IT202000029234A1 - SYSTEM AND METHOD IMPLEMENTED THROUGH A CALCULATOR FOR THE COLLECTION OF APPLICATION LOGS - Google Patents
SYSTEM AND METHOD IMPLEMENTED THROUGH A CALCULATOR FOR THE COLLECTION OF APPLICATION LOGS Download PDFInfo
- Publication number
- IT202000029234A1 IT202000029234A1 IT102020000029234A IT202000029234A IT202000029234A1 IT 202000029234 A1 IT202000029234 A1 IT 202000029234A1 IT 102020000029234 A IT102020000029234 A IT 102020000029234A IT 202000029234 A IT202000029234 A IT 202000029234A IT 202000029234 A1 IT202000029234 A1 IT 202000029234A1
- Authority
- IT
- Italy
- Prior art keywords
- log
- application
- archive nodes
- logs
- nodes
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 15
- 238000012545 processing Methods 0.000 claims description 13
- 102100022406 60S ribosomal protein L10a Human genes 0.000 claims description 11
- 101000755323 Homo sapiens 60S ribosomal protein L10a Proteins 0.000 claims description 11
- 238000005516 engineering process Methods 0.000 claims description 5
- 238000004891 communication Methods 0.000 claims description 4
- 238000013475 authorization Methods 0.000 claims description 2
- 238000003780 insertion Methods 0.000 claims description 2
- 230000037431 insertion Effects 0.000 claims description 2
- 238000007726 management method Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 238000013500 data storage Methods 0.000 description 3
- 230000001419 dependent effect Effects 0.000 description 2
- 238000012550 audit Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0766—Error or fault reporting or storing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3476—Data logging
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Steroid Compounds (AREA)
Description
DESCRIZIONE DESCRIPTION
Annessa a domanda di brevetto per INVENZIONE INDUSTRIALE avente per titolo Attached to a patent application for INDUSTRIAL INVENTION having the title
?SISTEMA E METODO ATTUATO MEDIANTE CALCOLATORE PER ?SYSTEM AND METHOD IMPLEMENTED BY CALCULATOR FOR
RACCOLTA DI LOG APPLICATIVI? APPLICATION LOG COLLECTION?
CAMPO DI APPLICAZIONE FIELD OF APPLICATION
La presente invenzione ha per oggetto un sistema di raccolta di log applicativi. The present invention relates to an application log collection system.
La presente invenzione ha inoltre per oggetto un metodo attuato mediante calcolatore per raccolta di log applicativi. The present invention also relates to a method implemented by computer for collecting application logs.
Pi? in particolare, la presente invenzione ha per oggetto un sistema ed un metodo di raccolta di log applicativi di aziende che gestiscono sistemi informativi (software e hardware) sia on-premise che in cloud e che desiderano, o sono obbligate, a raccogliere log applicativi e a conservarli. TECNICA PRECEDENTE Pi? in particular, the present invention relates to a system and method for collecting application logs of companies which manage information systems (software and hardware) both on-premise and in the cloud and which wish, or are obliged, to collect application logs and keep them. PRIOR ART
Attualmente, la raccolta dei log applicativi avviene manualmente o attraverso sistemi software proprietari. Currently, the collection of application logs takes place manually or through proprietary software systems.
I sistemi esistenti soffrono dei seguenti inconvenienti critici: Existing systems suffer from the following critical drawbacks:
- le garanzie di sicurezza ed immutabilit? delle informazioni conservate si basano su dichiarazioni scritte dei fornitori di servizi e non su strutture tecnologiche che garantiscano formalmente queste caratteristiche; - the guarantees of security and immutability? of the stored information is based on written declarations of the service providers and not on technological structures that formally guarantee these characteristics;
- l?archiviazione dei dati ? spesso in carico ai fornitori di servizi e non al cliente che acquista tale servizio; questo fa s? che sia difficile per il cliente effettuare un audit e detenere ?la propriet?? fisica delle informazioni inviate E? forte la necessit? di alleviare e/o superare gli inconvenienti esposti. Scopo generale della presente invenzione ? fornire un sistema ed un metodo di raccolta di log applicativi che superi i problemi della tecnica nota. - data storage ? often charged to the service providers and not to the customer who purchases this service; this does s? that it is difficult for the client to carry out an audit and hold ?property? physical information sent E? strong need? to alleviate and/or overcome the drawbacks exposed. General purpose of the present invention ? to provide an application log collection system and method which overcomes the problems of the prior art.
Scopo specifico della presente invenzione ? fornire un sistema ed un metodo di raccolta di log applicativi efficiente in termini di sicurezza ed immutabilit? delle informazioni conservate. Specific purpose of the present invention? provide an efficient application log collection system and method in terms of security and immutability? of the information stored.
SOMMARIO DELL?INVENZIONE SUMMARY OF THE INVENTION
In un primo aspetto dell?invenzione, questi ed altri scopi sono raggiunti da un sistema di raccolta di log applicativi, secondo quanto esposto nella rivendicazione 1. In a first aspect of the invention, these and other aims are achieved by an application log collection system, according to what is set forth in claim 1.
Caratteristiche vantaggiose sono esposte nelle rivendicazioni dipendenti da 2 a 9. Advantageous characteristics are set forth in the dependent claims 2 to 9.
In un secondo aspetto dell?invenzione, questi ed altri scopi sono raggiunti da un metodo di raccolta di log applicativi, secondo quanto esposto nella rivendicazione 10. In a second aspect of the invention, these and other aims are achieved by a method of collecting application logs, according to what is set forth in claim 10.
Preferibilmente, il metodo ? attuato mediante calcolatore. Preferably, the method ? implemented by computer.
Caratteristiche vantaggiose sono esposte nelle rivendicazioni dipendenti da 11 a 12. Advantageous characteristics are set forth in the dependent claims 11 to 12.
L?invenzione come descritta consente una conservazione dei dati in una struttura in stile blockchain. The invention as described allows for data storage in a blockchain-style structure.
L?invenzione fornisce i seguenti effetti tecnici: The invention provides the following technical effects:
- l?immutabilit? e la non corruttibilit? dei dati una volta inseriti che la struttura in stile blockchain garantisce formalmente, per sua natura tecnica ed algoritmica; - the immutability? and the non-corruptibility? of the data once entered that the blockchain-style structure formally guarantees, due to its technical and algorithmic nature;
- indecifrabilit? dei dati attraverso l?uso di algoritmi di cifratura; i dati inseriti sulla blockchain restano ?indecifrabili? al fornitore di servizi mentre restano visibili al cliente del servizio stesso - indecipherability data through the use of encryption algorithms; the data entered on the blockchain remain ?indecipherable? to the service provider while remaining visible to the customer of the service itself
- possibilit? per il cliente di mantenere la ?propriet?? fisica dei dati conservati senza perdere le caratteristiche di immutabilit? e conservazione sicura essendo la struttura della blockchain una struttura distribuita. - possibility? for the customer to keep the ?property? physical data stored without losing the characteristics of immutability? and secure storage as the blockchain structure is a distributed structure.
Gli effetti tecnici/vantaggi citati ed altri effetti tecnici/vantaggi dell?invenzione risulteranno pi? dettagliatamente dalla descrizione, fatta qui di seguito, di un esempio di realizzazione dati a titolo indicativo e non limitativo con riferimento ai disegni allegati. Will the technical effects/advantages mentioned and other technical effects/advantages of the invention be more? in detail from the description, given hereinafter, of an embodiment given by way of non-limiting example with reference to the attached drawings.
BREVE DESCRIZIONE DEI DISEGNI BRIEF DESCRIPTION OF THE DRAWINGS
La figura 1 rappresenta in generale il sistema di raccolta di log applicativi secondo l?invenzione. Figure 1 shows in general the application log collection system according to the invention.
DESCRIZIONE DETTAGLIATA DETAILED DESCRIPTION
Con riferimento alla figura 1, l?invenzione in un primo aspetto descrive un sistema di gestione di log applicativi. With reference to figure 1, the invention in a first aspect describes an application log management system.
Il sistema comprende almeno un?unit? di elaborazione di dati 1A,1B,1C. L?unit? di elaborazione di dati 1A,1B,1C ? compresa in un sistema proprietario 1 e predisposta per una esecuzione di almeno un servizio applicativo S1A,S1B,S1C. Does the system include at least one? unit? of data processing 1A,1B,1C. The unit of data processing 1A,1B,1C ? included in a proprietary system 1 and arranged for the execution of at least one application service S1A,S1B,S1C.
Il sistema di gestione di log applicativi comprende inoltre un raccoglitore di log applicativi 10A,10B,10C, in comunicazione di dati con l?almeno un?unit? di elaborazione di dati 1A,1B,1C. The application log management system further comprises an application log collector 10A, 10B, 10C, in data communication with the at least one unit? of data processing 1A,1B,1C.
Il raccoglitore di log applicativi 10A,10B,10C ? predisposto per raccogliere log applicativi L10A,L10B,L10C dall?unit? di elaborazione di dati 1A,1B,1C e per inviarli a nodi di archivio di log 110_1,110_2 per una corrispondente memorizzazione. The 10A,10B,10C application log collector ? set up to collect application logs L10A, L10B, L10C from the unit? data processing nodes 1A,1B,1C and to send them to log archive nodes 110_1,110_2 for corresponding storage.
Secondo l?invenzione, i nodi di archivio di log 110_1,110_2 sono in numero superiore a 1 per garantire l?affidabilit? del sistema e possono, opzionalmente, essere geograficamente distribuiti per garantire una affidabilit? maggiore. According to the invention, the log archive nodes 110_1,110_2 are greater than 1 in order to guarantee the reliability of the system and can, optionally, be geographically distributed to ensure reliability? greater.
Preferibilmente, il raccoglitore di log applicativi 10A,10B,10C ? predisposto per inviare i log applicativi L10A,L10B,L10C ai nodi di archivio di log 110_1,110_2 attraverso un canale sicuro e affidabile, in particolare TLS over TCP. Preferably, the application log collector 10A,10B,10C ? set up to send the application logs L10A,L10B,L10C to the log archive nodes 110_1,110_2 through a secure and reliable channel, in particular TLS over TCP.
Preferibilmente, il raccoglitore di log applicativi 10A,10B,10C ? predisposto per inviare i log applicativi L10A,L10B,L10C ai nodi di archivio di log 110_1,110_2 realizzando una cifratura asimmetrica, in particolare a chiave pubblica/privata, delle informazioni per garantirne la confidenzialit? e integrit?. Preferably, the application log collector 10A,10B,10C ? set up to send the application logs L10A,L10B,L10C to the log archive nodes 110_1,110_2 realizing an asymmetric encryption, in particular with public/private key, of the information to guarantee its confidentiality? and integrity.
Il sistema di gestione di log applicativi secondo l?invenzione comprende ulteriormente una struttura dati distribuita 100 strutturata con tecnologia blockchain e comprendente i nodi di archivio di log 110_1,110_2 predisposti per contenere informazioni ILOG dei log applicativi 10A,10B,10C. The application log management system according to the invention further comprises a distributed data structure 100 structured with blockchain technology and comprising the log archive nodes 110_1,110_2 arranged to contain ILOG information of the application logs 10A,10B,10C.
Secondo l?invenzione, ognuno dei nodi di archivio di log 110_1,110_2 ? predisposto per memorizzare una copia completa, opzionalmente cifrata, delle informazioni ILOG dei log applicativi 10A,10B,10C. According to the invention, each of the log archive nodes 110_1,110_2 ? set up to store a complete copy, optionally encrypted, of the ILOG information of application logs 10A,10B,10C.
il Sistema di gestione di log applicativi comprende inoltre almeno un sistema di terze parti 2; in altre parole, il sistema secondo l?invenzione comprende anche una porzione non proprietaria. the application log management system further comprises at least one third-party system 2; in other words, the system according to the invention also includes a non-proprietary portion.
I nodi di archivio di log 110_1,110_2 sono distribuiti tra il sistema proprietario 1 e l?almeno un sistema di terze parti 2. Log archive nodes 110_1,110_2 are distributed between proprietary system 1 and at least one third-party system 2.
La struttura dati distribuita 100 comprende un primo numero N1 di primi nodi di archivio di log 110_1 compresi nel sistema proprietario 1 ed un secondo numero N2 di secondi nodi di archivio di log 110_2 compresi nell?almeno un sistema di terze parti 2. The distributed data structure 100 comprises a first number N1 of first log archive nodes 110_1 included in the proprietary system 1 and a second number N2 of second log archive nodes 110_2 included in the at least one third-party system 2.
In altre parole, la distribuzione dei nodi di archivio ? distribuita tar diversi attori. In other words, the distribution of archive nodes ? distributed tar different actors.
Secondo l?invenzione il primo numero N1 ? almeno il 50% della somma N1+N2 dei primi nodi di archivio di log 110_1 e secondi nodi di archivio di log 110_2. According to the invention, the first number N1 ? at least 50% of the sum N1+N2 of the first log archive nodes 110_1 and second log archive nodes 110_2.
Ognuno dei nodi di archivio di log 110_1,110_2 comprende un componente software predisposto per verificare formalmente un?integrit?, in particolare tramite un controllo di checksum, delle informazioni ILOG dei log applicativi 10A,10B,10C, e per memorizzare le informazioni ILOG in una struttura distribuita in stile blockchain Each of the log archive nodes 110_1,110_2 comprises a software component arranged for formally verifying an integrity, in particular through a checksum control, of the ILOG information of the application logs 10A,10B,10C, and for storing the ILOG information in a distributed blockchain-style structure
Le informazioni ILOG memorizzate in ognuno dei nodi di archivio di log 110_1,110_2 all?interno della struttura dati distribuita 100 strutturata con tecnologia blockchain comprendono le seguenti specifiche: The ILOG information stored in each of the log archive nodes 110_1,110_2 within the distributed data structure 100 structured with blockchain technology includes the following specifications:
- Timestamping: ogni operazione di inserimento di un log porta con s? l?istante temporale in cui essa ? stata effettuata; - Timestamping: each operation of inserting a log brings with it? the time instant in which it ? been carried out;
- Immutabilit?: grazie all?applicazione di algoritmi crittografici, ogni operazione di inserimento, una volta accettata, non pu? essere annullata o alterata in maniera invisibile. - Immutability: thanks to the application of cryptographic algorithms, every insertion operation, once accepted, cannot? be reversed or invisibly altered.
- confidenzialit?, se richiesta: Poich? i dati sono cifrati prima dell?inserimento, le parti terze non possono accedervi senza autorizzazione esplicita del proprietario, ad esempio tramite condivisione della componente privata della chiave di cifratura. - confidentiality, if required: Since? the data is encrypted before being entered, third parties cannot access it without the explicit authorization of the owner, for example by sharing the private component of the encryption key.
- propriet? delle informazioni / Affidabilit?, cio? ogni nodo contiene al suo interno la totalit? delle informazioni inviate al sistema - property of information / Reliability?, that is? each node contains within it the totality? of the information sent to the system
In un secondo aspetto, l?invenzione descrive un metodo attuato mediante calcolatore per raccolta di log applicativi comprendente le fasi di: eseguire almeno un servizio applicativo S1A,S1B,S1C da parte di almeno un?unit? di elaborazione di dati 1A,1B,1C di un sistema proprietario 1; predisporre un raccoglitore di log applicativi 10A,10B,10C, in comunicazione di dati con l?almeno un?unit? di elaborazione di dati 1A,1B,1C; In a second aspect, the invention describes a computer-implemented method for collecting application logs comprising the steps of: performing at least one application service S1A, S1B, S1C by at least one unit? of data processing 1A,1B,1C of a proprietary system 1; prepare a collector of application logs 10A,10B,10C, in data communication with the at least one?unit? of data processing 1A,1B,1C;
predisporre una struttura dati distribuita 100 strutturata con tecnologia blockchain comprendente nodi di archivio di log 110_1,110_2 predisposti per contenere informazioni ILOG dei log applicativi 10A,10B,10C; raccogliere log applicativi L10A,L10B,L10C dall?unit? di elaborazione di dati 1A,1B,1C; arranging a distributed data structure 100 structured with blockchain technology comprising log archive nodes 110_1,110_2 arranged to contain ILOG information of the application logs 10A,10B,10C; collect application logs L10A,L10B,L10C from the unit? of data processing 1A,1B,1C;
inviare i log applicativi L10A,L10B,L10C ai nodi di archivio di log 110_1,110_2 per una corrispondente memorizzazione. send application logs L10A,L10B,L10C to log archive nodes 110_1,110_2 for corresponding storage.
Il Metodo comprende inoltre la fase di predisporre almeno un sistema di terze parti (2) e predisporre i nodi di archivio di log 110_1,110_2 distribuiti tra il sistema proprietario 1 e l?almeno un sistema di terze parti 2. The Method also includes the phase of preparing at least one third-party system (2) and preparing the log archive nodes 110_1,110_2 distributed between the proprietary system 1 and the at least one third-party system 2.
Il Metodo comprende ulteriormente la fase di predisporre nella struttura dati distribuita 100 un primo numero N1 di primi nodi di archivio di log 110_1 compresi nel sistema proprietario 1 ed un secondo numero N2 di secondi nodi di archivio di log 110_2 compresi nell?almeno un sistema di terze parti 2, in cui il primo numero N1 ? almeno il 50% di una somma N1+N2 dei primi nodi di archivio di log 110_1 e dei secondi nodi di archivio di log 110_2. The Method further comprises the step of arranging in the distributed data structure 100 a first number N1 of first log archive nodes 110_1 included in the proprietary system 1 and a second number N2 of second log archive nodes 110_2 included in the at least one system third party 2, in which the first number N1 ? at least 50% of a sum N1+N2 of the first log archive nodes 110_1 and the second log archive nodes 110_2.
E? stato descritto un sistema e metodo di gestione di log applicativi. AND? An application log management system and method has been described.
L?invenzione come descritta consente una conservazione dei dati in una struttura in stile blockchain. The invention as described allows for data storage in a blockchain-style structure.
L?invenzione fornisce i seguenti effetti tecnici: The invention provides the following technical effects:
- l?immutabilit? e la non corruttibilit? dei dati una volta inseriti che la struttura in stile blockchain garantisce formalmente, per sua natura tecnica ed algoritmica; - the immutability? and the non-corruptibility? of the data once entered that the blockchain-style structure formally guarantees, due to its technical and algorithmic nature;
- indecifrabilit? dei dati attraverso l?uso di algoritmi di cifratura; i dati inseriti sulla blockchain restano ?indecifrabili? al fornitore di servizi mentre restano visibili al cliente del servizio stesso - indecipherability data through the use of encryption algorithms; the data entered on the blockchain remain ?indecipherable? to the service provider while remaining visible to the customer of the service itself
- possibilit? per il cliente di mantenere la ?propriet?? fisica dei dati conservati senza perdere le caratteristiche di immutabilit? e conservazione sicura essendo la struttura della blockchain una struttura distribuita. - possibility? for the customer to keep the ?property? physical data stored without losing the characteristics of immutability? and secure storage as the blockchain structure is a distributed structure.
Claims (12)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IT102020000029234A IT202000029234A1 (en) | 2020-12-01 | 2020-12-01 | SYSTEM AND METHOD IMPLEMENTED THROUGH A CALCULATOR FOR THE COLLECTION OF APPLICATION LOGS |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IT102020000029234A IT202000029234A1 (en) | 2020-12-01 | 2020-12-01 | SYSTEM AND METHOD IMPLEMENTED THROUGH A CALCULATOR FOR THE COLLECTION OF APPLICATION LOGS |
Publications (1)
Publication Number | Publication Date |
---|---|
IT202000029234A1 true IT202000029234A1 (en) | 2022-06-01 |
Family
ID=74874965
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IT102020000029234A IT202000029234A1 (en) | 2020-12-01 | 2020-12-01 | SYSTEM AND METHOD IMPLEMENTED THROUGH A CALCULATOR FOR THE COLLECTION OF APPLICATION LOGS |
Country Status (1)
Country | Link |
---|---|
IT (1) | IT202000029234A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180157700A1 (en) * | 2016-12-06 | 2018-06-07 | International Business Machines Corporation | Storing and verifying event logs in a blockchain |
US20200127811A1 (en) * | 2018-10-22 | 2020-04-23 | Nutanix, Inc. | Tamper-proof management of audit logs |
US20200342127A1 (en) * | 2019-04-26 | 2020-10-29 | Jpmorgan Chase Bank, N.A. | Systems and methods for maintaining immutable data access logs with privacy |
-
2020
- 2020-12-01 IT IT102020000029234A patent/IT202000029234A1/en unknown
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180157700A1 (en) * | 2016-12-06 | 2018-06-07 | International Business Machines Corporation | Storing and verifying event logs in a blockchain |
US20200127811A1 (en) * | 2018-10-22 | 2020-04-23 | Nutanix, Inc. | Tamper-proof management of audit logs |
US20200342127A1 (en) * | 2019-04-26 | 2020-10-29 | Jpmorgan Chase Bank, N.A. | Systems and methods for maintaining immutable data access logs with privacy |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lee et al. | Blockchain based privacy preserving multimedia intelligent video surveillance using secure Merkle tree | |
CN108737374B (en) | Privacy protection method for data storage in block chain | |
Chen et al. | Data security and privacy protection issues in cloud computing | |
CN102170440B (en) | Method suitable for safely migrating data between storage clouds | |
CN103107995B (en) | A kind of cloud computing environment date safety storing system and method | |
US11386217B2 (en) | Hybrid centralized and decentralized enterprise system | |
CN104660551B (en) | A kind of database access device and method based on webservice | |
CN112307513B (en) | Uplink document security management method and device based on time domain consensus and electronic equipment | |
Indapwar et al. | E-Voting system using Blockchain technology | |
IT202000029234A1 (en) | SYSTEM AND METHOD IMPLEMENTED THROUGH A CALCULATOR FOR THE COLLECTION OF APPLICATION LOGS | |
Kumari et al. | Security in Cloud Computing using AES & DES | |
Wang et al. | A collaborative monitoring mechanism for making a multitenant platform accountable | |
Marshal | Secure audit service by using TPA for data integrity in cloud system | |
US11146594B2 (en) | Security incident blockchain | |
Singh et al. | Data Integrity Check in Cloud Computing using Hash Function. | |
Baghel et al. | A survey for secure communication of cloud third party authenticator | |
CN113360575A (en) | Method, device, equipment and storage medium for supervising transaction data in alliance chain | |
Ramesh et al. | Public auditing for shared data with efficient user revocation in the cloud | |
CN111030930A (en) | Decentralized network data fragment transmission method, device, equipment and medium | |
Ghanbari | A literature review on cloud computing security issues | |
KR20200068836A (en) | Method of sharing advertisement outcome data between advertisers using block chain | |
Pathak et al. | Enhanced security for multi cloud storage using AES algorithm | |
Koushik et al. | Open security system for cloud architecture | |
Kankrale et al. | Secured data outsourcing in cloud computing | |
Blomqvist et al. | Secrets Management in a Multi-Cloud Kubernetes Environment |