CN111897786A - Log reading method and device, computer equipment and storage medium - Google Patents

Log reading method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN111897786A
CN111897786A CN202010463755.0A CN202010463755A CN111897786A CN 111897786 A CN111897786 A CN 111897786A CN 202010463755 A CN202010463755 A CN 202010463755A CN 111897786 A CN111897786 A CN 111897786A
Authority
CN
China
Prior art keywords
log
reading
program
target
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010463755.0A
Other languages
Chinese (zh)
Other versions
CN111897786B (en
Inventor
何伟崇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fibocom Wireless Inc
Original Assignee
Fibocom Wireless Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fibocom Wireless Inc filed Critical Fibocom Wireless Inc
Priority to CN202010463755.0A priority Critical patent/CN111897786B/en
Publication of CN111897786A publication Critical patent/CN111897786A/en
Application granted granted Critical
Publication of CN111897786B publication Critical patent/CN111897786B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/349Performance evaluation by tracing or monitoring for interfaces, buses
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/122File system administration, e.g. details of archiving or snapshots using management policies
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a log reading method and device, computer equipment and a storage medium. The method comprises the following steps: sending a login request to a log management program through a log reading program so that the log management program verifies login information according to a pre-stored user list; when the log file passes the verification, acquiring a target reading authority corresponding to the login information from the user list through a log management program, determining a target log grade according to the target reading authority, acquiring label information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list; sending the log file list to a log reading program for displaying; and sending a log reading request to a log management program through the log reading program so that the log management program obtains a target encryption log file corresponding to the target label information, decrypts the target encryption log file, and sends the decrypted target encryption log file to the log reading program for displaying. By adopting the method, the safety of log reading can be improved.

Description

Log reading method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of internet technologies, and in particular, to a log reading method and apparatus, a computer device, and a storage medium.
Background
With the development of internet technology, program logs appear, which are event record files output by application programs in the running process. By analyzing the program log, the user can track the running state of the application program. The communication module comprises a plurality of application programs, and after the communication module is powered on and runs, each application program can output a large number of program logs.
In the conventional technology, all users can acquire the program log in the communication module. However, the program log includes core data, all users can acquire the program log in the communication module, and the risk that the core data is stolen is easily generated, so that potential safety hazards exist.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a log reading method, an apparatus, a computer device, and a storage medium capable of improving the security of log reading.
A log reading method is applied to a terminal provided with a log management program and a log reading program, the log management program is deployed in a communication module of the terminal, the log reading program is deployed in a host of the terminal, and the method comprises the following steps:
according to the communication connection between the communication module and the host, a log reading program sends a login request to a log management program so that the log management program verifies login information according to a pre-stored user list, wherein the login request carries the login information;
when the log file passes the verification, acquiring a target reading authority corresponding to the login information from a pre-stored user list through a log management program, determining a target log grade according to the target reading authority, acquiring label information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the label information comprises creation time, the log grade and a service program identifier;
sending the log file list to a log reading program for displaying according to the communication connection between the communication module and the host;
sending a log reading request to a log management program through a log reading program so that the log management program obtains a target encryption log file corresponding to target tag information, decrypting the target encryption log file to obtain a target decryption log file, sending the target decryption log file to the log reading program for displaying, wherein the log reading request is generated through a trigger operation aiming at a log file list, and the log reading request carries the target tag information.
A log reading apparatus, the apparatus comprising:
the log information verification module is used for sending a log request to the log management program through the log reading program according to the communication connection between the communication module and the host computer so that the log management program verifies the log information according to a pre-stored user list, and the log request carries the log information;
the log file list generating module is used for acquiring a target reading authority corresponding to login information from a pre-stored user list through a log management program when the log file list passes verification, determining a target log grade according to the target reading authority, acquiring label information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the label information comprises creation time, the log grade and a service program identifier;
the log file list sending module is used for sending the log file list to the log reading program for displaying according to the communication connection between the communication module and the host;
the log file sending module is used for sending a log reading request to the log management program through the log reading program so that the log management program can obtain a target encrypted log file corresponding to the target label information, decrypt the target encrypted log file to obtain a target decrypted log file, and send the target decrypted log file to the log reading program for displaying, wherein the log reading request is generated through triggering operation aiming at a log file list, and the log reading request carries the target label information.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
according to the communication connection between the communication module and the host, a log reading program sends a login request to a log management program so that the log management program verifies login information according to a pre-stored user list, wherein the login request carries the login information;
when the log file passes the verification, acquiring a target reading authority corresponding to the login information from a pre-stored user list through a log management program, determining a target log grade according to the target reading authority, acquiring label information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the label information comprises creation time, the log grade and a service program identifier;
sending the log file list to a log reading program for displaying according to the communication connection between the communication module and the host;
sending a log reading request to a log management program through a log reading program so that the log management program obtains a target encryption log file corresponding to target tag information, decrypting the target encryption log file to obtain a target decryption log file, sending the target decryption log file to the log reading program for displaying, wherein the log reading request is generated through a trigger operation aiming at a log file list, and the log reading request carries the target tag information.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
according to the communication connection between the communication module and the host, a log reading program sends a login request to a log management program so that the log management program verifies login information according to a pre-stored user list, wherein the login request carries the login information;
when the log file passes the verification, acquiring a target reading authority corresponding to the login information from a pre-stored user list through a log management program, determining a target log grade according to the target reading authority, acquiring label information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the label information comprises creation time, the log grade and a service program identifier;
sending the log file list to a log reading program for displaying according to the communication connection between the communication module and the host;
sending a log reading request to a log management program through a log reading program so that the log management program obtains a target encryption log file corresponding to target tag information, decrypting the target encryption log file to obtain a target decryption log file, sending the target decryption log file to the log reading program for displaying, wherein the log reading request is generated through a trigger operation aiming at a log file list, and the log reading request carries the target tag information.
According to the log reading method, the log reading device, the computer equipment and the storage medium, a log reading program sends a login request to a log management program according to the communication connection between a communication module and a host, so that the log management program verifies login information according to a pre-stored user list, and the login request carries the login information; when the log file passes the verification, acquiring a target reading authority corresponding to the login information from a pre-stored user list through a log management program, determining a target log grade according to the target reading authority, acquiring label information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the label information comprises creation time, the log grade and a service program identifier; sending the log file list to a log reading program for displaying according to the communication connection between the communication module and the host; sending a log reading request to a log management program through a log reading program so that the log management program obtains a target encryption log file corresponding to target tag information, decrypting the target encryption log file to obtain a target decryption log file, sending the target decryption log file to the log reading program for displaying, wherein the log reading request is generated through a trigger operation aiming at a log file list, and the log reading request carries the target tag information. Therefore, before the user acquires the log file from the host side to the communication module side, the communication module side verifies the identity information of the user through the log management program, and when the verification is passed, the user is a trusted user, and the trusted user can acquire the log file, so that the reading safety of the log file is improved. Moreover, different users can acquire log files of different levels, and the reading safety of the log files is further improved. Moreover, the encryption and decryption processes of the log file are realized at the communication module side, so that the risk of cracking the encryption algorithm is reduced, and the reading safety of the log file is further improved.
Drawings
FIG. 1 is a flow diagram illustrating a method for log reading in one embodiment;
FIG. 2 is a schematic flow chart illustrating storage of a log file in one embodiment;
FIG. 3 is a flow diagram illustrating the addition of user information in one embodiment;
FIG. 4 is a schematic flow chart illustrating generation of a hint in one embodiment;
FIG. 5 is a schematic flow diagram illustrating deletion of a log file in one embodiment;
FIG. 6 is a block diagram of a terminal in one embodiment;
FIG. 7 is a timing diagram of a log read method in one embodiment;
FIG. 8 is a block diagram showing the structure of a log reading apparatus according to an embodiment;
FIG. 9 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In one embodiment, as shown in fig. 1, a log reading method is provided, which is exemplified by applying the method to a terminal, wherein the terminal may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices. The method comprises the following steps:
s102, according to the communication connection between the communication module and the host, sending a login request to a log management program through a log reading program, so that the log management program verifies login information according to a pre-stored user list, wherein the login request carries the login information.
The terminal includes a communication module and a host, and the communication module and the host can communicate with each other through PCIe (peripheral component interconnect express) or USB (universal serial Bus). The communication module is a module having a communication function, such as a 4G module or a 5G module. The host computer runs a log reading program which is an application program for providing log reading service. The communication module runs a log management program, and the log management program is an application program for providing log management service. The log reading program and the log management program interact with each other through information exchange so as to read the log file in the communication module.
The user list is a table file in which user information is recorded. The user list includes a plurality of sets of data, each set of data including user information for a single user. The user information includes login information, management authority, and reading authority. The login information includes a user account and a user password. The management authority comprises a management authority and a non-management authority. The user with the management authority is an administrator user or a super user, and can manage user information of a common user, such as adding a user, deleting a user, and modifying the user information. The user without the management authority is a common user. The reading permission can be divided according to log levels, for example, the reading permission of the user a is the reading permission of the log level 1 and the log level 2, which indicates that the user a can read the log file corresponding to the log level 1 and the log file corresponding to the log level 2, and the reading permission of the user B is the reading permission of the log level 1, which indicates that the user B can only read the log file corresponding to the log level 1. The reading authority can also be divided according to user grades, for example, the reading authority of the user a is of a high grade, which indicates that the user a can read log files corresponding to all log grades (log grades 1-3), the reading authority of the user B is of a medium grade, which indicates that the user B can read log files corresponding to the log grades 1-2, and the reading authority of the user C is of a low grade, which indicates that the user C can only read log files corresponding to the log grade 1. The user list can be burned into the communication module in advance and stored into a memory of the communication module.
Specifically, a login interface can be displayed on the host computer through a log reading program, and the login interface comprises a login information filling position and a login button. The user can fill the user account and the user password in the login information filling position and trigger the login button. When the trigger operation of the login button is detected, the log reading program on the host side generates a login request according to the login information filled by the user, and the login request is sent to the log management program on the communication module side through PCIe or USB. The log management program at the communication module side can acquire a pre-stored user list and inquire whether the login information carried by the login request exists in the user list. If the user list can inquire the login information, the login request is verified. The triggering operation may specifically be a touch operation, a cursor operation, a key operation, or a voice operation, the touch operation may be a touch and click operation, a touch and press operation, or a touch and slide operation, and the touch and click operation may be a single-point touch operation or a multi-point touch operation.
S104, when the verification is passed, obtaining a target reading authority corresponding to the login information from a pre-stored user list through a log management program, determining a target log grade according to the target reading authority, obtaining tag information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the tag information comprises creation time, the log grade and a service program identifier.
The label information is description information of the log file, is used for describing attribute information of the log file, and can also be used for identifying the log file. The log file is a log file output by the service program in the communication module, and the log file can be used for analyzing the running state of the service program. The label information of the log file comprises the creation time of the log file, the log grade and the service program identification. The creation time of the log file refers to the time when the business program outputs the log file. The log level of a log file refers to the level of the log file. The higher the level of the log file, the more important the log file is, the log file includes more sensitive data. The log level of the log file can be determined by a developer of the service program in advance, and the developer of the service program can configure the log level rule corresponding to each service program through codes. Based on the log level rule, when each business program outputs the log file, the log level of the log file can be output together. The service program identifier is an identifier for uniquely identifying the service program, and may specifically include a character string of at least one character of letters, numbers and symbols.
The log management program can receive the log file sent by the service program, and encrypt, compress and store the log file. The encrypted log file and the tag information of the log file may be stored in association.
The log file list is a table file in which tag information of the log file is recorded. The log file list includes multiple sets of data, each set of data including tag information for a single log file.
Specifically, when the login information of the user passes the verification, the log management program on the communication module side may obtain the reading authority corresponding to the login information from the user list, and may determine the log level that the user can read according to the reading authority. The log management program at the communication module side can search a plurality of encrypted log files corresponding to the log level from the storage area of the log files, obtain the label information of the searched encrypted log files, and generate a log file list according to the obtained label information. When the log information of the user passes the verification, the log management program on the communication module side may return a verification success message to the log reading program on the host side. And when the log reading program at the host side receives the verification success message, jumping from the login interface to the log file reading interface.
And S106, sending the log file list to a log reading program for displaying according to the communication connection between the communication module and the host.
And S108, sending a log reading request to a log management program through the log reading program so that the log management program can acquire a target encrypted log file corresponding to the target label information, decrypting the target encrypted log file to obtain a target decrypted log file, sending the target decrypted log file to the log reading program for displaying, wherein the log reading request is generated by triggering operation aiming at a log file list, and the log reading request carries the target label information.
The log reading request is a request with a reading function and is used for reading a log file.
Specifically, the communication module and the host have established communication connection, the log management program on the communication module side can send the log file list to the log reading program on the host side, and the log file list can be displayed on a log file reading interface of the log reading program, that is, tag information of the log file which can be read is displayed. When the trigger operation of the user for the log file list is detected, namely the user selects at least one piece of label information through the log file list, the log reading program generates a log reading request according to the label information selected by the user, and the log reading request is sent to a log management program at the communication module side. After receiving the log reading request, the log management program can acquire a target encrypted log file corresponding to the target tag information carried by the log reading request from a storage area of the log file, decompress and decrypt the target encrypted log file, and obtain a target decrypted log file. The log management program on the communication module side can send the target decryption log file to the log reading program on the host side, and the target decryption log file is displayed on a log file reading interface of the log reading program.
In one embodiment, sending a log read request to a log manager through a log reader comprises: acquiring at least one piece of label information selected from a log file list as target label information through a log reading program; and generating a log reading request according to the target label information through a log reading program, and sending the log reading request to a log management program.
Specifically, after the log reading program on the host side obtains the log file list, the log file list can be displayed through the log file reading interface, a user can select at least one piece of tag information as target tag information through the log file reading interface, and then the log reading program can generate a log reading request according to the target tag information and send the log reading request to the log management program on the communication module side. In this way, compared with the case that the log reading program directly generates and sends the log reading request to the log management program, in the embodiment, after the target tag information is determined, the log reading request is generated according to the target tag information, and then the log reading request is sent to the log management program, so that the data volume transmitted between the host side and the communication module side can be reduced, and the log reading efficiency is improved.
According to the log reading method, a log reading program sends a login request to a log management program according to the communication connection between a communication module and a host, so that the log management program verifies login information according to a pre-stored user list, and the login request carries the login information; when the log file passes the verification, acquiring a target reading authority corresponding to the login information from a pre-stored user list through a log management program, determining a target log grade according to the target reading authority, acquiring label information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the label information comprises creation time, the log grade and a service program identifier; sending the log file list to a log reading program for displaying according to the communication connection between the communication module and the host; sending a log reading request to a log management program through a log reading program so that the log management program obtains a target encryption log file corresponding to target tag information, decrypting the target encryption log file to obtain a target decryption log file, sending the target decryption log file to the log reading program for displaying, wherein the log reading request is generated through a trigger operation aiming at a log file list, and the log reading request carries the target tag information. Therefore, before the user acquires the log file from the host side to the communication module side, the communication module side verifies the identity information of the user through the log management program, and when the verification is passed, the user is indicated to be a safe user, and the safe user can acquire the log file, so that the reading safety of the log file is improved. Moreover, different users can acquire log files of different levels, and the reading safety of the log files is further improved. Moreover, the encryption and decryption processes of the log file are realized at the communication module side, so that the risk of cracking the encryption algorithm is reduced, and the reading safety of the log file is further improved.
In an embodiment, as shown in fig. 2, the terminal includes a plurality of service programs, the service programs are deployed in a communication module of the terminal, and S102, that is, according to a communication connection between the communication module and the host, a log reading program sends a login request to a log management program, so that the log management program verifies login information according to a pre-stored user list, before the login request carries the login information, the log reading method further includes:
s202, receiving log files sent by each service program through a log management program, wherein the log files carry creation time, log grades and service program identifiers.
The communication module runs a service program, which is an application program providing communication-related service, such as a GNSS (Global Navigation Satellite System) service program providing positioning Navigation service, a short message service program providing short message service, a call service program providing call service, a network connection service program providing network access service, and the like.
Specifically, the terminal is started, and the communication module of the terminal runs an internal log management program and each service program. And each service program opens a communication channel by opening the equipment file, when the equipment file is opened successfully, the communication channel is opened successfully, each service program outputs log files to the log management program in real time, and each log file carries creation time, log grade and service program identification when being output.
In one embodiment, a single service program may output log files of different log levels, and accordingly, the log level rules corresponding to the single service program may include rule details corresponding to the different log levels. For example, the log level rule corresponding to the GNSS service program may be that the log level of the log file related to the self-positioning information of the terminal is a high level, and the log level of the log file related to the positioning information of other terminals is a low level.
S204, the log files corresponding to the service programs are encrypted through the log management program, and the encrypted log files corresponding to the service programs are obtained.
S206, the corresponding creating time, log grade and service program identification of each log file are used as the label information of the corresponding encrypted log file through the log management program.
And S208, acquiring a storage area corresponding to each log grade through the log management program, storing the encrypted log file corresponding to the corresponding log grade and the label information of the encrypted log file into the corresponding storage area, wherein the storage area is deployed in a communication module of the terminal.
Specifically, after receiving the log file sent by the service program, the log management program may encrypt the log file to obtain an encrypted log file. The log management program may use the creation time, the log level, and the service program identifier corresponding to the log file as the tag information of the log file, and the tag information may be used to uniquely identify the log file. The log management program can associate the encrypted log file with corresponding label information, and store the encrypted log file and the corresponding label information in the communication module in a separated manner according to the log grade. Different log levels correspond to different storage areas. Furthermore, the log management program can compress the encrypted log file and store the compressed log file so as to save the storage resource of the communication module.
In an embodiment, the encrypting the log file may specifically be using a Hash Algorithm such as MD5(Message-digest Algorithm), SHA-1(Secure Hash Algorithm-1), or SHA-2(Secure Hash Algorithm-2), which is not limited herein. The compression of the log file may specifically be by using a compression algorithm such as RLE (Run-Length Encoding), huffman algorithm, etc., and the embodiment of the present application is not limited herein.
In the embodiment, the log management program receives the log files of the service programs, encrypts and compresses the log files, and then stores the encrypted log files in an isolated manner according to the log grades, so that the security of log storage can be improved. In addition, the creating time, the log grade and the service program identification corresponding to the log file are used as the label information of the log file, a user can quickly acquire the basic information of the log file according to the label information, and the label information can assist the user in reading the log.
In one embodiment, as shown in fig. 3, further comprising:
s302, sending a user adding request to a log management program through a log reading program, wherein the user adding request carries login information of a user to be added, a reading authority corresponding to the user to be added and a user identifier of a request sending user.
S304, the log management program acquires the management authority corresponding to the user from the pre-stored user list according to the user identification.
S306, when the management authority corresponding to the user requesting to send is the management authority, the log management program is used for adding the login information of the user to be added and the reading authority corresponding to the user to be added into the user list for storage.
The user adding request is a request with an adding function and is used for adding user information in the user list. The user identification may be a user account.
Specifically, after the user successfully logs in the log reading program, the log reading program may display a log reading interface, and display a user addition control in the log reading interface. When the triggering operation acting on the control is detected, a user adding window can be popped up, a user can input a user account and a user password of a user to be added and a reading authority corresponding to the user to be added in the user adding window, and after the input is finished, a control representing the end can be triggered, such as a 'finishing' button, so that a user adding request is finally triggered and generated. The user adding request carries login information of a user to be added, a reading authority corresponding to the user to be added and a user identifier of a current user of a login log reading program. After receiving the user addition request, the log management program may verify whether the current user is an administrator user according to the user identifier of the current user, and specifically may search for the management authority corresponding to the user identifier of the current user from a pre-stored user list. When the found management authority is the management authority, that is, the current user is the administrator user, the log management program may add the login information of the user to be added and the reading authority corresponding to the user to be added to the user list, that is, store the user information of the user to be added in the communication module. Subsequently, the user to be added can log in a log reading program to read the log file.
In an embodiment, the administrator user may also input the management authority corresponding to the user to be added in the user adding window, and carry the management authority corresponding to the user to be added, the login information of the user to be added, and the reading authority corresponding to the user to be added together into the user adding request. Subsequently, the log management program may add the login information of the user to be added, and the reading right and the management right corresponding to the user to be added to the user list. Of course, if the user addition request does not carry the management permission corresponding to the user to be added, the management permission corresponding to the user to be added may be defaulted as no management permission.
In one embodiment, the administrator user may also send a user information modification request to the log manager through the log reader to modify the user information of the users in the user list. The user information modification request may be used to modify any kind of user information, for example, modify a user password corresponding to a user account in the user list, and modify a management authority corresponding to a user in the user list. The user information modification request may also be used to delete user information.
In the above embodiment, the log management program may receive the user addition request sent by the log reading program, and add the relevant information of the user to be added carried in the user addition request to the user list to add a new user capable of reading the log, thereby improving the flexibility of reading the log. In addition, when the management authority corresponding to the request sending user is the management authority, the log management program responds to the user adding request sent by the request sending user, not all users can add new users, only the administrator user can add new users, and the log reading safety can be improved.
In one embodiment, as shown in fig. 4, the log reading method further includes:
s402, detecting the storage allowance of each storage area through the log management program.
S404, when the storage allowance of at least one storage area is smaller than a first preset threshold value, sending prompt information to a log reading program for displaying through a log management program, wherein the prompt information carries a target log file list corresponding to the target storage area, the target log file list comprises tag information of a first preset number of encrypted log files stored in the target storage area, and the storage allowance of the target storage area is smaller than the first preset threshold value.
Specifically, the log management program may monitor the storage margin of the storage area corresponding to each log level. Since the storage capacity of the storage area is limited, when the storage margin of the storage area is smaller than the first preset threshold, it indicates that the storage margin of the storage area is about to be insufficient. When the storage margin of the storage area is insufficient, the log management program can clean the encrypted log file in the storage area. Therefore, when the storage margin of at least one storage area is less than the first preset threshold, the log management program may generate a prompt message, and send the prompt message to the log reading program, where the prompt message includes a target log file list corresponding to the storage area, and the target log file list includes the tag information of the preset number of encrypted log files stored in the storage area. The encrypted log files stored in the storage area can be sequenced according to the sequence of the creation time, the earlier the creation time is, the earlier the sequencing is, the higher the sequencing is, the label information of the encrypted log files with the sequencing earlier the preset number is acquired, and a target log file list is generated. The hint information may also carry hint text, such as "the following log file is to be cleaned and whether to read the following log file" is to be confirmed. After receiving the prompt information, the log reading program can display the prompt information on a log reading interface so as to remind a user to read the log file in time. The first preset number and the first preset threshold value can be set according to actual needs.
In one embodiment, when the target log file list is displayed, the tag information in the target log file list may be arranged according to the order of creation time, and the earlier the creation time is, the earlier the tag information is arranged. Further, different display parameters may be allocated to the tag information according to the arrangement position of the tag information, and the display parameters determine the display form of the tag information, including the display size, the display color, and the like. The top m groups of tag information may be highlighted, for example, a font is shown to be bolded, a color of the font is shown to be red, and the like. The encrypted log file corresponding to the tag information sorted earlier is washed earlier.
In the above embodiment, the log management program may detect the storage margins of the storage areas, and when the storage margin of at least one storage area is about to be insufficient, send the prompt information to the log reading program for display, so as to prompt the user to read the log file to be cleaned in time. After the user knows, the user can read the log file to be cleaned in time, and the utilization rate of the log file is further improved.
In one embodiment, as shown in fig. 5, the log reading method further includes:
and S502, when the storage allowance of the target storage area is smaller than a second preset threshold, sequencing the encrypted log files stored in the target storage area according to the time sequence of the creation time through the log management program.
S504, deleting a second preset number of encrypted log files in a preset direction from the target storage area through the log management program according to the sequencing result.
And the second preset threshold is smaller than the first preset threshold. The second preset number and the second preset threshold value can be set according to actual needs.
Specifically, when the storage margin of the storage area is smaller than a second preset threshold, it indicates that the storage capacity of the storage area is insufficient, the log management program may sort the encrypted log files stored in the storage area according to the order of creation time, and delete the encrypted log files of a second preset number that are sorted earlier the creation time is earlier the sorting is earlier.
In the above embodiment, when the storage margin of the storage area is insufficient, the encrypted log file in the storage area is deleted in time to increase the storage margin of the storage area, so that the storage area is ensured to have sufficient storage margin to store the newly created log file, and the validity of log storage is improved.
In one embodiment, the log reading method further comprises: acquiring a storage area corresponding to the login information through a log reading program, wherein the storage area corresponding to the login information is deployed in a host of the terminal; and storing the target decryption log file in a storage area corresponding to the login information through a log reading program.
Specifically, the storage area corresponding to the user may be determined through the directory path specified by the user, and the storage area may be a preset default storage area or a latest storage area currently specified by the user. The storage area corresponding to the user is deployed in the host of the terminal. The log reading program can obtain the directory path appointed by the current user, and store the target decryption log file read by the current user to the target path. Wherein the target decryption log file may be saved in a TXT file format. Subsequently, when the user analyzes the read log file through the log analysis program, the log analysis program can automatically acquire the log file under the directory path only by inputting the directory path in the log analysis program, and then the analysis is started.
In the above embodiment, the read log file is saved to the designated directory path, which is convenient for subsequent analysis of the log file.
As shown in fig. 6, fig. 6 is a block diagram of a terminal in one embodiment. The terminal comprises a host and a communication module, wherein the communication module comprises a log management program, a second storage area and a plurality of service programs from the service program 1 to the service program n, and the host comprises a log reading program and the second storage area. The communication module and the host may communicate over PCIe or USB.
FIG. 7 is a timing diagram illustrating a log reading method according to an embodiment, as shown in FIG. 7. With reference to fig. 6 and 7, the log reading method includes the following steps:
1. and the business program sends the log file to the log management program.
And starting the terminal, and starting the log management program and the service program by the communication module. And the service program opens the communication channel by opening the equipment file, and when the communication channel is opened successfully, the service program outputs a log file to the log management program, wherein the log file carries the creation time, the log grade and the service program identifier.
2. The log management program encrypts and compresses the log file and stores the log file.
And the log management program encrypts and compresses the log file to obtain a log encrypted file. The second storage area comprises a plurality of sub-areas, and each sub-area has a corresponding relation with the log level. And the log management program stores the log encrypted file according to the log grading area. The service program continuously outputs the log file, and the log management program continuously keeps the log file. The log management program can also take the creation time, the log grade and the service program identification of the log file as the label information of the log file, and store the log file and the corresponding label information in an associated manner.
3. The log reading program sends a login request to the log management program.
The user can send a login request to the log management program through the log reading program.
4. The log manager verifies the login request.
And the log management program acquires a pre-stored user list and verifies the login request according to the user list. And when the login information carried by the login request is stored in the user list, the login request passes the verification. And when the login information carried by the login request is not stored in the user list, the verification of the login request fails. The log management program may return a login failure to the log reading program, prohibiting the user from performing any log reading related operations.
5. When the verification passes, the log management program generates a log file list.
And when the login request passes the verification, the log management program acquires the reading authority corresponding to the login information from the user list. The log management program can return the login success and the reading authority corresponding to the login information to the log reading program. And the log management program determines the log grade which can be read by the user according to the obtained reading permission, obtains the label information of the encrypted log file corresponding to the log grade, and generates a log file list according to the obtained label information.
6. And the log management program sends a log file list to the log reading program.
7. The log reading program sends a log reading request to the log management program.
After receiving the log file list, the log reading program can display the log file list. The user can select the tag information of the log file to be read from the log file list, and the log reading program can generate a log reading request according to the tag information selected by the user and send the log reading request to the log management program.
8. And the log management program decrypts and decompresses the log encrypted file.
And after receiving the log reading request, the log management program acquires a log encrypted file corresponding to the tag information carried by the log reading request, and decompresses and decrypts the log encrypted file to obtain a log decrypted file.
9. The log management program sends the log decryption file to the log reading program.
After receiving the log decryption file, the log reading program may display the log decryption file, or store the log decryption file in a directory (a second storage area) specified by the user. The user may continue to initiate log read requests to obtain more log files.
The log management program can also detect the storage allowance of each sub-area, and when the storage allowance of the sub-area is about to be insufficient, prompt information is sent to the log reading program to prompt a user to read the log file to be cleaned in time. When the storage allowance of the sub-area is insufficient, the log files in the sub-area can be automatically cleaned, and the log files with earlier creation time are deleted.
The administrator user can also send a user adding request to the log management program through the log reading program so as to add a new user.
It should be understood that the steps in the above-described flowcharts are shown in order as indicated by the arrows, but the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a part of the steps in the above-mentioned flowcharts may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the steps or the stages is not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a part of the steps or the stages in other steps.
In one embodiment, as shown in fig. 8, there is provided a log reading apparatus including: a login information verification module 802, a log file list generation module 804, a log file list sending module 806 and a log file sending module 808, wherein:
a login information verification module 802, configured to send a login request to a log management program through a log reading program according to communication connection between the communication module and the host, so that the log management program verifies login information according to a pre-stored user list, where the login request carries the login information;
a log file list generating module 804, configured to, when the verification passes, obtain, by a log management program, a target reading permission corresponding to the login information from a pre-stored user list, determine a target log level according to the target reading permission, obtain tag information of a plurality of encrypted log files corresponding to the target log level, and generate a log file list, where the tag information includes creation time, the log level, and a service program identifier;
a log file list sending module 806, configured to send the log file list to the log reading program for displaying according to the communication connection between the communication module and the host;
the log file sending module 808 is configured to send a log reading request to the log management program through the log reading program, so that the log management program obtains a target encrypted log file corresponding to the target tag information, decrypts the target encrypted log file to obtain a target decrypted log file, and sends the target decrypted log file to the log reading program for display, where the log reading request is generated by a trigger operation for a log file list, and the log reading request carries the target tag information.
In one embodiment, the terminal includes a plurality of service programs, the service programs are deployed in a communication module of the terminal, and the log reading apparatus further includes:
the log file storage module is used for receiving log files sent by all the service programs through a log management program, and the log files carry creation time, log grades and service program identifiers; encrypting the log file corresponding to each service program through a log management program to obtain an encrypted log file corresponding to each service program; the creating time, the log grade and the service program identification corresponding to each log file are used as the label information of the corresponding encrypted log file through a log management program; and acquiring a storage area corresponding to each log grade through a log management program, storing an encrypted log file corresponding to the corresponding log grade and label information of the encrypted log file into the corresponding storage area, and deploying the storage area in a communication module of the terminal.
In one embodiment, the log reading apparatus further includes:
the information adding module is used for sending a user adding request to the log management program through the log reading program, wherein the user adding request carries login information of a user to be added, a reading authority corresponding to the user to be added and a user identifier of a user requesting to send; acquiring a management authority corresponding to a request sending user from a pre-stored user list according to a user identifier through a log management program; and when the management authority corresponding to the user requesting to send is the management authority, adding the login information of the user to be added and the reading authority corresponding to the user to be added into a user list for storage through a log management program.
In one embodiment, the log reading apparatus further includes:
the information prompt module is used for detecting the storage allowance of each storage area through a log management program; when the storage allowance of at least one storage area is smaller than a first preset threshold value, sending prompt information to a log reading program for displaying through a log management program, wherein the prompt information carries a target log file list corresponding to the target storage area, the target log file list comprises label information of a first preset number of encrypted log files stored in the target storage area, and the storage allowance of the target storage area is smaller than the first preset threshold value.
In one embodiment, the log reading apparatus further includes:
the log file deleting module is used for sorting the encrypted log files stored in the target storage area according to the time sequence of the creation time through a log management program when the storage allowance of the target storage area is smaller than a second preset threshold; and deleting a second preset number of encrypted log files in a preset direction from the target storage area according to the sequencing result through a log management program.
In one embodiment, the log file sending module is further configured to obtain at least one piece of tag information selected from the log file list as target tag information through the log reading program; and generating a log reading request according to the target label information through a log reading program, and sending the log reading request to a log management program.
In one embodiment, the log file sending module is further configured to obtain a storage area corresponding to the login information through a log reading program, where the storage area corresponding to the login information is deployed in a host of the terminal; and storing the target decryption log file in a storage area corresponding to the login information through a log reading program.
For the specific limitation of the log reading device, reference may be made to the above limitation on the log reading method, which is not described herein again. The respective modules in the log reading apparatus can be wholly or partially implemented by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 9. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a log reading method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 9 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of the log reading method described above. Here, the steps of the log reading method may be steps in the log reading method of each of the above embodiments.
In one embodiment, a computer readable storage medium is provided, storing a computer program that, when executed by a processor, causes the processor to perform the steps of the log reading method described above. Here, the steps of the log reading method may be steps in the log reading method of each of the above embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include both non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A log reading method applied to a terminal installed with a log management program and a log reading program, the log management program being deployed in a communication module of the terminal, the log reading program being deployed in a host of the terminal, the method comprising:
according to the communication connection between a communication module and a host, sending a login request to a log management program through a log reading program so that the log management program verifies login information according to a pre-stored user list, wherein the login request carries the login information;
when the log file passes the verification, acquiring a target reading authority corresponding to the login information from a pre-stored user list through the log management program, determining a target log grade according to the target reading authority, acquiring tag information of a plurality of encrypted log files corresponding to the target log grade, and generating a log file list, wherein the tag information comprises creation time, the log grade and a service program identifier;
sending the log file list to a log reading program for displaying according to the communication connection between the communication module and the host;
sending a log reading request to a log management program through the log reading program, so that the log management program obtains a target encryption log file corresponding to target tag information, decrypts the target encryption log file to obtain a target decryption log file, and sends the target decryption log file to the log reading program for displaying, wherein the log reading request is generated by triggering operation aiming at a log file list, and the log reading request carries the target tag information.
2. The method according to claim 1, wherein the terminal includes a plurality of service programs, the service programs are deployed in a communication module of the terminal, and before sending the login request to the log management program through the log reading program according to the communication connection between the communication module and the host, the method further includes:
receiving a log file sent by each service program through the log management program, wherein the log file carries creation time, a log grade and a service program identifier;
encrypting the log file corresponding to each service program through the log management program to obtain an encrypted log file corresponding to each service program;
the creating time, the log grade and the service program identification corresponding to each log file are used as the label information of the corresponding encrypted log file through the log management program;
and acquiring a storage area corresponding to each log grade through the log management program, and storing the encrypted log file corresponding to the corresponding log grade and the label information of the encrypted log file to the corresponding storage area, wherein the storage area is deployed in a communication module of the terminal.
3. The method of claim 1, further comprising:
sending a user adding request to a log management program through the log reading program, wherein the user adding request carries login information of a user to be added, a reading authority corresponding to the user to be added and a user identifier of a request sending user;
acquiring the management authority corresponding to the request sending user from a pre-stored user list according to the user identification through the log management program;
and when the management authority corresponding to the user requesting to send is the management authority, adding the login information of the user to be added and the reading authority corresponding to the user to be added into a user list for storage through the log management program.
4. The method of claim 2, further comprising:
detecting the storage allowance of each storage area through the log management program;
when the storage allowance of at least one storage area is smaller than a first preset threshold value, sending prompt information to a log reading program for displaying through the log management program, wherein the prompt information carries a target log file list corresponding to a target storage area, the target log file list comprises tag information of a first preset number of encrypted log files stored in the target storage area, and the storage allowance of the target storage area is smaller than the first preset threshold value.
5. The method of claim 4, further comprising:
when the storage allowance of the target storage area is smaller than a second preset threshold value, sorting the encrypted log files stored in the target storage area according to the time sequence of the creation time through the log management program;
and deleting a second preset number of encrypted log files in a preset direction from the target storage area according to the sequencing result through the log management program.
6. The method of claim 1, wherein sending a log read request to a log manager by the log reader comprises:
acquiring at least one piece of label information selected from the log file list as target label information through the log reading program;
and generating a log reading request according to the target label information through the log reading program, and sending the log reading request to a log management program.
7. The method of claim 1, further comprising:
acquiring a storage area corresponding to the login information through the log reading program, wherein the storage area corresponding to the login information is deployed in a host of the terminal;
and storing the target decryption log file to a storage area corresponding to the login information through the log reading program.
8. An apparatus for reading a log, the apparatus comprising:
the log information verification module is used for sending a log request to a log management program through a log reading program according to the communication connection between the communication module and the host computer so that the log management program verifies the log information according to a pre-stored user list, and the log request carries the log information;
a log file list generating module, configured to, when the log file list passes verification, obtain, by the log management program, a target reading permission corresponding to the login information from a pre-stored user list, determine a target log level according to the target reading permission, obtain tag information of a plurality of encrypted log files corresponding to the target log level, and generate a log file list, where the tag information includes creation time, the log level, and a service program identifier;
the log file list sending module is used for sending the log file list to a log reading program for displaying according to the communication connection between the communication module and the host;
the log file sending module is used for sending a log reading request to a log management program through the log reading program so that the log management program can obtain a target encrypted log file corresponding to target label information, decrypt the target encrypted log file to obtain a target decrypted log file, and send the target decrypted log file to the log reading program for displaying, wherein the log reading request is generated through triggering operation aiming at a log file list, and the log reading request carries the target label information.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202010463755.0A 2020-05-27 2020-05-27 Log reading method, device, computer equipment and storage medium Active CN111897786B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010463755.0A CN111897786B (en) 2020-05-27 2020-05-27 Log reading method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010463755.0A CN111897786B (en) 2020-05-27 2020-05-27 Log reading method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111897786A true CN111897786A (en) 2020-11-06
CN111897786B CN111897786B (en) 2024-03-15

Family

ID=73207513

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010463755.0A Active CN111897786B (en) 2020-05-27 2020-05-27 Log reading method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111897786B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112732665A (en) * 2021-01-04 2021-04-30 歌尔股份有限公司 Log processing method, system and storage medium based on Linux platform
CN113032830A (en) * 2021-03-26 2021-06-25 北京有竹居网络技术有限公司 Electronic equipment control method and device and electronic equipment
CN114036117A (en) * 2021-11-15 2022-02-11 平安普惠企业管理有限公司 Log viewing method and device, computer equipment and storage medium
CN114785677A (en) * 2022-04-22 2022-07-22 武汉联影医疗科技有限公司 Log management method, apparatus, computer device, storage medium, and program product
CN114978627A (en) * 2022-05-11 2022-08-30 湖南宝马文化传播有限公司 Method and system for controlling data authority of big data
CN115174544A (en) * 2021-04-02 2022-10-11 京东科技控股股份有限公司 Log obtaining method, device, equipment and medium
CN116149958A (en) * 2023-04-20 2023-05-23 华谱科仪(北京)科技有限公司 Chromatograph operation and maintenance method and device based on log management function

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000029751A (en) * 1998-07-15 2000-01-28 Fuji Xerox Co Ltd Log managing method/device
JP2002366461A (en) * 2001-06-11 2002-12-20 Sony Corp Server, log information management system and log information management method
US20120311347A1 (en) * 2011-05-30 2012-12-06 Samsung Electronics Co. Ltd. Apparatus and method for performing encryption and decryption of data in portable terminal
CN103780581A (en) * 2012-10-23 2014-05-07 江南大学 Cloud storage-based encrypted file access control system and method
US20160299934A1 (en) * 2015-04-09 2016-10-13 Commvault Systems, Inc. Management of log data
WO2016169410A1 (en) * 2015-04-21 2016-10-27 腾讯科技(深圳)有限公司 Login method and device, server and login system
CN106571951A (en) * 2016-10-19 2017-04-19 北京神州绿盟信息安全科技股份有限公司 Audit log obtaining, generating and verifying method and system and device
CN106844185A (en) * 2017-03-17 2017-06-13 上海与德科技有限公司 The storage method and device of a kind of journal file
CN108804644A (en) * 2018-06-05 2018-11-13 中国平安人寿保险股份有限公司 Interface log storing method, device, computer equipment and storage medium
CN110263008A (en) * 2019-06-20 2019-09-20 江苏满运软件科技有限公司 Terminal offline logs management system, method, equipment and storage medium
CN110719276A (en) * 2019-09-30 2020-01-21 北京网瑞达科技有限公司 Network equipment safety access system based on cache password and working method thereof
CN110908971A (en) * 2019-11-08 2020-03-24 苏州浪潮智能科技有限公司 System log management method, device, storage medium and equipment
CN111177096A (en) * 2019-12-11 2020-05-19 招银云创(深圳)信息技术有限公司 Log management method and device, computer equipment and storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000029751A (en) * 1998-07-15 2000-01-28 Fuji Xerox Co Ltd Log managing method/device
JP2002366461A (en) * 2001-06-11 2002-12-20 Sony Corp Server, log information management system and log information management method
US20120311347A1 (en) * 2011-05-30 2012-12-06 Samsung Electronics Co. Ltd. Apparatus and method for performing encryption and decryption of data in portable terminal
CN103780581A (en) * 2012-10-23 2014-05-07 江南大学 Cloud storage-based encrypted file access control system and method
US20160299934A1 (en) * 2015-04-09 2016-10-13 Commvault Systems, Inc. Management of log data
WO2016169410A1 (en) * 2015-04-21 2016-10-27 腾讯科技(深圳)有限公司 Login method and device, server and login system
CN106571951A (en) * 2016-10-19 2017-04-19 北京神州绿盟信息安全科技股份有限公司 Audit log obtaining, generating and verifying method and system and device
CN106844185A (en) * 2017-03-17 2017-06-13 上海与德科技有限公司 The storage method and device of a kind of journal file
CN108804644A (en) * 2018-06-05 2018-11-13 中国平安人寿保险股份有限公司 Interface log storing method, device, computer equipment and storage medium
CN110263008A (en) * 2019-06-20 2019-09-20 江苏满运软件科技有限公司 Terminal offline logs management system, method, equipment and storage medium
CN110719276A (en) * 2019-09-30 2020-01-21 北京网瑞达科技有限公司 Network equipment safety access system based on cache password and working method thereof
CN110908971A (en) * 2019-11-08 2020-03-24 苏州浪潮智能科技有限公司 System log management method, device, storage medium and equipment
CN111177096A (en) * 2019-12-11 2020-05-19 招银云创(深圳)信息技术有限公司 Log management method and device, computer equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
成茂才;徐开勇;: "基于可信计算平台的审计日志安全存储***", 计算机科学, no. 06, pages 154 - 159 *
苏恒阳;: "基于安全文档管理的日志***设计", 制造业自动化, no. 24, pages 114 - 117 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112732665A (en) * 2021-01-04 2021-04-30 歌尔股份有限公司 Log processing method, system and storage medium based on Linux platform
CN113032830A (en) * 2021-03-26 2021-06-25 北京有竹居网络技术有限公司 Electronic equipment control method and device and electronic equipment
CN115174544A (en) * 2021-04-02 2022-10-11 京东科技控股股份有限公司 Log obtaining method, device, equipment and medium
CN114036117A (en) * 2021-11-15 2022-02-11 平安普惠企业管理有限公司 Log viewing method and device, computer equipment and storage medium
CN114785677A (en) * 2022-04-22 2022-07-22 武汉联影医疗科技有限公司 Log management method, apparatus, computer device, storage medium, and program product
CN114785677B (en) * 2022-04-22 2023-12-22 武汉联影医疗科技有限公司 Log management method, device, computer equipment, storage medium and program product
CN114978627A (en) * 2022-05-11 2022-08-30 湖南宝马文化传播有限公司 Method and system for controlling data authority of big data
CN116149958A (en) * 2023-04-20 2023-05-23 华谱科仪(北京)科技有限公司 Chromatograph operation and maintenance method and device based on log management function
CN116149958B (en) * 2023-04-20 2023-06-27 华谱科仪(北京)科技有限公司 Chromatograph operation and maintenance method and device based on log management function

Also Published As

Publication number Publication date
CN111897786B (en) 2024-03-15

Similar Documents

Publication Publication Date Title
CN111897786B (en) Log reading method, device, computer equipment and storage medium
CN110826111B (en) Test supervision method, device, equipment and storage medium
CN107659632B (en) File encryption and decryption method and device and computer readable storage medium
US20170180332A1 (en) System and method to provide server control for access to mobile client data
CN110704863B (en) Configuration information processing method and device, computer equipment and storage medium
CN104520873A (en) Systems and methods for securing and restoring virtual machines
JP2005128996A (en) Information processing apparatus and system, and program
CN108304698B (en) Product authorized use method and device, computer equipment and storage medium
CN111666564B (en) Application program safe starting method and device, computer equipment and storage medium
CN110768784A (en) Password transmission method, device, computer equipment and storage medium
CN112417484A (en) Resource file protection method and device, computer equipment and storage medium
CN113553572A (en) Resource information acquisition method and device, computer equipment and storage medium
CN110958255B (en) Data transmission method and device, electronic equipment and storage medium
CN105630855A (en) File sharing method, file sharing system and terminal
CN111371755B (en) Voiceprint data processing method and device, computer equipment and storage medium
CN113127844A (en) Variable access method, device, system, equipment and medium
CN109871698B (en) Data processing method, data processing device, computer equipment and storage medium
CN114448722B (en) Cross-browser login method and device, computer equipment and storage medium
CN116743481A (en) Service security management and control method, device, equipment and storage medium
CN108848165B (en) Service request processing method and device, computer equipment and storage medium
CN111628985A (en) Security access control method, security access control device, computer equipment and storage medium
CN113545022A (en) Data processing method, data encryption method, data decryption method, data encryption equipment, data decryption equipment and storage medium
CN111400771A (en) Target partition checking method and device, storage medium and computer equipment
CN113297559B (en) Single sign-on method and device, computer equipment and storage medium
KR101745390B1 (en) Data leakage prevention apparatus and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant