CN111897786B - Log reading method, device, computer equipment and storage medium - Google Patents

Log reading method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN111897786B
CN111897786B CN202010463755.0A CN202010463755A CN111897786B CN 111897786 B CN111897786 B CN 111897786B CN 202010463755 A CN202010463755 A CN 202010463755A CN 111897786 B CN111897786 B CN 111897786B
Authority
CN
China
Prior art keywords
log
program
reading
target
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010463755.0A
Other languages
Chinese (zh)
Other versions
CN111897786A (en
Inventor
何伟崇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fibocom Wireless Inc
Original Assignee
Fibocom Wireless Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fibocom Wireless Inc filed Critical Fibocom Wireless Inc
Priority to CN202010463755.0A priority Critical patent/CN111897786B/en
Publication of CN111897786A publication Critical patent/CN111897786A/en
Application granted granted Critical
Publication of CN111897786B publication Critical patent/CN111897786B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/349Performance evaluation by tracing or monitoring for interfaces, buses
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/122File system administration, e.g. details of archiving or snapshots using management policies
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application relates to a log reading method, a log reading device, computer equipment and a storage medium. The method comprises the following steps: a log reading program sends a login request to a log management program so that the log management program verifies login information according to a pre-stored user list; when verification is passed, acquiring target reading permission corresponding to login information from a user list through a log management program, determining a target log grade according to the target reading permission, acquiring tag information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list; the log file list is sent to a log reading program for display; and sending a log reading request to a log management program through the log reading program, so that the log management program obtains a target encrypted log file corresponding to the target tag information, decrypts the target encrypted log file, and sends the decrypted target encrypted log file to the log reading program for display. By adopting the method, the safety of log reading can be improved.

Description

Log reading method, device, computer equipment and storage medium
Technical Field
The present disclosure relates to the field of internet technologies, and in particular, to a method and apparatus for reading logs, a computer device, and a storage medium.
Background
With the development of internet technology, a program log appears, and the program log is an event record file output by an application program in the running process. By analyzing the program log, the user can track the running state of the application. The communication module includes a plurality of application programs, and each application program can output a large number of program logs after the communication module is powered on to run.
In the conventional technology, all users can acquire the program log in the communication module. However, the program log includes core data, and all users can acquire the program log in the communication module, so that the risk that the core data is stolen is easily generated, and potential safety hazards exist.
Disclosure of Invention
In view of the above, it is desirable to provide a log reading method, apparatus, computer device, and storage medium capable of improving security of log reading.
A log reading method applied to a terminal installed with a log management program and a log reading program, the log management program being deployed in a communication module of the terminal, the log reading program being deployed in a host of the terminal, the method comprising:
According to the communication connection between the communication module and the host, a log reading program sends a log request to a log management program so that the log management program verifies the log information according to a pre-stored user list, and the log request carries the log information;
when verification is passed, acquiring target reading permission corresponding to login information from a pre-stored user list through a log management program, determining a target log grade according to the target reading permission, acquiring tag information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the tag information comprises creation time, log grade and service program identification;
according to the communication connection between the communication module and the host, the log file list is sent to a log reading program for display;
the method comprises the steps that a log reading request is sent to a log management program through the log reading program, so that the log management program obtains a target encrypted log file corresponding to target tag information, the target encrypted log file is decrypted to obtain a target decrypted log file, the target decrypted log file is sent to the log reading program to be displayed, the log reading request is generated through triggering operation aiming at a log file list, and the log reading request carries the target tag information.
A log reading apparatus, the apparatus comprising:
the log information verification module is used for sending a log request to the log management program through the log reading program according to the communication connection between the communication module and the host computer, so that the log management program verifies the log information according to a pre-stored user list, and the log request carries the log information;
the log file list generation module is used for acquiring target reading permission corresponding to login information from a pre-stored user list through a log management program when verification is passed, determining a target log grade according to the target reading permission, acquiring tag information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the tag information comprises creation time, log grade and service program identification;
the log file list sending module is used for sending the log file list to the log reading program for display according to the communication connection between the communication module and the host;
the log file sending module is used for sending a log reading request to the log management program through the log reading program so that the log management program obtains a target encrypted log file corresponding to target tag information, decrypts the target encrypted log file to obtain a target decrypted log file, sends the target decrypted log file to the log reading program for display, and the log reading request is generated through triggering operation aiming at a log file list and carries the target tag information.
A computer device comprising a memory storing a computer program and a processor which when executing the computer program performs the steps of:
according to the communication connection between the communication module and the host, a log reading program sends a log request to a log management program so that the log management program verifies the log information according to a pre-stored user list, and the log request carries the log information;
when verification is passed, acquiring target reading permission corresponding to login information from a pre-stored user list through a log management program, determining a target log grade according to the target reading permission, acquiring tag information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the tag information comprises creation time, log grade and service program identification;
according to the communication connection between the communication module and the host, the log file list is sent to a log reading program for display;
the method comprises the steps that a log reading request is sent to a log management program through the log reading program, so that the log management program obtains a target encrypted log file corresponding to target tag information, the target encrypted log file is decrypted to obtain a target decrypted log file, the target decrypted log file is sent to the log reading program to be displayed, the log reading request is generated through triggering operation aiming at a log file list, and the log reading request carries the target tag information.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
according to the communication connection between the communication module and the host, a log reading program sends a log request to a log management program so that the log management program verifies the log information according to a pre-stored user list, and the log request carries the log information;
when verification is passed, acquiring target reading permission corresponding to login information from a pre-stored user list through a log management program, determining a target log grade according to the target reading permission, acquiring tag information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the tag information comprises creation time, log grade and service program identification;
according to the communication connection between the communication module and the host, the log file list is sent to a log reading program for display;
the method comprises the steps that a log reading request is sent to a log management program through the log reading program, so that the log management program obtains a target encrypted log file corresponding to target tag information, the target encrypted log file is decrypted to obtain a target decrypted log file, the target decrypted log file is sent to the log reading program to be displayed, the log reading request is generated through triggering operation aiming at a log file list, and the log reading request carries the target tag information.
According to the log reading method, the log reading device, the computer equipment and the storage medium, according to the communication connection between the communication module and the host, a log request is sent to the log management program through the log reading program, so that the log management program verifies the log information according to a pre-stored user list, and the log request carries the log information; when verification is passed, acquiring target reading permission corresponding to login information from a pre-stored user list through a log management program, determining a target log grade according to the target reading permission, acquiring tag information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the tag information comprises creation time, log grade and service program identification; according to the communication connection between the communication module and the host, the log file list is sent to a log reading program for display; the method comprises the steps that a log reading request is sent to a log management program through the log reading program, so that the log management program obtains a target encrypted log file corresponding to target tag information, the target encrypted log file is decrypted to obtain a target decrypted log file, the target decrypted log file is sent to the log reading program to be displayed, the log reading request is generated through triggering operation aiming at a log file list, and the log reading request carries the target tag information. Therefore, before the user obtains the log file from the host side to the communication module side, the communication module side checks the identity information of the user through the log management program, and when the identity information passes the check, the user is indicated to be a trusted user, the trusted user can obtain the log file, and the security of log file reading is improved. Moreover, different users can acquire log files of different grades, so that the security of log file reading is further improved. In addition, the encryption and decryption processes of the log file are realized at the communication module side, so that the risk of cracking an encryption algorithm is reduced, and the security of reading the log file is further improved.
Drawings
FIG. 1 is a flowchart of a log reading method according to an embodiment;
FIG. 2 is a flow diagram of storing log files in one embodiment;
FIG. 3 is a flow diagram of adding user information in one embodiment;
FIG. 4 is a flow chart of generating hint information according to one embodiment;
FIG. 5 is a flow diagram of deleting log files in one embodiment;
FIG. 6 is a block diagram of a terminal in one embodiment;
FIG. 7 is a timing diagram of a log reading method according to an embodiment;
FIG. 8 is a block diagram of a log reading device according to an embodiment;
fig. 9 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
In one embodiment, as shown in fig. 1, a log reading method is provided, and this embodiment is applied to a terminal for illustration, where the terminal may be, but is not limited to, various personal computers, notebook computers, smartphones, tablet computers, and portable wearable devices. The method comprises the following steps:
S102, according to the communication connection between the communication module and the host, a login request is sent to the log management program through the log reading program, so that the log management program verifies login information according to a pre-stored user list, and the login request carries the login information.
The terminal comprises a communication module and a host, wherein the communication module and the host can communicate through PCIe (peripheral component interconnect express, high-speed serial computer expansion bus standard) or USB (Universal Serial Bus ). The communication module is a module having a communication function, such as a 4G module, a 5G module. The host computer is provided with a log reading program, and the log reading program is an application program for providing log reading service. The communication module is operated with a log management program, and the log management program is an application program for providing log management service. The log reading program and the log management program interact with each other by exchanging information so as to realize reading of log files in the communication module.
The user list is a table file in which user information is recorded. The user list includes a plurality of sets of data, each set of data including user information of an individual user. The user information includes login information, management authority, and read authority. The login information includes a user account number and a user password. The management authority comprises management authority and no management authority. The user with the management authority is an administrator user or a super user, and can manage the user information of the common user, such as adding users, deleting users and modifying user information. The users without administrative rights are ordinary users. The read rights may be classified according to log levels, for example, the read rights of the user a are the read rights of the log level 1 and the log level 2, which indicates that the user a may read the log file corresponding to the log level 1, the log file corresponding to the log level 2, and the read rights of the user B are the read rights of the log level 1, which indicates that the user B may only read the log file corresponding to the log level 1. The read rights may also be classified according to the user level, for example, the read rights of the user a are high, which indicates that the user a can read the log files corresponding to all log levels (log levels 1-3), the read rights of the user B are medium, which indicates that the user B can read the log files corresponding to the log levels 1-2, and the read rights of the user C are low, which indicates that the user C can only read the log files corresponding to the log level 1. The user list may be pre-burned into the communication module and saved into the memory of the communication module.
Specifically, a log reading program can display a login interface on the host computer, wherein the login interface comprises a login information filling position and a login button. The user may populate a user account and user password in a login information pad location and trigger a login button. When the triggering operation of the login button is detected, the log reading program of the host side generates a login request according to login information filled by a user, and sends the login request to the log management program of the communication module side through PCIe or USB. The log management program at the communication module side can acquire a pre-stored user list, and inquires whether login information carried by the login request exists in the user list. If the login information can be queried in the user list, the login request passes verification. The triggering operation may specifically be a touch operation, a cursor operation, a key operation or a voice operation, the touch operation may be a touch click operation, a touch press operation or a touch slide operation, and the touch click operation may be a single-point touch operation or a multi-point touch operation.
And S104, when verification is passed, acquiring target reading permission corresponding to login information from a pre-stored user list through a log management program, determining a target log grade according to the target reading permission, acquiring tag information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the tag information comprises creation time, the log grade and a service program identifier.
The tag information is description information of the log file, is used for describing attribute information of the log file, and can also be used for identifying the log file. The log file is a log file output by the service program in the communication module, and the log file can be used for analyzing the running state of the service program. The label information of the log file includes creation time, log grade and business program identification of the log file. The creation time of the log file refers to the time when the business program outputs the log file. The log rank of a log file refers to the rank of the log file. The higher the level of the log file, the more important the log file is, which includes sensitive data that is more sensitive. The log grade of the log file can be determined in advance by a developer of the service program, and the developer of the service program can configure log grade rules corresponding to each service program through codes. Based on the log level rule, each business program can output the log level of the log file together when outputting the log file. The service program identifier is an identifier for uniquely identifying a service program, and may specifically include a character string of at least one of letters, numbers, and symbols.
The log management program can receive the log files sent by the service program, encrypt, compress and store the log files. The encrypted log file and the tag information of the log file may be stored in association.
The log file list is a table file in which tag information of log files is recorded. The log file list includes a plurality of sets of data, each set of data including tag information of a single log file.
Specifically, when the login information of the user passes verification, the log management program at the communication module side can acquire the reading authority corresponding to the login information from the user list, and the log grade which can be read by the user can be determined according to the reading authority. The log management program at the communication module side can search a plurality of encrypted log files corresponding to the log grade from the storage area of the log files, acquire the label information of the searched plurality of encrypted log files, and generate a log file list according to the acquired label information. When the login information of the user passes the verification, the log management program at the communication module side can return a verification success message to the log reading program at the host side. When the log reading program of the host side receives the verification success message, the log reading program jumps to the log file reading interface from the login interface.
And S106, according to the communication connection between the communication module and the host, the log file list is sent to a log reading program for display.
S108, sending a log reading request to a log management program through the log reading program so that the log management program obtains a target encrypted log file corresponding to target tag information, decrypting the target encrypted log file to obtain a target decrypted log file, sending the target decrypted log file to the log reading program for display, wherein the log reading request is generated through triggering operation aiming at a log file list, and the log reading request carries the target tag information.
The log reading request is a request with a reading function and is used for reading the log file.
Specifically, the communication module and the host have established communication connection, the log management program at the communication module side may send the log file list to the log reading program at the host side, and the log file list may be displayed on the log file reading interface of the log reading program, that is, label information of the log file available for reading is displayed. When the triggering operation of the user on the log file list is detected, namely the user selects at least one piece of tag information through the log file list, the log reading program generates a log reading request according to the tag information selected by the user, and the log reading request is sent to a log management program on the communication module side. After receiving the log reading request, the log management program can acquire a target encrypted log file corresponding to target tag information carried by the log reading request from a storage area of the log file, decompress and decrypt the target encrypted log file, and obtain a target decrypted log file. The log management program at the communication module side can send the target decryption log file to the log reading program at the host side, and the target decryption log file is displayed on a log file reading interface of the log reading program.
In one embodiment, sending, by a log reader, a log read request to a log manager includes: acquiring at least one piece of tag information selected from a log file list as target tag information through a log reading program; generating a log reading request according to the target tag information through a log reading program, and sending the log reading request to a log management program.
Specifically, after the log reading program at the host side obtains the log file list, the log file list may be displayed through the log file reading interface, and the user may select at least one tag information as the target tag information through the log file reading interface, so that the log reading program may generate a log reading request according to the target tag information, and send the log reading request to the log management program at the communication module side. In this way, compared with the method that the log reading program directly generates and transmits the log reading request to the log management program, in the embodiment, after the target tag information is determined, the log reading request is generated according to the target tag information, and then the log reading request is transmitted to the log management program, so that the data volume transmitted between the host side and the communication module side can be reduced, and the log reading efficiency is improved.
According to the log reading method, according to the communication connection between the communication module and the host, a log reading program sends a log request to a log management program so that the log management program verifies the log information according to a pre-stored user list, and the log request carries the log information; when verification is passed, acquiring target reading permission corresponding to login information from a pre-stored user list through a log management program, determining a target log grade according to the target reading permission, acquiring tag information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the tag information comprises creation time, log grade and service program identification; according to the communication connection between the communication module and the host, the log file list is sent to a log reading program for display; the method comprises the steps that a log reading request is sent to a log management program through the log reading program, so that the log management program obtains a target encrypted log file corresponding to target tag information, the target encrypted log file is decrypted to obtain a target decrypted log file, the target decrypted log file is sent to the log reading program to be displayed, the log reading request is generated through triggering operation aiming at a log file list, and the log reading request carries the target tag information. Therefore, before the user obtains the log file from the host side to the communication module side, the communication module side checks the identity information of the user through the log management program, and when the identity information passes the check, the user is indicated to be a safe user, the safe user can obtain the log file, and the safety of reading the log file is improved. Moreover, different users can acquire log files of different grades, so that the security of log file reading is further improved. In addition, the encryption and decryption processes of the log file are realized at the communication module side, so that the risk of cracking an encryption algorithm is reduced, and the security of reading the log file is further improved.
In one embodiment, as shown in fig. 2, the terminal includes a plurality of service programs, the service programs are deployed in a communication module of the terminal, S102, that is, according to a communication connection between the communication module and the host, a log reading program sends a log request to a log management program, so that the log management program verifies log information according to a pre-stored user list, and before the log request carries the log information, the log reading method further includes:
s202, receiving log files sent by each service program through a log management program, wherein the log files carry creation time, log grade and service program identification.
The communication module is provided with a service program, wherein the service program is an application program for providing communication related service, for example, a GNSS (Global Navigation Satellite System ) service program for providing positioning navigation service, a short message service program for providing short message service, a call service program for providing call service, a network connection service program for providing network access service, and the like.
Specifically, the terminal is started, and the communication module of the terminal runs an internal log management program and each service program. And each business program opens a communication channel in a mode of opening the equipment file, when the equipment file is successfully opened, the communication channel is successfully opened, each business program outputs log files to the log management program in real time, and each log file carries creation time, log grade and business program identification when outputting.
In one embodiment, a single business program may output log files of different log levels, and accordingly, log level rules corresponding to a single business program may include rule details corresponding to different log levels. For example, the log level rule corresponding to the GNSS service program may be that the log level of the log file related to the positioning information of the terminal itself is high, and the log level of the log file related to the positioning information of the other terminal is low.
S204, encrypting the log files corresponding to the service programs through the log management program to obtain the encrypted log files corresponding to the service programs.
S206, using the creation time, the log grade and the service program identification corresponding to each log file as the label information of the corresponding encrypted log file through the log management program.
S208, obtaining storage areas corresponding to the log levels through a log management program, storing the encrypted log files corresponding to the corresponding log levels and the tag information of the encrypted log files into the corresponding storage areas, and disposing the storage areas in a communication module of the terminal.
Specifically, after receiving the log file sent by the service program, the log management program may encrypt the log file to obtain an encrypted log file. The log management program may use the creation time, log class, and business program identifier corresponding to the log file as tag information of the log file, and the tag information may be used to uniquely identify the log file. The log management program can correlate the encrypted log file with the corresponding tag information, and store the encrypted log file and the corresponding tag information in the communication module in an isolated manner according to the log grade. Different log levels correspond to different storage areas. Furthermore, the log management program can compress the encrypted log file and store the compressed encrypted log file so as to save the storage resources of the communication module.
In one embodiment, the encrypting the log file may specifically be using a hash Algorithm such as MD5 (Message-Digest Algorithm), SHA-1 (Secure Hash Algorithm, secure hash Algorithm-1), SHA-2 (Secure Hash Algorithm, secure hash Algorithm-2), and the embodiments of the present application are not limited herein. The log file may be compressed by using a compression algorithm such as RLE (Run-Length Encoding) or huffman algorithm, which is not limited herein.
In the above embodiment, the log management program receives the log files of each service program, encrypts and compresses the log files, and then stores the log files in an isolated manner according to the log level, so that the security of log storage can be improved. In addition, the creation time, the log grade and the service program identifier corresponding to the log file are used as label information of the log file, a user can quickly acquire basic information of the log file according to the label information, and the label information can assist the user in log reading.
In one embodiment, as shown in fig. 3, further comprising:
s302, a user adding request is sent to a log management program through a log reading program, wherein the user adding request carries login information of a user to be added, reading permission corresponding to the user to be added and a user identification of a user requesting to be sent.
S304, acquiring a request to send the management authority corresponding to the user from a pre-stored user list through a log management program according to the user identification.
S306, when the management authority corresponding to the request sending user is the management authority, the log management program is used for adding the login information of the user to be added and the reading authority corresponding to the user to be added into the user list for storage.
Wherein the user addition request is a request with an addition function for adding user information in the user list. The user identification may be a user account.
Specifically, after the user successfully logs into the log-reading program, the log-reading program may present a log-reading interface, and present a user-add control in the log-reading interface. When the triggering operation acting on the control is detected, a user adding window can be popped up, a user account number and a user password of a user to be added and a reading authority corresponding to the user to be added can be input into the user adding window by a user, after the input is completed, the control representing the end can be triggered, for example, a 'complete' button, and finally, the user adding request is triggered and generated. The user adding request carries login information of the user to be added, reading permission corresponding to the user to be added and a user identifier of the current user of the login log reading program. After receiving the user adding request, the log management program can verify whether the current user is an administrator user according to the user identification of the current user, and specifically can search the management authority corresponding to the user identification of the current user from a pre-stored user list. When the found management authority is the management authority, that is, the current user is the administrator user, the log management program can add the login information of the user to be added and the reading authority corresponding to the user to be added into the user list, that is, store the user information of the user to be added into the communication module. And then, the user to be added can log in the log reading program to read the log file.
In one embodiment, the administrator user may also input the management authority corresponding to the user to be added in the user adding window, and carry the management authority corresponding to the user to be added, the login information of the user to be added, and the read authority corresponding to the user to be added into the user adding request. Subsequently, the log management program may add login information of the user to be added, the read authority and the management authority corresponding to the user to be added to the user list. Of course, if the user adding request does not carry the management authority corresponding to the user to be added, the management authority corresponding to the user to be added can be defaulted to be no management authority.
In one embodiment, the administrator user may also send a user information modification request to the log manager via the log reader program to modify the user information of the users in the user list. The user information modification request may be used to modify any kind of user information, for example, modify a user password corresponding to a user account in the user list, and modify a management authority corresponding to a user in the user list. The user information modification request may also be used to delete user information.
In the above embodiment, the log management program may receive a user addition request sent by the log reading program, and add relevant information of the user to be added, which is carried by the user addition request, to the user list, so as to newly add the user that can read the log, thereby improving flexibility of log reading. In addition, when the management authority corresponding to the request sending user is the management authority, the log management program responds to the user adding request sent by the request sending user, not all users can add new users, only the manager user can add new users, and the security of log reading can be improved.
In one embodiment, as shown in fig. 4, the log reading method further includes:
s402, the log management program detects the storage margin of each storage area.
S404, when the storage margin of at least one storage area is smaller than a first preset threshold, sending prompt information to a log reading program for display through a log management program, wherein the prompt information carries a target log file list corresponding to a target storage area, the target log file list comprises label information of a first preset number of encrypted log files stored in the target storage area, and the storage margin of the target storage area is smaller than the first preset threshold.
Specifically, the log management program may monitor the storage margin of the storage area corresponding to each log level. Since the storage capacity of the storage area is limited, when the storage margin of the storage area is smaller than the first preset threshold value, the storage margin of the storage area is about to be insufficient. When the storage margin of the storage area is insufficient, the log management program cleans the encrypted log file in the storage area. Therefore, when the storage margin of at least one storage area is smaller than the first preset threshold, the log management program may generate a prompt message, and send the prompt message to the log reading program, where the prompt message includes a target log file list corresponding to the storage area, and the target log file list includes label information of a preset number of encrypted log files stored in the storage area. The encrypted log files stored in the storage area can be ordered according to the sequence of the creation time, the earlier the creation time is, the earlier the ordered earlier the creation time is, the label information of the encrypted log files with the preset number is obtained, and a target log file list is generated. The prompt message may also carry a prompt word, for example, "about to wash the following log file, please confirm whether to read the following log file. After the log reading program receives the prompt information, the prompt information can be displayed on a log reading interface so as to remind a user to read the log file in time. The first preset number and the first preset threshold value can be set according to actual needs.
In one embodiment, when the target log file list is displayed, the label information in the target log file list may be arranged according to the sequence of the creation time, and the earlier the creation time is, the earlier the arrangement is. Further, different display parameters may be allocated to the tag information according to the arrangement position of the tag information, and the display parameters determine the display form of the tag information, including display size, display color, and the like. The m sets of label information arranged at the front may be highlighted, for example, the display font is thickened, the color of the display font is red, and the like. The earlier the encrypted log file corresponding to the tag information of which the order is the earlier is washed.
In the above embodiment, the log management program may detect the storage margin of each storage area, and when the storage margin of at least one storage area is about to be insufficient, send a prompt message to the log reading program for displaying, so as to prompt the user to timely read the log file to be cleaned. After the user obtains the log file, the user can timely read the log file to be cleaned, so that the utilization rate of the log file is improved.
In one embodiment, as shown in fig. 5, the log reading method further includes:
s502, when the storage margin of the target storage area is smaller than a second preset threshold value, sorting the encrypted log files stored in the target storage area according to the time sequence of the creation time by the log management program.
S504, deleting a second preset number of encrypted log files in a preset direction from the target storage area according to the sorting result through the log management program.
Wherein the second preset threshold is smaller than the first preset threshold. The second preset number and the second preset threshold may be set according to actual needs.
Specifically, when the storage margin of the storage area is smaller than a second preset threshold, the storage capacity of the storage area is indicated to be insufficient, and the log management program can sort the encrypted log files stored in the storage area according to the sequence of the creation time, and the earlier the creation time is, the earlier the order is, the more the encrypted log files are, and then the second preset number of encrypted log files which are sorted in the front are deleted.
In the above embodiment, when the storage margin of the storage area is insufficient, the encrypted log file in the storage area is deleted in time, so as to increase the storage margin of the storage area, further ensure that the storage area has sufficient storage margin to store the newly created log file, and improve the validity of log storage.
In one embodiment, the log reading method further comprises: acquiring a storage area corresponding to login information through a log reading program, wherein the storage area corresponding to the login information is deployed in a host of the terminal; and storing the target decryption log file into a storage area corresponding to the login information through a log reading program.
Specifically, the storage area corresponding to the user may be determined through a directory path specified by the user, and the storage area may be a default storage area set in advance, or may be a latest storage area specified by the user currently. The storage area corresponding to the user is deployed in the host of the terminal. The log reading program can acquire the directory path specified by the current user, and save the target decryption log file read by the current user under the target path. The target decryption log file may be stored in a TXT file format. Subsequently, when a user analyzes the read log file through the log analysis program, the log analysis program can automatically acquire the log file under the directory path only by inputting the directory path into the log analysis program, and then the analysis is started.
In the above embodiment, the read log file is saved under the designated directory path, so that the log file can be conveniently analyzed later.
As shown in fig. 6, fig. 6 is a block diagram of a structure of a terminal in one embodiment. The terminal includes a host computer and a communication module, the communication module includes a log management program, a second storage area, and a plurality of business programs, the business programs 1 to n, and the host computer includes a log reading program and a second storage area. The communication module and the host may communicate over PCIe or USB.
As shown in fig. 7, fig. 7 is a timing diagram of a log reading method in one embodiment. Referring to fig. 6 and 7, the log reading method includes the steps of:
1. the business program sends the log file to the log management program.
The terminal is started, and the communication module starts a log management program and a service program. The service program opens a communication channel by opening a device file, and when the communication channel is successfully opened, the service program outputs a log file to the log management program, wherein the log file carries the creation time, the log grade and the service program identifier.
2. The log management program encrypts and compresses the log file and stores the log file.
And the log management program encrypts and compresses the log file to obtain the log encrypted file. The second storage area comprises a plurality of subareas, and each subarea has a corresponding relation with the log level. The log management program stores the log encrypted file according to the log grade classification area. The business program continuously outputs the log file, and the log management program continuously maintains the log file. The log management program can also use the creation time, log grade and business program identification of the log file as the label information of the log file, and store the log file and the corresponding label information in a correlated way.
3. The log reading program sends a login request to the log management program.
The user may send a login request to the log management program through the log reading program.
4. The log manager validates the login request.
The log management program acquires a pre-stored user list, and verifies the login request according to the user list. When the login information carried by the login request is stored in the user list, the login request passes verification. When the login information carried by the login request is not stored in the user list, the verification of the login request fails. The log manager may return a log failure to the log reader, prohibiting the user from performing any log reading related operations.
5. When the verification is passed, the log manager generates a log file list.
When the login request passes verification, the log management program acquires the reading authority corresponding to the login information from the user list. The log management program can return the login success and the read permission corresponding to the login information to the log reading program. The log management program determines the log grade which can be read by the user according to the acquired read authority, acquires the label information of the encrypted log file corresponding to the log grade, and generates a log file list according to the acquired label information.
6. The log management program sends a log file list to the log reading program.
7. The log reading program sends a log reading request to the log management program.
After the log reading program receives the log file list, the log file list can be displayed. The user can select the label information of the log file to be read from the log file list, and the log reading program can generate a log reading request according to the label information selected by the user and send the log reading request to the log management program.
8. The log management program decrypts and decompresses the log encrypted file.
After receiving the log reading request, the log management program obtains the log encryption file corresponding to the tag information carried by the log reading request, decompresses and decrypts the log encryption file, and obtains the log decryption file.
9. The log management program sends the log decryption file to the log reading program.
After receiving the log decryption file, the log reading program may display the log decryption file, or may save the log decryption file under a directory (second storage area) specified by the user. The user may continue to initiate log read requests to obtain more log files.
The log management program can also detect the storage margin of each subarea, and when the storage margin of the subarea is about to be insufficient, the log management program sends prompt information to the log reading program so as to prompt a user to timely read the log file to be cleaned. When the storage margin of the subarea is insufficient, the log files in the subarea can be automatically cleaned, and the log files with earlier creation time are deleted.
The administrator user may also send a user add request to the log management program via the log reading program to add the user newly.
It should be understood that each step in the above-described flowcharts is shown in order as indicated by the arrow, but the steps are not necessarily performed in order as indicated by the arrow. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described above may include a plurality of steps or stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of execution of the steps or stages is not necessarily sequential, but may be performed in turn or alternately with at least a part of other steps or stages.
In one embodiment, as shown in fig. 8, there is provided a log reading apparatus including: a login information verification module 802, a log file list generation module 804, a log file list transmission module 806, and a log file transmission module 808, wherein:
the login information verification module 802 is configured to send a login request to the log management program through the log reading program according to the communication connection between the communication module and the host, so that the log management program verifies the login information according to a pre-stored user list, and the login request carries the login information;
the log file list generating module 804 is configured to obtain, when verification passes, a target reading permission corresponding to the login information from a user list stored in advance through a log management program, determine a target log level according to the target reading permission, obtain tag information of a plurality of encrypted log files corresponding to the target log level, and generate a log file list, where the tag information includes creation time, log level and service program identifier;
the log file list sending module 806 is configured to send the log file list to the log reading program for display according to the communication connection between the communication module and the host;
The log file sending module 808 is configured to send a log reading request to the log management program through the log reading program, so that the log management program obtains a target encrypted log file corresponding to the target tag information, decrypts the target encrypted log file to obtain a target decrypted log file, sends the target decrypted log file to the log reading program for display, where the log reading request is generated through a triggering operation for a log file list, and the log reading request carries the target tag information.
In one embodiment, the terminal includes a plurality of service programs, the service programs are deployed in a communication module of the terminal, and the log reading device further includes:
the log file storage module is used for receiving log files sent by each service program through the log management program, wherein the log files carry the creation time, the log grade and the service program identification; encrypting the log files corresponding to each service program through the log management program to obtain encrypted log files corresponding to each service program; using the creation time, the log grade and the service program identifier corresponding to each log file as the label information of the corresponding encrypted log file through a log management program; the method comprises the steps that a storage area corresponding to each log grade is obtained through a log management program, an encrypted log file corresponding to the corresponding log grade and tag information of the encrypted log file are stored in the corresponding storage area, and the storage area is deployed in a communication module of a terminal.
In one embodiment, the log reading device further includes:
the information adding module is used for sending a user adding request to the log management program through the log reading program, wherein the user adding request carries login information of a user to be added, reading permission corresponding to the user to be added and a user identifier of a user requesting to be sent; acquiring a request from a pre-stored user list through a log management program according to a user identifier to send a management authority corresponding to a user; when the management authority corresponding to the request sending user is the management authority, the log management program is used for adding the login information of the user to be added and the reading authority corresponding to the user to be added into a user list for storage.
In one embodiment, the log reading device further includes:
the information prompt module is used for detecting the storage allowance of each storage area through the log management program; when the storage margin of at least one storage area is smaller than a first preset threshold value, a log management program sends prompt information to a log reading program for display, the prompt information carries a target log file list corresponding to a target storage area, the target log file list comprises label information of encrypted log files with a first preset number stored in the target storage area, and the storage margin of the target storage area is smaller than the first preset threshold value.
In one embodiment, the log reading device further includes:
the log file deleting module is used for sequencing the encrypted log files stored in the target storage area according to the time sequence of the creation time through the log management program when the storage allowance of the target storage area is smaller than a second preset threshold value; and deleting a second preset number of encrypted log files in a preset direction from the target storage area according to the sorting result through the log management program.
In one embodiment, the log file sending module is further configured to obtain, by the log reading program, at least one tag information selected from the log file list as the target tag information; generating a log reading request according to the target tag information through a log reading program, and sending the log reading request to a log management program.
In one embodiment, the log file sending module is further configured to obtain a storage area corresponding to the login information through a log reading program, where the storage area corresponding to the login information is deployed in a host of the terminal; and storing the target decryption log file into a storage area corresponding to the login information through a log reading program.
The specific limitation of the log reading device can be referred to the limitation of the log reading method hereinabove, and the description thereof will not be repeated here. The respective modules in the above log reading apparatus may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure thereof may be as shown in fig. 9. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program, when executed by a processor, implements a log reading method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 9 is merely a block diagram of a portion of the structure associated with the present application and is not limiting of the computer device to which the present application applies, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided that includes a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of the log reading method described above. The steps of the log reading method here may be the steps in the log reading method of each of the above embodiments.
In one embodiment, a computer readable storage medium is provided, storing a computer program which, when executed by a processor, causes the processor to perform the steps of the log reading method described above. The steps of the log reading method here may be the steps in the log reading method of each of the above embodiments.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include both non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, or the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (10)

1. A log reading method applied to a terminal installed with a log management program deployed in a communication module of the terminal and a log reading program deployed in a host of the terminal, the method comprising:
according to the communication connection between the communication module and the host, a log reading program sends a log request to a log management program so that the log management program verifies the log information carried by the log request according to a pre-stored user list; the user list comprises user information of a plurality of users, wherein the user information comprises login information, management authority and reading authority of the users, the management authority is divided into management authority and non-management authority, and the management authority comprises user information of adding new users in the user list;
When verification is passed, acquiring target reading permission corresponding to login information carried by the login request from a pre-stored user list through the log management program, determining a target log grade according to the target reading permission, acquiring tag information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the tag information comprises creation time, log grade and service program identification; the encrypted log file is obtained by encrypting the log file which is received by the log management program and sent by a service program deployed in a communication module of the terminal; the label information of the encrypted log file is carried by the log file;
according to the communication connection between the communication module and the host, the log file list is sent to a log reading program for display;
the method comprises the steps that a log reading request is sent to a log management program through the log reading program, so that the log management program obtains a target encrypted log file corresponding to target tag information, decrypts the target encrypted log file to obtain a target decrypted log file, and sends the target decrypted log file to the log reading program for display, wherein the log reading request is generated through triggering operation aiming at a log file list, and the log reading request carries the target tag information.
2. The method of claim 1, wherein the terminal includes a plurality of business programs, the business programs being deployed in a communication module of the terminal, the method further comprising, before sending the login request to the log management program through the log reading program according to a communication connection of the communication module and the host computer:
receiving a log file sent by each service program through the log management program, wherein the log file carries creation time, log grade and service program identification;
encrypting the log files corresponding to each service program through the log management program to obtain encrypted log files corresponding to each service program;
using the creation time, the log grade and the service program identifier corresponding to each log file as the label information of the corresponding encrypted log file through the log management program;
and acquiring storage areas corresponding to the log levels through the log management program, and storing the encrypted log files corresponding to the corresponding log levels and the tag information of the encrypted log files into the corresponding storage areas, wherein the storage areas are deployed in a communication module of the terminal.
3. The method according to claim 1, wherein the method further comprises:
A user adding request is sent to a log management program through the log reading program, wherein the user adding request carries login information of a user to be added, reading authority corresponding to the user to be added and a user identifier of a user requesting to be sent;
acquiring a management authority corresponding to the request sending user from a pre-stored user list through the log management program according to the user identifier;
when the management authority corresponding to the request sending user is the management authority, the log management program is used for adding the login information of the user to be added and the reading authority corresponding to the user to be added into a user list for storage.
4. The method according to claim 2, wherein the method further comprises:
detecting the storage allowance of each storage area through the log management program;
when the storage margin of at least one storage area is smaller than a first preset threshold value, sending prompt information to a log reading program for display through the log management program, wherein the prompt information carries a target log file list corresponding to a target storage area, the target log file list comprises label information of encrypted log files with a first preset number stored in the target storage area, and the storage margin of the target storage area is smaller than the first preset threshold value.
5. The method according to claim 4, wherein the method further comprises:
when the storage allowance of the target storage area is smaller than a second preset threshold value, sequencing the encrypted log files stored in the target storage area according to the time sequence of the creation time by the log management program;
and deleting a second preset number of encrypted log files in a preset direction from the target storage area according to the sequencing result by the log management program.
6. The method of claim 1, wherein the sending, by the log reader, a log read request to a log manager comprises:
acquiring at least one piece of label information selected from the log file list as target label information through the log reading program;
generating a log reading request according to the target tag information through the log reading program, and sending the log reading request to a log management program.
7. The method according to claim 1, wherein the method further comprises:
acquiring a storage area corresponding to the login information carried by the login request through the log reading program, wherein the storage area corresponding to the login information carried by the login request is deployed in a host of the terminal;
And storing the target decryption log file into a storage area corresponding to the login information carried by the login request through the log reading program.
8. A log reading apparatus, the apparatus comprising:
the log information verification module is used for sending a log request to the log management program through the log reading program according to the communication connection between the communication module and the host computer, so that the log management program verifies the log information carried by the log request according to a pre-stored user list, and the log request carries the log information; the user list comprises user information of a plurality of users, wherein the user information comprises login information, management authority and reading authority of the users, the management authority is divided into management authority and non-management authority, and the management authority comprises user information of adding new users in the user list;
the log file list generation module is used for acquiring target reading permission corresponding to login information carried by the login request from a pre-stored user list through the log management program when verification is passed, determining a target log grade according to the target reading permission, acquiring tag information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the tag information comprises creation time, log grade and service program identification; the encrypted log file is obtained by encrypting the log file which is received by the log management program and sent by the service program deployed in the communication module; the label information of the encrypted log file is carried by the log file;
The log file list sending module is used for sending the log file list to a log reading program for display according to the communication connection between the communication module and the host;
the log file sending module is used for sending a log reading request to the log management program through the log reading program so that the log management program obtains a target encrypted log file corresponding to target tag information, decrypts the target encrypted log file to obtain a target decrypted log file, and sends the target decrypted log file to the log reading program for display, wherein the log reading request is generated through triggering operation on a log file list, and the log reading request carries the target tag information.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 7 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 7.
CN202010463755.0A 2020-05-27 2020-05-27 Log reading method, device, computer equipment and storage medium Active CN111897786B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010463755.0A CN111897786B (en) 2020-05-27 2020-05-27 Log reading method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010463755.0A CN111897786B (en) 2020-05-27 2020-05-27 Log reading method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111897786A CN111897786A (en) 2020-11-06
CN111897786B true CN111897786B (en) 2024-03-15

Family

ID=73207513

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010463755.0A Active CN111897786B (en) 2020-05-27 2020-05-27 Log reading method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111897786B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112732665B (en) * 2021-01-04 2022-10-18 歌尔股份有限公司 Log processing method, system and storage medium based on Linux platform
CN113032830A (en) * 2021-03-26 2021-06-25 北京有竹居网络技术有限公司 Electronic equipment control method and device and electronic equipment
CN115174544A (en) * 2021-04-02 2022-10-11 京东科技控股股份有限公司 Log obtaining method, device, equipment and medium
CN114036117A (en) * 2021-11-15 2022-02-11 平安普惠企业管理有限公司 Log viewing method and device, computer equipment and storage medium
CN114785677B (en) * 2022-04-22 2023-12-22 武汉联影医疗科技有限公司 Log management method, device, computer equipment, storage medium and program product
CN114978627A (en) * 2022-05-11 2022-08-30 湖南宝马文化传播有限公司 Method and system for controlling data authority of big data
CN116149958B (en) * 2023-04-20 2023-06-27 华谱科仪(北京)科技有限公司 Chromatograph operation and maintenance method and device based on log management function

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000029751A (en) * 1998-07-15 2000-01-28 Fuji Xerox Co Ltd Log managing method/device
JP2002366461A (en) * 2001-06-11 2002-12-20 Sony Corp Server, log information management system and log information management method
CN103780581A (en) * 2012-10-23 2014-05-07 江南大学 Cloud storage-based encrypted file access control system and method
WO2016169410A1 (en) * 2015-04-21 2016-10-27 腾讯科技(深圳)有限公司 Login method and device, server and login system
CN106571951A (en) * 2016-10-19 2017-04-19 北京神州绿盟信息安全科技股份有限公司 Audit log obtaining, generating and verifying method and system and device
CN106844185A (en) * 2017-03-17 2017-06-13 上海与德科技有限公司 The storage method and device of a kind of journal file
CN108804644A (en) * 2018-06-05 2018-11-13 中国平安人寿保险股份有限公司 Interface log storing method, device, computer equipment and storage medium
CN110263008A (en) * 2019-06-20 2019-09-20 江苏满运软件科技有限公司 Terminal offline logs management system, method, equipment and storage medium
CN110719276A (en) * 2019-09-30 2020-01-21 北京网瑞达科技有限公司 Network equipment safety access system based on cache password and working method thereof
CN110908971A (en) * 2019-11-08 2020-03-24 苏州浪潮智能科技有限公司 System log management method, device, storage medium and equipment
CN111177096A (en) * 2019-12-11 2020-05-19 招银云创(深圳)信息技术有限公司 Log management method and device, computer equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101802521B1 (en) * 2011-05-30 2017-11-30 삼성전자주식회사 Device and method for performing encryption and decryption of data in wireless terminal
US9934265B2 (en) * 2015-04-09 2018-04-03 Commvault Systems, Inc. Management of log data

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000029751A (en) * 1998-07-15 2000-01-28 Fuji Xerox Co Ltd Log managing method/device
JP2002366461A (en) * 2001-06-11 2002-12-20 Sony Corp Server, log information management system and log information management method
CN103780581A (en) * 2012-10-23 2014-05-07 江南大学 Cloud storage-based encrypted file access control system and method
WO2016169410A1 (en) * 2015-04-21 2016-10-27 腾讯科技(深圳)有限公司 Login method and device, server and login system
CN106571951A (en) * 2016-10-19 2017-04-19 北京神州绿盟信息安全科技股份有限公司 Audit log obtaining, generating and verifying method and system and device
CN106844185A (en) * 2017-03-17 2017-06-13 上海与德科技有限公司 The storage method and device of a kind of journal file
CN108804644A (en) * 2018-06-05 2018-11-13 中国平安人寿保险股份有限公司 Interface log storing method, device, computer equipment and storage medium
CN110263008A (en) * 2019-06-20 2019-09-20 江苏满运软件科技有限公司 Terminal offline logs management system, method, equipment and storage medium
CN110719276A (en) * 2019-09-30 2020-01-21 北京网瑞达科技有限公司 Network equipment safety access system based on cache password and working method thereof
CN110908971A (en) * 2019-11-08 2020-03-24 苏州浪潮智能科技有限公司 System log management method, device, storage medium and equipment
CN111177096A (en) * 2019-12-11 2020-05-19 招银云创(深圳)信息技术有限公司 Log management method and device, computer equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于可信计算平台的审计日志安全存储系统;成茂才;徐开勇;;计算机科学(第06期);154-159 *
基于安全文档管理的日志系统设计;苏恒阳;;制造业自动化(第24期);114-117 *

Also Published As

Publication number Publication date
CN111897786A (en) 2020-11-06

Similar Documents

Publication Publication Date Title
CN111897786B (en) Log reading method, device, computer equipment and storage medium
US20170180332A1 (en) System and method to provide server control for access to mobile client data
CN110826111A (en) Test supervision method, device, equipment and storage medium
CN113196702A (en) System and method for distributed data storage and transfer using blockchains
KR101756288B1 (en) Document security system
CN112637166A (en) Data transmission method, device, terminal and storage medium
US10733594B1 (en) Data security measures for mobile devices
CN112417484A (en) Resource file protection method and device, computer equipment and storage medium
CN106778295B (en) File storage method, file display method, file storage device, file display device and terminal
CN104937904A (en) Copy offload for disparate offload providers
CN110768784A (en) Password transmission method, device, computer equipment and storage medium
CN106682521B (en) File transparent encryption and decryption system and method based on driver layer
CN110958255B (en) Data transmission method and device, electronic equipment and storage medium
CN112733180A (en) Data query method and device and electronic equipment
CN115277143A (en) Data secure transmission method, device, equipment and storage medium
KR101757407B1 (en) Apparatus, method and computer program for merging binary files
CN115129332A (en) Firmware burning method, computer equipment and readable storage medium
KR101497067B1 (en) Electric document transfer method and apparatus based digital forensic
KR101346284B1 (en) Method for producing an encrypted file and decrypting the encrypted file, computer readable recording medium a program for implementing the methods
KR102375973B1 (en) Security server using case based reasoning engine and storage medium for installing security function
CN114448722B (en) Cross-browser login method and device, computer equipment and storage medium
CN115114646B (en) File authority processing method and device and storage medium
CN115098877A (en) File encryption and decryption method and device, electronic equipment and medium
CN113297559B (en) Single sign-on method and device, computer equipment and storage medium
CN106453335B (en) Data transmission method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant