Unlock instant, AI-driven research and patent intelligence for your innovation.

Historical operation record encryption method and device

A technology of historical operation record and encryption method, which is applied in the field of historical operation record encryption method and device, and can solve problems such as command line operation stuck.

Active Publication Date: 2020-07-07
MAIPU COMM TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the purpose of the embodiments of the present invention is to provide a historical operation record encryption method and device to solve the problem that the command line operation may be stuck when the user performs command line operation to simultaneously encrypt the historical operation record

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Historical operation record encryption method and device
  • Historical operation record encryption method and device
  • Historical operation record encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0024] Please see figure 2 , figure 2 It is a flow chart of a historical operation record encryption method provided by an embodiment of the present invention, and the method is applied to a network device. The methods include:

[0025] Step S110: Obtain first operation information of the network device, where the first operation information includes corresponding first part information and second part information.

[0026] Wherein, as a manner, the first part of information includes a command line input by the user, and the network device may perform an operation corresponding to the command line after responding to the command line input by the user. Correspondingly, the second part of information includes the encryption algorithm to be used when encrypting the historical operation records, and may also include the operation time of the command line input by the user, network device information, user name of the user, and the like.

[0027] Step S120: Encrypt the first ...

no. 2 example

[0041] Please see image 3 , image 3 It is a flow chart of a historical operation record encryption method provided by an embodiment of the present invention, and the method is applied to a network device. The methods include:

[0042] Step S210: Obtain first operation information of the network device, where the first operation information includes corresponding first part information and second part information.

[0043] Step S220: Encrypt the first part of information based on a preset encryption algorithm to obtain encrypted first part of information.

[0044] Step S230: Generate second operation information of the network device, where the second operation information includes the second part of information and the encrypted first part of information.

[0045] Step S240: Add a preset isolation identifier to the second operation information, and set the isolation identifier at the tail or head of the second operation information.

[0046] Since the generated second op...

no. 3 example

[0053] Please see Figure 5 , Figure 5 It is a flow chart of a historical operation record encryption method provided by an embodiment of the present invention, and the method is applied to a network device. The methods include:

[0054] Step S310: Obtain first operation information of the network device, where the first operation information includes corresponding first part information and second part information.

[0055] Step S311: The first part of information is the simplified command line data input by the user, and the simplified command line data input by the user is matched with the pre-saved matching rules.

[0056] When users enter a command line, they may enter simplified command line data. As an implementation, the command line in the first operation information acquired by the network device may be a complete command line formed by completing data completion based on the simplified command line input by the user, in addition to the command line directly inpu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a historical operation record encryption method and device which are applied to network equipment, and belongs to the field of data communication. The method comprises the steps that first operation information of the network equipment is acquired, wherein the first operation information comprises first part information and second part information which correspond to each other; the first part information is encrypted on the basis of a preset encryption algorithm to obtain encrypted first part information; second operation information of the network equipment is generated, wherein the second operation information comprises the second part information and the encrypted first part information; the second operation information is stored. According to the method, the problem that when a user synchronously performs historical operation record encryption in the process that the user performs a command line operation, the command line operation may be blocked can be solved.

Description

technical field [0001] The invention relates to the field of data communication, in particular to a method and device for encrypting historical operation records. Background technique [0002] The network device historical operation record file stores the operation control and configuration details of all administrator users on the device. The historical operation record may contain many core data and materials for network device management, which is private information. With the increasing security awareness of people, more and more people choose to encrypt the historical operation records of network equipment. The historical operation records must be written synchronously with the actual operation in real time to ensure consistency with the actual operation. Therefore, the encryption operation of the historical operation records also needs to be synchronized with the actual operation. However, when the existing technology encrypts historical operation records, due to the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/602G06F2221/2107
Inventor 王立锟
Owner MAIPU COMM TECH CO LTD