B2 (en) Communication link transmission method, apparatus and terminal
US9680917B2 (en) Method, apparatus, and system of opening a web page

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant