CN118382862A - 日志输出装置、日志输出方法以及日志输出程序 - Google Patents

日志输出装置、日志输出方法以及日志输出程序 Download PDF

Info

Publication number
CN118382862A
CN118382862A CN202180104958.3A CN202180104958A CN118382862A CN 118382862 A CN118382862 A CN 118382862A CN 202180104958 A CN202180104958 A CN 202180104958A CN 118382862 A CN118382862 A CN 118382862A
Authority
CN
China
Prior art keywords
log
hash value
file
log output
hook
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202180104958.3A
Other languages
English (en)
Chinese (zh)
Inventor
山中友贵
泷口浩义
篠原正纪
永井智大
和田泰典
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NTT Inc
Original Assignee
Nippon Telegraph and Telephone Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegraph and Telephone Corp filed Critical Nippon Telegraph and Telephone Corp
Publication of CN118382862A publication Critical patent/CN118382862A/zh
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Debugging And Monitoring (AREA)
  • Storage Device Security (AREA)
CN202180104958.3A 2021-12-14 2021-12-14 日志输出装置、日志输出方法以及日志输出程序 Pending CN118382862A (zh)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2021/046125 WO2023112170A1 (ja) 2021-12-14 2021-12-14 ログ出力装置、ログ出力方法およびログ出力プログラム

Publications (1)

Publication Number Publication Date
CN118382862A true CN118382862A (zh) 2024-07-23

Family

ID=86773803

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202180104958.3A Pending CN118382862A (zh) 2021-12-14 2021-12-14 日志输出装置、日志输出方法以及日志输出程序

Country Status (6)

Country Link
US (1) US20250132924A1 (https=)
EP (1) EP4435633A4 (https=)
JP (1) JP7800561B2 (https=)
CN (1) CN118382862A (https=)
AU (1) AU2021477953A1 (https=)
WO (1) WO2023112170A1 (https=)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN121585480A (zh) * 2026-01-28 2026-02-27 济南浪潮数据技术有限公司 日志的管理方法、装置、电子设备和计算机程序产品

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3873557B2 (ja) * 2000-01-07 2007-01-24 株式会社日立製作所 半導体装置の製造方法
US9003548B2 (en) * 2004-04-13 2015-04-07 Nl Systems, Llc Method and system for digital rights management of documents
JP4939851B2 (ja) * 2006-06-21 2012-05-30 パナソニック株式会社 情報処理端末、セキュアデバイスおよび状態処理方法
JP4917061B2 (ja) * 2007-12-18 2012-04-18 日本電信電話株式会社 特徴的キーワード検出装置、特徴的キーワード検出方法、プログラムおよび記録媒体
US8572050B2 (en) * 2009-12-01 2013-10-29 International Business Machines Corporation Method and system for real time system log integrity protection
US10007795B1 (en) 2014-02-13 2018-06-26 Trend Micro Incorporated Detection and recovery of documents that have been compromised by malware
US9754086B1 (en) * 2014-05-19 2017-09-05 Symantec Corporation Systems and methods for customizing privacy control systems
WO2016060568A1 (en) * 2014-10-13 2016-04-21 Invenia As Method and system for protecting and sharing digital data between users in a network
JP2016122917A (ja) * 2014-12-24 2016-07-07 パナソニックIpマネジメント株式会社 署名生成装置、署名検証装置、署名生成方法及び署名検証方法
US10354081B1 (en) * 2017-01-05 2019-07-16 Trend Micro Incorporated Protection of interprocess communications in a computer
US10860536B2 (en) * 2017-01-05 2020-12-08 Portworx, Inc. Graph driver layer management
US11057366B2 (en) * 2018-08-21 2021-07-06 HYPR Corp. Federated identity management with decentralized computing platforms
US20200193426A1 (en) * 2018-12-18 2020-06-18 Secude Ag Method and system for creating and updating an authentic log file for a computer system and transactions
EP3683712B1 (en) * 2019-01-16 2021-10-20 Siemens Aktiengesellschaft Protecting integrity of log data
CN111177703B (zh) * 2019-12-31 2023-03-31 青岛海尔科技有限公司 操作系统数据完整性的确定方法及装置
CN111259348B (zh) * 2020-02-20 2023-03-07 国网信息通信产业集团有限公司 一种安全运行可执行文件的方法及系统
CN111444528B (zh) * 2020-03-31 2022-03-29 海信视像科技股份有限公司 数据安全保护方法、装置及存储介质
CN113468535B (zh) * 2020-03-31 2024-06-25 华为技术有限公司 可信度量方法及相关装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN121585480A (zh) * 2026-01-28 2026-02-27 济南浪潮数据技术有限公司 日志的管理方法、装置、电子设备和计算机程序产品

Also Published As

Publication number Publication date
WO2023112170A1 (ja) 2023-06-22
AU2021477953A1 (en) 2024-06-27
EP4435633A1 (en) 2024-09-25
JP7800561B2 (ja) 2026-01-16
US20250132924A1 (en) 2025-04-24
EP4435633A4 (en) 2025-09-10
JPWO2023112170A1 (https=) 2023-06-22

Similar Documents

Publication Publication Date Title
US11176255B2 (en) Securely booting a service processor and monitoring service processor integrity
US11503030B2 (en) Service processor and system with secure booting and monitoring of service processor integrity
EP3479282B1 (en) Targeted secure software deployment
US8122256B2 (en) Secure bytecode instrumentation facility
US8667263B2 (en) System and method for measuring staleness of attestation during booting between a first and second device by generating a first and second time and calculating a difference between the first and second time to measure the staleness
US10462160B2 (en) Method and system for identifying uncorrelated suspicious events during an attack
US20180089436A1 (en) Methods And Apparatus To Facilitate Blockchain-based Boot Tracking
US9270467B1 (en) Systems and methods for trust propagation of signed files across devices
TW201500960A (zh) 在配有適用統一可延伸韌體介面(uefi)之韌體之計算裝置中的安全性變數變化檢測技術
JP2019512142A (ja) トリップワイヤファイルを生成するためのシステム及び方法
CN101473335A (zh) 信息处理终端与状态通知方法
JP6063321B2 (ja) サーバ装置およびハッシュ値処理方法
CN112711570B (zh) 日志信息的处理方法、装置、电子设备及存储介质
US20080313475A1 (en) Methods and systems for tamper resistant files
CN108229144A (zh) 一种应用程序的验证方法、终端设备及存储介质
US20250371141A1 (en) Apparatuses for audit data generation and verification
CN113647053A (zh) 用于利用至少一个导出密钥配置安全模块的方法
AU2019313886B2 (en) Information processing device, verification method and verification program
CN118382862A (zh) 日志输出装置、日志输出方法以及日志输出程序
CN118228208A (zh) 用于上下文特定验证的程序文件测量
JP2014191658A (ja) サーバ装置およびプログラム管理方法
US10242195B2 (en) Integrity values for beginning booting instructions
CN115878122B (zh) 用于数据项的损坏确定的方法、系统及存储介质
US11163909B2 (en) Using multiple signatures on a signed log
Snyder et al. Determining the effectiveness of data remanence prevention in the AWS cloud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Country or region after: Japan

Address after: Tokyo, Japan

Applicant after: Entiti Corp.

Address before: Tokyo, Japan

Applicant before: NIPPON TELEGRAPH AND TELEPHONE Corp.

Country or region before: Japan