A safe and reliable data collection aggregation query method and system
A technology of data acquisition and query method, which is applied in the field of data processing, can solve problems such as data leakage and low security, and achieve the effects of high performance characteristics, superior processing performance, robustness and performance characteristics
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0060] figure 1 A flow chart showing a safe and reliable data collection aggregation query method of the present invention is shown.
[0061] Such as figure 1 As shown, the first aspect of the present invention proposes a safe and reliable data collection aggregation query method, said method comprising the following steps:
[0062] Step 1, the application client registers with the unified data center to obtain the application key, and the unified data center stores the identification ID of the application client and the application key in association;
[0063] Step 2, the application client and the unified data center perform two-way identity authentication, if the two-way identity authentication is successful, enter the next step, and if the two-way identity authentication fails, then end;
[0064] Step 3, the application client collects the first log data, and uses the application key to encrypt the first log data to obtain the ciphertext of the log data, and then transmi...
Embodiment 2
[0071] As an implementable manner, the process of two-way identity authentication between the application client and the unified data center described in step 2 in the first embodiment includes:
[0072] Step 2-1, issue digital certificates to the application client and the unified data center through the CA organization;
[0073] Step 2-1, the application client adds the digital certificate of the unified data center to the local trust directory, and at the same time, the unified data center adds the digital certificate of the application client to the local trust directory;
[0074] In step 2-3, the application client authenticates the unified data center based on the digital certificate of the unified data center, and at the same time, the unified data center authenticates the application client based on the digital certificate of the application client.
[0075] In specific applications, HTTPS single and two-way authentication can be used for the security of log data trans...
Embodiment approach
[0091] As an implementable manner, an embodiment of the aggregation analysis processing process described in step 5 specifically includes:
[0092] Step 5-1, the unified data center performs integrity verification based on the collected and reported second log data;
[0093] Step 5-2, if the verification is successful, write the second log data classification into the local log file;
[0094] Step 5-3, Filebeat monitors the local log files and synchronizes the newly added second log data to Logstash;
[0095] Step 5-4, Logstash writes the newly added second log data into different indexes in ElasticSearch according to the type, for classified storage;
[0096] Step 5-5, schedule the second log data in ElasticSearch and perform completion, cleaning, and aggregation processing to obtain the aggregated analysis results and store them in ElasticSearch or database for third-party applications to query and obtain through openAPI authentication.
[0097] Such as figure 2 As shown...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



