Log encryption and decryption methods

An encryption method and log technology, applied in the field of log encryption and decryption, can solve problems such as network security risks

Active Publication Date: 2018-10-26
NEW H3C SECURITY TECH CO LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Here, the key for encrypting or decrypting the log is the shared key. Once the shared key is stolen, it will lead to security risks for the entire network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log encryption and decryption methods
  • Log encryption and decryption methods
  • Log encryption and decryption methods

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0045] A log is a character string formed in a network device according to a certain standard format, and is used to record characteristic information of packets, user operation information, or network access information. Among them, one character occupies one byte.

[0046] Such as figure 1 The log system shown includes a network device 100 and a server 101 . The log system may include multiple network devices, and here only one network device 100 is taken as an example for illus...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide log encryption and decryption methods. The log encryption method includes the following steps: network equipment obtains a log, the log includes a timestamp and log contents; the network equipment determines a target secret key according to a basic secret key appointed by a server; the network equipment performs encryption on the log contents by utilizing the target secret key so that encrypted log contents can be obtained; the network equipment determines an encrypted log according to the encrypted log contents and the timestamp; and the network equipmentsends the encrypted log the server. The security of networks can be effectively enhanced by applying the embodiments of the methods.

Description

technical field [0001] The present application relates to the technical field of communications, in particular to a log encryption and decryption method. Background technique [0002] A log is a character string formed in a network device according to a certain standard format, and is used to record characteristic information of packets, user operation information, or network access information. Through the obtained logs, network administrators can understand the access status of the network and the operation status of network devices. [0003] In order to prevent the log from being stolen, a shared key is used between each network device and the server. The key is a string of strings, and the corresponding log is encrypted using the shared key. Specifically, after the network device generates the log, it encrypts the log according to the shared key, and sends the encrypted log to the server. The server decrypts the log according to the shared key to obtain the original lo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/06
Inventor 岳炳词
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products