LOG EVENT MANAGEMENT MECHANISM
First Claim
1. A non-transitory computer-readable medium having stored thereon instructions that, when executed by one or more processors, are configurable to cause the one or more processors to:
- transmit one or more messages to a computing device, wherein each of the one or more messages comprises a unique identifier (ID);
generate a comparison checksum for each of the one or more messages, wherein each comparison checksum is associated with a unique ID corresponding to a message from which the comparison checksum was generated;
perform an encryption on each comparison checksum and associated unique ID to generate encryption data including the encrypted checksum and associated unique ID; and
transmit the encryption data to the computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques and structures to facilitate management of log event messages, including transmitting one or more messages, each having a unique identifier (ID), to a computing device, generating a comparison checksum for each of the one or more messages, wherein each comparison checksum is associated with a unique ID corresponding to a message from which the comparison checksum was generated, performing an encryption on each comparison checksum and associated unique ID to generate encryption data and transmitting the encryption data to the computing device.
0 Citations
20 Claims
-
1. A non-transitory computer-readable medium having stored thereon instructions that, when executed by one or more processors, are configurable to cause the one or more processors to:
-
transmit one or more messages to a computing device, wherein each of the one or more messages comprises a unique identifier (ID); generate a comparison checksum for each of the one or more messages, wherein each comparison checksum is associated with a unique ID corresponding to a message from which the comparison checksum was generated; perform an encryption on each comparison checksum and associated unique ID to generate encryption data including the encrypted checksum and associated unique ID; and transmit the encryption data to the computing device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer-readable medium having stored thereon instructions that, when executed by one or more processors, are configurable to cause the one or more processors to:
-
receive one or more messages at a computing device, wherein each of the one or more messages comprises a unique identifier (ID); generate a first message checksum for a first of the one or more messages, wherein the first message and the first message checksum are associated with a first unique ID; receive encryption data from the computing device; perform a decryption of the encryption data to extract one or more comparison checksums; and compare a first of the one or more comparison checksums having the first unique ID to the first message checksum to determine whether there is a match between the first message checksum and the first comparison checksum. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computing device comprising:
-
at least one physical memory device to store a log emitter; and one or more processors coupled with the at least one physical memory device, the one or more processors configurable to execute the log emitter to transmit one or more messages to a computing device, generate a comparison checksum for each of the one or more messages, perform an encryption on each comparison checksum and an associated unique identifier (ID) to generate encryption data including the encrypted checksum and associated unique ID and transmit the encryption data to the computing device, wherein each of the one or more messages comprises a unique ID and each comparison checksum is associated with a unique ID corresponding to a message from which the comparison checksum was generated. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computing device comprising:
-
at least one physical memory device to store a log collector; and one or more processors coupled with the at least one physical memory device, the one or more processors configurable to execute the log collector to receive one or more messages at a computing device, generate a first message checksum for a first of the one or more messages, receive encryption data from the computing device, perform a decryption of the encryption data to extract one or more comparison checksums including the encrypted checksum and associated unique ID and compare a first of the one or more comparison checksums having a first unique identifier (ID) to the first message checksum to determine whether there is a match between the first message checksum and the first comparison checksum, wherein each of the one or more messages comprises a unique ID and the first message and the first message checksum are associated with the first unique ID; - View Dependent Claims (17, 18, 19, 20)
-
Specification