Historical operation record encryption method and device
A technology of historical operation record and encryption method, which is applied in the field of historical operation record encryption method and device, and can solve problems such as command line operation stuck.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0024] Please see figure 2 , figure 2 It is a flow chart of a historical operation record encryption method provided by an embodiment of the present invention, and the method is applied to a network device. The methods include:
[0025] Step S110: Obtain first operation information of the network device, where the first operation information includes corresponding first part information and second part information.
[0026] Wherein, as a manner, the first part of information includes a command line input by the user, and the network device may perform an operation corresponding to the command line after responding to the command line input by the user. Correspondingly, the second part of information includes the encryption algorithm to be used when encrypting the historical operation records, and may also include the operation time of the command line input by the user, network device information, user name of the user, and the like.
[0027] Step S120: Encrypt the first ...
no. 2 example
[0041] Please see image 3 , image 3 It is a flow chart of a historical operation record encryption method provided by an embodiment of the present invention, and the method is applied to a network device. The methods include:
[0042] Step S210: Obtain first operation information of the network device, where the first operation information includes corresponding first part information and second part information.
[0043] Step S220: Encrypt the first part of information based on a preset encryption algorithm to obtain encrypted first part of information.
[0044] Step S230: Generate second operation information of the network device, where the second operation information includes the second part of information and the encrypted first part of information.
[0045] Step S240: Add a preset isolation identifier to the second operation information, and set the isolation identifier at the tail or head of the second operation information.
[0046] Since the generated second op...
no. 3 example
[0053] Please see Figure 5 , Figure 5 It is a flow chart of a historical operation record encryption method provided by an embodiment of the present invention, and the method is applied to a network device. The methods include:
[0054] Step S310: Obtain first operation information of the network device, where the first operation information includes corresponding first part information and second part information.
[0055] Step S311: The first part of information is the simplified command line data input by the user, and the simplified command line data input by the user is matched with the pre-saved matching rules.
[0056] When users enter a command line, they may enter simplified command line data. As an implementation, the command line in the first operation information acquired by the network device may be a complete command line formed by completing data completion based on the simplified command line input by the user, in addition to the command line directly inpu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


