Nothing Special   »   [go: up one dir, main page]

CN114826579A - Log processing method, device and equipment - Google Patents

Log processing method, device and equipment Download PDF

Info

Publication number
CN114826579A
CN114826579A CN202210439553.1A CN202210439553A CN114826579A CN 114826579 A CN114826579 A CN 114826579A CN 202210439553 A CN202210439553 A CN 202210439553A CN 114826579 A CN114826579 A CN 114826579A
Authority
CN
China
Prior art keywords
log
chip
ciphertext
plaintext
ise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210439553.1A
Other languages
Chinese (zh)
Inventor
刘列宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spreadtrum Communications Shanghai Co Ltd
Original Assignee
Spreadtrum Communications Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spreadtrum Communications Shanghai Co Ltd filed Critical Spreadtrum Communications Shanghai Co Ltd
Priority to CN202210439553.1A priority Critical patent/CN114826579A/en
Publication of CN114826579A publication Critical patent/CN114826579A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the application provides a log processing method, a log processing device and log processing equipment. The method comprises the following steps: acquiring account information of the terminal equipment; acquiring a log ciphertext of a terminal device, wherein the terminal device comprises an integrated secure element ISE chip, and the log ciphertext is a log generated by a program developed in the ISE chip; acquiring a log plaintext corresponding to the log ciphertext according to the account information; and sending a log plaintext to the chip external server, wherein the log plaintext is used for determining fault information of a program in the terminal equipment, so that the ISE log can be used.

Description

Log processing method, device and equipment
Technical Field
The embodiment of the application relates to the technical field of information security, in particular to a log processing method, device and equipment.
Background
An Integrated Secure Element (ISE) may be provided in the smart device, and the ISE may be an ISE chip, and a program (system or application program) may be developed in the ISE chip.
In the process of developing a program in the ISE chip, an ISE log may be generated. In the related art, in order to prevent external personnel from attacking the ISE chip by analyzing the ISE log, the ISE log generated in the process of developing a program in the ISE chip is a log ciphertext, and the ISE log cannot be directly decrypted in the ISE chip, so that the ISE log cannot be used.
Disclosure of Invention
The embodiment of the application provides a log processing method, a log processing device and log processing equipment, which are used for enabling an ISE log to be used.
In a first aspect, an embodiment of the present application provides a log processing method, including:
acquiring account information of the terminal equipment;
acquiring a log ciphertext of the terminal equipment, wherein the terminal equipment comprises an integrated secure element ISE chip, and the log ciphertext is a log generated by a program developed in the ISE chip;
acquiring a log plaintext corresponding to the log ciphertext according to the account information;
and sending the log plaintext to a chip external server, wherein the log plaintext is used for determining the fault information of the program in the terminal equipment.
In a possible implementation manner, obtaining a log plaintext corresponding to the log ciphertext according to the account information includes:
determining a key name corresponding to the account information according to the account information;
and acquiring the plain text of the log according to the key name.
In a possible implementation, obtaining the log plaintext according to the key name includes:
sending the key name and the log ciphertext to an encryptor;
and receiving the log plaintext sent by the encryption machine, wherein the encryption machine comprises a key corresponding to the key name, and the log plaintext is obtained by decrypting the log ciphertext by the encryption machine according to the key.
In a possible embodiment, the method is applied to an on-chip server, the on-chip server and the encryptor being located in the same local area network;
sending the key name and the log ciphertext to an encryptor, including:
sending a decryption request to the encryption machine through the local area network, wherein the decryption request comprises the key name and the log ciphertext;
receiving the log plaintext sent by the encryption machine, including:
and receiving a decryption response corresponding to the decryption request sent by the encryption machine through the local area network, wherein the decryption response comprises the log plaintext.
In a possible implementation manner, before obtaining the account information of the terminal device, the method further includes:
receiving a registration request sent by the terminal equipment, wherein the registration request comprises the account information and equipment information of the terminal equipment;
and sending a registration response corresponding to the registration request to the terminal equipment, wherein the registration response is used for indicating the success or failure of registration.
In a possible implementation manner, obtaining a log ciphertext of a terminal device includes:
and receiving the log ciphertext from a chip external server corresponding to the terminal equipment, wherein the log ciphertext is sent to the chip external server by the terminal equipment.
In a second aspect, an embodiment of the present application provides a log processing method, which is applied to a terminal device, where the terminal device is provided with an ISE chip, a master chip, and a log interface, and the method includes:
generating a log ciphertext through the log interface in the process of generating a program in the ISE chip;
sending account information and the log ciphertext to a server outside a chip through the main chip;
and receiving a log plaintext corresponding to the log ciphertext sent by the external server of the chip through the main chip, wherein the log plaintext is used for determining the fault information of the program.
In a possible implementation manner, in the process of generating a program in the ISE chip, generating a log ciphertext through the log interface includes:
generating the log plaintext in the process of generating the program in the ISE chip;
and encrypting the log plaintext through the log interface to obtain the log ciphertext.
In a possible implementation manner, a secret key is arranged in the ISE chip; encrypting the log plaintext through the log interface to obtain the log ciphertext, wherein the encrypting process comprises the following steps:
acquiring the secret key in the ISE chip;
and according to the secret key, encrypting the log plaintext through the log interface to obtain the log ciphertext.
In one possible embodiment, the method further comprises:
sending a registration request to the chip internal server, wherein the registration request comprises the account information and the equipment information of the terminal equipment;
and receiving a registration response corresponding to the registration request sent by the chip internal server, wherein the registration response is used for indicating the success or failure of registration.
In one possible embodiment, the method further comprises:
and receiving a development environment data packet sent by a chip server, wherein the development environment data packet is used for the terminal equipment to develop the program.
In a third aspect, an embodiment of the present application provides a log processing apparatus, including: a first obtaining module, a second obtaining module, a third obtaining module, and a first sending module,
the first acquisition module is used for acquiring account information of the terminal equipment;
the second obtaining module is configured to obtain a log ciphertext of the terminal device, where the terminal device includes an integrated secure element ISE chip, and the log ciphertext is a log generated by a program developed in the ISE chip;
the third obtaining module is used for obtaining a log plaintext corresponding to the log ciphertext according to the account information;
the first sending module is used for sending the log plaintext to a chip external server, and the log plaintext is used for determining the fault information of the program in the terminal equipment.
In a possible implementation manner, the third obtaining module is specifically configured to:
determining a key name corresponding to the account information according to the account information;
and acquiring the plain text of the log according to the key name.
In a possible implementation manner, the third obtaining module is specifically configured to:
sending the key name and the log ciphertext to an encryptor;
and receiving the log plaintext sent by the encryption machine, wherein the encryption machine comprises a key corresponding to the key name, and the log plaintext is obtained by decrypting the log ciphertext by the encryption machine according to the key.
In a possible embodiment, the method is applied to an on-chip server, the on-chip server and the encryptor being located in the same local area network;
sending the key name and the log ciphertext to an encryptor, including:
sending a decryption request to the encryption machine through the local area network, wherein the decryption request comprises the key name and the log ciphertext;
receiving the log plaintext sent by the encryption machine, including:
and receiving a decryption response corresponding to the decryption request sent by the encryption machine through the local area network, wherein the decryption response comprises the log plaintext.
In a possible implementation manner, the log processing apparatus further includes a receiving module and a second sending module:
the receiving module is used for receiving a registration request sent by the terminal equipment, wherein the registration request comprises the account information and the equipment information of the terminal equipment;
the second sending module is configured to send a registration response corresponding to the registration request to the terminal device, where the registration response is used to indicate success or failure of registration.
In a possible implementation manner, obtaining a log ciphertext of a terminal device includes:
and receiving the log ciphertext from a chip external server corresponding to the terminal equipment, wherein the log ciphertext is sent to the chip external server by the terminal equipment.
In a fourth aspect, an embodiment of the present application provides a log processing apparatus, including: a generating module, a first sending module and a first receiving module, wherein,
the generating module is used for generating a log ciphertext through the log interface in the process of generating a program in the ISE chip;
the first sending module is used for sending account information and the log ciphertext to a chip external server through the main chip;
the first receiving module is used for receiving a log plaintext corresponding to the log ciphertext sent by the chip external server through the main chip, and the log plaintext is used for determining the fault information of the program.
In a possible implementation, the generating module is specifically configured to:
generating the log plaintext in the process of generating the program in the ISE chip;
and encrypting the log plaintext through the log interface to obtain the log ciphertext.
In a possible implementation manner, a key is provided in the ISE chip, and the generation module is specifically configured to:
acquiring the secret key in the ISE chip;
and according to the secret key, encrypting the log plaintext through the log interface to obtain the log ciphertext.
In a possible implementation manner, the log processing apparatus further includes a second sending module, a second receiving module:
the second sending module is configured to send a registration request to the chip internal server, where the registration request includes the account information and the device information of the terminal device;
the second receiving module is configured to receive a registration response corresponding to the registration request sent by the server inside the chip, where the registration response is used to indicate success or failure of registration.
In a possible implementation, the log processing apparatus further includes a third receiving module:
the third receiving module is configured to receive a development environment data packet sent by a chip server, where the development environment data packet is used for the terminal device to develop the program.
In a fifth aspect, an embodiment of the present application provides a chip internal server, including: a memory and a processor;
the memory stores computer-executable instructions;
the processor executes the computer-executable instructions stored in the memory, so that the processor executes the log processing method of any one of the first aspect.
In a sixth aspect, an embodiment of the present application provides a terminal device, including: a memory and a processor;
the memory stores computer execution instructions;
the processor executes the computer-executable instructions stored in the memory, so that the processor executes the log processing method of any one of the second aspect.
In a seventh aspect, an embodiment of the present application provides a computer-readable storage medium, where computer-executable instructions are stored in the computer-readable storage medium, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium is configured to implement the log processing method according to any one of the first aspect.
In an eighth aspect, an embodiment of the present application provides a computer-readable storage medium, in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium is configured to implement the log processing method according to any one of the second aspects.
In a ninth aspect, the present application provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the method for processing logs shown in any one of the first aspect is implemented.
In a tenth aspect, an embodiment of the present application provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the method for processing a log according to any one of the second aspect is implemented.
In the embodiment of the application, the server in the chip can obtain the account information and the log ciphertext of the terminal device, and determine the key name according to the account information. The server in the chip can send a decryption request to the encryption machine through the local area network and receive a decryption response corresponding to the decryption request sent by the encryption machine, wherein the decryption response comprises a log plaintext. The chip internal server can send the log plaintext to the chip external server so that the terminal device can obtain the log plaintext. The server in the chip can call the encryption machine so that the encryption machine can decrypt the log ciphertext to obtain the log plaintext, and can send the log plaintext to the server outside the chip so that the terminal equipment can obtain the log plaintext, thereby avoiding directly decrypting the ISE log in the ISE chip and enabling the ISE log to be used.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a schematic diagram of an application scenario provided in an embodiment of the present application;
fig. 2 is a schematic flowchart of a log processing method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another log processing method according to an embodiment of the present application;
fig. 4 is a schematic diagram of an account-key correspondence table provided in an embodiment of the present application;
fig. 5 is a schematic diagram of an encryption apparatus provided in an embodiment of the present application;
fig. 6 is a schematic flowchart of another log processing method according to an embodiment of the present application;
fig. 7 is a schematic process diagram of a log processing method according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a log processing apparatus according to an exemplary embodiment of the present application;
fig. 9 is a schematic structural diagram of another log processing apparatus according to an exemplary embodiment of the present application;
fig. 10 is a schematic structural diagram of another log processing apparatus according to an exemplary embodiment of the present application;
fig. 11 is a schematic structural diagram of still another log processing apparatus according to an exemplary embodiment of the present application;
fig. 12 is a schematic structural diagram of a chip internal server according to an exemplary embodiment of the present disclosure;
fig. 13 is a schematic structural diagram of a terminal device according to an exemplary embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present application and in the above-described drawings (if any) are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present application, please refer to fig. 1, which includes a terminal device, a chip external server, and a chip internal server. The terminal equipment may include an ISE chip. The terminal equipment can be communicated with the external server of the chip, and the external server of the chip can be communicated with the internal server of the chip. The off-chip server and the on-chip server may be servers of an ISE chip vendor.
An ISE application developer, or an ISE system developer, may perform program development on an ISE chip in the terminal device. When the program is developed, the generated ISE log is a log ciphertext. When the log ciphertext needs to be read, the terminal device can send the account information and the log ciphertext to the external server of the chip. After receiving the account information and the log ciphertext, the external server of the chip may forward the account information and the log ciphertext to the internal server of the chip. The chip internal server can obtain the log plaintext corresponding to the log ciphertext according to the account information and send the log plaintext to the chip external server. The chip external server may send the log plaintext to the terminal device so that the terminal device obtains the log plaintext, or the chip external server may save the log plaintext for a worker to view. And the staff can analyze the fault information of the program in the terminal equipment according to the log plaintext.
In the related art, in order to prevent external personnel from attacking the ISE chip by analyzing the ISE log, the ISE log generated in the process of developing a program in the ISE chip is a log ciphertext, and the ISE log cannot be directly decrypted in the ISE chip, so that the ISE log cannot be used.
In the embodiment of the application, the server in the chip can acquire the account information and the log ciphertext sent by the terminal device, and acquire the log plaintext corresponding to the log ciphertext according to the account information. The chip internal server can send the log plaintext to the chip external server so that the terminal device can obtain the log plaintext. Because the log plaintext corresponding to the log ciphertext can be obtained through the server in the chip, the ISE log is prevented from being directly decrypted in the ISE chip, and therefore the ISE log can be used.
The technical means shown in the present application will be described in detail below with reference to specific examples. It should be noted that the following embodiments may exist alone or in combination with each other, and description of the same or similar contents is not repeated in different embodiments.
Fig. 2 is a schematic flowchart of a log processing method according to an embodiment of the present application. Referring to fig. 2, the method may include:
s201, account information of the terminal device is obtained.
The execution main body of the embodiment of the application may be an internal server of a chip, or may be a log processing device disposed in the internal server of the chip. The log processing means may be implemented by software, or may be implemented by a combination of software and hardware. The log processing means may be a processor in an on-chip server. For ease of understanding, the execution subject is described as an example of an on-chip server in the following.
The terminal device may be an electronic device mounted with an ISE chip. For example, the terminal device may be a computer.
Programs can be developed in the terminal device based on the ISE chip. For example, an ISE application developer may develop an application in a terminal device based on an ISE chip; an ISE system developer can develop a development system based on an ISE chip in a terminal device.
The terminal device may have a corresponding chip external server, and the terminal device may send the account information to the corresponding chip external server. After receiving the account information, the chip external server may forward the account information to the chip internal server, so that the chip internal server obtains the account information of the terminal device.
It should be noted that, for one ISE application developer, the account information set in the terminal device may be the same, and all account information is the account information registered by the ISE application developer in the chip external server of the ISE chip manufacturer.
S202, obtaining a log ciphertext of the terminal device.
The log ciphertext is an ISE log generated by a program developed in the terminal device, and records all behaviors of the terminal device.
The terminal device may send the log ciphertext to a server external to the chip. After receiving the log ciphertext, the external server may forward the log ciphertext to the internal server, so that the internal server may obtain the log ciphertext of the terminal device.
And S203, acquiring a log plaintext corresponding to the log ciphertext according to the account information.
In an optional embodiment, the server inside the chip may determine, according to the account information, a key name corresponding to the account information; and acquiring a log plaintext according to the key name.
For example, if the chip internal server obtains the account-a and the log ciphertext-1 sent by the terminal device, the chip internal server may determine, according to the account-a, that the corresponding key name is the key name-1, and obtain, according to the key name-1, the log plaintext corresponding to the log ciphertext-1.
The log plaintext may be obtained from the key name by: sending the key name and the log ciphertext to an encryptor; and receiving the log plaintext sent by the encryption machine. The log plaintext is obtained by decrypting the log ciphertext by the encryption machine.
For example, if the chip internal server determines that the corresponding key name is the key name-1 according to the account-a, the chip internal server may send the key name-1 and the log ciphertext-1 to the encryptor, so that the encryptor may decrypt the log ciphertext-1 according to the key name-1 to obtain the log plaintext-1. The chip internal server can receive the log plaintext-1 sent by the encryption machine.
And S204, sending a log plaintext to a server outside the chip.
The chip internal server can send the log plaintext to the chip external server, so that the log plaintext can be stored in the chip external server. The staff can view the log plaintext on a server external to the chip.
Optionally, the chip external server may send the log plaintext to the terminal device, so that the terminal device obtains the log plaintext. The log plaintext may be used to determine fault information for a program in the terminal device.
In the embodiment of the application, the server inside the chip can acquire the account information and the log ciphertext of the terminal device through the server outside the chip, and determine the key name according to the account information. The server in the chip can send the key name and the log ciphertext to the encryption machine, so that the encryption machine can decrypt the log ciphertext according to the key name to obtain the corresponding log plaintext. The server in the chip can receive the log plaintext sent by the encryption machine and send the log plaintext to the server outside the chip, so that the terminal equipment can obtain the log plaintext. The server in the chip acquires the log plaintext corresponding to the log ciphertext and sends the log plaintext to the server outside the chip, so that the terminal equipment can acquire the log plaintext, and the ISE log is prevented from being directly decrypted in the ISE chip, so that the ISE log can be used.
Next, based on the embodiment shown in fig. 2, the log processing method will be further described in detail with reference to fig. 3. Fig. 3 is a schematic flowchart of another log processing method according to an embodiment of the present application. Referring to fig. 3, the method may include:
s301, receiving a registration request sent by the terminal equipment.
The registration request is used for the terminal equipment to register an account in the server in the chip. The registration request may include account information and device information of the terminal device. The device information of the terminal device may include an address of the terminal device, a company to which the terminal device belongs, and the like. For example, the registration request may include account number-A and "A technologies, Inc.
The terminal device may send a registration request to the off-chip server. After receiving the registration request, the off-chip server may forward the registration request to the on-chip server, so that the on-chip server may obtain the registration request of the terminal device.
And S302, sending a registration response corresponding to the registration request to the terminal equipment.
The registration response may be used to indicate registration success or failure. For example, the registration response may be "Account-A registration successful".
After receiving the registration request, the on-chip server may generate a registration response according to the registration request, and send the registration response to the off-chip server. After receiving the registration response, the external server may send the registration response to the terminal device, so that the terminal device obtains the registration response and knows whether the registration is successful.
For example, if the on-chip server generates a registration response according to the registration request, that is, the account-a registration is successful, the on-chip server may send the registration response to the on-chip server, and the on-chip server may send the registration response to the terminal device. After the terminal device obtains the registration response, the terminal device can know that the registration is successful according to the registration response.
And S303, acquiring account information of the terminal equipment.
It should be noted that the execution process of S303 may refer to S201, and is not described herein again.
S304, obtaining the log ciphertext of the terminal equipment.
It should be noted that the execution process of S304 may refer to S202, and is not described herein again.
S305, determining a key name corresponding to the account information according to the account information.
Optionally, the server inside the chip may determine, according to the account information, a key name corresponding to the account information in the account-key correspondence table. The account-key correspondence table may be stored in the chip internal server by a worker in advance.
Next, the account-key correspondence table will be described with reference to fig. 4.
Fig. 4 is a schematic diagram of an account-key correspondence table provided in the embodiment of the present application. As shown in fig. 4, the account-key correspondence table may include a plurality of accounts and a plurality of key names. The account number and the key name correspond to each other one by one.
For example, account-key correspondence tables may include account-A, account-B, account-C, … …, account-N, and key name-1, key name-2, key name-3, … …, key name-N. The key name corresponding to the account-a is the key name-1, the key name corresponding to the account-B is the key name-2, the key name corresponding to the account-C is the key names-3 and … …, and the key name corresponding to the account-N is the key name-N.
For example, the on-chip server may determine, according to the account-a, a key name corresponding to the account-a in the account-key correspondence table as the key name-1.
S306, sending a decryption request to the encryption device.
In order to protect information security, the on-chip server and the encryptor may be located in the same local area network. For example, the local area network may be an intranet of a chip vendor.
The server in the chip can send a decryption request to the encryptor in the local area network in two ways:
mode 1: may be by way of a wired network. For example, a data line may be used to connect the hardware interface of the on-chip server and the encryptor so that the on-chip server may send a decryption request to the encryptor in a local area network.
Mode 2: may be by way of a wireless network. The Wireless network may be Bluetooth (BT), Wireless communication technology (Wi-Fi), etc. The on-chip server may send a decryption request to the encryptor in the local area network in a wireless manner.
The decryption request may include a key name and a log ciphertext. For example, the decryption request may include a key name-1 and a log ciphertext-1.
The server in the chip can send a decryption request to the encryptor, so that the encryptor can decrypt the log ciphertext according to the decryption request.
Next, the encryption device will be described with reference to fig. 5.
Fig. 5 is a schematic diagram of an encryption apparatus according to an embodiment of the present application. Referring to fig. 5, a plurality of keys may be stored in the encryption engine, each key having a corresponding key name. For example, key name-1, key name-2, key name-3, … …, key name-n, and key-1, key-2, key-3, … …, key-n may be included in the encryptor. Wherein key name-1 is used to determine key-1, key name-2 is used to determine key-2, key name-3 is used to determine key-3, … …, and key name-n is used to determine key-n. The key is a parameter, and is a parameter required to be input in an algorithm for converting a log ciphertext into a log plaintext or converting the log plaintext into the log ciphertext. For example, the key may be "23059802826269955". The encryption machine can determine a key according to the key name, and then decrypt the log ciphertext through an algorithm according to the key.
For example, the server inside the chip may send a decryption request to the encryptor, where the decryption request includes the key name-1 and the log ciphertext-1, and the encryptor may determine the key-1 according to the key name-1 and decrypt the log ciphertext-1 through an algorithm according to the key-1.
And S307, receiving a decryption response corresponding to the decryption request sent by the encryptor.
The server inside the chip can receive a decryption response corresponding to the decryption request sent by the encryption in a wired or wireless mode in the local area network. The decryption response may include a log plaintext, which is obtained by the encryption machine decrypting the log ciphertext according to the key.
For example, if the encryption machine obtains that the decryption request includes the key name-1 and the log ciphertext-1, the encryption machine may determine the key-1 according to the key name-1, and further decrypt the log ciphertext-1 through an algorithm according to the key-1 to obtain the log plaintext-1. The encryptor may send a decryption response to the on-chip server in the local area network so that the on-chip server may receive the decryption response, which may include "decryption complete" and log plaintext-1.
And S308, sending the log plaintext to a server outside the chip.
It should be noted that the execution process of S308 may refer to S204, and is not described herein again.
In the embodiment of the application, the chip internal server may obtain the registration request of the terminal device through the chip external server, and send the registration response to the terminal device. After the registration is successful, if the log ciphertext needs to be decrypted, the server inside the chip can acquire the account information and the log ciphertext of the terminal device through the server outside the chip, and determine the key name according to the account information. The chip internal server can send a decryption request to the encryption machine and receive a decryption response corresponding to the decryption request sent by the encryption machine, wherein the decryption response comprises a log plaintext. The chip internal server can send the log plaintext to the chip external server so that the terminal device can obtain the log plaintext. The server in the chip can call the encryption machine so that the encryption machine can decrypt the log ciphertext to obtain the log plaintext, and can send the log plaintext to the server outside the chip so that the terminal equipment can obtain the log plaintext, thereby avoiding directly decrypting the ISE log in the ISE chip and enabling the ISE log to be used.
The log processing method described in any of the above embodiments may be applied to an on-chip server. Next, a log processing method, which can be applied to a terminal device, will be described in further detail with reference to fig. 6.
Fig. 6 is a schematic flowchart of another log processing method according to an embodiment of the present application. Referring to fig. 6, the method may include:
s601, receiving a development environment data packet sent by a chip server.
The development environment data package may be used to assist in developing the program. For example, if an ISE system developer performs system Development based on an ISE chip in the terminal device, a Software Development Kit (SDK) may be included in the Development environment data package; if the ISE application developer develops the application based on the ISE chip in the terminal device, the development environment data package may include an SDK package, documents related to the ISE system, and the like, and the ISE application developer may develop the application based on the ISE system using the development environment data package.
The chip server may be a server of a chip vendor.
The terminal equipment can receive the development environment data packet sent by the chip server, so that a worker can develop a program on the terminal equipment based on the development environment data packet.
S602, a registration request is sent to a server in the chip.
The registration request can be used for the terminal device to register an account in the chip internal server. The registration request may include account information and device information of the terminal device. The device information of the terminal device may include an address of the device, a company to which the device belongs, and the like. For example, the registration request may include account number-A and "A technologies, Inc.
The terminal device may send a registration request to the off-chip server, and after receiving the registration request, the off-chip server may forward the registration request to the on-chip server.
And S603, receiving a registration response corresponding to the registration request sent by the internal server of the chip.
The registration response may be used to indicate registration success or failure. For example, the registration response may be "Account-A registration successful".
After receiving the registration request, the chip internal server may generate a registration response according to the registration request, and send the registration response to the chip external server. After receiving the registration response, the chip external server may send the registration response to the terminal device, so that the terminal device obtains the registration response corresponding to the registration request to know whether the registration is successful.
And S604, generating a log ciphertext through a log interface.
The terminal equipment can be provided with an ISE chip and a main chip, and the ISE chip is provided with a secret key and a log interface. The ISE chip is a secure element, and the log interface can be used for recording logs generated based on the ISE chip.
In the process of developing a program in the ISE chip, the terminal device may generate a log plaintext based on the ISE chip. The terminal equipment can acquire the secret key in the ISE chip, and automatically encrypt the log plaintext through the log interface according to the secret key to obtain the log ciphertext.
For example, if the key is "23059802826269955", the program processor may input the key in the algorithm, and encrypt the log plaintext-1 through the log interface to obtain the corresponding log ciphertext-1.
And S605, sending the account information and the log ciphertext to an external server of the chip through the main chip.
And after the terminal equipment generates the log ciphertext in the ISE chip, the log ciphertext can be sent to the main chip through the log interface. The terminal device can send the log ciphertext and the account information of the terminal device to the external server through the main chip, so that the external server can obtain the log ciphertext and the account information. The external server can forward the log ciphertext and the account information to the internal server.
And S606, receiving a log plaintext corresponding to the log ciphertext sent by the external server of the chip through the main chip.
The execution process of generating the log plaintext corresponding to the log ciphertext may refer to S203 in fig. 2 or S305 to S307 in fig. 3, which is not described herein again.
The chip external server can acquire the log plaintext sent by the chip internal server and can send the log plaintext to the terminal device. The terminal device can receive a log plaintext sent by a server outside the chip through the main chip, and the log plaintext can be used for determining fault information of a program in the terminal device.
Optionally, after the log ciphertext is generated on the terminal device, a worker of the ISE system developer may export the log ciphertext to a server of the ISE system developer, and the server of the ISE system developer sends the account information and the log ciphertext to the external server of the chip, and receives the log plaintext sent by the external server of the chip.
In the embodiment of the application, the terminal device may obtain the development environment data packet sent by the chip server, and perform program development based on the development environment data packet. The terminal equipment can send a registration request to the server inside the chip through the server outside the chip and receive a registration response corresponding to the registration request sent by the server inside the chip. The terminal equipment can generate a log ciphertext through a log interface in the ISE chip and send the log ciphertext to the main chip. The terminal equipment can send the log ciphertext and the account information to the chip external server through the main chip, and receive the log plaintext sent by the chip external server. The terminal equipment can send the log ciphertext to the server inside the chip through the server outside the chip and acquire the log plaintext corresponding to the log ciphertext, so that the ISE log is prevented from being directly decrypted in the ISE chip, and the ISE log can be used.
On the basis of any of the above embodiments, the following describes the above log processing method in further detail by using a specific example in conjunction with fig. 7.
Fig. 7 is a process schematic diagram of a log processing method according to an embodiment of the present application. Please refer to fig. 7, which includes a chip external server, a chip internal server, an encryptor, a terminal device and a chip server.
The chip external server, the chip internal server, the encryption machine and the chip server can be owned by a chip manufacturer, and the chip internal server, the encryption machine and the chip server can be located in a local area network of the chip manufacturer.
The ISE chip and the main chip can be arranged in the terminal equipment, and a log interface and a secret key can be arranged in the ISE chip. The key in the ISE chip may be preset in the ISE chip by the encryption machine before the ISE chip leaves the factory. The key in the ISE chip may be processed differently according to different ISE system developers or ISE application developers, so that different keys may be used by terminal devices of different ISE system developers or ISE application developers. For example, the keys in the ISE chips in the end devices of ISE system developer-1 may all be key-1.
The chip server can send a development environment data packet to the terminal device, and the development environment data packet can include an SDK packet, and/or ISE system-related documents, and the like. The development environment data package can be used for assisting workers in program development on the terminal equipment.
In the process of developing a program on the terminal device, the terminal device may generate a log plaintext based on the ISE chip. The terminal equipment can obtain the key in the ISE chip, and automatically encrypt the log plaintext through the log interface according to the key to obtain the log ciphertext. Further, the terminal device may send the log ciphertext to the main chip through the log interface.
If the log ciphertext needs to be decrypted, the terminal device can send the account information and the log ciphertext to a server outside the chip through the main chip. After receiving the account information and the log ciphertext, the external server of the chip may forward the account information and the log ciphertext to the internal server of the chip. As shown in fig. 7, the terminal device may send the account-B and the log ciphertext to the off-chip server, and the off-chip server may forward the account-B and the log ciphertext to the on-chip server.
An account-key corresponding table is stored in the chip internal server. After receiving the account information and the log ciphertext, the server in the chip can determine a key name corresponding to the account information in the account-key correspondence table according to the account information, and send the key name and the log ciphertext to the encryption machine through the local area network. As shown in fig. 7, after receiving the account-B and the log ciphertext, the server in the chip may determine the key name-2 in the account-key correspondence table according to the account-B, and send the key name-2 and the log ciphertext to the encryptor.
After receiving the key name and the log ciphertext, the encryption machine can determine the key according to the key name, further decrypt the log ciphertext through an algorithm according to the key to obtain a log plaintext corresponding to the log ciphertext, and send the log plaintext to the server in the chip through the local area network. As shown in fig. 7, the encryption engine may determine the key-2 according to the key name-2, decrypt the log ciphertext according to the key-2, obtain the log plaintext, and send the log plaintext to the chip internal server.
After the chip internal server can obtain the log plaintext, the chip internal server can send the log plaintext to the chip external server. The chip external server can store the log plaintext and send the log plaintext to the terminal device.
Alternatively, the operator may view the plaintext on a server external to the chip.
It should be noted that both the chip external server and the chip internal server may be provided with an account system and a log function. Different ISE system developers and ISE application developers can apply for registering different accounts on account systems of the external server and the internal server of the chip. The account systems of the off-chip server and the on-chip server may be the same.
The chip external server can record the conditions of sending account information and log ciphertext, receiving and sending log plaintext by different terminal equipment through a log function; and the server in the chip records the conditions that different terminal devices send account information and log ciphertext, call an encryption machine to decrypt and receive log plaintext through a log function.
Optionally, the chip manufacturer, the ISE system developer, and the ISE application developer may be the same subject; alternatively, the ISE application developer may be an end developer, for example, the ISE application developer may be a computer developer.
In the embodiment of the application, the terminal device may obtain the development environment data packet sent by the chip server, and perform program development based on the development environment data packet. The terminal equipment can generate a log ciphertext through a log interface in the ISE chip and send the log ciphertext to the main chip. The terminal device can send account information and a log ciphertext to the chip internal server through the chip external server, the chip internal server can determine a key name corresponding to the account information according to the account information, and then sends the key name and the log ciphertext to the encryption machine, so that the encryption machine can determine a key according to the key name and decrypt the log ciphertext according to the key to obtain a log plaintext corresponding to the log ciphertext. The chip internal server can send the log plaintext to the chip external server, and then the chip external server can send the log plaintext to the terminal device, so that the terminal device can obtain the log plaintext. The terminal equipment can send the log ciphertext to the server in the chip, and the server in the chip can call the encryption machine to decrypt the log ciphertext to obtain the log plaintext corresponding to the log ciphertext, so that the ISE log is prevented from being directly decrypted in the ISE chip, and the ISE log can be used.
Fig. 8 is a schematic structural diagram of a log processing apparatus according to an exemplary embodiment of the present application. The log processing device can be a chip or a chip module. Referring to fig. 8, the log processing apparatus 10 includes a first obtaining module 11, a second obtaining module 12, a third obtaining module 13, and a first sending module 14, wherein,
the first obtaining module 11 is configured to obtain account information of the terminal device;
the second obtaining module 12 is configured to obtain a log ciphertext of the terminal device, where the terminal device includes an integrated secure element ISE chip, and the log ciphertext is a log generated by a program developed in the ISE chip;
the third obtaining module 13 is configured to obtain a log plaintext corresponding to the log ciphertext according to the account information;
the first sending module 14 is configured to send the log plaintext to a chip external server, where the log plaintext is used to determine fault information of the program in the terminal device.
The log processing apparatus provided in the embodiment of the present application may execute the technical solutions shown in the foregoing method embodiments, and the implementation principles and beneficial effects thereof are similar, which are not described herein again.
In a possible implementation manner, the third obtaining module 13 is specifically configured to:
determining a key name corresponding to the account information according to the account information;
and acquiring the plain text of the log according to the key name.
In a possible implementation manner, the third obtaining module 13 is specifically configured to:
sending the key name and the log ciphertext to an encryptor;
and receiving the log plaintext sent by the encryption machine, wherein the encryption machine comprises a key corresponding to the key name, and the log plaintext is obtained by decrypting the log ciphertext by the encryption machine according to the key.
In a possible embodiment, the method is applied to an on-chip server, the on-chip server and the encryptor being located in the same local area network;
sending the key name and the log ciphertext to an encryptor, including:
sending a decryption request to the encryption machine through the local area network, wherein the decryption request comprises the key name and the log ciphertext;
receiving the log plaintext sent by the encryption machine, including:
and receiving a decryption response corresponding to the decryption request sent by the encryption machine through the local area network, wherein the decryption response comprises the log plaintext.
In a possible implementation manner, obtaining a log ciphertext of a terminal device includes:
and receiving the log ciphertext from a chip external server corresponding to the terminal equipment, wherein the log ciphertext is sent to the chip external server by the terminal equipment.
The log processing apparatus provided in the embodiment of the present application may execute the technical solutions shown in the foregoing method embodiments, and the implementation principles and beneficial effects thereof are similar, and details are not repeated here.
Fig. 9 is a schematic structural diagram of another log processing apparatus according to an exemplary embodiment of the present application. The log processing device can be a chip or a chip module. On the basis of the embodiment shown in fig. 8, please refer to fig. 9, the log processing apparatus 10 further includes a receiving module 15 and a second sending module 16, wherein,
the receiving module 15 is configured to receive a registration request sent by the terminal device, where the registration request includes the account information and device information of the terminal device;
the second sending module 16 is configured to send a registration response corresponding to the registration request to the terminal device, where the registration response is used to indicate success or failure of registration.
The log processing apparatus provided in the embodiment of the present application may execute the technical solutions shown in the foregoing method embodiments, and the implementation principles and beneficial effects thereof are similar, and details are not repeated here.
Fig. 10 is a schematic structural diagram of another log processing apparatus according to an exemplary embodiment of the present application. The log processing device can be a chip or a chip module. Referring to fig. 10, the log processing apparatus 20 includes: a generating module 21, a first transmitting module 22, a first receiving module 23, wherein,
the generating module 21 is configured to generate a log ciphertext through the log interface in a process of generating a program in the ISE chip;
the first sending module 22 is configured to send the account information and the log ciphertext to an external server of the chip through the main chip;
the first receiving module 23 is configured to receive, by the master chip, a log plaintext corresponding to the log ciphertext sent by the chip external server, where the log plaintext is used to determine the fault information of the program.
The log processing apparatus provided in the embodiment of the present application may execute the technical solutions shown in the foregoing method embodiments, and the implementation principles and beneficial effects thereof are similar, and details are not repeated here.
In a possible implementation, the generating module 21 is specifically configured to:
generating the log plaintext in the process of generating the program in the ISE chip;
and encrypting the log plaintext through the log interface to obtain the log ciphertext.
In a possible implementation manner, a key is provided in the ISE chip, and the generating module 21 is specifically configured to:
acquiring the secret key in the ISE chip;
and according to the secret key, encrypting the log plaintext through the log interface to obtain the log ciphertext.
The log processing apparatus provided in the embodiment of the present application may execute the technical solutions shown in the foregoing method embodiments, and the implementation principles and beneficial effects thereof are similar, and details are not repeated here.
Fig. 11 is a schematic structural diagram of another log processing apparatus according to an exemplary embodiment of the present application. The log processing device can be a chip or a chip module. On the basis of the embodiment shown in fig. 10, please refer to fig. 11, the log processing apparatus further includes a second sending module 24 and a second receiving module 25:
the second sending module 24 is configured to send a registration request to the chip internal server, where the registration request includes the account information and the device information of the terminal device;
the second receiving module 25 is configured to receive a registration response corresponding to the registration request sent by the chip internal server, where the registration response is used to indicate success or failure of registration.
In a possible implementation, the log processing apparatus further includes a third receiving module 26:
the third receiving module 26 is configured to receive a development environment data packet sent by a chip server, where the development environment data packet is used for the terminal device to develop the program.
The log processing apparatus provided in the embodiment of the present application may execute the technical solutions shown in the foregoing method embodiments, and the implementation principles and beneficial effects thereof are similar, which are not described herein again.
The exemplary embodiment of the present application provides a schematic structural diagram of an on-chip internal server, please refer to fig. 12, the on-chip internal server 30 may include a processor 31 and a memory 32. Illustratively, the processor 31, the memory 32, and the various parts are interconnected by a bus 33.
The memory 32 stores computer-executable instructions;
the processor 31 executes the computer-executable instructions stored in the memory 32, so that the processor 31 executes the log processing method as shown in the above-mentioned method embodiment.
The exemplary embodiment of the present application provides a schematic structural diagram of a terminal device, please refer to fig. 13, where the terminal device 40 may include a processor 41 and a memory 42. Illustratively, the processor 41, the memory 42, and the various parts are interconnected by a bus 43.
The memory 42 stores computer-executable instructions;
the processor 41 executes the computer-executable instructions stored in the memory 42, so that the processor 41 executes the log processing method as shown in the above-mentioned method embodiments.
All or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The aforementioned program may be stored in a readable memory. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned memory (storage medium) includes: read-only memory (ROM), RAM, flash memory, hard disk, solid state disk, magnetic tape (magnetic tape), floppy disk (flexible disk), optical disk (optical disk), and any combination thereof.
Accordingly, an embodiment of the present application provides a computer-readable storage medium, in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium is configured to implement the log processing method according to the foregoing method embodiment.
Accordingly, the present application may also provide a computer program product, which includes a computer program, and when the computer program is executed by a processor, the log processing method shown in the foregoing method embodiment may be implemented.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the embodiments of the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the embodiments of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to encompass such modifications and variations.
In the present application, the terms "include" and variations thereof may refer to non-limiting inclusions; the term "or" and variations thereof may mean "and/or". The terms "first," "second," and the like in this application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. In the present application, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.

Claims (17)

1. A log processing method, comprising:
acquiring account information of the terminal equipment;
acquiring a log ciphertext of the terminal equipment, wherein the terminal equipment comprises an integrated secure element ISE chip, and the log ciphertext is a log generated by a program developed in the ISE chip;
acquiring a log plaintext corresponding to the log ciphertext according to the account information;
and sending the log plaintext to a chip external server, wherein the log plaintext is used for determining the fault information of the program in the terminal equipment.
2. The method according to claim 1, wherein obtaining a log plaintext corresponding to the log ciphertext according to the account information comprises:
determining a key name corresponding to the account information according to the account information;
and acquiring the plain text of the log according to the key name.
3. The method of claim 2, wherein obtaining the log plaintext from the key name comprises:
sending the key name and the log ciphertext to an encryptor;
and receiving the log plaintext sent by the encryption machine, wherein the encryption machine comprises a key corresponding to the key name, and the log plaintext is obtained by decrypting the log ciphertext by the encryption machine according to the key.
4. The method of claim 3, wherein the method is applied to an on-chip server, and the on-chip server and the encryptor are located in the same local area network;
sending the key name and the log ciphertext to an encryptor, including:
sending a decryption request to the encryption machine through the local area network, wherein the decryption request comprises the key name and the log ciphertext;
receiving the log plaintext sent by the encryption device, including:
and receiving a decryption response corresponding to the decryption request sent by the encryption machine through the local area network, wherein the decryption response comprises the log plaintext.
5. The method according to claim 1, wherein before acquiring the account information of the terminal device, the method further comprises:
receiving a registration request sent by the terminal equipment, wherein the registration request comprises the account information and equipment information of the terminal equipment;
and sending a registration response corresponding to the registration request to the terminal equipment, wherein the registration response is used for indicating the success or failure of registration.
6. The method according to any one of claims 1 to 5, wherein obtaining the log ciphertext of the terminal device comprises:
and receiving the log ciphertext from a chip external server corresponding to the terminal equipment, wherein the log ciphertext is sent to the chip external server by the terminal equipment.
7. A log processing method is applied to a terminal device, wherein an ISE chip, a main chip and a log interface are arranged in the terminal device, and the method comprises the following steps:
generating a log ciphertext through the log interface in the process of generating a program in the ISE chip;
sending account information and the log ciphertext to a server outside a chip through the main chip;
and receiving a log plaintext corresponding to the log ciphertext sent by the external server of the chip through the main chip, wherein the log plaintext is used for determining the fault information of the program.
8. The method of claim 7, wherein generating a log cipher text through the log interface during the process of generating a program in the ISE chip comprises:
generating the log plaintext in the process of generating the program in the ISE chip;
and encrypting the log plaintext through the log interface to obtain the log ciphertext.
9. The method of claim 8, wherein a key is provided in the ISE chip; encrypting the log plaintext through the log interface to obtain the log ciphertext, wherein the encrypting process comprises the following steps:
acquiring the secret key in the ISE chip;
and according to the secret key, encrypting the log plaintext through the log interface to obtain the log ciphertext.
10. The method according to any one of claims 7-9, further comprising:
sending a registration request to the chip internal server, wherein the registration request comprises the account information and the equipment information of the terminal equipment;
and receiving a registration response corresponding to the registration request sent by the server in the chip, wherein the registration response is used for indicating the success or failure of registration.
11. The method according to any one of claims 7-10, further comprising:
and receiving a development environment data packet sent by a chip server, wherein the development environment data packet is used for the terminal equipment to develop the program.
12. A log processing apparatus, comprising: a first obtaining module, a second obtaining module, a third obtaining module, and a first sending module,
the first acquisition module is used for acquiring account information of the terminal equipment;
the second obtaining module is configured to obtain a log ciphertext of the terminal device, where the terminal device includes an integrated secure element ISE chip, and the log ciphertext is a log generated by a program developed in the ISE chip;
the third obtaining module is used for obtaining a log plaintext corresponding to the log ciphertext according to the account information;
the first sending module is used for sending the log plaintext to a chip external server, and the log plaintext is used for determining the fault information of the program in the terminal equipment.
13. The utility model provides a log processing apparatus which characterized in that is applied to terminal equipment, be provided with ISE chip, main chip and log interface in the terminal equipment, include: a generating module, a first sending module and a first receiving module, wherein,
the generating module is used for generating a log ciphertext through the log interface in the process of generating a program in the ISE chip;
the first sending module is used for sending account information and the log ciphertext to a chip external server through the main chip;
the first receiving module is used for receiving a log plaintext corresponding to the log ciphertext sent by the chip external server through the main chip, and the log plaintext is used for determining the fault information of the program.
14. A chip internal server, comprising: a memory and a processor;
the memory stores computer-executable instructions;
the processor executing the computer-executable instructions stored by the memory causes the processor to perform the log processing method of any of claims 1 to 6.
15. A terminal device, comprising: a memory and a processor;
the memory stores computer execution instructions;
the processor executing the computer-executable instructions stored by the memory causes the processor to perform the log processing method of any of claims 7 to 11.
16. A computer-readable storage medium having stored therein computer-executable instructions for implementing the log processing method of any one of claims 1 to 6 or the log processing method of any one of claims 7 to 11 when executed by a processor.
17. A computer program product comprising a computer program which, when executed by a processor, implements the log processing method of any one of claims 1 to 6 or the log processing method of any one of claims 7 to 11.
CN202210439553.1A 2022-04-25 2022-04-25 Log processing method, device and equipment Pending CN114826579A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210439553.1A CN114826579A (en) 2022-04-25 2022-04-25 Log processing method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210439553.1A CN114826579A (en) 2022-04-25 2022-04-25 Log processing method, device and equipment

Publications (1)

Publication Number Publication Date
CN114826579A true CN114826579A (en) 2022-07-29

Family

ID=82507895

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210439553.1A Pending CN114826579A (en) 2022-04-25 2022-04-25 Log processing method, device and equipment

Country Status (1)

Country Link
CN (1) CN114826579A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110019075A (en) * 2018-08-09 2019-07-16 苏州科达科技股份有限公司 Log encryption method and decryption method and device
CN110719203A (en) * 2019-10-12 2020-01-21 腾讯云计算(北京)有限责任公司 Operation control method, device and equipment of intelligent household equipment and storage medium
CN112632007A (en) * 2020-12-23 2021-04-09 平安银行股份有限公司 Log storage and extraction method, device, equipment and storage medium
WO2021239272A1 (en) * 2020-05-29 2021-12-02 Giesecke+Devrient Mobile Security Gmbh Personalization of a secure element
CN113918992A (en) * 2021-10-19 2022-01-11 深圳市锐尔觅移动通信有限公司 Log data processing method and device, storage medium and electronic equipment
CN113922976A (en) * 2020-09-15 2022-01-11 京东科技控股股份有限公司 Equipment log transmission method and device, electronic equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110019075A (en) * 2018-08-09 2019-07-16 苏州科达科技股份有限公司 Log encryption method and decryption method and device
CN110719203A (en) * 2019-10-12 2020-01-21 腾讯云计算(北京)有限责任公司 Operation control method, device and equipment of intelligent household equipment and storage medium
WO2021239272A1 (en) * 2020-05-29 2021-12-02 Giesecke+Devrient Mobile Security Gmbh Personalization of a secure element
CN113922976A (en) * 2020-09-15 2022-01-11 京东科技控股股份有限公司 Equipment log transmission method and device, electronic equipment and storage medium
CN112632007A (en) * 2020-12-23 2021-04-09 平安银行股份有限公司 Log storage and extraction method, device, equipment and storage medium
CN113918992A (en) * 2021-10-19 2022-01-11 深圳市锐尔觅移动通信有限公司 Log data processing method and device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
CN109067528B (en) Password operation method, work key creation method, password service platform and equipment
CN109347625B (en) Password operation method, work key creation method, password service platform and equipment
EP1710724A2 (en) Application program verification system, application program verification method and computer program
CN108347361B (en) Application program testing method and device, computer equipment and storage medium
CN111274611A (en) Data desensitization method, device and computer readable storage medium
CN113722683B (en) Model protection method, device, equipment, system and storage medium
CN110995720B (en) Encryption method, device, host terminal and encryption chip
CN105653902B (en) Software registration method and device register code generating method and device
CN109558739A (en) Program operating method, device, terminal and readable medium
CN107423583B (en) A kind of software protecting device remapping method and device
CN111628863A (en) Data signature method and device, electronic equipment and storage medium
CN107248910A (en) Method for security protection and equipment
CN107609415A (en) A kind of equipment Serial Number write protection method
CN110232570B (en) Information supervision method and device
CN112039662A (en) Symmetric encryption transmission method for sensitive data in Web application webpage of secret-related unit
JP2013045277A (en) Program obfuscation method and remote debug system
CN111859226A (en) Page jump method, device and related equipment
CN114826579A (en) Log processing method, device and equipment
CN110266699A (en) Prize drawing data cochain method and its equipment applied to block chain
CN104392153A (en) Software protection method and system
CN114915503A (en) Data stream splitting processing encryption method based on security chip and security chip device
CN110737910B (en) Android log decryption management method, device, equipment and medium
EP3086583B1 (en) Wireless terminal network locking method and system
CN110245512A (en) Lottery data cochain method and its equipment applied to block chain
CN112688909B (en) Data transmission system, method, device, medium and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination