Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Log desensitization method, server and storage medium

A log and desensitization technology, applied in the field of data security, can solve the problem of destroying original log information and achieve the effect of dynamic protection

Pending Publication Date: 2019-09-13
ZTE CORP
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to propose a log desensitization method, server and storage medium, aiming to solve the problem of destroying the original log information caused by encrypting or replacing sensitive log information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log desensitization method, server and storage medium
  • Log desensitization method, server and storage medium
  • Log desensitization method, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026] In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only for facilitating description of the present invention and has no specific meaning by itself. Therefore, 'module', 'part' or 'unit' may be used in combination.

[0027] like figure 1 As shown, it is a schematic flowchart of the log desensitization method provided by the embodiment of the present invention. exist figure 1 Among them, the log desensitization method includes:

[0028] Step 110, receiving a log query request message sent by the client.

[0029] Specifically, when the client is connected to the client through the network, and the client initiates a log query request to the server through the network, the log query request is received. The message format of the log query request carries ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a log desensitization method. The method comprises the following steps: receiving a log query request message sent by a client; determining a corresponding log desensitizationstrategy according to information in the log query request; extracting an original log corresponding to the log query request message; judging whether sensitive data exists in the original log or not;and if the sensitive data exists in the original log, performing desensitization conversion on the extracted original log according to the log desensitization strategy. In addition, the invention also discloses a server and a storage medium. According to the method and the device, log data of different results can be provided for visitors with different identity information, and dynamic protection on sensitive data is realized.

Description

technical field [0001] The invention relates to the field of data security, in particular to a log desensitization method, server and storage medium. Background technique [0002] Different application systems and log systems corresponding to devices retain a large amount of sensitive data, such as ID numbers, user names, user IDs, etc. carried in user sessions, for example: Request Structured Query Language (SQL) statements The bank card number, client IP address, server IP and so on. When the logs need to be queried and analyzed, these sensitive data will be exposed to unauthorized users, resulting in information security risks. [0003] The existing technology generally encrypts or replaces sensitive data in the process of writing sensitive information in the log to convert it into unrecognizable data, and then writes it into the log system. However, this method of destroying original log information will affect functions such as fault location analysis or log audit, lo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6245G06F21/62G06F16/24
Inventor 牛家浩张强
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products