A log encryption and decryption method

An encryption method and log technology, applied in the field of log encryption and decryption, can solve problems such as network security risks

Active Publication Date: 2021-04-20
NEW H3C SECURITY TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Here, the key for encrypting or decrypting the log is the shared key. Once the shared key is stolen, it will lead to security risks for the entire network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A log encryption and decryption method
  • A log encryption and decryption method
  • A log encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0045] A log is a character string formed in a network device according to a certain standard format, and is used to record characteristic information of packets, user operation information, or network access information. Among them, one character occupies one byte.

[0046] Such as figure 1 The log system shown includes a network device 100 and a server 101 . The log system may include multiple network devices, and here only one network device 100 is taken as an example for illus...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present application provides a log encryption and decryption method. The log encryption method includes: the network device obtains the log, and the log includes a time stamp and log content; the network device determines the target key according to the basic key agreed with the server; the network device uses The target key encrypts the log content to obtain the encrypted log content; the network device determines the encrypted log according to the encrypted log content and the time stamp; the network device sends the encrypted log to the server. By applying the embodiment of the present application, the security of the network is effectively improved.

Description

technical field [0001] The present application relates to the technical field of communications, in particular to a log encryption and decryption method. Background technique [0002] A log is a character string formed in a network device according to a certain standard format, and is used to record characteristic information of packets, user operation information, or network access information. Through the obtained logs, network administrators can understand the access status of the network and the operation status of network devices. [0003] In order to prevent the log from being stolen, a shared key is used between each network device and the server. The key is a string of strings, and the corresponding log is encrypted using the shared key. Specifically, after the network device generates the log, it encrypts the log according to the shared key, and sends the encrypted log to the server. The server decrypts the log according to the shared key to obtain the original lo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/06
Inventor 岳炳词
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products