Unlock instant, AI-driven research and patent intelligence for your innovation.

Audit log obtaining, generating and verifying method and system and device

An acquisition method and log technology, applied in the field of information security, can solve the problems of imperfect audit log access control and difficult implementation

Active Publication Date: 2017-04-19
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides a method, system and device for acquiring, generating, and verifying audit logs, which are used to solve the problem that the access control of audit logs in the prior art is not perfect and difficult to implement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Audit log obtaining, generating and verifying method and system and device
  • Audit log obtaining, generating and verifying method and system and device
  • Audit log obtaining, generating and verifying method and system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] In order to provide a highly secure implementation plan for access control of audit logs, the embodiment of this application provides a method, system and device for acquiring, generating, and verifying audit logs. The preferred embodiments of this application are described below in conjunction with the accompanying drawings Note, it should be understood that the preferred embodiments described here are only used to illustrate and explain the present application, and are not intended to limit the present application. And in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0072] The embodiment of this application provides a method for obtaining audit logs, and its flowchart is as follows figure 1 As shown, specifically, the following steps may be included:

[0073] S101. The user terminal sends an identity verification request to the audit server; the identity verification request...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses an audit log obtaining, generating and verifying method and system and device that are high in audit log access control security. The audit log obtaining method comprises the following steps: an audit server receives an identity verifying request sent from a user terminal, and the identity verifying request comprises user identity label information; when a user passes identity verification conducted by the audit server, an authorization acquisition request sent by the user terminal is received, the authorization acquisition request comprises a first identification code input by the user, the audit server generates an authorization file according to the user identity label information and the first identification code, the authorization file is sent to the user terminal, the user terminal obtains a second identification code input by the user, and audit log which comes from the audit server and is stored in a memory can be obtained based on the second identification code and the received authorization file.

Description

technical field [0001] The present application relates to the field of information security, in particular to a method, system and device for acquiring, generating and verifying audit logs. Background technique [0002] When users operate and maintain the operation and maintenance equipment, they often access the operation and maintenance equipment through the audit server. Then, the operation data of the user terminal to the operation and maintenance equipment and the data returned by the operation and maintenance equipment to the user terminal will be verified through the audit server. Forward. In the above process, the audit server can record the session information generated by each user terminal when operating and maintaining the operation and maintenance equipment as a session log, and record the operation and maintenance information corresponding to each session as an operation and maintenance log, while the above Session logs and operation and maintenance logs can j...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/069H04L63/08
Inventor 许德昭鲁迅曾祥雯
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD