Audit log obtaining, generating and verifying method and system and device
An acquisition method and log technology, applied in the field of information security, can solve the problems of imperfect audit log access control and difficult implementation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0071] In order to provide a highly secure implementation plan for access control of audit logs, the embodiment of this application provides a method, system and device for acquiring, generating, and verifying audit logs. The preferred embodiments of this application are described below in conjunction with the accompanying drawings Note, it should be understood that the preferred embodiments described here are only used to illustrate and explain the present application, and are not intended to limit the present application. And in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.
[0072] The embodiment of this application provides a method for obtaining audit logs, and its flowchart is as follows figure 1 As shown, specifically, the following steps may be included:
[0073] S101. The user terminal sends an identity verification request to the audit server; the identity verification request...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


