Supercharge Your Innovation With Domain-Expert AI Agents!

Log processing method, device and equipment

A processing method and log technology, applied in the field of information security, which can solve the problems of ISE log decryption and unusable ISE log.

Pending Publication Date: 2022-07-29
SPREADTRUM COMM (SHANGHAI) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In related technologies, in order to prevent external personnel from attacking the ISE chip by analyzing the ISE log, the ISE log is generated as log ciphertext during the process of developing the program in the ISE chip, and the ISE log cannot be directly decrypted in the ISE chip, and then Resulting in unusable ISE logs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log processing method, device and equipment
  • Log processing method, device and equipment
  • Log processing method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0102] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0103] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of this application and the above-mentioned drawings are used to distinguish similar objects and are not necessarily used to Describe a particular order or sequence. It is to be understood that the data so used may be interchanged under appropriate circumstances such that the embodiments of the application described herein can, for example,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a log processing method, device and equipment. The method comprises the following steps: acquiring account information of terminal equipment; a log ciphertext of the terminal equipment is obtained, the terminal equipment comprises an ISE (Integrated Secure Element) chip, and the log ciphertext is a log generated by developing a program in the ISE chip; acquiring a log plaintext corresponding to the log ciphertext according to the account information; and the log plaintext is sent to the chip external server, and the log plaintext is used for determining the fault information of the program in the terminal equipment, so that the ISE log can be used.

Description

technical field [0001] The embodiments of the present application relate to the technical field of information security, and in particular, to a log processing method, apparatus, and device. Background technique [0002] The smart device may be provided with an integrated secure element (Integrated Secure Element, ISE), the ISE may be an ISE chip, and a program (system or application) may be developed in the ISE chip. [0003] During the development of the program in the ISE chip, ISE logs can be generated. In related technologies, in order to prevent external personnel from attacking the ISE chip by analyzing the ISE log, the ISE log is generated in the process of developing the program in the ISE chip as the log ciphertext, and the ISE log cannot be directly decrypted in the ISE chip. Makes ISE logs unusable. SUMMARY OF THE INVENTION [0004] Embodiments of the present application provide a log processing method, apparatus, and device, so that ISE logs can be used. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L41/069
CPCH04L9/0861H04L41/069
Inventor 刘列宁
Owner SPREADTRUM COMM (SHANGHAI) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More