Supercharge Your Innovation With Domain-Expert AI Agents!

A safe and reliable data collection aggregation query method and system

A technology of data acquisition and query method, which is applied in the field of data processing, can solve problems such as data leakage and low security, and achieve the effects of high performance characteristics, superior processing performance, robustness and performance characteristics

Active Publication Date: 2022-04-08
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problem of low security and easy data leakage when the application side reports the log data and queries the log data in the data center in the existing technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A safe and reliable data collection aggregation query method and system
  • A safe and reliable data collection aggregation query method and system
  • A safe and reliable data collection aggregation query method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] figure 1 A flow chart showing a safe and reliable data collection aggregation query method of the present invention is shown.

[0061] Such as figure 1 As shown, the first aspect of the present invention proposes a safe and reliable data collection aggregation query method, said method comprising the following steps:

[0062] Step 1, the application client registers with the unified data center to obtain the application key, and the unified data center stores the identification ID of the application client and the application key in association;

[0063] Step 2, the application client and the unified data center perform two-way identity authentication, if the two-way identity authentication is successful, enter the next step, and if the two-way identity authentication fails, then end;

[0064] Step 3, the application client collects the first log data, and uses the application key to encrypt the first log data to obtain the ciphertext of the log data, and then transmi...

Embodiment 2

[0071] As an implementable manner, the process of two-way identity authentication between the application client and the unified data center described in step 2 in the first embodiment includes:

[0072] Step 2-1, issue digital certificates to the application client and the unified data center through the CA organization;

[0073] Step 2-1, the application client adds the digital certificate of the unified data center to the local trust directory, and at the same time, the unified data center adds the digital certificate of the application client to the local trust directory;

[0074] In step 2-3, the application client authenticates the unified data center based on the digital certificate of the unified data center, and at the same time, the unified data center authenticates the application client based on the digital certificate of the application client.

[0075] In specific applications, HTTPS single and two-way authentication can be used for the security of log data trans...

Embodiment approach

[0091] As an implementable manner, an embodiment of the aggregation analysis processing process described in step 5 specifically includes:

[0092] Step 5-1, the unified data center performs integrity verification based on the collected and reported second log data;

[0093] Step 5-2, if the verification is successful, write the second log data classification into the local log file;

[0094] Step 5-3, Filebeat monitors the local log files and synchronizes the newly added second log data to Logstash;

[0095] Step 5-4, Logstash writes the newly added second log data into different indexes in ElasticSearch according to the type, for classified storage;

[0096] Step 5-5, schedule the second log data in ElasticSearch and perform completion, cleaning, and aggregation processing to obtain the aggregated analysis results and store them in ElasticSearch or database for third-party applications to query and obtain through openAPI authentication.

[0097] Such as figure 2 As shown...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a safe and reliable data collection aggregation query method and system. The application client registers with the unified data center to obtain the application key, and the application client and the unified data center perform two-way identity authentication; the application client collects the first log data, and use the application key to encrypt the first log data to obtain the ciphertext of the log data, and the unified data center searches the application key associated with it based on the identification ID of the application client to decrypt the ciphertext of the log data to obtain the first log data Second log data; the unified data center separately collects the second log data reported by each application client and performs aggregate analysis processing on all the second log data to obtain the aggregate analysis results; third-party applications query the unified data center through openAPI authentication to obtain aggregate analysis result. The invention solves the problem of low security and easy data leakage when the application end reports the log data and inquires the log data in the data center in the distributed system.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a safe and reliable data collection aggregation query method and system. Background technique [0002] With the continuous development of Internet technology, more and more distributed systems are applied in the field of government and enterprises. However, based on the needs of government and enterprise businesses, higher requirements are also put forward for distributed systems, such as requiring unified processing of various log data stored on various devices in distributed systems. The existing unified processing method is prone to security issues such as illegal identity and data leakage in the process of reporting log data in the early stage and releasing aggregated data in the later stage. Therefore, it is urgent to propose a safe and reliable data collection aggregation query method and system. Contents of the invention [0003] In order to solve the problem of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/242G06F21/44G06F21/62
CPCG06F16/244G06F21/6218G06F21/445
Inventor 张永强王建宇荆豪明陈臣周小欠王志虎
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More