Real-time log output method and device based on rsa key pair under windows platform
A key pair and log technology, applied in the field of data security, can solve the problems of low timeliness, inability to monitor data in real time, and low security of log data transmission, so as to ensure security, reduce storage space, and ensure stable operation.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0049] combine figure 1 As shown, an instant log output method based on an RSA key pair under a Windows platform includes the following steps:
[0050] S01. Operation and maintenance or developers start the Main App main application program;
[0051] S02. The Main App obtains the public key file through the network or locally, loads the public key, and establishes a one-way data transmission pipeline;
[0052] S03.Main App transmits log data;
[0053] S04. The operation and maintenance or developer starts the Logger App recorder application program;
[0054] S05. The Logger App obtains the private key file through the network or locally, loads the private key, and opens a one-way receiving data channel;
[0055] S06. The Logger App receives log data.
[0056] The specific steps for Main App to transmit log data in the S03 step are:
[0057] S0311. Main App encrypts the log data to be output;
[0058] S0312. The Main App transmits the log data to the one-way sending data ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


