CN116743738A - Log transmission method and device and electronic equipment - Google Patents

Log transmission method and device and electronic equipment Download PDF

Info

Publication number
CN116743738A
CN116743738A CN202310897322.XA CN202310897322A CN116743738A CN 116743738 A CN116743738 A CN 116743738A CN 202310897322 A CN202310897322 A CN 202310897322A CN 116743738 A CN116743738 A CN 116743738A
Authority
CN
China
Prior art keywords
log data
proxy
program
encrypted
relay
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310897322.XA
Other languages
Chinese (zh)
Other versions
CN116743738B (en
Inventor
牛旭龙
李高隆
田运
何文宾
李振海
何春明
辛梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Daoyou Technology Co ltd
Original Assignee
Beijing Daoyou Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Daoyou Technology Co ltd filed Critical Beijing Daoyou Technology Co ltd
Priority to CN202310897322.XA priority Critical patent/CN116743738B/en
Publication of CN116743738A publication Critical patent/CN116743738A/en
Application granted granted Critical
Publication of CN116743738B publication Critical patent/CN116743738B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The embodiment of the application provides a log transmission method, a device and electronic equipment, wherein the log transmission method comprises the following steps: in a railway signal system, receiving original log data transmitted by a log data transmitting device in a first local area network through a first proxy program on a proxy server in the first local area network, wherein the first proxy program is created in advance; performing type marking on the original log data by a first virtual proxy server according to a preset classification marking rule to obtain marked log data; the first agent program encrypts the marked log data to obtain encrypted log data, and the encrypted log data is transmitted to a second agent program on a target server in a second local area network which is created in advance in an encrypted mode, so that the second agent program decrypts the encrypted log data to obtain the marked log data. By the embodiment of the application, the safety and the integrity of data transmission are ensured.

Description

Log transmission method and device and electronic equipment
Technical Field
The embodiment of the application relates to the technical field of data transmission, in particular to a log transmission method and device and electronic equipment.
Background
The railway signal system is used as a system for controlling railway traffic signal equipment, and is an important infrastructure for guaranteeing safe transportation and efficient operation of railways. In a railway signal system, a system log is used as one of system information flow paths, so that railway maintenance personnel can be helped to timely find and check the fault condition of equipment in the system, and meanwhile, the whole running state and the data flow direction of the system can be recorded, so that the fault point of the system can be timely monitored, the occurrence of security events such as network attack, data leakage and the like can be effectively prevented, and important guarantee is provided for the whole stability, reliability and security of the system.
Currently, most of railway signaling systems use UDP (User Datagram Protoco, user datagram protocol) protocol to transmit logs between devices in a plaintext manner. However, in this manner, due to the protocol requirements and transmission characteristics of the UDP protocol, there may be problems such as information loss and information leakage during the log transmission, and the integrity and security of the log information may not be ensured.
Disclosure of Invention
In view of the above, embodiments of the present application provide a log transmission method, device and electronic equipment, so as to at least partially solve the above problems.
According to a first aspect of an embodiment of the present application, there is provided a log transmission method, including: in a railway signal system, receiving original log data transmitted by a log data transmitting device in a first local area network in a clear text manner through a first proxy program of a proxy server in the first local area network, which is created in advance; the method comprises the steps that type marking is conducted on original log data through a first proxy program according to a preset classification marking rule, marking log data is obtained, and the preset classification marking rule is used for marking the original log data according to the type of log data sending equipment, wherein the type comprises equipment type and/or service type; the first agent program encrypts the marked log data to obtain encrypted log data, and the encrypted log data is transmitted to a second agent program on a target server in a second local area network which is created in advance in an encrypted mode, so that the second agent program decrypts the encrypted log data to obtain the marked log data.
According to a second aspect of the embodiment of the present application, there is provided a log transmission device, including a virtual server creating module, a classification marking module, and an encryption transmission module, where the virtual server creating module is configured to receive, in a railway signal system, original log data transmitted in plaintext by a log data transmitting apparatus in a first local area network through a first proxy program on a proxy server in the first local area network created in advance; the classification marking module is used for marking the type of the original log data through a first proxy program according to a preset classification marking rule to obtain marked log data, wherein the preset classification marking rule is used for marking the original log data according to the type of log data transmitting equipment, and the type comprises equipment type and/or service type; the encryption transmission module is used for encrypting the marked log data through the first agent program to obtain encrypted log data, and transmitting the encrypted log data to a second agent program on a target server in a second local area network which is created in advance in an encryption mode, so that the encrypted log data is decrypted through the second agent program to obtain the marked log data.
According to a third aspect of an embodiment of the present application, there is provided an electronic apparatus including: the device comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface are communicated with each other through the communication bus; the memory is used for storing at least one executable instruction, and the executable instruction enables the processor to execute the operations corresponding to the method of the embodiments of the application.
According to the log transmission method, the log transmission device and the electronic equipment provided by the embodiment of the application, in a railway signal system, original log data transmitted by a log data transmitting device in a first local area network in plaintext is received through a first proxy program on a proxy server in the first local area network which is created in advance; the method comprises the steps that type marking is conducted on original log data through a first proxy program according to a preset classification marking rule, marking log data is obtained, and the preset classification marking rule is used for marking the original log data according to the type of log data sending equipment, wherein the type comprises equipment type and/or service type; the first agent program encrypts the marked log data to obtain encrypted log data, and the encrypted log data is transmitted to a second agent program on a target server in a second local area network which is created in advance in an encrypted mode, so that the second agent program decrypts the encrypted log data to obtain the marked log data. The created first agent program and second agent program are utilized to carry out encryption transmission on the log data, compared with a plaintext transmission mode, the security and the integrity of the log data transmission are ensured, and only the relevant configuration of the log data transmitting equipment and the target server for transmitting the log data and receiving the log data is required to be modified, so that the program of the system is not required to be adjusted, and the method is simple and efficient. In addition, by marking the types of the log data, the types of the log data of different types can be automatically classified, and the usability and the practicability of the log data are improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments described in the embodiments of the present application, and other drawings may be obtained according to these drawings for a person having ordinary skill in the art.
FIG. 1A illustrates an exemplary log transmission system implementing a log transmission method of an embodiment of the present application;
FIG. 1B illustrates another exemplary log transmission system implementing a log transmission method of an embodiment of the present application;
FIG. 1C illustrates another exemplary log transmission system implementing a log transmission method of an embodiment of the present application;
FIG. 1D illustrates another exemplary log transmission system implementing a log transmission method of an embodiment of the present application;
fig. 2 is a flow chart of a log transmission method according to an embodiment of the application;
FIG. 3 is a flowchart illustrating another log transmission method according to an embodiment of the present application;
FIG. 4 is a block diagram of a log transmission device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to better understand the technical solutions in the embodiments of the present application, the following description will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which are derived by a person skilled in the art based on the embodiments of the present application, shall fall within the scope of protection of the embodiments of the present application.
Fig. 1A illustrates an exemplary log transmission system implementing a log transmission method according to an exemplary embodiment of the present application, and as shown in fig. 1A, the log transmission system 100 may be applied to a railway signal system, the log transmission system 100 may include a log data transmitting device 102 disposed in a first local area network, a proxy server 104, and a target server 108 disposed in a second local area network, the log data transmitting device 102 may include different kinds and numbers of devices, such as servers, routers, switches, etc., and the target server 108 may include a log audit server. The log data sending device 102 and the proxy server 104 are located in a first local area network, and the target server 108 is located in a second local area network, and illustratively, the proxy server 104 and the target server 108 can perform encrypted communication through the national secret TSL (Transport Layer Security) protocol, but the present application is not limited thereto, and other encrypted communication modes are also applicable to the scheme of the embodiment of the present application. Note that, the national secret TSL (Transport Layer Security) protocol is a secure network transport layer protocol for protecting security of computer network communication. The identities of the server and the client are verified by using encryption technology and digital certificates, and encrypted data are transmitted, so that confidentiality, integrity and reliability in the communication process are ensured.
The log data sending device 102 is configured to generate and send log data, where the log data is transmitted to a first agent on the proxy server 104, and the first agent encrypts the log data and then encrypts and transmits the encrypted log data to a second agent on the target server 108, where the second agent decrypts the encrypted log data and performs subsequent storage, audit, and other processes on the target server 108. Referring to fig. 1B, the log transmission system 100 may further include a relay proxy server 106, where the relay proxy server 106 communicates with the proxy server 104 through a first relay network, and the relay proxy server 106 communicates with the target server 108 through a second relay network, where the first relay network and the second relay network are networks of different network types from the first local area network and the second local area network.
Referring to fig. 1C, in one implementation, the log transmission system 100 may further include a plurality of relay proxy servers 106 disposed between the proxy server 104 and the target server 108, for example, a first relay proxy server 1061 and a second relay proxy server 1062, where the proxy server 104 and the first relay proxy server 1061 communicate through a third relay network, the first relay proxy server 1061 and the second relay proxy server 1062 communicate through a fourth relay network, and the second relay proxy server 1062 and the target server 108 communicate through a fifth relay network, where the third relay network and the fifth relay network are networks of different network types than the first local area network and the second local area network, and the fourth relay network is not limited.
Referring to fig. 1D, in another implementation, the log transmission system 100 may further include a plurality of log data transmission devices 102 disposed in a third local area network, the third relay proxy 1063 communicating with the first proxy of the proxy server 104 through a sixth relay network, the third relay proxy 1063 communicating with the second proxy of the target server 108 through a seventh relay network, wherein the sixth relay network and the seventh relay network are networks having different network types from the first local area network and the second local area network.
The log data refers to recorded data for recording the procedural events generated by the railway signal system. By looking at the log data it is possible to know which specific user, at which specific time, on which device or in which application, what specific operation is done. The sources of the log data can comprise a server, a storage device, a network device, an operating system, a database, a service system and the like, and the embodiment of the application does not limit the sources and the acquisition modes of the log data.
The implementation of the embodiments of the present application will be further described below with reference to the accompanying drawings.
In combination with the log transmission system, the embodiments of the present application provide a log transmission method, which is described below through a plurality of embodiments.
Fig. 2 is a flow chart of a log transmission method according to an exemplary embodiment of the present application, as shown in the drawing, the embodiment mainly includes the following steps:
s202, in the railway signal system, receiving original log data transmitted by a log data transmitting device in a first local area network in a plaintext manner through a first proxy program on a proxy server in the first local area network, which is created in advance.
Illustratively, in the railway signaling system, a first proxy program on a proxy server in a first local area network is created, and the IP address and port information of the proxy server are configured in the log data transmitting apparatus. The Proxy service may be obtained by installing first Proxy service software on the Proxy server, for example, log c_proxy Proxy service software may be used, which is not limited in this embodiment, and the IP address and port information of second Proxy service software where the second Proxy program is located are configured in the first Proxy service software, and the second Proxy service software may be log s_proxy Proxy service software, and the IP address and port information of the target server are configured in the second Proxy service software. The log data transmitting device transmits the original log data to a first proxy program of the proxy server through a first local area network plaintext. Wherein the original log data is generated by the log data transmitting apparatus.
In another implementation, the second proxy program may be separately provided in a proxy server device, and may be recorded as a first proxy server (to distinguish from the proxy server), where the first proxy server device is located in the second local area network, encrypts the log data with the first proxy program to obtain encrypted log data, encrypts the encrypted log data to the second proxy program on the first proxy server in the second local area network, decrypts the encrypted log data with the second proxy program to obtain the log data, and transmits the log data to the target server in plain text,
s204, performing type marking on the original log data according to a preset classification marking rule by a first proxy program to obtain marked log data.
The preset classification marking rule is used for marking the original log data according to the type of the log data sending equipment, wherein the type comprises equipment type and/or service type. The preset classification marking rules can be maintained and set in the target server, and the preset classification marking rules are distributed to the first proxy programs through the log server. If there is a relay proxy server, the log server distributes the preset classification flag rule to each relay proxy server, and then the relay proxy server distributes the preset classification flag rule to each first proxy program.
The first proxy program receives the original log data, and then performs type marking on the original log data according to a preset classification marking rule to obtain marked log data. For example, the original log data may be marked by its type, where the original log data may refer to a device type and/or a service type of a log data transmitting device that generates the original log data, a service type may refer to a service signal system where the log data transmitting device is located, a device type may refer to a type of the log data transmitting device, and a device key in the original log data may be acquired to determine a device type, e.g., the device type is a switch, a router, or a server. The device type and service type may refer to a device in a service signaling system, which may include, for example, a TDCS/CTC system, a CTCS system, a CSM system, a CCS system, etc. Devices of different uses exist in each system, for example, a TDCS/CTC system may include a dispatcher station, an application server, a communication front-end, a vehicle service terminal, a TSRS interface server, etc.
The CTCS system is a chinese train control system (China Train Control System), the TDCS system is a train dispatch command system (Train Dispatching Command System), the CTC system is a dispatch centralized system (Centralized Traffic Control), the CCS system is a motor train unit (institute) control centralized system (Control Centralized System), and the CSM system is a signal centralized monitoring system (Centralized Signaling Monitoring System).
In an alternative implementation manner, performing type marking on original log data by a first proxy program according to a preset classification marking rule to obtain marked log data, including: acquiring information of equipment type and/or service type of log data transmitting equipment corresponding to original log data; determining a type mark corresponding to original log data according to the information of the equipment type and/or the service type and a preset data dictionary, wherein the data dictionary is used for indicating the mapping relation between the information of the equipment type and/or the service type and the type mark; and classifying and marking the original log data according to the type mark corresponding to the original log data to obtain marked log data.
Illustratively, a class mark according to the traffic type information may be identified as app_sys; the class mark according to the device type information may be identified as app_dev. And acquiring information of the equipment type and/or service type of the log data transmitting equipment corresponding to the original log data. According to the information of the equipment type and/or the service type and a preset data dictionary, a mapping relation of many to many can be defined in the preset data dictionary, and the information for different equipment types and/or service types corresponds to different type marks. And determining the type mark corresponding to the original log data through the mapping relation between the equipment type and/or service type information corresponding to the original log data and the data dictionary. And classifying and marking the original log data according to the type mark corresponding to the original log data to obtain marked log data.
The data dictionary refers to defining and describing data items, data structures, data streams, data storage, processing logic, and the like of data, and may be said to be an information set describing data, and is a set of definitions of all data elements used in a system. A Data dictionary (Data dictionary) is a directory of record databases and application metadata that a user can access.
In the implementation mode, the information of the equipment type and/or the service type of the log data sending equipment corresponding to the original log data is obtained; determining a type mark corresponding to original log data according to the information of the equipment type and/or the service type and a preset data dictionary; and classifying and marking the original log data according to the type mark corresponding to the original log data to obtain marked log data. By marking the types of the log data, the types of the log data of different types can be automatically classified, so that the target server can process the log data conveniently, and the usability and practicability of the log data are improved.
S206, encrypting the marked log data through the first agent program to obtain encrypted log data, and encrypting and transmitting the encrypted log data to a second agent program on a target server in a second local area network which is created in advance, so that the encrypted log data is decrypted through the second agent program to obtain the marked log data.
Illustratively, in the railway signaling system, the second agent program on the target server in the second local area network is created in advance, the agent service may be acquired by installing the second agent service software on the target server 108, for example, log_proxy service software may be used, which is not limited in this embodiment, and the IP address and port information of the target server 108 are configured in the second agent service software. The first proxy program encrypts the marked log data to obtain encrypted log data, wherein the encryption algorithm can use a national encryption SM4 encryption algorithm. And establishing a communication channel between the first agent program and the second agent program through a national cipher TSL (Transport Layer Security) protocol, encrypting and transmitting the encrypted log data to the second agent program through the communication channel, decrypting the encrypted log data through the second agent program to obtain the marked log data, wherein the second agent program firstly carries out data integrity verification on the encrypted log data by adopting an SM3 algorithm, and then decrypting the encrypted log data by adopting an SM4 algorithm to obtain the marked log data. The integrity verification can be carried out on the log data through the encrypted transmission of the national secret TSL protocol, so that the log data is ensured not to be tampered or damaged in the transmission process.
After receiving the marked log data, the target server can carry out audit analysis on the log data, and if the analysis result is abnormal, the target server can determine corresponding log data sending equipment through type marking so as to carry out security detection on the equipment in time; if the analysis result is normal, respectively classifying and storing the marked log data with the same type mark into a corresponding database according to the type mark so as to uniformly manage the log data. In addition, if a certain log data transmitting device in the railway signal system fails, the corresponding marked log data can be searched according to the type mark corresponding to the device, so that the fault positioning, the fault checking and the like can be performed according to the corresponding log data.
Note that, the cryptographic SM4 is a symmetric encryption algorithm, also called SMs4, and may be used in fields such as data encryption and authentication. The SM4 algorithm is used for encrypting the marked log data, so that the security of the log data in the transmission process can be improved, the encryption speed is high, and the transmission efficiency can be improved.
In an alternative implementation, the encrypted log data is transmitted to a second agent program on a target server in a second local area network created in advance in an encrypted manner, including: and encrypting and transmitting the encrypted log data to a second proxy program on a target server in a second local area network which is created in advance through the first proxy program according to the type mark of the marked log data corresponding to the encrypted log data.
For example, according to the type mark of the mark log data corresponding to the encrypted log data, the encrypted log data of different types of marks can be transmitted to the second agent program in the second local area network in batches through the first agent program according to the type mark.
In this implementation manner, the encrypted log data is encrypted and transmitted to a second agent program on a target server in a second local area network, which is created in advance, through the first agent program according to a type mark of the marked log data corresponding to the encrypted log data. The subsequent second agent program decrypts the encrypted log data and then carries out subsequent processing by the target server, so that the target server can store or process in batches according to the type mark, and the working efficiency is improved.
In an alternative implementation, encrypting the marked log data by the first proxy program to obtain encrypted log data includes: determining a data grade corresponding to the marked log data according to the type mark of the marked log data and a preset data grade classification rule, wherein the data grade classification rule is used for classifying the marked log data according to the type mark of the marked log data; and determining an encryption mode corresponding to the mark log data according to the data grade corresponding to the mark log data and a preset encryption rule, encrypting the mark log data according to the encryption mode to obtain the encrypted log data, wherein the preset encryption rule is used for indicating the corresponding relation between the data grade and the encryption mode.
For example, the preset data class classification rule may classify the data class of the marking log data according to the type mark in the marking log data, such as the device type and/or the service type, and the number of data classes and the type mark corresponding to each data class may be flexibly set by those skilled in the art according to the actual situation, which is not limited in this embodiment. For example, the data class classification can be performed on the marked log data according to the importance or confidentiality degree of the service type, and the higher the data class, the higher the importance or confidentiality degree of the marked log data, and the more strict the security requirement for data transmission. Similarly, encryption rules are preset, so that each data level corresponds to one encryption mode, and the higher the data level, the more complex the corresponding encryption mode can be set. And determining the data grade corresponding to the marked log data according to the type mark of the marked log data and a preset data grade classification rule. And determining an encryption mode corresponding to the mark log data according to the data grade corresponding to the mark log data and a preset encryption rule, and encrypting the mark log data according to the encryption mode.
In this implementation manner, the data level corresponding to the mark log data may be determined according to the type mark of the mark log data and a preset data level classification rule. And determining an encryption mode corresponding to the mark log data according to the data grade corresponding to the mark log data and a preset encryption rule, and encrypting the mark log data according to the encryption mode. Therefore, different marked log data can be enabled to correspond to different encryption modes, so that the flexibility of encrypting the marked log data is improved, and the efficiency and the safety of data encryption are further improved.
In an alternative implementation, the method further comprises: performing initialization configuration when the first agent program and the second agent program are initially started, wherein the initialization configuration comprises at least one of the following steps: reading log data transmission parameter configuration information of a first local area network corresponding to a first proxy program and a second local area network corresponding to a second proxy program, acquiring channel address information of a server where a peer proxy program is located, and loading a communication certificate of the server where the home proxy program is located; based on the initialization configuration, communication connection, communication certificate authentication and key negotiation between the server where the first proxy program is located and the server where the second proxy program is located are performed to establish a communication channel between the proxy server and the target server.
For example, when the first agent program and the second agent program are initially started, initial configuration is performed, where the initial configuration may include reading log data transmission parameter configuration information of a first local area network corresponding to the first agent program and a second local area network corresponding to the second agent program, for example, a target IP address and port information of log data transmission, where the first agent program obtains channel address information of a server where the second agent program is located (i.e., a target server), where the second agent program obtains channel address information of a server where the first agent program is located (i.e., an agent server), where the server where the first agent program is located and the server where the second agent program is located load local communication certificates respectively, where the communication certificates may be authenticated by an SM2-1 algorithm. Based on the initialization configuration, the first proxy program sends a communication channel construction request to a server where the second proxy program is located, communication connection is carried out between the server where the first proxy program is located and the server where the second proxy program is located, communication certificate authentication is carried out by using an SM2-1 algorithm at both ends, key negotiation is carried out by using the SM2 algorithm, and after authentication, a communication channel between the proxy server where the first proxy program is located and a target server where the second proxy program is located is established.
In this implementation manner, when the first agent program and the second agent program are initially started, initialization configuration is performed to determine information that the first agent program and the second agent program establish a communication channel. Based on the initialization configuration, in the process of communication connection between the first proxy program and the second proxy program, communication certificate authentication and key negotiation are carried out, so that the data transmission security of a communication channel between the proxy server where the first proxy program is located and the target server where the second proxy program is located is higher, and the security level protection requirement of log data transmission is met, so that data is ensured not to be stolen, tampered or forged in the transmission process.
In an alternative implementation, the method further comprises: detecting the connection state of the established communication channel between the proxy server and the target server through a heartbeat detection mechanism to obtain a detection result; when the detection result shows that the communication channel is disconnected, the untransmitted encrypted log data is saved by the first proxy program and recorded in a disk of a proxy server where the first proxy program is located.
By way of example, the connection state detection is performed on the communication channel between the proxy server and the target server through the heartbeat detection mechanism, so as to obtain a detection result, and the detection result may include that the communication channel is normal or the communication channel is disconnected. When the detection result shows that the communication channel is disconnected, the untransmitted encrypted log data is saved by the first proxy program and recorded in a disk of a proxy server where the first proxy program is located.
The heartbeat packet is a custom command word for informing the state of the other party at regular time between the client and the server, and is sent at a certain time interval. The heartbeat detection mechanism is to set a heartbeat packet between the proxy server and the target server to judge whether the opposite side operates normally or not, send a simple heartbeat packet to the opposite side at regular time, and judge that the opposite side is offline if no response is received from the opposite side within a designated time.
In the implementation manner, when the disconnection of the communication channel is detected, the untransmitted encrypted log data is stored by the first proxy program and recorded in the disk of the proxy server where the first proxy program is located, so that the integrity and the safety of the log data can be ensured, and the leakage or damage of the log data in the transmission process due to the disconnection of the communication channel is avoided.
In the log transmission method provided by the embodiment, in a railway signal system, original log data transmitted by a log data transmitting device in a first local area network in plaintext is received through a first proxy program on a proxy server in the first local area network which is created in advance; the method comprises the steps that type marking is conducted on original log data through a first proxy program according to a preset classification marking rule, marking log data is obtained, and the preset classification marking rule is used for marking the original log data according to the type of log data sending equipment, wherein the type comprises equipment type and/or service type; the first agent program encrypts the marked log data to obtain encrypted log data, and the encrypted log data is transmitted to a second agent program on a target server in a second local area network which is created in advance in an encrypted mode, so that the second agent program decrypts the encrypted log data to obtain the marked log data. The created first agent program and second agent program are utilized to carry out encryption transmission on the log data, compared with a plaintext transmission mode, the security and the integrity of the log data transmission are ensured, and only the relevant configuration of the log data transmitting equipment and the target server for transmitting the log data and receiving the log data is required to be modified, so that the program of the system is not required to be adjusted, and the method is simple and efficient. In addition, by marking the types of the log data, the types of the log data of different types can be automatically classified, and the usability and the practicability of the log data are improved.
Fig. 3 is a flowchart of another log transmission method according to an exemplary embodiment of the present application. As shown in the figure, this embodiment mainly shows a specific implementation manner of the second agent program for encrypting and transmitting the encrypted log data to the target server in the second local area network created in advance in step S206 of the above embodiment, and mainly includes the following steps:
s302, in the railway signal system, receiving original log data transmitted by a log data transmitting device in a first local area network in a clear text mode through a first proxy program on a proxy server in the first local area network, wherein the first proxy program is created in advance.
S304, performing type marking on the original log data according to a preset classification marking rule by a first proxy program to obtain marked log data.
The preset classification marking rule is used for marking the original log data according to the type of the log data sending equipment, wherein the type comprises equipment type and/or service type.
S306, encrypting the marked log data through the first proxy program to obtain encrypted log data.
It should be noted that, the steps S302 to S306 may be implemented with reference to the specific implementation manner in the steps S202 to S206 in the above embodiment, which is not described herein.
S308, determining at least one relay proxy server between the first local area network and the second local area network.
S310, the encrypted log data transmitted by the first agent program is received through at least one relay proxy server and forwarded to the second agent program, so that the encrypted log data is decrypted through the second agent program to obtain the marked log data.
By way of example, one or more relay proxy servers may be created between the first proxy program and the second proxy program, and reference may be made to fig. 1B, 1C and 1D, where the number of relay proxy servers is not limited, and may be flexibly set by those skilled in the art according to actual situations. The encrypted log data transmitted by the first proxy program is received through the relay proxy server, and the encrypted log data is obtained by encrypting the marked log data through the first proxy program, wherein the encryption algorithm can use a national cipher SM4 encryption algorithm. Communication channels are respectively established between the first proxy program and the relay proxy server and between the relay proxy servers through a national cipher TSL (Transport Layer Security) protocol, encrypted log data can be firstly transmitted to the relay proxy server through the communication channels, then the encrypted log data is transmitted to the second proxy program from the relay proxy server through the communication channels, the encrypted log data is decrypted through the second proxy program to obtain marked log data, wherein the second proxy program firstly carries out data integrity verification on the encrypted log data through an SM3 algorithm, and then the encrypted log data is decrypted through an SM4 algorithm to obtain the marked log data.
It will be appreciated that if there are multiple relay proxy servers, communication channels may be established between the multiple relay proxy servers via the national cipher TSL (Transport Layer Security) protocol to enable encrypted transmission of encrypted log data between the first proxy and the second proxy.
In this embodiment, by accessing the relay proxy server, in an application scenario where a network is not reachable between the sending end and the receiving end, for example, in a case where a security gateway, a gatekeeper isolation, etc. are provided, forwarding is performed by using the relay proxy server, so as to realize log data transmission of the sending end and the receiving end in a network failure scenario.
In an alternative implementation, the encrypted log data transmitted by the first agent is received by at least one relay proxy server and forwarded to the second agent, including receiving, by the at least one relay proxy server, the encrypted log data transmitted by the first agent via a first relay network between the at least one relay proxy server and the first agent; and forwarding the encrypted log data to the second agent via a second relay network between the at least one relay proxy and the second agent.
The first relay network and the second relay network are networks with different network types from the first local area network and the second local area network.
Illustratively, the relay proxy server configures a first relay network and a second relay network, and via the first relay network between the relay proxy server and the first proxy program, the relay server may receive encrypted log data transmitted by the first proxy program. The relay proxy server may forward the encrypted log data to the second agent via a second relay network between the relay proxy server and the second agent.
In this implementation manner, since the relay proxy server configures the first relay network and the second relay network, the relay proxy server may communicate with the first proxy program through the first relay network and communicate with the second proxy program through the second relay network, so that in a case where the network between the first proxy program and the second proxy program is not available, log data sent by the first proxy program may be forwarded to the second proxy program by using the relay proxy server, so as to implement log data transmission in a case where the network is not available.
In an alternative implementation, the encrypted log data transmitted by the first proxy program is received by at least one relay proxy server and forwarded to the second proxy program, including receiving, by the first relay proxy server, the encrypted log data transmitted by the first proxy program via a third relay network between the first relay proxy server and the first proxy program; forwarding the encrypted log data to the second relay proxy via a fourth relay network between the first relay proxy and the second relay proxy; and forwarding the encrypted log data to the second agent via a fifth relay network between the second relay agent and the second agent.
The third relay network and the fifth relay network are each a network of a different network type from the first local area network and the second local area network. The first relay proxy server configures a third relay network and a fourth relay network, and the second relay proxy server configures the fourth relay network and a fifth relay network, where different relay networks may be configured by configuring different network cards. The encrypted log data transmitted by the first proxy is transmitted to the first relay proxy via a third relay network between the first proxy and the first relay proxy. Then, forwarding the encrypted log data to the second relay proxy server through a fourth relay network between the first relay proxy server and the second relay proxy server; and forwarding the encrypted log data to the second agent via a fifth relay network between the second relay agent and the second agent.
In the implementation manner, by arranging a plurality of relay proxy servers, when the network is not enabled between the first proxy program and the second proxy program, the plurality of relay proxy servers are utilized to forward the log data sent by the first proxy program until the log data is transmitted to the second proxy program, so that the log data transmission under the condition of network failure is realized.
Fig. 4 is a block diagram of a log transmission device according to an exemplary embodiment of the present application.
As shown in the figure, the log transmission apparatus 400 of the present embodiment includes an agent creation module 402, a classification mark module 404, and an encryption transmission module 406.
The virtual server creating module 402 is configured to receive, in the railway signal system, original log data transmitted in plaintext by a log data transmitting device in a first local area network through a first proxy program on a proxy server in the first local area network created in advance; the classification marking module 404 is configured to perform type marking on the original log data according to a preset classification marking rule by using a first proxy program to obtain marked log data, where the preset classification marking rule is used to mark the original log data according to a type of a log data sending device, and the type includes a device type and/or a service type; the encryption transmission module 406 is configured to encrypt the marked log data by using the first agent to obtain encrypted log data, and encrypt and transmit the encrypted log data to a second agent on a target server in a second local area network, where the second agent is created in advance, so as to decrypt the encrypted log data to obtain the marked log data.
In an alternative implementation, the encrypted transmission module 406 is further configured to: determining at least one relay proxy server between the first local area network and the second local area network; the encrypted log data transmitted by the first agent is received by at least one relay proxy server and forwarded to the second agent.
In an alternative implementation, the encrypted transmission module 406 is further configured to: receiving, by the at least one relay proxy server, encrypted log data transmitted by the first proxy program via a first relay network between the at least one relay proxy server and the first proxy program; and forwarding the encrypted log data to the second agent via a second relay network between the at least one relay proxy and the second agent; wherein the first relay network and the second relay network are networks of different network types from the first local area network and the second local area network.
In an alternative implementation, the encrypted transmission module 406 is further configured to: receiving, by the first relay proxy server, encrypted log data transmitted by the first proxy program via a third relay network between the first relay proxy server and the first proxy program; forwarding the encrypted log data to the second relay proxy via a fourth relay network between the first relay proxy and the second relay proxy; and forwarding the encrypted log data to the second agent via a fifth relay network between the second relay agent and the second agent.
In an alternative implementation, the encrypted transmission module 406 is further configured to: and encrypting and transmitting the encrypted log data to a second proxy program on a target server in a second local area network which is created in advance through the first proxy program according to the type mark of the marked log data corresponding to the encrypted log data.
In an alternative implementation, the encrypted transmission module 406 is further configured to: determining a data grade corresponding to the marked log data according to the type mark of the marked log data and a preset data grade classification rule, wherein the data grade classification rule is used for classifying the marked log data according to the type mark of the marked log data; and determining an encryption mode corresponding to the mark log data according to the data grade corresponding to the mark log data and a preset encryption rule, encrypting the mark log data according to the encryption mode, and indicating the corresponding relation between the data grade and the encryption mode by the preset encryption rule.
In an alternative implementation, the encrypted transmission module 406 is further configured to: performing initialization configuration when the first agent program and the second agent program are initially started, wherein the initialization configuration comprises at least one of the following steps: reading log data transmission parameter configuration information of a first local area network corresponding to a first proxy program and a second local area network corresponding to a second proxy program, acquiring channel address information of a proxy program at an opposite end, and loading a communication certificate of a server where the proxy program at the home end is located; based on the initialization configuration, communication connection, communication certificate authentication and key negotiation between the server where the first proxy program is located and the server where the second proxy program is located are performed to establish a communication channel between the proxy server and the target server.
In an alternative implementation, the encrypted transmission module 406 is further configured to: detecting the connection state of the established communication channel between the proxy server and the target server through a heartbeat detection mechanism to obtain a detection result; when the detection result shows that the communication channel is disconnected, the untransmitted encrypted log data is saved by the first proxy program and recorded in a disk of a proxy server where the first proxy program is located.
In an alternative implementation, the classification marking module 404 is further configured to: acquiring information of equipment type and/or service type of log data transmitting equipment corresponding to original log data; determining a type mark corresponding to original log data according to the information of the equipment type and/or the service type and a preset data dictionary, wherein the data dictionary is used for indicating the mapping relation between the information of the equipment type and/or the service type and the type mark; and classifying and marking the original log data according to the type mark corresponding to the original log data to obtain marked log data.
In addition, the log transmission device 400 of the embodiment of the present application may be further used to implement other steps in the foregoing embodiments of the log transmission method, and has the beneficial effects of the corresponding embodiments of the method steps, which are not described herein again.
Referring to fig. 5, a schematic structural diagram of an electronic device according to another embodiment of the present application is shown, and the specific embodiment of the present application is not limited to the specific implementation of the electronic device.
As shown in fig. 5, the electronic device may include: a processor (processor) 501, a memory (memory) 503, a communication bus 504, and a communication interface (Communications Interface) 505.
Wherein:
processor 501, memory 503, and communication interface 505 perform communication with each other via communication bus 504.
A communication interface 505 for communicating with other electronic devices or servers.
The processor 501 is configured to execute the program 502, and may specifically perform the steps of the method in any of the foregoing embodiments.
In particular, program 502 may include program code including computer operating instructions.
The processor 501 may be a central processing unit CPU, or a specific integrated circuit ASIC (Application Specific Integrated Circuit), or one or more integrated circuits configured to implement embodiments of the present application. The one or more processors comprised by the smart device may be the same type of processor, such as one or more CPUs; but may also be different types of processors such as one or more CPUs and one or more ASICs.
A memory 503 for storing the program 502. The memory 503 may comprise high-speed RAM memory or may further comprise non-volatile memory (non-volatile memory), such as at least one disk memory.
The program 502 is specifically operable to cause the processor 501 to execute to implement the steps of any one of the methods described in the embodiments. The specific implementation of each step in the program 502 may refer to the steps and corresponding descriptions in the units executed by the method in any of the above steps, which are not described herein. It will be apparent to those skilled in the art that for convenience and brevity of description, the specific operation of the apparatus and modules described above may be described with reference to corresponding processes in the foregoing method embodiments.
The exemplary embodiments of the present application also provide a computer storage medium having stored thereon a computer program which, when executed by a processor, implements the methods of the embodiments of the present application.
The above-described methods according to embodiments of the present application may be implemented in hardware, firmware, or as software or computer code storable in a recording medium such as a CD ROM, RAM, floppy disk, hard disk, or magneto-optical disk, or as computer code originally stored in a remote recording medium or a non-transitory machine-readable medium and to be stored in a local recording medium downloaded through a network, so that the methods described herein may be stored on such software processes on a recording medium using a general purpose computer, special purpose processor, or programmable or special purpose hardware such as an ASIC or FPGA. It is understood that a computer, processor, microprocessor controller, or programmable hardware includes a storage component (e.g., RAM, ROM, flash memory, etc.) that can store or receive software or computer code that, when accessed and executed by a computer, processor, or hardware, performs the methods described herein. Furthermore, when a general purpose computer accesses code for implementing the methods illustrated herein, execution of the code converts the general purpose computer into a special purpose computer for performing the methods illustrated herein.
Thus, specific embodiments of the present invention have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may be advantageous.
In the description of the present invention, the terms "first," "second," and the like are used merely for convenience in describing the various components or names, and are not to be construed as indicating or implying a sequential relationship, relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used herein in the description of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention.
It should be noted that, although specific embodiments of the present invention have been described in detail with reference to the accompanying drawings, the present invention should not be construed as limiting the scope of the present invention. Various modifications and variations which may be made by those skilled in the art without the creative effort fall within the protection scope of the present invention within the scope described in the claims.
Examples of embodiments of the present invention are intended to briefly illustrate technical features of embodiments of the present invention so that those skilled in the art may intuitively understand the technical features of the embodiments of the present invention, and are not meant to be undue limitations of the embodiments of the present invention.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (11)

1. A log transmission method, comprising:
In a railway signal system, receiving original log data transmitted by a log data transmitting device in a first local area network in a clear text manner through a first proxy program on a proxy server in the first local area network which is created in advance;
the first proxy program marks the original log data in a type according to a preset classification marking rule to obtain marked log data, wherein the preset classification marking rule is used for marking the original log data according to the type of log data transmitting equipment, and the type comprises equipment type and/or service type;
encrypting the marked log data through the first agent program to obtain encrypted log data, and encrypting and transmitting the encrypted log data to a second agent program on a target server in a second local area network which is created in advance, so that the encrypted log data is decrypted through the second agent program to obtain the marked log data agent program.
2. The method of claim 1, wherein said cryptographically transmitting said encrypted log data to a second agent on a target server in a pre-created second local area network, comprises:
Determining at least one relay proxy server between the first local area network and the second local area network;
and receiving the encrypted log data transmitted by the first proxy through the at least one relay proxy server, and forwarding the encrypted log data to the second proxy on the target server.
3. The method of claim 2, wherein the receiving, by the at least one relay proxy server, the encrypted log data transmitted by the first proxy and forwarding to the second proxy on a target server, comprises:
receiving, by the at least one relay proxy server, the encrypted log data transmitted by the first proxy via a first relay network between the at least one relay proxy server and the first proxy;
and forwarding the encrypted log data to the second agent via a second relay network between the at least one relay proxy and the second agent;
the first relay network and the second relay network are networks with different network types from the first local area network and the second local area network.
4. The method of claim 2, wherein the receiving, by the at least one relay proxy server, the encrypted log data transmitted by the first proxy and forwarding to the second proxy on a target server, comprises:
receiving, by a first relay proxy server, the encrypted log data transmitted by the first proxy program via a third relay network between the first relay proxy server and the first proxy program;
forwarding the encrypted log data to a second relay proxy via a fourth relay network between the first relay proxy and the second relay proxy;
and forwarding the encrypted log data to the second agent program through a fifth relay network between the second relay agent server and the second agent program.
5. The method of any of claims 1-4, wherein said cryptographically transmitting said encrypted log data to a second agent on a target server in a pre-created second local area network, comprises:
and according to the type mark of the mark log data corresponding to the encrypted log data, the encrypted log data is transmitted to a second proxy program on a target server in a second local area network which is created in advance through the first proxy program in an encrypted mode.
6. The method of claim 1, wherein encrypting the marker log data by the first agent to obtain encrypted log data comprises:
determining a data grade corresponding to the marked log data according to the type mark of the marked log data and a preset data grade classification rule, wherein the data grade classification rule is used for classifying the marked log data according to the type mark of the marked log data;
and determining an encryption mode corresponding to the mark log data according to the data grade corresponding to the mark log data and a preset encryption rule, encrypting the mark log data according to the encryption mode to obtain the encrypted log data, wherein the preset encryption rule is used for indicating the corresponding relation between the data grade and the encryption mode.
7. The method according to any one of claims 1-4, further comprising:
performing initialization configuration when the first agent program and the second agent program are started initially, wherein the initialization configuration comprises at least one of the following steps: reading log data transmission parameter configuration information of a first local area network corresponding to the first agent program and a second local area network corresponding to the second agent program, acquiring channel address information of a server where an opposite-end agent program is located, and loading a communication certificate of the server where the local-end agent program is located;
And carrying out communication connection, communication certificate authentication and key negotiation between the proxy server where the first proxy program is located and the target server where the second proxy program is located based on the initialization configuration so as to establish a communication channel between the proxy server and the target server.
8. The method of claim 7, wherein the method further comprises:
detecting the connection state of the established communication channel between the proxy server and the target server through a heartbeat detection mechanism to obtain a detection result;
and when the detection result shows that the communication channel is disconnected, storing the untransmitted encrypted log data through the first proxy program, and recording the encrypted log data into a disk of the proxy server where the first proxy program is located.
9. The method according to any one of claims 1-4, wherein the performing, by the first proxy program, type marking on the original log data according to a preset classification marking rule to obtain marked log data includes:
acquiring information of equipment type and/or service type of the log data transmitting equipment corresponding to the original log data;
Determining a type mark corresponding to the original log data according to the information of the equipment type and/or the service type and a preset data dictionary, wherein the data dictionary is used for indicating the mapping relation between the information of the equipment type and/or the service type and the type mark;
and classifying and marking the original log data according to the type mark corresponding to the original log data to obtain the marked log data.
10. A log transmission device, comprising:
the virtual server creating module is used for receiving original log data transmitted by a log data transmitting device in a first local area network through a first proxy program on a proxy server in the first local area network created in advance in a railway signal system;
the classification marking module is used for performing type marking on the original log data through the first proxy program according to a preset classification marking rule to obtain marked log data, wherein the preset classification marking rule is used for marking the original log data according to the type of log data transmitting equipment, and the type comprises equipment type and/or service type;
and the encryption transmission module is used for encrypting the marked log data through the first agent program to obtain encrypted log data, and transmitting the encrypted log data to a second agent program on a target server in a second local area network which is created in advance in an encryption mode, so that the encrypted log data is decrypted through the second agent program to obtain the marked log data.
11. An electronic device, comprising: the positioning device, the processor, the memory and the communication interface complete communication with each other through the communication bus; the memory is configured to store at least one executable instruction that causes the processor to perform operations corresponding to the method of any one of claims 1-9.
CN202310897322.XA 2023-07-20 2023-07-20 Log transmission method and device and electronic equipment Active CN116743738B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310897322.XA CN116743738B (en) 2023-07-20 2023-07-20 Log transmission method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310897322.XA CN116743738B (en) 2023-07-20 2023-07-20 Log transmission method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN116743738A true CN116743738A (en) 2023-09-12
CN116743738B CN116743738B (en) 2024-04-05

Family

ID=87901315

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310897322.XA Active CN116743738B (en) 2023-07-20 2023-07-20 Log transmission method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN116743738B (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014058158A1 (en) * 2012-10-10 2014-04-17 (주)디지캡 Content distribution log agent and operation method for protection of copyright content provided through online service
CN103973785A (en) * 2014-05-07 2014-08-06 Tcl集团股份有限公司 Log reading system based on P2P and method thereof
CN104219336A (en) * 2014-09-03 2014-12-17 深圳市腾讯计算机系统有限公司 Method, device and system for implementing data connection
KR20150102283A (en) * 2014-02-28 2015-09-07 주식회사 디지캡 A log Monitoring device to monitor the log agent that generates a log of copyrighted content provided by online service
CN105721198A (en) * 2016-01-20 2016-06-29 中国科学院信息工程研究所 Video monitoring system log safety audit method
CN106375493A (en) * 2016-10-10 2017-02-01 腾讯科技(深圳)有限公司 Cross-network communication method and proxy servers
CN106650493A (en) * 2016-12-14 2017-05-10 咪咕文化科技有限公司 Method for obtaining behavioral data and device thereof
CN106657408A (en) * 2017-02-24 2017-05-10 深圳市中博睿存信息技术有限公司 Cross-platform log collecting and processing framework
CN108337249A (en) * 2018-01-19 2018-07-27 论客科技(广州)有限公司 A kind of data safe transmission method, system and device
CN109039749A (en) * 2018-08-10 2018-12-18 广州天予智能科技有限公司 A kind of acquisition of remote journal and encryption transmission system and method
CN112784300A (en) * 2021-01-22 2021-05-11 重庆秦嵩科技有限公司 Multi-stage log encryption processing system and method
CN114189515A (en) * 2021-11-12 2022-03-15 苏州浪潮智能科技有限公司 Server cluster log obtaining method and device based on SGX
CN114363410A (en) * 2022-03-17 2022-04-15 苏州浪潮智能科技有限公司 Application access method, cloud agent, node agent component, device and medium
CN114826754A (en) * 2022-05-06 2022-07-29 中国光大银行股份有限公司 Communication method and system among different networks, storage medium and electronic device
CN115242841A (en) * 2022-07-22 2022-10-25 蔚来汽车科技(安徽)有限公司 Vehicle operation log processing system and method
CN115695019A (en) * 2022-11-03 2023-02-03 成都钊峪半网络科技有限公司 Big data network safety data transmission method
CN116192946A (en) * 2023-02-23 2023-05-30 彼真科技(上海)有限公司 Cloud rendering system and cloud rendering method
CN116405482A (en) * 2023-03-29 2023-07-07 新云网科技集团股份有限公司 Log file transmission method, system, terminal and storage medium

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014058158A1 (en) * 2012-10-10 2014-04-17 (주)디지캡 Content distribution log agent and operation method for protection of copyright content provided through online service
KR20150102283A (en) * 2014-02-28 2015-09-07 주식회사 디지캡 A log Monitoring device to monitor the log agent that generates a log of copyrighted content provided by online service
CN103973785A (en) * 2014-05-07 2014-08-06 Tcl集团股份有限公司 Log reading system based on P2P and method thereof
CN104219336A (en) * 2014-09-03 2014-12-17 深圳市腾讯计算机系统有限公司 Method, device and system for implementing data connection
CN105721198A (en) * 2016-01-20 2016-06-29 中国科学院信息工程研究所 Video monitoring system log safety audit method
CN106375493A (en) * 2016-10-10 2017-02-01 腾讯科技(深圳)有限公司 Cross-network communication method and proxy servers
CN106650493A (en) * 2016-12-14 2017-05-10 咪咕文化科技有限公司 Method for obtaining behavioral data and device thereof
CN106657408A (en) * 2017-02-24 2017-05-10 深圳市中博睿存信息技术有限公司 Cross-platform log collecting and processing framework
CN108337249A (en) * 2018-01-19 2018-07-27 论客科技(广州)有限公司 A kind of data safe transmission method, system and device
CN109039749A (en) * 2018-08-10 2018-12-18 广州天予智能科技有限公司 A kind of acquisition of remote journal and encryption transmission system and method
CN112784300A (en) * 2021-01-22 2021-05-11 重庆秦嵩科技有限公司 Multi-stage log encryption processing system and method
CN114189515A (en) * 2021-11-12 2022-03-15 苏州浪潮智能科技有限公司 Server cluster log obtaining method and device based on SGX
CN114363410A (en) * 2022-03-17 2022-04-15 苏州浪潮智能科技有限公司 Application access method, cloud agent, node agent component, device and medium
CN114826754A (en) * 2022-05-06 2022-07-29 中国光大银行股份有限公司 Communication method and system among different networks, storage medium and electronic device
CN115242841A (en) * 2022-07-22 2022-10-25 蔚来汽车科技(安徽)有限公司 Vehicle operation log processing system and method
CN115695019A (en) * 2022-11-03 2023-02-03 成都钊峪半网络科技有限公司 Big data network safety data transmission method
CN116192946A (en) * 2023-02-23 2023-05-30 彼真科技(上海)有限公司 Cloud rendering system and cloud rendering method
CN116405482A (en) * 2023-03-29 2023-07-07 新云网科技集团股份有限公司 Log file transmission method, system, terminal and storage medium

Also Published As

Publication number Publication date
CN116743738B (en) 2024-04-05

Similar Documents

Publication Publication Date Title
US9698979B2 (en) QKD key management system
US20190222423A1 (en) Vehicle information collection system, vehicle-mounted computer, vehicle information collection device, vehicle information collection method, and computer program
US9755824B2 (en) Power line based theft protection of electronic devices
US20200162434A1 (en) Secure and encrypted heartbeat protocol
CN106713360B (en) Method for realizing web encryption access and information encryption storage based on gateway equipment
CN116405302B (en) System and method for in-vehicle safety communication
US7707424B2 (en) Secure file transfer
US20070076882A1 (en) Network component for a communication network, communication network, and method of providing a data connection
CN112671735A (en) Data encryption sharing system and method based on block chain and re-encryption
CN114866245A (en) Block chain-based power data acquisition method and system
CN113965425B (en) Access method, device and equipment of Internet of things equipment and computer readable storage medium
CN111934888B (en) Safety communication system of improved software defined network
CN104735020A (en) Method, device and system for acquiring sensitive data
CN116743738B (en) Log transmission method and device and electronic equipment
JPH10242957A (en) User authentication method, system therefor and storage medium for user authentication
CN109587134B (en) Method, apparatus, device and medium for secure authentication of interface bus
CN113992387B (en) Resource management method, device, system, electronic equipment and readable storage medium
CN104618211A (en) Tunnel based message processing method and headquarters gateway device
CN101115055A (en) Device and method for reporting all-level error in tunnel data package of communication network
CN110830243A (en) Symmetric key distribution method, device, vehicle and storage medium
US11973700B2 (en) Trusted remote management unit
CN116827684B (en) DDoS attack defense method, system, equipment and storage medium
CN113037770B (en) Industrial control data safety system and method based on storage virtualization
CN113709069B (en) Lossless switching method and device for data transmission
CN117336313A (en) Communication method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant