Design method and device for protecting system logs
A technology of protection system and design method, applied in the direction of computer security device, file system, digital data protection, etc., can solve the problem of server system security threat, and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0018] A 10M log storage space is reserved in a non-volatile dual in-line memory module (NVDIMM, non-volatile dual in-line memory module) for storing system logs.
[0019] The log storage is divided into 3 parts, and these three parts are numbered, and the respective numbers are stored in the non-volatile storage of the encryption chip. When a system log is generated, the content of the system log is randomly stored in a certain part of any log space, and at the same time, the number of the log storage space where the part is located is written into the non-volatile storage of the encryption chip.
[0020] The system encrypts and stores the log content, and the encryption algorithm can use RSA or other internationally recognized security encryption algorithms. If the encryption algorithm uses an asymmetric key, the decryption key is placed in the non-volatile storage of the encryption chip.
[0021] Set a daemon for this log space, and set a set of security attributes for tha...
Embodiment 2
[0025] A design method for protecting system logs, the specific steps of which include:
[0026] S1. The server is powered on.
[0027] S2. Create a 10M log space in NVDIMM.
[0028] S3. The log space is randomly divided into three parts, and the number of each part is stored in the non-volatile storage of the encryption chip.
[0029] S4. When a system log is generated, randomly store the log content in a certain part of the log space, and write the number of the part of the space into the non-volatile storage of the encryption chip.
[0030] S5. Use the RSA encryption algorithm or other internationally recognized security encryption algorithms to encrypt the log file, and store the decryption key in the non-volatile storage of the encryption chip.
[0031] S6. The daemon process copies the log file to the system hard disk every 30 minutes or when the log size reaches 10M.
[0032] S7. When the user accesses the daemon process, the operating system kernel enforces authoriz...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
