Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and equipment for verifying authenticity of log information, and medium

A log, authenticity technology, applied in the field of verifying the authenticity of log information, can solve problems such as the inability to accurately verify the authenticity of log information

Active Publication Date: 2020-05-22
LIAONING MOBILE COMM +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Therefore, there is currently a technical problem that it is impossible to accurately verify the authenticity of log information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and equipment for verifying authenticity of log information, and medium
  • Method, device and equipment for verifying authenticity of log information, and medium
  • Method, device and equipment for verifying authenticity of log information, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The characteristics and exemplary embodiments of various aspects of the present invention will be described in detail below. In order to make the purpose, technical solutions and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only configured to explain the present invention, not to limit the present invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention.

[0031] It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, device and equipment for verifying authenticity of log information, and a medium. The method comprises the steps: extracting attribute information in log informationaccording to a preset keyword; obtaining legal access behavior information or illegal access behavior information according to the attribute information and access control state information in a rulebase; based on the attribute information and server information in a rule base, obtaining legal server basic information or illegal server basic information; taking the log information including the basic information of the legal server and / or the log information including the legal access behavior information as legal log information; and taking the log information including the basic informationof the illegal server and / or the log information including the illegal access behavior information as illegal log information. According to the embodiment of the invention, the authenticity of the log information can be accurately verified.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method, device, equipment and medium for verifying the authenticity of log information. Background technique [0002] System logs are information that records hardware, software, and system problems in the system, and can also monitor events that occur in the system. Users can use it to check why an error occurred, or to find traces left by an attacker when the system was attacked. [0003] The Syslog protocol is a standard for forwarding system log information in an Internet Protocol (Internet Protocol, IP), and it can be used to record logs of devices. Syslog records any event in the system, and the administrator can grasp the system status at any time by viewing the system records. The system log records the relevant events of the system through the Syslog process, and can also record the operation events of the application program. By analyzing these netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 陈明杰
Owner LIAONING MOBILE COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products