CN114491661A - Log tamper-proofing method and system based on block chain - Google Patents

Log tamper-proofing method and system based on block chain Download PDF

Info

Publication number
CN114491661A
CN114491661A CN202111627003.4A CN202111627003A CN114491661A CN 114491661 A CN114491661 A CN 114491661A CN 202111627003 A CN202111627003 A CN 202111627003A CN 114491661 A CN114491661 A CN 114491661A
Authority
CN
China
Prior art keywords
log
chain
block
current node
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111627003.4A
Other languages
Chinese (zh)
Inventor
杨志龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUHAN HONGXU INFORMATION TECHNOLOGY CO LTD
Original Assignee
WUHAN HONGXU INFORMATION TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUHAN HONGXU INFORMATION TECHNOLOGY CO LTD filed Critical WUHAN HONGXU INFORMATION TECHNOLOGY CO LTD
Priority to CN202111627003.4A priority Critical patent/CN114491661A/en
Publication of CN114491661A publication Critical patent/CN114491661A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The invention provides a block chain-based log tamper-proof method and a block chain-based log tamper-proof system, wherein the method comprises the following steps: when a user accesses the sensitive information through a current node in the block chain, generating a target log block according to the accessed log information; carrying out integrity verification and validity verification on the log chain on the current node; if the verification results of the integrity verification and the validity verification pass, the target log block is accessed to the log chain on the current node, and is synchronously accessed to the log chains on other nodes in the block chain; otherwise, the target log block is not accessed. The method and the device reduce the risk of malicious tampering of the log information, improve the safety of the log information, further improve the safety of sensitive information and prevent malicious leakage.

Description

Log tamper-proofing method and system based on block chain
Technical Field
The invention relates to the technical field of data security, in particular to a block chain-based log tamper-proof method and system.
Background
In the internet era, various Applications (APPs), websites and systems exist, regardless of whether the mobile terminal or the pc (personal computer) terminal is used. A large amount of user sensitive information may be actively uploaded to a service end of a service provider for storage, which may cause leakage of the user sensitive information.
In consideration of the security of confidential information on the server, log records for viewing and access rights and the like need to be set for such information. But the access records can be erased by manually modifying the database data. The supervision of such log information is particularly important in order to prevent confidential information from being accessed deliberately, and to delete or tamper with the access log records manually. Therefore, preventing the log information from being tampered is an important issue to be solved in the industry.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a block chain-based log tamper-proof method and system.
The invention provides a log tamper-proofing method based on a block chain, which comprises the following steps:
when a user accesses the sensitive information through a current node in the block chain, generating a target log block according to the accessed log information;
carrying out integrity verification and validity verification on the log chain on the current node;
if the verification results of the integrity verification and the validity verification pass, the target log block is accessed to the log chain on the current node, and is synchronously accessed to the log chains on other nodes in the block chain; otherwise, the target log block is not accessed.
According to the block chain-based log tamper-proofing method provided by the invention, the generation of the target log block according to the accessed log information comprises the following steps:
encrypting the log information based on an encryption algorithm;
merging the digital signature of the preorder log block of the target log block with the encrypted log information;
taking the digital signature of the preorder log block and the hash value of the encrypted combination result of the log information as the digital signature of the target log block;
and generating the target log block according to the digital signature of the preamble log block, the digital signature of the target log block and the encrypted log information.
According to the block chain-based log tamper-proofing method provided by the invention, the integrity verification of the log chain on the current node comprises the following steps:
respectively counting the number of log blocks in the log chain on the current node and each other node;
and if the number of the log blocks in the log chain on the current node is the same as that of the log blocks in the log chain on each other node, the integrity verification is passed.
According to the block chain-based log tamper-proof method provided by the invention, the validity verification of the log chain on the current node is carried out, and the method comprises the following steps:
and if the integrity verification passes, performing validity verification on the log chain on the current node based on a workload certification algorithm.
According to the log tamper-proofing method based on the block chain, provided by the invention, the verification of the validity of the log chain on the current node based on the workload certification algorithm comprises the following steps:
sequentially judging whether log information in log blocks at the same position of the log chain on the current node and each other node is the same from front to back;
and if the log information corresponding to all the positions is the same until the created blocks in the log chain are matched, the validity verification is passed.
The invention provides a log tamper-proofing method based on a block chain, which further comprises the following steps:
and analyzing the log chain on the current node through an intelligent contract to acquire the log information in the log block on the log chain.
The invention also provides a block chain-based log tamper-proof system, which comprises:
the generating module is used for generating a target log block according to the accessed log information when a user accesses the sensitive information through the current node in the block chain;
the verification module is used for carrying out integrity verification and validity verification on the log chain on the current node;
the judging module is used for accessing the target log block to the log chain on the current node and synchronously accessing the target log block to the log chains on other nodes in the block chain if the verification results of the integrity verification and the validity verification pass; otherwise, the target log block is not accessed.
The invention also provides an electronic device, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the steps of the block chain-based log anti-tampering method.
The present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the block chain based log tamper-proofing method as recited in any of the above.
The present invention also provides a computer program product comprising a computer program which, when executed by a processor, performs the steps of the above-mentioned blockchain-based log tamper-proofing method.
According to the block chain-based log tamper-proofing method and system, the log chain whole-chain integrity verification and the validity verification are performed while the user accesses the sensitive information to generate the log block, and only when the verification results of the integrity verification and the validity verification pass, the target log block is synchronously accessed into the whole-node log chain, so that the risk that the log information is maliciously tampered is reduced, the safety of the log information is improved, the safety of the sensitive information is further improved, and malicious leakage is prevented.
Drawings
In order to more clearly illustrate the technical solutions of the present invention or the prior art, the drawings needed for the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a schematic flowchart of a block chain-based log tamper-proof method provided by the present invention;
FIG. 2 is a schematic structural diagram of a block chain-based log tamper-resistant system provided by the present invention;
fig. 3 is a schematic structural diagram of an electronic device provided in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The following describes, with reference to fig. 1, a block chain-based log tamper-proofing method of the present invention, including: step 101, when a user accesses sensitive information through a current node in a block chain, generating a target log block according to accessed log information;
the execution subject in this embodiment is a server. And the server acquires the sensitive information reported by the system, the APP and the like on the client and stores the sensitive information into a user information database of the server. The user information database adopts a mysql database, a hbase distributed system or an ES full text retrieval system. Optionally, the sensitive information includes a login account number, a password, and personal real-name information.
And when the user accesses the sensitive information in the user information database through the current node, generating the log block accessed this time according to the log information accessed this time. And taking the log block accessed this time as a target log block.
102, performing integrity verification and validity verification on the log chain on the current node;
each log node is provided with a log chain, and the log chain comprises a plurality of log blocks. Integrity verification refers to verifying whether a log chunk in a chunk chain is deleted. Validity verification refers to verifying whether a log chunk in a chunk chain is modified. Integrity verification and validity verification may employ redis cache computations.
103, if the verification results of the integrity verification and the validity verification pass, accessing the target log block to the log chain on the current node, and synchronously accessing the target log block to the log chains on other nodes in the block chain; otherwise, the target log block is not accessed.
If the integrity verification and/or the validity verification are not passed, the log block in the log chain on the current node is probably tampered, the target log block has the risk of being maliciously tampered, the target log block is not accessed into the log chain, an alarm can be given, and the alarm record of the invalid log block is stored in a log chain database. The log chain database adopts a mysql database, a hbase distributed system or an ES full text retrieval system. In addition, log information is pushed, and a tampered user can be conveniently located in time.
If the integrity verification and the validity verification pass, accessing the verified target log block to a log chain of the current node, storing the log chain into a log chain database, and synchronizing the log chains of all nodes to realize independent backup of data by multiple nodes. The implementation of the embodiment can adopt the javascript technology and echarts graphic technology of the open source.
The number of the nodes in the block chain network is at least 3, and the more the nodes are, the lower the probability of the log block being tampered. All log chain data are stored in each node, even if some node is abnormal, the log chain data of other nodes are not influenced, and the aim of decentralization is fulfilled.
According to the method and the device, the log chain full-chain integrity verification and the validity verification are performed while the user accesses the sensitive information to generate the log block, and only when the verification results of the integrity verification and the validity verification pass, the target log block is synchronously accessed into the full-node log chain, so that the risk of malicious tampering of the log information is reduced, the safety of the log information is improved, the safety of the sensitive information is further improved, and malicious leakage is prevented.
On the basis of the foregoing embodiment, the generating a target log block according to accessed log information in this embodiment includes: encrypting the log information based on an encryption algorithm;
optionally, the log information includes operation content, an operation account, a client IP (Internet Protocol), operation time, and an operation type.
The encryption Algorithm is SHA (Secure Hash Algorithm).
Merging the digital signature of the preorder log block of the target log block and the encrypted log information;
the preamble log block of the target log block is the last log block on the log chain of the current node. A digital signature of the preamble log block is extracted from the preamble log block. And merging the encrypted log information of the access sensitive information and the digital signature of the preorder log block, for example, splicing the digital signature of the preorder log block behind the encrypted log information.
Taking the digital signature of the preorder log block and the hash value of the encrypted combination result of the log information as the digital signature of the target log block;
and calculating the merging result by using a hash function to generate a hash value. And using the hash value as a digital signature of the target log block accessed at this time to identify the target log block.
And generating the target log block according to the digital signature of the preamble log block, the digital signature of the target log block and the encrypted log information.
And merging the digital signature of the preamble log block, the digital signature of the target log block and the encrypted log information, for example, merging in a splicing manner to generate the target log block.
On the basis of the foregoing embodiment, the integrity verification of the log chain on the current node in this embodiment includes: respectively counting the number of log blocks in the log chain of the current node and each other node; and if the number of the log blocks in the log chain on the current node is the same as that of the log blocks in the log chain on each other node, the integrity verification is passed.
For each new log chunk generated, log chains on all nodes in the blockchain network are synchronously accessed if the verification passes. Thus, without tampering, the log chain is the same on all nodes.
If the log blocks in the log chain on the current node are maliciously deleted and the log blocks in the log chains on other nodes are not tampered, the log blocks corresponding to the two nodes are different in number, and the log blocks in the log chain on the current node are judged to be maliciously deleted in sequence, so that the integrity verification of the log chain is realized.
On the basis of the foregoing embodiment, the validity verification of the log chain on the current node in this embodiment includes: and if the integrity verification passes, performing validity verification on the log chain on the current node based on a workload certification algorithm.
If the integrity verification is passed, the log blocks in the log chain on all nodes in the block chain network can only be the same in number, but the contents of the log blocks may be different. Therefore, the workload certification algorithm is used for judging whether the content of the log block on the current node is the same as the content of the log block on other nodes, so that the validity verification of the log chain is realized.
On the basis of the foregoing embodiment, in this embodiment, the verifying the validity of the log chain on the current node based on the workload certification algorithm includes: sequentially judging whether the log information in the log blocks at the same position of the log chain on the current node and each other node is the same from front to back; and if the log information corresponding to all the positions is the same until the created blocks in the log chain are matched, the validity verification is passed.
In this embodiment, a workload certification algorithm is used to trace back the log chain, and it is sequentially determined from front to back whether the log information in the log block at the same position corresponding to the log chain on the current node and the log chain on another node is the same. If the content of a certain log block in the log chain on the current node is modified, the judgment results are different. If the log information corresponding to a certain position is different, stopping judging, and failing to pass the validity verification; otherwise, the creation block in the log chain is traced back all the time, and the validity verification is passed.
On the basis of the above embodiments, the present embodiment further includes: and analyzing the log chain on the current node through an intelligent contract to acquire the log information in the log block on the log chain.
The embodiment retrieves log information accessed by sensitive information through the intelligent contract. And resolving the log information in the log chain into identifiable display information by using an intelligent contract algorithm. And compiling the service code of the retrieved log information into an Etheng byte code, deploying the Etheng byte code to a log chain, and extracting the encrypted data in the log block for decryption.
The following describes the block chain based log tamper-resistant system provided by the present invention, and the block chain based log tamper-resistant system described below and the block chain based log tamper-resistant method described above may be referred to correspondingly.
As shown in fig. 2, the system includes a generation module 201, a verification module 202, and a judgment module 203, wherein:
the generating module 201 is configured to generate a target log block according to accessed log information when a user accesses sensitive information through a current node in a block chain;
the verification module 202 is configured to perform integrity verification and validity verification on the log chain on the current node;
the judging module 203 is configured to access the target log block to the log chain on the current node and synchronously access to the log chains on other nodes in the block chain if the verification results of the integrity verification and the validity verification both pass; otherwise, the target log block is not accessed.
According to the method and the device, the log chain whole-chain integrity verification and the validity verification are performed while the user accesses the sensitive information to generate the log block, and only when the verification results of the integrity verification and the validity verification pass, the target log block is synchronously accessed into the whole-node log chain, so that the risk of malicious tampering of the log information is reduced, the safety of the log information is improved, the safety of the sensitive information is further improved, and malicious leakage is prevented.
Fig. 3 illustrates a physical structure diagram of an electronic device, which may include, as shown in fig. 3: a processor (processor)310, a communication Interface (communication Interface)320, a memory (memory)330 and a communication bus 340, wherein the processor 310, the communication Interface 320 and the memory 330 communicate with each other via the communication bus 340. The processor 310 may call logic instructions in the memory 330 to perform a blockchain based log tamper-resistant method comprising: when a user accesses sensitive information through a current node in a block chain, generating a target log block according to accessed log information; carrying out integrity verification and validity verification on the log chain on the current node; if the verification results of the integrity verification and the validity verification pass, the target log block is accessed to the log chain on the current node, and is synchronously accessed to the log chains on other nodes in the block chain; otherwise, the target log block is not accessed.
In addition, the logic instructions in the memory 330 may be implemented in the form of software functional units and stored in a computer readable storage medium when the software functional units are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In another aspect, the present invention further provides a computer program product, where the computer program product includes a computer program, the computer program can be stored on a non-transitory computer readable storage medium, and when the computer program is executed by a processor, a computer can execute the method for tamper-proofing a log based on a blockchain provided by the above methods, where the method includes: when a user accesses the sensitive information through a current node in the block chain, generating a target log block according to the accessed log information; carrying out integrity verification and validity verification on the log chain on the current node; if the verification results of the integrity verification and the validity verification pass, the target log block is accessed to the log chain on the current node, and is synchronously accessed to the log chains on other nodes in the block chain; otherwise, the target log block is not accessed.
In yet another aspect, the present invention also provides a non-transitory computer-readable storage medium, on which a computer program is stored, the computer program, when executed by a processor, implementing a method for tamper-proofing a blockchain-based log provided by the above methods, the method including: when a user accesses the sensitive information through a current node in the block chain, generating a target log block according to the accessed log information; carrying out integrity verification and validity verification on the log chain on the current node; if the verification results of the integrity verification and the validity verification pass, the target log block is accessed to the log chain on the current node, and is synchronously accessed to the log chains on other nodes in the block chain; otherwise, the target log block is not accessed.
The above-described system embodiments are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A log tamper-proofing method based on a block chain is characterized by comprising the following steps:
when a user accesses the sensitive information through a current node in the block chain, generating a target log block according to the accessed log information;
carrying out integrity verification and validity verification on the log chain on the current node;
if the verification results of the integrity verification and the validity verification pass, the target log block is accessed to the log chain on the current node, and is synchronously accessed to the log chains on other nodes in the block chain; otherwise, the target log block is not accessed.
2. The method according to claim 1, wherein the generating a target log block according to the accessed log information comprises:
encrypting the log information based on an encryption algorithm;
merging the digital signature of the preorder log block of the target log block and the encrypted log information;
taking the digital signature of the preorder log block and the hash value of the encrypted combination result of the log information as the digital signature of the target log block;
and generating the target log block according to the digital signature of the preamble log block, the digital signature of the target log block and the encrypted log information.
3. The method according to claim 2, wherein verifying integrity of the log chain on the current node comprises:
respectively counting the number of log blocks in the log chain of the current node and each other node;
and if the number of the log blocks in the log chain on the current node is the same as that of the log blocks in the log chain on each other node, the integrity verification is passed.
4. The method according to claim 3, wherein verifying validity of the log chain on the current node comprises:
and if the integrity verification passes, performing validity verification on the log chain on the current node based on a workload certification algorithm.
5. The method according to claim 4, wherein the verifying validity of the log chain on the current node based on the workload certification algorithm comprises:
sequentially judging whether log information in log blocks at the same position of the log chain on the current node and each other node is the same from front to back;
and if the log information corresponding to all the positions is the same until the created blocks in the log chain are matched, the validity verification is passed.
6. The method for preventing log tampering based on blockchain according to any one of claims 1 to 5, further comprising:
and analyzing the log chain on the current node through an intelligent contract to acquire the log information in the log block on the log chain.
7. A blockchain-based log tamper-resistant system, comprising:
the generating module is used for generating a target log block according to the accessed log information when a user accesses the sensitive information through the current node in the block chain;
the verification module is used for carrying out integrity verification and validity verification on the log chain on the current node;
the judging module is used for accessing the target log block to the log chain on the current node and synchronously accessing the target log block to the log chains on other nodes in the block chain if the verification results of the integrity verification and the validity verification pass; otherwise, the target log block is not accessed.
8. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the block chain based log tamper-resistant method according to any of claims 1 to 6 when executing the program.
9. A non-transitory computer readable storage medium having stored thereon a computer program, which when executed by a processor implements the steps of the method for tamper-proofing a blockchain-based log according to any one of claims 1 to 6.
10. A computer program product comprising a computer program, wherein the computer program when executed by a processor implements the steps of the method for anti-tampering with a blockchain based log according to any one of claims 1 to 6.
CN202111627003.4A 2021-12-28 2021-12-28 Log tamper-proofing method and system based on block chain Pending CN114491661A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111627003.4A CN114491661A (en) 2021-12-28 2021-12-28 Log tamper-proofing method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111627003.4A CN114491661A (en) 2021-12-28 2021-12-28 Log tamper-proofing method and system based on block chain

Publications (1)

Publication Number Publication Date
CN114491661A true CN114491661A (en) 2022-05-13

Family

ID=81495573

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111627003.4A Pending CN114491661A (en) 2021-12-28 2021-12-28 Log tamper-proofing method and system based on block chain

Country Status (1)

Country Link
CN (1) CN114491661A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115118507A (en) * 2022-06-29 2022-09-27 支付宝(杭州)信息技术有限公司 Log certificate storing and log verifying method and device suitable for privacy calculation

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115118507A (en) * 2022-06-29 2022-09-27 支付宝(杭州)信息技术有限公司 Log certificate storing and log verifying method and device suitable for privacy calculation
CN115118507B (en) * 2022-06-29 2023-09-08 支付宝(杭州)信息技术有限公司 Log evidence-storing and log verification method and device suitable for privacy calculation

Similar Documents

Publication Publication Date Title
CN109257340B (en) Website tamper-proof system and method based on block chain
US9990507B2 (en) Adapting decoy data present in a network
CN110826111A (en) Test supervision method, device, equipment and storage medium
CN105453102B (en) The system and method for the private cipher key leaked for identification
JP2015511338A (en) Method and system for ensuring the reliability of IP data provided by a service provider
CN111131221B (en) Interface checking device, method and storage medium
CN113489713A (en) Network attack detection method, device, equipment and storage medium
US9779250B1 (en) Intelligent application wrapper
US10621345B1 (en) File security using file format validation
WO2022078366A1 (en) Application protection method and apparatus, device and medium
CN109997138A (en) For detecting the system and method for calculating the malicious process in equipment
CN106709281B (en) Patch granting and acquisition methods, device
CN116305290A (en) System log security detection method and device, electronic equipment and storage medium
CN115248919A (en) Method and device for calling function interface, electronic equipment and storage medium
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN114491661A (en) Log tamper-proofing method and system based on block chain
CN108090364B (en) Method and system for positioning data leakage source
CN111224826B (en) Configuration updating method, device, system and medium based on distributed system
US11475156B2 (en) Dynamically adjusted timeout quarantined code scanning
CN111045856A (en) Method, apparatus and computer program product for managing application systems
CN111698227B (en) Information synchronization management method, device, computer system and readable storage medium
CN109472138B (en) Method, device and storage medium for detecting snort rule conflict
CN110826078A (en) Data storage method, device and system
CN115022096B (en) Method and device for downloading software
CN114338245B (en) Data anti-leakage method and system based on artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination