Computer attack information storage method and device and electronic equipment
The embodiment of the invention discloses a computer attack information storage method and device and electronic equipment, and relates to the technical field of network security. The method and the device are invented for solving the problem that attack techniques cannot be reproduced due to deleti...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | SONG DANCHENG SUN JINCHAO |
description | The embodiment of the invention discloses a computer attack information storage method and device and electronic equipment, and relates to the technical field of network security. The method and the device are invented for solving the problem that attack techniques cannot be reproduced due to deletion of target log files. The computer attack information storage method comprises the following steps: monitoring a target log file stored in a local first storage area; obtaining a first log newly generated in the target log file; and encrypting the obtained first log by adopting a first encryption algorithm, and synchronizing the encrypted first log to a local second storage area for storage. The method is suitable for application scenes for storing computer attack information.
本发明实施例公开一种计算机攻击信息存储方法、装置、电子设备,涉及网络安全技术领域。为解决因目标日志文件被删除而无法复现攻击手法而发明。所述计算机攻击信息存储方法,包括:对本地第一存储区域保存的目标日志文件进行监视;获取所述目标日志文件中新生成的第一日志;对获取的所述第一日志采用第一加密算法进行加密,将加密后的第一日志同步到本地的第二存储区域中进行保存。适用于存储计算机攻击信息的应用场景。 |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN114221798A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN114221798A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN114221798A3</originalsourceid><addsrcrecordid>eNqNyjEKAjEQRuFtLES9w3gAi6yCWkpQrLayX4bkXw1uMjGZ9fyCeACr9xVv3nRWYp4UhViV3ZNCGqRE1iCJqkrhOyhCH-KJkyePd3D4EiOcFknBEV5TyBFJl81s4LFi9euiWV_ON3vdIEuPmtkhQXvbGbNrW7M_Hk7bf54PWqw3FA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Computer attack information storage method and device and electronic equipment</title><source>esp@cenet</source><creator>SONG DANCHENG ; SUN JINCHAO</creator><creatorcontrib>SONG DANCHENG ; SUN JINCHAO</creatorcontrib><description>The embodiment of the invention discloses a computer attack information storage method and device and electronic equipment, and relates to the technical field of network security. The method and the device are invented for solving the problem that attack techniques cannot be reproduced due to deletion of target log files. The computer attack information storage method comprises the following steps: monitoring a target log file stored in a local first storage area; obtaining a first log newly generated in the target log file; and encrypting the obtained first log by adopting a first encryption algorithm, and synchronizing the encrypted first log to a local second storage area for storage. The method is suitable for application scenes for storing computer attack information.
本发明实施例公开一种计算机攻击信息存储方法、装置、电子设备,涉及网络安全技术领域。为解决因目标日志文件被删除而无法复现攻击手法而发明。所述计算机攻击信息存储方法,包括:对本地第一存储区域保存的目标日志文件进行监视;获取所述目标日志文件中新生成的第一日志;对获取的所述第一日志采用第一加密算法进行加密,将加密后的第一日志同步到本地的第二存储区域中进行保存。适用于存储计算机攻击信息的应用场景。</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220322&DB=EPODOC&CC=CN&NR=114221798A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220322&DB=EPODOC&CC=CN&NR=114221798A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>SONG DANCHENG</creatorcontrib><creatorcontrib>SUN JINCHAO</creatorcontrib><title>Computer attack information storage method and device and electronic equipment</title><description>The embodiment of the invention discloses a computer attack information storage method and device and electronic equipment, and relates to the technical field of network security. The method and the device are invented for solving the problem that attack techniques cannot be reproduced due to deletion of target log files. The computer attack information storage method comprises the following steps: monitoring a target log file stored in a local first storage area; obtaining a first log newly generated in the target log file; and encrypting the obtained first log by adopting a first encryption algorithm, and synchronizing the encrypted first log to a local second storage area for storage. The method is suitable for application scenes for storing computer attack information.
本发明实施例公开一种计算机攻击信息存储方法、装置、电子设备,涉及网络安全技术领域。为解决因目标日志文件被删除而无法复现攻击手法而发明。所述计算机攻击信息存储方法,包括:对本地第一存储区域保存的目标日志文件进行监视;获取所述目标日志文件中新生成的第一日志;对获取的所述第一日志采用第一加密算法进行加密,将加密后的第一日志同步到本地的第二存储区域中进行保存。适用于存储计算机攻击信息的应用场景。</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyjEKAjEQRuFtLES9w3gAi6yCWkpQrLayX4bkXw1uMjGZ9fyCeACr9xVv3nRWYp4UhViV3ZNCGqRE1iCJqkrhOyhCH-KJkyePd3D4EiOcFknBEV5TyBFJl81s4LFi9euiWV_ON3vdIEuPmtkhQXvbGbNrW7M_Hk7bf54PWqw3FA</recordid><startdate>20220322</startdate><enddate>20220322</enddate><creator>SONG DANCHENG</creator><creator>SUN JINCHAO</creator><scope>EVB</scope></search><sort><creationdate>20220322</creationdate><title>Computer attack information storage method and device and electronic equipment</title><author>SONG DANCHENG ; SUN JINCHAO</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN114221798A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>SONG DANCHENG</creatorcontrib><creatorcontrib>SUN JINCHAO</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>SONG DANCHENG</au><au>SUN JINCHAO</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Computer attack information storage method and device and electronic equipment</title><date>2022-03-22</date><risdate>2022</risdate><abstract>The embodiment of the invention discloses a computer attack information storage method and device and electronic equipment, and relates to the technical field of network security. The method and the device are invented for solving the problem that attack techniques cannot be reproduced due to deletion of target log files. The computer attack information storage method comprises the following steps: monitoring a target log file stored in a local first storage area; obtaining a first log newly generated in the target log file; and encrypting the obtained first log by adopting a first encryption algorithm, and synchronizing the encrypted first log to a local second storage area for storage. The method is suitable for application scenes for storing computer attack information.
本发明实施例公开一种计算机攻击信息存储方法、装置、电子设备,涉及网络安全技术领域。为解决因目标日志文件被删除而无法复现攻击手法而发明。所述计算机攻击信息存储方法,包括:对本地第一存储区域保存的目标日志文件进行监视;获取所述目标日志文件中新生成的第一日志;对获取的所述第一日志采用第一加密算法进行加密,将加密后的第一日志同步到本地的第二存储区域中进行保存。适用于存储计算机攻击信息的应用场景。</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN114221798A |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Computer attack information storage method and device and electronic equipment |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T17%3A52%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=SONG%20DANCHENG&rft.date=2022-03-22&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN114221798A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |