Repetitive log filtering method for terminal

A filtering method and log technology, applied in the field of network security, can solve the problems of wasting engineers, redundant data, and complicated log files, and achieve the effect of improving efficiency and reducing expenses

Active Publication Date: 2017-09-15
TCL COMM TECH NINGBO CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because the system generates logs all the time, the log files are very complicated. When an abnormality occurs repeatedly, the applicati

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Repetitive log filtering method for terminal
  • Repetitive log filtering method for terminal
  • Repetitive log filtering method for terminal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0032] See figure 2 , figure 2 It is a schematic flowchart of the second embodiment of the repeated log filtering method of the terminal of the present invention. This embodiment is a specific embodiment in which the identification information that can uniquely identify the abnormality is extracted from the log to be stored, and the method includes the following steps:

[0033] S201: Determine the type of abnormality according to the log to be stored.

[0034] Specifically, the type of abnormality determined by the log to be stored can be specifically classified into application layer exception (JaveException), local layer exception (Native Exception), and application not responding exception (Application not Responsing).

[0035] S202: Determine the extraction rule according to the type of the abnormality.

[0036] Specifically, the exception extraction rule of the application layer is as follows: two judgments are made for each line of the exception information, firstly whether it...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a repetitive log filtering method for a terminal, wherein the method comprises the steps of: obtaining an abnormally recorded to-be-stored log generated by the terminal in an operation process; extracting identification information capable of uniquely identifying abnormity from the to-be-stored log; generating the abnormal snapshot of the to-be-stored log by utilizing the identification information; comparing whether the abnormal snapshot of the to-be-stored log and the abnormal snapshot of a stored log existing in a database are repetitive or not; and if not, storing the to-be-stored log and the abnormal snapshot of the to-be-stored log in the database. By means of the manner, the workload of developers can be reduced; the expense of a server can be reduced; and the working efficiency and the stability of a terminal system are improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a terminal duplicate log filtering method. Background technique [0002] The log is what we often call the Log. It is usually a record of some kind of processing that has been completed by the system or some software, so that it can be used as a reference when an exception occurs in the future to solve software vulnerabilities. The existence of logs allows system and software developers to quickly locate and solve problems after an exception occurs. Logs play a vital role in maintaining systems and software. [0003] At present, although there are already many applications that can automatically capture exception logs on the mobile phone, when an exception occurs, the exception-related logs can be automatically saved and uploaded to the server, and then engineers can solve the problem based on the uploaded logs. However, because the system generates logs all the time, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L12/26H04L29/06
CPCH04L41/069H04L43/028H04L63/1425
Inventor 薛安溪钟永安叶锌尧
Owner TCL COMM TECH NINGBO CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products