CN115632879A - Log management method, system, electronic device and storage medium - Google Patents

Log management method, system, electronic device and storage medium Download PDF

Info

Publication number
CN115632879A
CN115632879A CN202211560352.3A CN202211560352A CN115632879A CN 115632879 A CN115632879 A CN 115632879A CN 202211560352 A CN202211560352 A CN 202211560352A CN 115632879 A CN115632879 A CN 115632879A
Authority
CN
China
Prior art keywords
request
log
plaintext
encryption
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211560352.3A
Other languages
Chinese (zh)
Other versions
CN115632879B (en
Inventor
卞阳
张健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fucun Technology Shanghai Co ltd
Original Assignee
Fucun Technology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fucun Technology Shanghai Co ltd filed Critical Fucun Technology Shanghai Co ltd
Priority to CN202211560352.3A priority Critical patent/CN115632879B/en
Publication of CN115632879A publication Critical patent/CN115632879A/en
Application granted granted Critical
Publication of CN115632879B publication Critical patent/CN115632879B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a log management method, a system, electronic equipment and a storage medium, wherein the log management method comprises the steps of sending a first request to a server node to trigger the server node to generate a second request, wherein the second request comprises a first encrypted log; receiving a second request and acquiring a first encryption log from the second request; capturing a third request, wherein the third request comprises a second plaintext log; judging whether the third request corresponds to the second request, if so, encrypting the second plaintext log by using a public key corresponding to the algorithm to obtain a second encrypted log; and judging whether the first encryption log is the same as the second encryption log, and if so, determining that the algorithm is safe. The method and the device complete the monitoring of algorithm safety through the management of the log, determine that the encrypted data is not tampered, do not need to invade the federal learning products of manufacturers and carry out a large amount of personalized operations aiming at the federal learning products of different manufacturers, simplify the operation and save the time cost and the labor cost.

Description

Log management method, system, electronic device and storage medium
Technical Field
The invention relates to the technical field of computers, in particular to a log management method, a log management system, electronic equipment and a storage medium.
Background
Various logs can exist among all server nodes of the federal learning product, including an operation log, an API (Application Programming Interface) call log, a task log, an algorithm log and the like, some clients can use the federal learning products of different manufacturers, the interfaces of the federal learning products of different manufacturers are mutually called, and encrypted data are easily tampered after being captured. In the prior art, when a user manages different federal learning products, the difficulty of unifying interfaces and request modes is high, so that the algorithm safety of the different federal learning products needs to be personalized and customized for verification. Logs are easily managed and analyzed in federal learning products of different vendors. How to use the log is to monitor the algorithm safety of the federal learning products of different manufacturers and determine that the encrypted data is not tampered on the premise of not invading the federal learning products of the manufacturers and not carrying out a large amount of personalized operations aiming at the federal learning products of different manufacturers, so that the problem which needs to be solved urgently is solved.
Disclosure of Invention
The invention aims to overcome the defect that algorithm safety monitoring of the Federation learning product is difficult in the prior art, and provides a log management method, a log management system, electronic equipment and a storage medium.
The invention solves the technical problems through the following technical scheme:
the invention provides a log management method, which comprises the following steps:
sending a first request to a target server node, wherein the first request is used for triggering the target server node to encrypt a first plaintext log by using a target algorithm to obtain a first encrypted log and generate a second request, and the second request comprises the first encrypted log;
receiving the second request sent by the target server node through a target algorithm interface through a log interface, and acquiring the first encrypted log from the second request;
capturing a third request from the target algorithm interface, wherein the third request comprises a second plaintext log;
judging whether the third request corresponds to the second request, if so, encrypting the second plaintext log by using a public key corresponding to the target algorithm to obtain a second encrypted log;
and judging whether the first encryption log and the second encryption log are the same or not, and if so, determining that the target algorithm is safe.
Preferably, the step of sending the first request to the target server node is preceded by:
generating a pair of public key and private key;
the first request comprises the public key;
the second request comprises the first encryption log, an encryption request header and a first plaintext parameter, wherein the encryption request header is obtained by encrypting the first plaintext request header by the target server node by using the public key.
Preferably, the step of obtaining the first encryption log from the second request comprises:
judging whether the private key is matched with the encryption request head, if so, decrypting the encryption request head by using the private key to obtain the first plaintext request head, and executing the step of obtaining the first encryption log from the second request;
the step of obtaining the first encrypted log from the second request may be followed by:
and acquiring the first plaintext parameters from the second request.
Preferably, the third request further includes a second plaintext request header and a second plaintext parameter;
the step of determining whether the third request corresponds to the second request comprises:
judging whether the second plaintext parameters are the same as the first plaintext parameters, if so, judging whether the second plaintext request header is the same as the first plaintext request header, and if so, determining that the third request corresponds to the second request; and/or the presence of a gas in the atmosphere,
the step of obtaining the first plaintext parameter from the second request is followed by:
classifying the first encrypted log according to the first plaintext parameter;
extracting label information from the first plain text parameter, and correspondingly storing the label information and the first encryption log.
The invention also provides a log management system, which comprises:
the system comprises a first request sending module, a first encryption module and a second request sending module, wherein the first request sending module is used for sending a first request to a target server node, the first request is used for triggering the target server node to encrypt a first plaintext log by using a target algorithm to obtain a first encrypted log and generate the second request, and the second request comprises the first encrypted log;
a second request receiving module, configured to receive, through a log interface, the second request sent by the target server node through a target algorithm interface, and obtain the first encrypted log from the second request;
a third request capturing module, configured to capture a third request from the target algorithm interface, where the third request includes a second plaintext log;
the first judgment module is used for judging whether the third request corresponds to the second request or not, if so, an encryption module is called, and the encryption module is used for encrypting the second plaintext log by using a public key corresponding to the target algorithm to obtain a second encrypted log;
and the second judgment module is used for judging whether the first encryption log and the second encryption log are the same or not, and if so, determining that the target algorithm is safe.
Preferably, the first request sending module is further configured to generate a pair of a public key and a private key;
the first request comprises the public key;
the second request comprises the first encryption log, an encryption request header and first plaintext parameters, wherein the encryption request header is obtained by encrypting the first plaintext request header by the target server node by using the public key.
Preferably, the second request receiving module is further configured to:
judging whether the private key is matched with the encryption request head, if so, decrypting the encryption request head by using the private key to obtain the first plaintext request head, and acquiring the first encryption log from the second request;
and acquiring the first plaintext parameters from the second request.
Preferably, the third request further includes a second plaintext request header and a second plaintext parameter;
the first judging module comprises:
a first judging unit, configured to judge whether the second plaintext parameter is the same as the first plaintext parameter, if so, invoke a second judging unit, where the second judging unit is configured to judge whether the second plaintext request header is the same as the first plaintext request header, and if so, determine that the third request corresponds to the second request; and/or the presence of a gas in the gas,
the second request receiving module is further configured to:
classifying the first encrypted log according to the first plaintext parameter;
extracting label information from the first plain text parameter, and correspondingly storing the label information and the first encryption log.
The invention further provides an electronic device, which comprises a memory, a processor and a computer program stored on the memory and used for running on the processor, wherein the processor realizes the log management method when executing the computer program.
The present invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the aforementioned log management method.
The positive progress effects of the invention are as follows: the method and the device complete the monitoring of algorithm safety through the management of the logs, determine that the encrypted data is not tampered, do not need to invade the federal learning products of manufacturers and carry out a large amount of personalized operations aiming at the federal learning products of different manufacturers, simplify the operation, and save the time cost and the labor cost.
Drawings
Fig. 1 is a first flowchart of a log management method according to embodiment 1 of the present invention.
Fig. 2 is a second flowchart of the log management method provided in embodiment 1 of the present invention.
Fig. 3 is a flowchart of S107 provided in embodiment 1 of the present invention.
Fig. 4 is a schematic block diagram of a log management system according to embodiment 2 of the present invention.
Fig. 5 is a block diagram of the first determining module 24 according to embodiment 2 of the present invention.
Fig. 6 is a schematic structural diagram of an electronic device provided in embodiment 3 of the present invention.
Detailed Description
The invention is further illustrated by the following examples, which are not intended to limit the invention thereto.
Example 1
The present embodiment provides a log management method, as shown in fig. 1, the log management method includes the following steps:
s101, a first request is sent to a target server node, the first request is used for triggering the target server node to encrypt a first plaintext log by using a target algorithm to obtain a first encrypted log and generate a second request, and the second request comprises the first encrypted log.
Specifically, in this embodiment, the target server node is a server node of a federal learning product that needs to monitor algorithm security, and may send the corresponding first requests to all server nodes of the federal learning product that needs to monitor algorithm security at one time, or may send the first requests respectively in sequence until all server nodes of the federal learning product that need to monitor algorithm security receive the first requests.
S102, receiving a second request sent by the target server node through the target algorithm interface through the log interface.
S103, acquiring the first encryption log from the second request.
S104, capturing a third request from the target algorithm interface, wherein the third request comprises a second plaintext log.
S105, judging whether the third request corresponds to the second request; if yes, go to step S106.
S106, encrypting the second plaintext log by using the public key corresponding to the target algorithm to obtain a second encrypted log.
S107, judging whether the first encryption log and the second encryption log are the same, if so, executing S108.
And S108, determining the safety of the target algorithm.
As shown in fig. 2, in this embodiment, before S101, the method further includes:
s1101, generating a pair of public key and private key.
The first request includes a public key.
Specifically, in the present embodiment, the parameters ClientId (client identification number) and ClientSecret (client key) are also included in the first request.
Specifically, in this embodiment, the second request includes a first encrypted log, an encrypted request header, and a first plaintext parameter, where the encrypted request header is obtained by encrypting, by the target server node, the first plaintext request header using a public key.
As shown in fig. 2, specifically, in the present embodiment, S103 includes the steps of:
s1103, judging whether the private key is matched with the encryption request header, if so, executing S2103.
Specifically, in this embodiment, the matching of the private key with the decryption request header means that the private key can decrypt the encryption request header.
S2103, the encrypted request head is decrypted by using a private key to obtain a first plaintext request head.
As shown in fig. 2, specifically, in the present embodiment, the step of S103 is followed by:
s3103, the first plaintext parameter is obtained from the second request.
S4103, classifying the first encryption log according to the first plaintext parameter.
And S5103, extracting the label information from the first plaintext parameter, and correspondingly storing the label information and the first encryption log.
Specifically, in this embodiment, the content of the plaintext parameters includes a server address, manufacturer information, product information, algorithm type information, log type, and the like. The types of the log include an operation log, a task log, an API (Application Programming Interface) log, a verification log, and the like. The plaintext parameters corresponding to the operation logs comprise a node ID, manufacturer information, product information and a label related to an algorithm type, the plaintext parameters corresponding to the task logs comprise a node ID, a log type, an operator account, manufacturer information, product information and a label related to the algorithm type, the plaintext parameters corresponding to the API logs comprise a node ID, a log type, manufacturer information, product information and a label related to the algorithm type, and the plaintext parameters corresponding to the evidence-storing logs comprise a node ID, manufacturer information, product information and a label related to the algorithm type.
Specifically, in this embodiment, the third request further includes a second plaintext request header and a second plaintext parameter.
As shown in fig. 3, in particular, in this embodiment, S107 specifically includes the steps of:
s1071, judging whether the second plaintext parameter is the same as the first plaintext parameter, if so, executing S1072.
S1072, judging whether the second plaintext request header is the same as the first plaintext request header, if so, executing S1073.
Specifically, in this embodiment, after receiving the first request, the target server node maintains the ClientId and the ClientSecret included in the first request, generates a Timestamp and a Nonce (Number one), and then combines the ClientId, the ClientSecret, the Timestamp, and the Nonce to obtain a plaintext request header. The Timestamp in the plaintext request header may indicate the time at which the target server node generated the plaintext request header.
Specifically, in this embodiment, the log management system is used to implement the log management method in this embodiment, after obtaining the plaintext request header, the log management system compares the Timestamp in the plaintext request header with its own Timestamp, and determines whether the time difference between the Timestamp and the plaintext request header is within a preset range, and if the time difference exceeds the preset range, it indicates that the received request is out of date, and the log management system discards the received request, and retransmits the first request to the target server node or captures a third request from the target server node. The Timestamp of the log management system may indicate the time at which the log management system received the request.
S1073, determining that the third request corresponds to the second request.
The embodiment provides a log management method, which completes the monitoring of algorithm safety through the management of logs, determines that encrypted data is not tampered, and does not need to invade federal learning products of manufacturers and perform a large amount of personalized operations aiming at federal learning products of different manufacturers, thereby simplifying the operation and saving the time cost and the labor cost; when the log interface is called, the encryption technology is used, so that the safety of interface calling is ensured; the log information of all the federal learning products is collected and classified and stored, and the integrity and the normalization of the log are guaranteed.
Example 2
The present embodiment provides a log management system, as shown in fig. 4, the log management system includes a first request sending module 21, a second request receiving module 22, a third request capturing module 23, a first judging module 24, an encrypting module 25, and a second judging module 26.
The first request sending module 21 is configured to send a first request to a target server node, where the first request is used to trigger the target server node to encrypt a first plaintext log by using a target algorithm to obtain a first encrypted log and generate a second request, where the second request includes the first encrypted log.
Specifically, in this embodiment, the target server node is a server node of the federal learning product requiring monitoring algorithm security, and may send the corresponding first requests to all server nodes of the federal learning product requiring monitoring algorithm security at a time, or may send the corresponding first requests respectively in sequence until all server nodes of the federal learning product requiring monitoring algorithm security receive the first requests.
The second request receiving module 22 is configured to receive, through the log interface, a second request sent by the target server node through the target algorithm interface, and obtain the first encrypted log from the second request.
The third request capture module 23 is configured to capture a third request from the target algorithm interface, where the third request includes a second plaintext log.
The first determining module 24 is configured to determine whether the third request corresponds to the second request, and if so, invoke the encrypting module 25, where the encrypting module is configured to encrypt the second plaintext log by using a public key corresponding to the target algorithm, to obtain a second encrypted log.
The second judging module 26 is configured to judge whether the first encryption log and the second encryption log are the same, and if yes, determine that the target algorithm is safe.
Specifically, in this embodiment, the first request sending module 21 is further configured to generate a pair of a public key and a private key. The first request includes a public key.
Specifically, in this embodiment, the first request further includes parameters ClientId and ClientSecret.
The second request comprises a first encryption log, an encryption request header and a first plaintext parameter, wherein the encryption request header is obtained by encrypting the first plaintext request header by the target server node by using a public key.
Specifically, in this embodiment, the second request receiving module 22 is further configured to determine whether the private key is matched with the encrypted request header, and if so, decrypt the encrypted request header by using the private key to obtain a first plaintext request header, and obtain a first encrypted log from the second request.
Specifically, in this embodiment, the second request receiving module 22 is further configured to obtain the first plaintext parameter from the second request.
Specifically, in this embodiment, the third request further includes a second plaintext request header and a second plaintext parameter.
As shown in fig. 5, in particular, in the present embodiment, the first judging module 24 includes a first judging unit 241 and a second judging unit 242.
The first determining unit 241 is configured to determine whether the second plaintext parameter is the same as the first plaintext parameter, if so, invoke the second determining unit 242, and the second determining unit 242 is configured to determine whether the second plaintext request header is the same as the first plaintext request header, and if so, determine that the third request corresponds to the second request. Specifically, in this embodiment, after receiving the first request, the target server node maintains the ClientId and the ClientSecret included in the first request, generates the Timestamp and the Nonce, and then combines the ClientId, the ClientSecret, the Timestamp, and the Nonce to obtain the plaintext request header. The Timestamp in the plaintext request header may indicate the time at which the target server node generated the plaintext request header.
Specifically, in this embodiment, after obtaining the plaintext request header, the log management system compares the Timestamp in the plaintext request header with its own Timestamp, and determines whether the time difference between the two timestamps is within a preset range, and if the time difference exceeds the preset range, the received request is expired, and the log management system discards the received request, and retransmits the first request to the target server node or captures a third request from the target server node. The Timestamp of the log management system may indicate the time the log management system received the request.
Specifically, in this embodiment, the second request receiving module 22 is further configured to classify the first encrypted log according to the first plaintext parameter, extract the tag information from the first plaintext parameter, and store the tag information and the first encrypted log correspondingly. The contents of the plaintext parameters in this embodiment include server address, manufacturer information, product information, algorithm type information, log type, and the like. The types of logs include operation logs, task logs, API logs, evidence-storing logs, and the like. The plaintext parameters corresponding to the operation logs comprise node IDs, manufacturer information, product information and algorithm type related labels, the plaintext parameters corresponding to the task logs comprise the node IDs, log types, operator accounts, manufacturer information, product information and algorithm type related labels, the plaintext parameters corresponding to the API logs comprise the node IDs, the log types, the manufacturer information, the product information and algorithm type related labels, and the plaintext parameters corresponding to the evidence storage logs comprise the node IDs, the manufacturer information, the product information and the algorithm type related labels.
The embodiment provides a log management system, which completes the monitoring of algorithm safety through the management of logs, determines that encrypted data is not tampered, does not need to invade federal learning products of manufacturers and perform a large amount of personalized operations aiming at federal learning products of different manufacturers, simplifies the operation, and saves time cost and labor cost; when the log interface is called, an encryption technology is used, so that the safety of interface calling is ensured; the log information of all the federal learning products is collected and classified and stored, and the completeness and the normalization of the log are guaranteed.
Example 3
Fig. 6 is a schematic structural diagram of an electronic device according to embodiment 3 of the present invention. Comprising a memory, a processor and a computer program stored in the memory and adapted to run on the processor, the processor implementing the log management method of the aforementioned embodiment 1 when executing the computer program. The electronic device 30 shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiment of the present invention.
The electronic device 30 may be embodied in the form of a general purpose computing device, which may be, for example, a server device. The components of the electronic device 30 may include, but are not limited to: the at least one processor 31, the at least one memory 32, and a bus 33 connecting the various system components (including the memory 32 and the processor 31).
The bus 33 includes a data bus, an address bus, and a control bus.
The memory 32 may include volatile memory, such as Random Access Memory (RAM) 321 and/or cache memory 322, and may further include Read Only Memory (ROM) 323.
Memory 32 may also include a program/utility 325 having a set (at least one) of program modules 324, such program modules 324 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
The processor 31 executes various functional applications and data processing, such as the log management method of embodiment 1 of the present invention, by running the computer program stored in the memory 32.
The electronic device 30 may also communicate with one or more external devices 34 (e.g., a keyboard, a pointing device, etc.). Such communication may be through input/output (I/O) interfaces 35. Also, model-generating device 30 may also communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet) via network adapter 36. As shown, network adapter 36 communicates with the other modules of model-generating device 30 via bus 33. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the model-generating device 30, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID (disk array) systems, tape drives, and data backup storage systems, to name a few.
It should be noted that although in the above detailed description several units/modules or sub-units/modules of the electronic device are mentioned, such a division is merely exemplary and not mandatory. Indeed, the features and functionality of two or more of the units/modules described above may be embodied in one unit/module according to embodiments of the invention. Conversely, the features and functions of one unit/module described above may be further divided into embodiments by a plurality of units/modules.
Example 4
The present invention also provides a computer-readable medium on which a computer program is stored, the computer program, when executed by a processor, implementing the log management method of the foregoing embodiment 1.
More specific examples, among others, that the readable storage medium may employ may include, but are not limited to: a portable disk, hard disk, random access memory, read only memory, erasable programmable read only memory, optical storage device, magnetic storage device, or any suitable combination of the foregoing.
In a possible implementation, the invention may also be implemented in the form of a program product comprising program code for causing a terminal device to perform the log management method implementing embodiment 1 when the program product is run on the terminal device.
Where program code for carrying out the invention is written in any combination of one or more programming languages, the program code may be executed entirely on the user device, partly on the user device, as a stand-alone software package, partly on the user device and partly on a remote device or entirely on the remote device.
While specific embodiments of the invention have been described above, it will be appreciated by those skilled in the art that this is by way of example only, and that the scope of the invention is defined by the appended claims. Various changes or modifications to these embodiments may be made by those skilled in the art without departing from the principle and spirit of this invention, and these changes and modifications are within the scope of this invention.

Claims (10)

1. A log management method, characterized in that the log management method comprises:
sending a first request to a target server node, wherein the first request is used for triggering the target server node to encrypt a first plaintext log by using a target algorithm to obtain a first encrypted log and generate a second request, and the second request comprises the first encrypted log;
receiving the second request sent by the target server node through a target algorithm interface through a log interface, and acquiring the first encrypted log from the second request;
capturing a third request from the target algorithm interface, wherein the third request comprises a second plaintext log;
judging whether the third request corresponds to the second request, if so, encrypting the second plaintext log by using a public key corresponding to the target algorithm to obtain a second encrypted log;
and judging whether the first encryption log and the second encryption log are the same or not, and if so, determining that the target algorithm is safe.
2. The log management method of claim 1,
the step of sending the first request to the target server node may be preceded by:
generating a pair of public key and private key;
the first request includes the public key;
the second request comprises the first encryption log, an encryption request header and a first plaintext parameter, wherein the encryption request header is obtained by encrypting the first plaintext request header by the target server node by using the public key.
3. The log management method of claim 2,
the step of obtaining the first encrypted log from the second request may be preceded by:
judging whether the private key is matched with the encryption request head, if so, decrypting the encryption request head by using the private key to obtain the first plaintext request head, and executing the step of acquiring the first encryption log from the second request;
the step of obtaining the first encrypted log from the second request may be followed by:
and acquiring the first plaintext parameters from the second request.
4. The log management method of claim 3,
the third request also comprises a second plaintext request header and a second plaintext parameter;
the step of determining whether the third request corresponds to the second request comprises:
judging whether the second plaintext parameters are the same as the first plaintext parameters, if so, judging whether the second plaintext request header is the same as the first plaintext request header, and if so, determining that the third request corresponds to the second request; and/or the presence of a gas in the atmosphere,
the step of obtaining the first plaintext parameter from the second request is followed by:
classifying the first encrypted log according to the first plaintext parameter;
extracting label information from the first plain text parameter, and correspondingly storing the label information and the first encryption log.
5. A log management system, characterized in that the log management system comprises:
the system comprises a first request sending module, a first encryption module and a second request sending module, wherein the first request sending module is used for sending a first request to a target server node, the first request is used for triggering the target server node to encrypt a first plaintext log by using a target algorithm to obtain a first encrypted log and generate the second request, and the second request comprises the first encrypted log;
a second request receiving module, configured to receive, through a log interface, the second request sent by the target server node through a target algorithm interface, and obtain the first encrypted log from the second request;
a third request capture module, configured to capture a third request from the target algorithm interface, where the third request includes a second plaintext log;
the first judgment module is used for judging whether the third request corresponds to the second request or not, if so, an encryption module is called, and the encryption module is used for encrypting the second plaintext log by using a public key corresponding to the target algorithm to obtain a second encrypted log;
and the second judgment module is used for judging whether the first encryption log and the second encryption log are the same or not, and if so, determining that the target algorithm is safe.
6. The log management system of claim 5,
the first request sending module is also used for generating a pair of public key and private key;
the first request comprises the public key;
the second request comprises the first encryption log, an encryption request header and first plaintext parameters, wherein the encryption request header is obtained by encrypting the first plaintext request header by the target server node by using the public key.
7. The log management system of claim 6,
the second request receiving module is further configured to:
judging whether the private key is matched with the encryption request head, if so, decrypting the encryption request head by using the private key to obtain the first plaintext request head, and acquiring the first encryption log from the second request;
and acquiring the first plaintext parameters from the second request.
8. The log management system of claim 7,
the third request also comprises a second plaintext request header and a second plaintext parameter;
the first judging module comprises:
a first judging unit, configured to judge whether the second plaintext parameter is the same as the first plaintext parameter, if so, invoke a second judging unit, where the second judging unit is configured to judge whether the second plaintext request header is the same as the first plaintext request header, and if so, determine that the third request corresponds to the second request; and/or the presence of a gas in the atmosphere,
the second request receiving module is further configured to:
classifying the first encrypted log according to the first plaintext parameter;
extracting label information from the first plain text parameter, and correspondingly storing the label information and the first encryption log.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and adapted to run on the processor, wherein the processor implements the log management method of any of claims 1 to 4 when executing the computer program.
10. A computer-readable storage medium on which a computer program is stored, the computer program, when being executed by a processor, implementing the log management method of any one of claims 1 to 4.
CN202211560352.3A 2022-12-07 2022-12-07 Log management method, system, electronic device and storage medium Active CN115632879B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211560352.3A CN115632879B (en) 2022-12-07 2022-12-07 Log management method, system, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211560352.3A CN115632879B (en) 2022-12-07 2022-12-07 Log management method, system, electronic device and storage medium

Publications (2)

Publication Number Publication Date
CN115632879A true CN115632879A (en) 2023-01-20
CN115632879B CN115632879B (en) 2023-04-11

Family

ID=84910980

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211560352.3A Active CN115632879B (en) 2022-12-07 2022-12-07 Log management method, system, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN115632879B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106506552A (en) * 2016-12-28 2017-03-15 北京奇艺世纪科技有限公司 A kind of HTTP request transmission method and device
CN108833091A (en) * 2018-05-28 2018-11-16 武汉斗鱼网络科技有限公司 A kind of encryption method of journal file, decryption method and device
CN109639676A (en) * 2018-12-12 2019-04-16 杭州安恒信息技术股份有限公司 The method, apparatus, equipment and system of tampering detection when log transmission
CN110661748A (en) * 2018-06-28 2020-01-07 武汉斗鱼网络科技有限公司 Log encryption method, log decryption method and log encryption device
CN110855439A (en) * 2019-12-17 2020-02-28 深圳前海环融联易信息科技服务有限公司 HTTP encryption method, device, computer equipment and storage medium
US20200313878A1 (en) * 2019-03-29 2020-10-01 Microsoft Technology Licensing, Llc Secure and verifiable data access logging system
CN112132198A (en) * 2020-09-16 2020-12-25 建信金融科技有限责任公司 Data processing method, device and system and server
CN112235243A (en) * 2020-09-10 2021-01-15 李文华 Log audit security platform based on Web application security
US20210097195A1 (en) * 2017-10-30 2021-04-01 Abb Schweiz Ag Privacy-Preserving Log Analysis
CN113344222A (en) * 2021-06-29 2021-09-03 福建师范大学 Safe and credible federal learning mechanism based on block chain
CN113723623A (en) * 2021-08-10 2021-11-30 深圳致星科技有限公司 Federal learning auditing device, system and method
CN114448601A (en) * 2022-03-01 2022-05-06 南京航空航天大学 Distributed federal learning security defense method based on end edge cloud architecture and application
CN115085902A (en) * 2022-06-09 2022-09-20 深圳供电局有限公司 Power grid dispatching log management method and system
CN115225265A (en) * 2022-06-20 2022-10-21 中国电信股份有限公司 Log management method and device, electronic equipment and storage medium

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106506552A (en) * 2016-12-28 2017-03-15 北京奇艺世纪科技有限公司 A kind of HTTP request transmission method and device
US20210097195A1 (en) * 2017-10-30 2021-04-01 Abb Schweiz Ag Privacy-Preserving Log Analysis
CN108833091A (en) * 2018-05-28 2018-11-16 武汉斗鱼网络科技有限公司 A kind of encryption method of journal file, decryption method and device
CN110661748A (en) * 2018-06-28 2020-01-07 武汉斗鱼网络科技有限公司 Log encryption method, log decryption method and log encryption device
CN109639676A (en) * 2018-12-12 2019-04-16 杭州安恒信息技术股份有限公司 The method, apparatus, equipment and system of tampering detection when log transmission
US20200313878A1 (en) * 2019-03-29 2020-10-01 Microsoft Technology Licensing, Llc Secure and verifiable data access logging system
CN110855439A (en) * 2019-12-17 2020-02-28 深圳前海环融联易信息科技服务有限公司 HTTP encryption method, device, computer equipment and storage medium
CN112235243A (en) * 2020-09-10 2021-01-15 李文华 Log audit security platform based on Web application security
CN112132198A (en) * 2020-09-16 2020-12-25 建信金融科技有限责任公司 Data processing method, device and system and server
CN113344222A (en) * 2021-06-29 2021-09-03 福建师范大学 Safe and credible federal learning mechanism based on block chain
CN113723623A (en) * 2021-08-10 2021-11-30 深圳致星科技有限公司 Federal learning auditing device, system and method
CN114448601A (en) * 2022-03-01 2022-05-06 南京航空航天大学 Distributed federal learning security defense method based on end edge cloud architecture and application
CN115085902A (en) * 2022-06-09 2022-09-20 深圳供电局有限公司 Power grid dispatching log management method and system
CN115225265A (en) * 2022-06-20 2022-10-21 中国电信股份有限公司 Log management method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN115632879B (en) 2023-04-11

Similar Documents

Publication Publication Date Title
CN108780485B (en) Pattern matching based data set extraction
CN108304704B (en) Authority control method and device, computer equipment and storage medium
US8966249B2 (en) Data security and integrity by remote attestation
CN112217835B (en) Message data processing method and device, server and terminal equipment
CN107483472B (en) Network security monitoring method and device, storage medium and server
US8544100B2 (en) Detecting secure or encrypted tunneling in a computer network
CN108347361B (en) Application program testing method and device, computer equipment and storage medium
CN109450777B (en) Session information extraction method, device, equipment and medium
US20130145483A1 (en) System And Method For Processing Protected Electronic Communications
CN110855699B (en) Flow auditing method and device, server and auditing equipment
US20140195793A1 (en) Remotely Establishing Device Platform Integrity
CN103631678A (en) Backup method, restoring method and device for client software
CN110737639A (en) Audit log method, device, computer equipment and storage medium
US20200052902A1 (en) Digital data locker system providing enhanced security and protection for data storage and retrieval
CN110888778A (en) Cloud desktop-based log file monitoring system and method
CN112507264A (en) System and method for automatically realizing network electronic evidence obtaining through traceability
US8745010B2 (en) Data storage and archiving spanning multiple data storage systems
CN114866258A (en) Method and device for establishing access relationship, electronic equipment and storage medium
CN111371889A (en) Message processing method and device, Internet of things system and storage medium
CN107133517B (en) Data recovery method based on data encryption and calculation in memory
CN115632879B (en) Log management method, system, electronic device and storage medium
KR101641306B1 (en) Apparatus and method of monitoring server
CN114189515B (en) SGX-based server cluster log acquisition method and device
CN115250467A (en) Data processing method and device, electronic equipment and computer readable storage medium
CN111885069B (en) Computer network safety system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant