Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In order to facilitate understanding of the operation auditing method provided by the present application, a system in which the present application is used is described below. Referring to fig. 1, an architecture diagram of an operation audit system provided by an embodiment of the present application is shown in fig. 1, where the architecture diagram includes a log source 100 of a target enterprise, a server 200 of the target enterprise, and a parent blockchain network, where the parent blockchain network includes a plurality of sub-blockchain networks, and each enterprise corresponds to one sub-blockchain network, that is, one sub-blockchain network is used to store operation information of one enterprise, and data isolation is performed between each sub-blockchain network, so that operation information of different enterprises is isolated from each other in the parent blockchain network, and security of operation information of the enterprises is ensured. Wherein the sub-blockchain network corresponding to the target enterprise is the target sub-blockchain network 300.
The number of log sources is not limited herein, i.e., the log source 100 may include a plurality of log sources, each of which may be understood as a memory for storing logs, such as a kafka queue or database, etc. Each log source may maintain one system-generated operation original log, or may maintain a plurality of system-generated operation original logs, which are collectively referred to as operation original logs in the subsequent embodiments, without being limited thereto.
The server 200 is a server of an enterprise internal audit system, and includes a plurality of log source plug-ins, where the plurality of log source plug-ins may be stored in the server 200 in a cluster manner, and each log source plug-in is configured to obtain an operation original log in its corresponding log source and transmit the operation original log to the server 200, so that as the types of the log sources 100 increase, the cluster may be expanded.
The server 200 further includes a plurality of mark extraction plugins, where the plurality of mark extraction plugins may be stored in the server 200 in a cluster manner, and each mark extraction plugin is configured to extract an element from an operation original log of a corresponding log type, and it is understood that, as the log type increases, the cluster storing the mark extraction plugins is also an expandable cluster.
In addition, in order to extract information closer to the service, the server 200 may further include a plurality of element extension plug-ins for extracting extension fields of each element in the management system corresponding to each element. The management system is used for recording basic information of each element, for example, the subject management system may include an HR system and the like, and the object management system may include a resource management system and the like.
The target sub-blockchain network 300 includes a supervisory blockchain node 31 for operational auditing of the target enterprise, i.e., the supervisory authority utilizes the supervisory blockchain node 31 to conduct operational auditing of the target enterprise. Of course, the target sub-blockchain network 300 further includes other blockchain nodes, the server 200 may store the element extracted from the operation original log and the hash value corresponding to the operation original log into the target sub-blockchain network 300 by using the blockchain node 32, and the supervisory blockchain node 31 may obtain the element from the target sub-blockchain network 300 to perform operation audit, and may also obtain the hash value from the target sub-blockchain network 300 when necessary, so as to query the operation original log in the server 200 to perform operation audit.
The embodiment of the application discloses an operation auditing method which realizes real-time operation auditing of enterprises.
Referring to fig. 2, a flowchart of an operation auditing method according to an embodiment of the present application, as shown in fig. 2, includes:
s101, a server acquires an operation original log of a target enterprise from a log source;
In this step, the server obtains the operation original log from the log source, preferably, this step includes obtaining the operation original log from the log source by using the log source plug-in. The operation original logs herein may include internet application logs, instant messaging logs, data block logs, attack/scan logs, file transfer logs, remote control logs, mail logs, and the like, and the internet application logs may include HTTP (chinese full name: hypertext transfer protocol; english full name: hyper Text TransferProtocol) application logs, entertainment software logs, and C/S (chinese full name: client/Server; english full name: client/Server) architecture-based application software usage logs, and the like. The HTTP application log is a log for monitoring content information of access to an internet web page, recording keyword information set by a user, information aiming at HTTPUP, and recording all DNS (chinese full name: domain name system, english full name: domain NAME SYSTEM) protocol requests, and monitoring content information of access to an internet web page includes publishing and browsing based on the HTTP protocol. The instant messaging log is a log for recording the use information of various instant messaging software, namely virtual identity information, the database log is a log for recording the operation and user information of various data blocks, the attack/scan log is a behavioral log for recording DDOS attack (Chinese full name: distributed denial of service attack, english full name: distributed denial ofservice attack) and port scanning, the file transfer log comprises various downloading tools, an FTP Protocol (Chinese full name: file transfer Protocol), an SMB (Chinese full name: FILE TRANSFER Protocol), a file transfer information carried out by an SMB (Chinese full name: server information block, english full name: SERVERMESSAGE BLOCK) Protocol, and also comprises information for point-to-point file transfer and file name of the instant chat software, the remote control log is a log for recording the use condition of various remote control software or protocols, including TELNET Protocol (Chinese full name: remote terminal Protocol), WINDOWS remote desktop and SSH (Chinese full name: secure Shell Protocol, english full name: secure Shell), the mail log is a SMTP Protocol (Chinese full name: simple mail transfer Protocol ), POP (POP full name: 3, full name: 3-mail Protocol, english Version 3, text, and the like, and the text of the text, the text and the like.
The server comprises a plurality of log source plug-ins, and each log source plug-in is used for acquiring an operation original log from one log source, namely the server acquires the operation original log from a plurality of log sources by using the plurality of log source plug-ins. Specifically, the method comprises the steps of obtaining an operation original log in a kafka queue by using a kafka source plug-in, and/or obtaining an operation original log in a database by using a data plug-in, and/or obtaining a reported operation original log through an interface by using a reporting interface plug-in.
In a specific implementation, for the original log of operations stored in the kafka queue, the original log of operations may be read into the server by the kafka source plug-in, and for the original log of operations stored in the database, the original log of operations may be read from the database by the data plug-in. The server can also comprise a reporting interface plug-in, and the reporting interface plug-in can be utilized to report the operation original log to the server through an interface.
The kafka source plug-in, the data plug-in and the reporting interface plug-in described above may be stored in a server in clusters that are scalable as the log source variety increases.
S102, extracting elements of the operation original log by a server, wherein the elements comprise standard elements and custom elements, and the standard elements comprise a subject, an object, time and an operation type;
Preferably, the step of extracting the elements of the operation original log by the server comprises the steps of determining the log type of the operation original log and extracting the elements of the operation original log by using a mark extraction plug-in corresponding to the log type.
In the log source plug-in, the original log is marked with a basic label, for example, a server indicates which system the original log is generated by, a service indicates which service interface the original log is generated by, and the labels can be obtained by the original system of the original log or by simply reading and analyzing the original log. The server may determine the log type of the original log of each operation according to the above tag, where the log type may include a structured type, an sql type, a text type, and the like, and the structured day type, such as json structure, xml structure, and the like, which are not specifically limited herein.
The server comprises a plurality of mark extraction plug-ins, and each mark extraction plug-in is used for extracting elements from the operation original log of the corresponding log type, namely the server extracts the elements of the operation original log of different log types by using different mark extraction plug-ins. The elements herein may include subject, object, time and operation type, i.e. standard elements in this step, and may also include other user-defined elements.
The plurality of tag-extraction plugins may be stored in the server in a collection, which is scalable. The server may provide a mapping table to indicate which tag extraction plug-ins may be processed by the operation source logs of different log types, such as shown in table 1:
TABLE 1
Log type |
Mark extraction insert |
Structured type |
Mark extraction plug-in A |
Type sql |
Mark extraction plug-in B |
Text type |
Mark extraction plug-in C |
It will be appreciated that the log types of the operation original logs generated by different service interfaces of the same system may be different, so that for the operation original logs of the same system, multiple mark extraction plugins may be simultaneously used for element extraction. Table 1 can be extended to table 2:
TABLE 2
server |
service |
Log type |
Mark extraction insert |
ServerA |
Service1 |
Type sql |
Mark extraction plug-in B |
ServerA |
Service2 |
Structured type |
Mark extraction plug-in A |
ServerB |
Service3 |
Type sql |
Mark extraction plug-in B |
ServerC |
Service4 |
Text type |
Mark extraction plug-in C |
Specifically, the step of extracting the element of the operation original log by using the mark extraction plug-in corresponding to the log type may include performing structural analysis on the operation original log, extracting the element of the operation original log from an analysis result, and/or performing analysis on sql statements in the operation original log by using a druid library, extracting the element of the operation original log from the analysis result, and/or extracting the element of the operation original log by using a regular expression.
In a specific implementation, if the log type is a json or xml structured type, the structure may be parsed to obtain each element of the original log. If the log type is the sql type, that is, the operation original log contains the sql statement, the sql statement can be analyzed through druid library, and then each element of the operation original log is obtained. Because of the specific labels and keywords in structured and sql type of operation raw logs, elements can be extracted by identifying the labels and keywords. druid is an open-source, distributed, column-stored system suitable for real-time data analysis, and can summarize the underlying statistical indicators, i.e., the elements in this embodiment, can be represented by a field. If the log type is text type, each element of the original log can be obtained by adopting a regular expression mode.
Note that, the mark extraction plug-in this step is not specifically limited to the embodiment, and may be implemented by Java code, python script, or the like, for example.
The original operation log extracted above may include standard elements and custom elements, where the standard elements are four elements of operation audit, including subject, object, time and operation type. The four elements can be extracted from each operation raw log, which define a standard story/event for each operation raw log, i.e. what person (subject) does what type of operation on what object at what time. The subject represents an executor of the operation, and the object represents an object on which the operation is actually performed, such as a server host, a service, a product configuration, and the like. The following examples are presented for operation:
(1) The system administrator queries information of a user. In the operation, the host is a system administrator, the object is a user ID, and the operation type is query;
(2) The system administrator modifies the configuration of a fund. In the operation, the host is a system administrator, the object is an ID of the fund, and the operation type is modification;
(3) An employee logs into a machine. In the operation, the host is employee ID, the object is the IP address of the machine, and the operation type is login;
It should be noted that the guest elements in one operation original log may be multiple and multiple types. For example, one employee deployed service S on machine a, machine B, and machine C, respectively, and then the objects include machine a, machine B, and machine C, and service S, which has a total of 4 objects.
For the guest elements, the parameters in the request message recorded in the operation original log may be extracted. For example, for an operation original log "a system administrator inquires about user information by user ID", the ID of the user may be extracted from the parameters in the request message as an object. Of course, the parameters in the response message recorded in the operation original log may also be extracted. For example, for the operation original log "a system administrator initiates a range query", the response message returns an information list of 10 users, and the IDs of the users in the response message may be used as objects. That is, the step may include extracting, by using the tag extraction plug-in corresponding to the log type, the object of the operation original log according to the request packet and the response packet in the operation original log.
The extracted object element includes at least an object type (type) and an object name (name). For example, the object is a user ID, type is a userId, and name is zhangsan. It should be noted that, in order to facilitate operation audit across multiple log types, naming needs to be uniformly specified for the same object type. For example, for system a, the type of user ID is userId, while in system B, the type of user ID is user_account, which may be unified as userId in this embodiment.
Of course, in addition to the standard elements described above, elements of other business concern may be extracted in the tag extraction plug-in as custom elements. For example, for an original log of operations to record configuration online activities, additional care may be taken about the amount configured, so that the amount can be extracted as a custom element. Of course, the user may set other custom elements, which are not specifically limited herein.
Because different systems and even different operations in the same system can have different log formats, the element for standardizing the original log of the operation can provide data support for subsequent operation audit. For example, for an important user, it is necessary to determine whether someone has operated him in all systems. Through the extraction of the object elements in the step, unified standard query can be carried out on the heterogeneous logs to obtain results. Similarly, the method has similar meaning for the main body and the operation type, and the time element can know the time of the operation and the operation sequence of the restoration.
S103, the server performs hash calculation on the operation original log to obtain a hash value corresponding to the operation original log, and stores the mapping relation between the operation original log and the hash value;
in this step, hash calculation is performed on each operation original log to obtain a hash value corresponding to each operation original log, and specific forms of the hash values are not limited herein, and for example, the hash values may include hash values. And in the subsequent step, only uploading the hash value of the operation original log to the target sub-blockchain network, ensuring the safety of the operation original log, acquiring the hash value from the target sub-blockchain network when the operation original log is required by a supervision mechanism, and determining the operation original log corresponding to the hash value based on the mapping relation in the server.
S104, the server stores the hash value and the element into a target sub-blockchain network corresponding to the target enterprise in a parent blockchain network;
In this step, the server uploads the hash values of all the operation original logs of the target enterprise and the elements extracted from the operation original logs to the target sub-blockchain network corresponding to the target enterprise in the parent blockchain network. The master block chain network comprises a plurality of sub block chain networks, each enterprise corresponds to one sub block chain network, namely one sub block chain network is used for storing operation information of one enterprise, and data isolation is carried out among the sub block chain networks, so that the operation information of different enterprises are mutually isolated in the master block chain network, and the safety of the operation information of the enterprises is ensured.
S105, performing operation audit on the target enterprise by using the supervision block chain nodes in the target sub-block chain network.
In a specific implementation, the target sub-blockchain network includes a supervisory blockchain node for operating auditing of the target enterprise, i.e., the supervisory authority utilizes the supervisory blockchain node to operate auditing of the target enterprise. The supervision block chain node can acquire elements from the target sub-block chain network to perform operation audit, and can acquire hash values if needed, and inquire operation original logs corresponding to the hash values in a server based on the mapping relation between the operation original logs and the hash values to perform operation audit.
The operation auditing method provided by the embodiment of the application utilizes the blockchain network to store the operation information, namely the elements extracted from the operation original log and the hash value of the operation original log. In the parent blockchain network, each sub-blockchain network stores the operation information of an enterprise, and only the hash value is uploaded to the sub-blockchain network instead of directly uploading the operation original log, so that the safety of the operation information is ensured. And data isolation is carried out between each sub-blockchain network, so that the operation information of different enterprises is mutually isolated in the parent blockchain network, and the safety of the operation information of the enterprises is ensured. The supervision mechanism for performing operation audit on the target enterprise is added into the target sub-blockchain network corresponding to the target enterprise as a blockchain link point, the operation audit is performed by acquiring elements from the target sub-blockchain network in real time, and an operation original log can be queried in a server of the target enterprise based on a hash value stored in the target sub-blockchain network when required. Therefore, the operation auditing method provided by the embodiment of the application ensures timeliness and non-falsifiability of enterprise operation information by utilizing the characteristics of shared account book, non-falsifiability and timely synchronization of the blockchain, opens up a system barrier from the enterprise to a supervision organization, and realizes real-time operation auditing of the enterprise.
The embodiment of the application discloses an operation auditing method, which further describes and optimizes a technical scheme relative to the previous embodiment. The embodiment will be described with a server as an execution body, and specifically:
referring to fig. 3, a flowchart of another operation auditing method provided by an embodiment of the present application, as shown in fig. 3, includes:
S201, acquiring an operation original log of a target enterprise, and extracting elements of the operation original log, wherein the elements comprise standard elements and custom elements, and the standard elements comprise a subject, an object, time and an operation type;
S202, determining sensitive information in the elements, and preprocessing the sensitive information, wherein the sensitive information comprises user sensitive information and/or system sensitive information of the target enterprise;
The execution subject of this embodiment is a server of an enterprise internal auditing system. Before the operation information is uploaded to the target sub-blockchain network, sensitive information in the operation information needs to be preprocessed in order to ensure the security of the data. It will be appreciated that the entire content of the operation information may be divided into user information related to the user operation and system information unrelated to the user operation, and the user information may be divided into user sensitive information and non-user sensitive information. The sensitive information in this step may include the above-mentioned user sensitive information, such as user identity information, etc., and may further include system information unrelated to user operation, that is, system sensitive information of the target enterprise, such as an IP address, an internal database name, an internal system name, etc., inside the target enterprise.
The specific preprocessing mode is not limited here, and only the plaintext that other devices in the access target sub-blockchain network cannot acquire sensitive information needs to be ensured. For example, for the system sensitive information, the system sensitive information in the element may be removed, or the masking processing may be performed on the system sensitive information. For user sensitive information, it may be encrypted. The specific encryption method is not limited herein, and a symmetric encryption or an asymmetric encryption method may be employed. For the symmetric encryption mode, a shared key is distributed between a target enterprise and each supervision organization in advance, the target enterprise encrypts user sensitive information by using the shared key and then uploads the encrypted information to a target sub-blockchain network, and the supervision organization reads data on the target sub-blockchain network and decrypts the data, so that the encryption and decryption speed is high. For an asymmetric encryption mode, a public key is distributed to a target enterprise for encryption, and a supervision organization uses a private key for decryption.
S203, carrying out hash calculation on the operation original log to obtain a hash value corresponding to the operation original log, and storing a mapping relation between the operation original log and the hash value;
in this step, hash calculation is performed on each operation original log to obtain a hash value corresponding to each operation original log, and specific forms of the hash values are not limited herein, and for example, the hash values may include hash values. And in the subsequent step, only uploading the hash value of the operation original log to the target sub-blockchain network, ensuring the safety of the operation original log, acquiring the hash value from the target sub-blockchain network when the operation original log is required by a supervision mechanism, and determining the operation original log corresponding to the hash value based on the mapping relation in the server.
And S204, storing the hash value and the preprocessed elements into a target sub-blockchain network corresponding to the target enterprise in a master blockchain network so that a supervision blockchain node in the target sub-blockchain network carries out operation audit on the target enterprise, wherein the master blockchain network comprises a plurality of sub-blockchain networks, and each sub-blockchain network carries out data isolation.
In the step, the server uploads the hash values of all operation original logs of the target enterprise and the elements extracted from the operation original logs to a target sub-blockchain network corresponding to the target enterprise in the parent blockchain network, and timeliness and non-tamper modification of enterprise operation information are ensured by utilizing the characteristics of sharing account book, non-tamper and timely synchronization of the blockchain. The target sub-blockchain network comprises a supervision blockchain node for performing operation audit on the target enterprise, namely, the supervision organization performs operation audit on the target enterprise by using the supervision blockchain node. The supervision block chain node can acquire elements from the target sub-block chain network to perform operation audit, and can acquire hash values if needed, and inquire operation original logs corresponding to the hash values in a server based on the mapping relation between the operation original logs and the hash values to perform operation audit.
Therefore, according to the operation auditing method provided by the embodiment, data isolation is performed among the sub-block chain networks corresponding to different enterprises, and the security of enterprise data is higher. In the sub-block chain network, only the hash value of the operation original log is uploaded, the operation original log is not uploaded, and the security of the operation original log of an enterprise is ensured. And the sensitive information to be uplink is preprocessed, so that other devices in the access sub-blockchain network can not acquire the plaintext of the sensitive information, and the security is high.
The embodiment of the application discloses an operation auditing method, which further describes and optimizes a technical scheme relative to the first embodiment. The embodiment will be described with a server as an execution body, and specifically:
Referring to fig. 4, a flowchart of still another operation auditing method according to an embodiment of the present application, as shown in fig. 4, includes:
S301, acquiring an operation original log of a target enterprise, and extracting elements of the operation original log, wherein the elements comprise standard elements and custom elements, and the standard elements comprise a subject, an object, time and an operation type;
s302, acquiring element expansion standards from the supervision block link points, and determining expansion fields corresponding to each element based on the element expansion standards;
In this step, the regulatory agency defines the extension field that each element must extend, i.e., defines element extension criteria, which are published through the regulatory blockchain node into the entire target sub-blockchain network. The server determines an extension field corresponding to each element based on the element extension criteria. In element expansion, for heterogeneous logs with different sources, the same expansion plug-in can be adopted, and each expansion plug-in is distinguished according to different elements. More important marks close to the business can be expanded for the operation original log through the expansion plug-in, so that the operation audit supports more powerful standardized audit.
In particular implementations, the principal mark extension plugin extracts basic information by invoking a principal management system, where the principal management system may include a company's HR system or an organizational architecture system, depending on the individual company's IT system differences. For example, the true identity of the principal, including the true name, identification card, or equivalent identification, may be extended, as well as the principal's position at the company, subscription unit, etc. The object tag extension plugin extracts basic information by calling an object management system, such as a company's resource management system, depending on the individual company IT system distinction. For example, the true identity of the object, including the true name, identification card or equivalent identification, may be extended, as well as the properties of the object, e.g., when the information of the fund purchased by the user is queried by an internal employee, the relevant rules should be formulated, and the relevant properties of the expanded fund are filled into the expanded fields.
Preferably, the extension field of the operation type comprises a category, and the determining the extension field corresponding to each element based on the element extension standard comprises obtaining an operation type classification standard from the supervision blockchain node and determining the category of the operation type based on the operation type classification standard. In a specific implementation, servers of different enterprises define different URL names or interface names for operation types, which are too poorly readable to regulatory authorities. Therefore, the supervision organization can define operation type classification standards which are convenient for audit, the server establishes the corresponding relation between each supported operation type and the category, for example, the category corresponding to "/api/fk_ frozen" is "risk control-frozen fund", and Chinese annotation marks can be added for operation types which cannot be classified.
S303, determining an operation abstract field of the operation original log based on a standard report format according to each element and an extension field corresponding to each element;
In a specific implementation, the server adds the extracted elements to a standard reporting format, where the standard reporting format is for example:
it is to be understood that "user" is a subject, "operation_type" is an operation type, "time" is a time, and "object" is an object. If the element extracted in the previous step further includes a custom element, other operation abstract fields may be allocated to the custom element in the standard report format. In the target sub-blockchain network, elements extracted from the operation original log are stored based on a standard report format, namely, each element is subjected to standardized processing, and a supervision organization audits the operation information in a unified format, so that the efficiency is high.
And S304, storing the hash value and the operation abstract field into a target sub-blockchain network corresponding to the target enterprise in a parent blockchain network so as to enable a supervision blockchain node in the target sub-blockchain network to perform operation audit on the target enterprise, wherein the parent blockchain network comprises a plurality of sub-blockchain networks, and each sub-blockchain network performs data isolation.
Therefore, according to the operation auditing method provided by the embodiment, the unified element marks are extracted from the operation original logs which are collected by various systems and are not formatted, so that the original logs which are completely different originally can query key information by adopting the same method, and more important and service-proximate expansion information is expanded for each element by element expansion based on the element expansion standard defined by the supervision mechanism, thereby improving the operation auditing efficiency.
For ease of understanding, the present application is described in connection with an application scenario. In connection with fig. 1, the nodes of the target sub-blockchain network 300 include enterprise a and its associated enterprises, departments, and multiple regulatory authorities. And the different block chain sub-networks are used for data isolation, so that the data of different enterprises can be isolated from each other.
And collecting operation original logs through an audit system built in the enterprise by each sub-company and each sub-department of the enterprise A, wherein the audit system extracts four-element information, namely a subject, an object, an operation type and time, and expands the four-element information. In performing the four-element expansion, it is required that the necessary field required by the regulatory agency must be expanded. The subject has to extend his true identity, in the company's position, subscription units, etc. The object has to extend its true identity, properties, etc. The classification identification is required to be added according to the operation type classification standard defined by the regulatory body for the operation types, and the Chinese annotation mark is required to be added for the operation types which cannot be classified.
The hash processing is performed on the operation original log, and only the hash value of the operation original log is uploaded to the target sub-blockchain network 300. An audit system within the enterprise should maintain a mapping of the original log of operations to the hash value. When the supervision authorities require the inquiry, the corresponding operation original log can be inquired through the hash value.
In the extracted elements, the system information in the enterprise irrelevant to the user operation is removed or masked, so that the leakage of the enterprise relevant information is prevented. And carrying out encryption processing on the user sensitive information. The hash values of all the operation original logs of the enterprise a and the elements extracted from the operation original logs and subjected to the above processing are uploaded into the target sub-blockchain network 300. The supervision organization can obtain the elements from the target sub-blockchain network 300 to perform operation audit, and can also obtain the hash value if necessary, and query the operation original log corresponding to the hash value in the server based on the mapping relation between the operation original log and the hash value to perform operation audit.
An operation auditing device provided by the embodiment of the present application is described below, and an operation auditing device described below and an operation auditing method described above may be referred to each other.
Referring to fig. 5, a block diagram of an operation auditing apparatus according to an embodiment of the present application, as shown in fig. 5, includes:
The extraction module 501 is used for obtaining an operation original log of a target enterprise and extracting elements of the operation original log, wherein the elements comprise standard elements and custom elements, and the standard elements comprise a subject, an object, time and an operation type;
the calculation module 502 is configured to perform hash calculation on the operation original log to obtain a hash value corresponding to the operation original log, and store a mapping relationship between the operation original log and the hash value;
and a storage module 503, configured to store the hash value and the element in a target sub-blockchain network corresponding to the target enterprise in a parent blockchain network, so that a supervision blockchain node in the target sub-blockchain network performs operation audit on the target enterprise, where the parent blockchain network includes a plurality of sub-blockchain networks, and each sub-blockchain network performs data isolation.
The operation auditing device provided by the embodiment of the application utilizes the blockchain network to store the operation information, namely the elements extracted from the operation original log and the hash value of the operation original log. In the parent blockchain network, each sub-blockchain network stores the operation information of an enterprise, and only the hash value is uploaded to the sub-blockchain network instead of directly uploading the operation original log, so that the safety of the operation information is ensured. And data isolation is carried out between each sub-blockchain network, so that the operation information of different enterprises is mutually isolated in the parent blockchain network, and the safety of the operation information of the enterprises is ensured. The supervision mechanism for performing operation audit on the target enterprise is added into the target sub-blockchain network corresponding to the target enterprise as a blockchain link point, the operation audit is performed by acquiring elements from the target sub-blockchain network in real time, and an operation original log can be queried in a server of the target enterprise based on a hash value stored in the target sub-blockchain network when required. Therefore, the operation auditing device provided by the embodiment of the application ensures timeliness and non-falsifiability of enterprise operation information by utilizing the characteristics of shared account book, non-falsifiability and timely synchronization of the blockchain, opens up a system barrier from the enterprise to a supervision organization, and realizes real-time operation auditing of the enterprise.
On the basis of the above embodiment, as a preferred implementation manner, the method further includes:
the preprocessing module is used for determining sensitive information in the elements and preprocessing the sensitive information, wherein the sensitive information comprises user sensitive information and/or system sensitive information of the target enterprise.
On the basis of the above embodiment, as a preferred implementation manner, the preprocessing module is specifically a module for removing the system sensitive information in the element or masking the system sensitive information.
On the basis of the above embodiment, as a preferred implementation manner, the preprocessing module is specifically a module for encrypting the user sensitive information.
Based on the above embodiment, as a preferred implementation manner, the storage module 503 includes:
the first determining unit is used for determining an operation abstract field of the operation original log based on a standard report format according to the element;
And the storage unit is used for storing the hash value and the operation abstract field into a target sub-blockchain network corresponding to the target enterprise in the parent blockchain network.
On the basis of the above embodiment, as a preferred implementation manner, the method further includes:
The determining module is used for acquiring element expansion standards from the supervision block link points and determining expansion fields corresponding to each element based on the element expansion standards;
Correspondingly, the first determining unit is specifically a unit for determining an operation abstract field of the operation original log based on a standard report format according to each element and an extension field corresponding to each element.
On the basis of the above embodiment, as a preferred implementation manner, the extension field of the operation type includes a category, and the determining module includes:
and the second determining unit is used for acquiring operation type classification standards from the supervision block chain node and determining the category of the operation type based on the operation type classification standards.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
The present application also provides an electronic device, referring to fig. 6, and a block diagram of an electronic device 60 provided in an embodiment of the present application, as shown in fig. 6, may include a processor 61 and a memory 62.
Processor 61 may include one or more processing cores, such as a 4-core processor, an 8-core processor, etc. The processor 61 may be implemented in at least one hardware form of DSP (DIGITAL SIGNAL Processing), FPGA (Field-Programmable gate array), PLA (Programmable Logic Array ). The processor 61 may also include a main processor, which is a processor for processing data in a wake-up state, also called a CPU (Central Processing Unit ), and a coprocessor, which is a low-power processor for processing data in a standby state. In some embodiments, the processor 61 may integrate a GPU (Graphics Processing Unit, image processor) for rendering and drawing of content required to be displayed by the display screen. In some embodiments, the processor 61 may also include an AI (ARTIFICIAL INTELLIGENCE ) processor for processing computing operations related to machine learning.
Memory 62 may include one or more computer-readable storage media, which may be non-transitory. Memory 62 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In this embodiment, the memory 62 is at least used for storing a computer program 621, which, when loaded and executed by the processor 61, can implement relevant steps in the operation auditing method performed by the electronic device side as disclosed in any of the foregoing embodiments. In addition, the resources stored by the memory 62 may also include an operating system 622, data 623, and the like, and the storage manner may be transient storage or permanent storage. Wherein the operating system 622 may include Windows, unix, linux, etc.
In some embodiments, the electronic device 60 may further include a display 63, an input-output interface 64, a communication interface 65, a sensor 66, a power supply 67, and a communication bus 68.
Of course, the structure of the electronic device shown in fig. 6 is not limited to the electronic device in the embodiment of the present application, and the electronic device may include more or fewer components than those shown in fig. 6 or may combine some components in practical applications.
In another exemplary embodiment, a computer readable storage medium is also provided that includes program instructions that, when executed by a processor, implement the steps of the operation audit method performed by any of the embodiments servers described above.
In the description, each embodiment is described in a progressive manner, and each embodiment is mainly described by the differences from other embodiments, so that the same similar parts among the embodiments are mutually referred. For the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section. It should be noted that it will be apparent to those skilled in the art that various modifications and adaptations of the application can be made without departing from the principles of the application and these modifications and adaptations are intended to be within the scope of the application as defined in the following claims.
It should also be noted that in this specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.