CN108418903B - Remote access system and access method for embedded software log - Google Patents
Remote access system and access method for embedded software log Download PDFInfo
- Publication number
- CN108418903B CN108418903B CN201810520718.1A CN201810520718A CN108418903B CN 108418903 B CN108418903 B CN 108418903B CN 201810520718 A CN201810520718 A CN 201810520718A CN 108418903 B CN108418903 B CN 108418903B
- Authority
- CN
- China
- Prior art keywords
- log
- unit
- request
- cloud platform
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000012545 processing Methods 0.000 claims abstract description 8
- 238000012217 deletion Methods 0.000 claims description 4
- 230000037430 deletion Effects 0.000 claims description 4
- 238000011161 development Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Debugging And Monitoring (AREA)
Abstract
The invention discloses an embedded software log remote access system and an access method. The invention uses the message queue mechanism to keep the embedded device and the remote log access module in a long connection state all the time, so that a developer can check or delete the log of any embedded device accessing to the network at any required moment, thereby simplifying the log access flow and meeting the access requirement of the developer to the log. Meanwhile, in the invention, the logs of the embedded equipment are disclosed and transparent for other parts in the system, and the other parts do not need to perform any operation processing on the logs or store the logs, so that the storage space of the system is saved to the maximum extent, and the utilization rate of hardware resources in the system is improved.
Description
Technical Field
The invention relates to a remote access system and an access method, in particular to an embedded software log remote access system and an access method used in the Internet of things or the industrial Internet, and belongs to the field of the Internet of things or the industrial Internet.
Background
In recent years, the development of the internet of things and the industrial internet in China is rapid, and related devices represented by set top boxes, routers and various intelligent terminals are gradually applied and popularized in daily life of people. With this trend and current situation, at present, there are more and more embedded devices accessing the network.
In general, after a product is released or online, a software developer needs to locate, analyze and solve possible problems of the product by checking a log, and the process is also followed for embedded software. However, unlike other software, most embedded devices using embedded software have no display or input device, and developers cannot directly obtain logs through the devices. Moreover, the embedded device is generally located on the user side, which is far from the developer in space, so that it is difficult for the developer to obtain the log by the user, and therefore, how to conveniently obtain the log of the embedded software becomes a big problem commonly faced in the industry.
In the prior art, PC software in a network system generally uploads a log to a log server by prompting a user or automatically operating when a serious problem occurs in the system, and a developer then downloads a corresponding log from the log server. The existing server or background system software is generally convenient for developers to log in and check logs directly in a mode of opening a log port or a console.
But for embedded software the way the log is obtained differs from general software. In an important embedded device such as a communication device, if the port can be directly accessed, the log is generally checked in real time through an open port or port forwarding mode, and if the port cannot be directly accessed, the device periodically uploads the log to a log server through a special log server, so that a developer can download the log from the log server.
For most embedded devices, most of the embedded devices operate behind a firewall and cannot be directly accessed through a port, so that logs cannot be checked through an open port or port forwarding mode. However, the method of uploading the logs to the log server can be seen, but the logs need to be uploaded, how to upload the logs and the daily management of the uploaded server are very complex. Under the condition that the system has no problem, the content of the log is unnecessary, and the log can be stored on the log server for a long time, so that the storage space is wasted, and particularly in an Internet of things or industrial Internet platform accessed with mass equipment, the storage of the log also becomes a big problem in the existing system.
In summary, how to design an embedded log remote access system and an access method that enable a developer to randomly access a log of embedded software at any time to meet actual use needs is a problem to be solved by those skilled in the art.
Disclosure of Invention
In view of the above-mentioned drawbacks of the prior art, the present invention aims to provide an embedded software log remote access system and an access method used in the internet of things or the industrial internet.
The aim of the invention is achieved by the following technical scheme:
an embedded software log remote access system comprising:
the terminal unit is used for generating and sending a log access request, and receiving and checking a returned log result;
the network cloud platform unit is used for acquiring log information, receiving and responding to the log access request from the terminal unit, converting the log access request into log access information, then issuing the log access information, and returning the fed-back log result to the terminal unit;
the embedded equipment unit is used for receiving and decoding the log access message from the network cloud platform unit, generating a log result according to the log access message and feeding back the log result to the network cloud platform unit.
Preferably, the log access request includes a log list access request, a log file reference request, and a log file deletion request.
Preferably, the log access request is an HTTP request, and the log access message is an HTTPs request.
Preferably, the terminal unit includes:
the login authentication module is used for performing login authentication on the user information of the user terminal unit;
and the log terminal module is used for generating and sending a log access request, receiving and checking the returned log result in a text form.
Preferably, the network cloud platform unit includes a remote log service module for running a remote log service, the remote log service module includes:
a log management sub-module for managing the log message queue,
a receiving connection sub-module for receiving the message queue of the embedded equipment unit and establishing message connection,
a request encryption sub-module for encrypting the log access request generated by the terminal unit,
a message pushing sub-module for converting the log access request after encryption processing to generate log access message and pushing the log access message to the appointed embedded equipment unit,
and the result returning sub-module is used for receiving and converting the log result fed back by the embedded equipment unit and returning the converted log result to the terminal unit.
Preferably, each of the embedded device units corresponds to one embedded device, and the embedded device unit includes:
the service application module of the Internet of things manages and controls service applications and system tools in the Internet of things;
the remote log application module is used for receiving the log access message pushed by the network cloud platform unit, decoding the log access message, generating a log result according to the type of the log access request, and feeding back the log result to the network cloud platform unit.
An embedded software log remote access method comprises the following steps:
s1, a terminal unit is set, a log access request is generated and sent through the terminal unit, and a returned log result is received and checked;
s2, a network cloud platform unit is arranged, log information is obtained through the network cloud platform unit, a log access request from a terminal unit is received and responded, the log access request is converted into a log access message and then sent down, and a fed-back log result is returned to the terminal unit;
s3, an embedded equipment unit is arranged, the log access information from the network cloud platform unit is received and decoded through the embedded equipment unit, a log result is generated according to the log access information, and the log result is fed back to the network cloud platform unit.
Preferably, the log access request includes a log list access request, a log file reference request, and a log file deletion request.
Preferably, the log access request is an HTTP request, and the log access message is an HTTPs request.
Preferably, the step of terminating in S1 includes:
s11, a login authentication step, namely setting a login authentication module, and performing login authentication on user information of the user terminal unit through the login authentication module;
s12, a log terminal module is arranged, a log access request is generated and sent through the log terminal module, and a returned log result is received and checked in a text form.
Preferably, the step S2 of the network cloud platform includes a remote log service step, setting a remote log service module, and performing remote log service by using the remote log service module, where the remote log service step includes:
s21, a log management sub-step, wherein a log management sub-module is arranged, the log message queue is managed by the log management sub-module,
s22, setting a receiving connection sub-module, receiving the message queue of the embedded equipment unit and establishing message connection through the receiving connection sub-module,
s23, a request encryption sub-step, setting a request encryption sub-module, encrypting the log access request generated by the terminal unit through the request encryption sub-module,
s24, a message pushing sub-step, a message pushing sub-module is arranged, the encrypted log access request is converted through the message pushing sub-module, a log access message is generated and pushed to a designated embedded equipment unit,
s25, setting a result returning sub-module, receiving and converting the log result fed back by the embedded equipment unit through the result returning sub-module, and returning the converted log result to the terminal unit.
Preferably, each embedded device unit in S3 corresponds to one embedded device, and the steps of the embedded device in S3 include:
s31, an Internet of things service application step, namely setting an Internet of things service application module, and managing and controlling service applications and system tools in the Internet of things through the Internet of things service application module;
s32, a remote log application step, namely setting a remote log application module, receiving the log access message pushed by the network cloud platform unit through the remote log application module, decoding the log access message, generating a log result according to the type of the log access request, and feeding back the log result to the network cloud platform unit.
Compared with the prior art, the invention has the following outstanding effects:
the invention uses the message queue mechanism to keep the embedded device and the remote log access module in a long connection state all the time, so that a developer can check or delete the log of any embedded device accessing to the network at any required moment, thereby simplifying the log access flow and meeting the access requirement of the developer to the log. Meanwhile, in the invention, the logs of the embedded equipment are disclosed and transparent for other parts in the system, and the other parts do not need to perform any operation processing on the logs or store the logs, so that the storage space of the system is saved to the maximum extent, and the utilization rate of hardware resources in the system is improved. In addition, the request protocol and the file transmission protocol used in the invention are mostly realized based on the prior art, thereby not only fully ensuring the stability of the system in the use process, but also reducing the workload of developers and improving the operation efficiency of enterprises.
In conclusion, the invention has excellent use effect and high use and popularization value.
The following detailed description of the embodiments of the present invention is provided with reference to the accompanying drawings, so that the technical scheme of the present invention can be understood and mastered more easily.
Drawings
Fig. 1 is a topological graph of the present invention.
Detailed Description
As shown in the figure, the invention discloses an embedded software log remote access system and an access method used in the Internet of things or the industrial Internet.
Specifically, an embedded software log remote access system includes:
and the terminal unit is used for generating and sending a log access request, and receiving and checking a returned log result. In this technical solution, the terminal unit may be a computer used by development or technical support personnel to view the log, or may be a browser, a command line tool, or other tools capable of generating HTTPS commands, which mainly has the function of sending a log access request to the network cloud platform unit, and then viewing the returned result in text form.
The network cloud platform unit is used for acquiring log information, receiving and responding to the log access request from the terminal unit, converting the log access request into log access information, then issuing the log access information, and returning the fed-back log result to the terminal unit. In the technical scheme, the network cloud platform unit is a remote cloud platform for managing equipment, users and data of the Internet of things or the industrial Internet, and comprises a privately deployed Internet of things system with an open Internet port, and is mainly used for running remote log services.
The embedded equipment unit is used for receiving and decoding the log access message from the network cloud platform unit, generating a log result according to the log access message and feeding back the log result to the network cloud platform unit. In this embodiment, the embedded device unit is mainly configured to receive a log access message pushed from the network cloud platform unit, decode the log access message, and return a log result to the network cloud platform unit according to a request log access type. It should be noted that, in order for the remote log application module in the embedded device unit to access the log of other applications, those applications that need remote log access must output the log to a file, store it in a specified directory and store it with a directory name or file name in a specified format.
The log access request includes a log list access request, a log file reference request, and a log file delete request.
The log access request is an HTTP request, and the log access message is an HTTPS request.
The terminal unit includes:
the login authentication module is used for performing login authentication on the user information of the user terminal unit;
and the log terminal module is used for generating and sending a log access request, receiving and checking the returned log result in a text form.
The message queue used in the invention can be in a mode without return value, and the embedded equipment unit sends the result to the network cloud platform unit through TCP or HTTP protocol.
The network cloud platform unit comprises a remote log service module, is connected with the log terminal module and is used for running remote log service, and the remote log service module comprises:
the log management sub-module is used for managing the log message queue;
the receiving connection sub-module is used for receiving the message queue of the embedded equipment unit and establishing message connection;
the request encryption sub-module is used for carrying out encryption processing on the log access request generated by the terminal unit, wherein the encryption processing specifically adopts TLS encryption and needs security authentication, and the HTTP request is converted into an HTTPS request.
The message pushing sub-module converts the log access request after encryption processing, generates log access messages and pushes the log access messages to the appointed embedded equipment units, and for simplifying the implementation, the message pushing interface needs the embedded equipment units to synchronously return log results unlike a common message queue.
And the result returning sub-module receives and converts the log result fed back by the embedded equipment unit, converts the log result into a Response of the HTTPS, and returns the converted log result to the terminal unit.
Each embedded equipment unit corresponds to one embedded equipment, and the embedded equipment unit comprises:
the service application module of the Internet of things manages and controls service applications and system tools in the Internet of things;
the remote log application module is connected with the remote log service module, receives the log access message pushed by the network cloud platform unit, decodes the log access message, generates a log result according to the type of the log access request, and feeds the log result back to the network cloud platform unit.
The overall process steps of the present invention are briefly described below:
when a developer or a technical support person needs to check a log file of an application of an embedded device, first, a unique identifier of each embedded device unit needs to be obtained, and because each embedded device unit corresponds to one embedded device, the information of the corresponding embedded device is mastered. And then obtaining all log file lists of the appointed application on the equipment through a remote log service module of the network cloud platform unit by using an HTTPS request, determining the log files to be checked after obtaining the lists, and then obtaining the content of the appointed log files through the HTTPS request. The specified log file may also be deleted, if necessary, by HTTPS commands.
In the embedded device unit, it is necessary to output the log to a file by an application desiring to view the log remotely, store the log in a fixed directory, and name the log file or directory with a certain naming rule. And then establishing message communication connection with the cloud platform through the message queue client, and subscribing the message with the unique identifier of the equipment as a theme to a remote log service module of the network cloud platform unit.
Since in the present invention, the log access request includes three types of log list access request, log file reference request, and log file deletion request, the steps corresponding to these three different types of operations are described herein, respectively.
The step of accessing a list of log files of an application on the embedded device is as follows:
1.1, a terminal unit is connected with a network cloud platform unit to carry out login authentication;
1.2, a terminal unit initiates a log list access request to a network cloud platform unit through HTTPS, wherein the request comprises a unique identifier of equipment and an application name of a log to be checked;
1.3, after the remote log service module of the network cloud platform unit receives the HTTP request, decoding the request content to obtain the unique identifier of the equipment and check the application name;
1.4, the network cloud platform unit generates a log file list viewing message according to the request application name;
1.5, the network cloud platform unit pushes the message to the embedded device unit by taking the device unique identifier as a message theme;
1.6, decoding the message after receiving the message by the embedded equipment unit, and obtaining the message type and checking the application;
1.7, listing a log file list of a specified application by the embedded equipment unit;
1.8, the embedded equipment unit returns the log file list to the network cloud platform unit;
1.9, the network cloud platform unit encapsulates the return result into an HTTPS request to a Response;
and 1.10, the network cloud platform unit returns a log file list to the terminal unit.
The step of consulting a log file on the embedded device is as follows:
2.1, a terminal unit initiates a request for checking log file content to a network cloud platform unit through HTTPS, wherein the request comprises a unique identifier of equipment and a name of a log file to be checked;
2.2, after the remote log service of the network cloud platform unit receives the HTTP request, decoding the request content to obtain the unique identifier and log file name of the equipment;
2.3, the network cloud platform unit generates a log file checking message according to the name of the request log file;
2.4, the network cloud platform unit pushes the message to the embedded device unit by taking the device unique identifier as a message theme;
2.5, decoding the message after the embedded equipment unit receives the message, and obtaining the message type and the log file name;
2.6, the embedded equipment unit reads the content of the appointed log file;
2.7, the embedded equipment unit returns the log file content to the network cloud platform unit;
2.8, the network cloud platform unit encapsulates the return result into an HTTPS request to a Response;
and 2.9, the network cloud platform unit returns the log file content to the terminal unit.
The step of deleting a log file on the embedded device is as follows:
3.1, the terminal unit initiates a log file deleting request to the network cloud platform unit through HTTPS, wherein the request comprises a unique identifier of equipment and a log file name to be checked;
3.2, after the remote log service of the network cloud platform unit receives the HTTP request, decoding the request content to obtain the unique identifier and log file name of the equipment;
3.3, the network cloud platform unit generates a log file deleting message according to the name of the request log file;
3.4, the network cloud platform unit pushes the message to the embedded device unit by taking the device unique identifier as a message theme;
3.5, decoding the message after the embedded equipment unit receives the message, and obtaining the message type and the log file name;
3.6, deleting the appointed log file by the embedded equipment unit;
3.7, the embedded equipment unit returns the deleting result to the cloud platform;
3.8, the network cloud platform unit encapsulates the return result into an HTTPS request to a Response;
and 3.9, the network cloud platform unit returns a deleting result to the terminal unit.
The invention also discloses a remote access method of the embedded software log, which comprises the following steps:
s1, a terminal unit is set, a log access request is generated and sent through the terminal unit, and a returned log result is received and checked;
s2, a network cloud platform unit is arranged, log information is obtained through the network cloud platform unit, a log access request from a terminal unit is received and responded, the log access request is converted into a log access message and then sent down, and a fed-back log result is returned to the terminal unit;
s3, an embedded equipment unit is arranged, the log access information from the network cloud platform unit is received and decoded through the embedded equipment unit, a log result is generated according to the log access information, and the log result is fed back to the network cloud platform unit.
The log access request includes a log list access request, a log file reference request, and a log file delete request.
The log access request is an HTTP request, and the log access message is an HTTPS request.
The step of the terminal in S1 comprises the following steps:
s11, a login authentication step, namely setting a login authentication module, and performing login authentication on user information of the user terminal unit through the login authentication module;
s12, a log terminal module is arranged, a log access request is generated and sent through the log terminal module, and a returned log result is received and checked in a text form.
S2, the network cloud platform step comprises a remote log service step, a remote log service module is set, the remote log service module is used for carrying out remote log service, and the remote log service step comprises the following steps:
s21, a log management sub-step, wherein a log management sub-module is arranged, the log message queue is managed by the log management sub-module,
s22, setting a receiving connection sub-module, receiving the message queue of the embedded equipment unit and establishing message connection through the receiving connection sub-module,
s23, a request encryption sub-step, setting a request encryption sub-module, encrypting the log access request generated by the terminal unit through the request encryption sub-module,
s24, a message pushing sub-step, a message pushing sub-module is arranged, the encrypted log access request is converted through the message pushing sub-module, a log access message is generated and pushed to a designated embedded equipment unit,
s25, setting a result returning sub-module, receiving and converting the log result fed back by the embedded equipment unit through the result returning sub-module, and returning the converted log result to the terminal unit.
Each embedded equipment unit in S3 corresponds to one embedded equipment, and the steps of the embedded equipment in S3 include:
s31, an Internet of things service application step, namely setting an Internet of things service application module, and managing and controlling service applications and system tools in the Internet of things through the Internet of things service application module;
s32, a remote log application step, namely setting a remote log application module, receiving the log access message pushed by the network cloud platform unit through the remote log application module, decoding the log access message, generating a log result according to the type of the log access request, and feeding back the log result to the network cloud platform unit.
It should be noted that, the present invention uses message pairing to remotely obtain the log on the embedded device by using the long connection between the embedded device unit and the network cloud platform unit. The terminal unit requests the software log through HTTPS, and ensures the safety through login authentication, and the terminal unit can adopt tools such as curl, web browser and the like without any additional development. The invention uses the unique identification of the embedded device as the message theme, so that the network cloud platform unit is very simple when pushing the message, the message is not required to be searched, the message is only required to be pushed according to the message theme, and the realization mode is more convenient. In the invention, the log content is transparent to the network cloud platform unit, and the remote service only needs to convert the HTTP request into the message, push the message to the embedded equipment, and encapsulate the message to the HTTP Response after receiving the return result, so that the log is not required to be managed and stored. In addition, the remote log access process and method are transparent to the application being checked, other applications only need to output the log to a file and store the log in a certain format, and no other operation is needed.
In summary, the invention uses the message queue mechanism to keep the embedded device and the remote log access module in a long connection state all the time, so that the developer can check or delete any log of the embedded device accessing the network at any required time, thereby simplifying log access flow and meeting the access requirement of the developer to the log. Meanwhile, in the invention, the logs of the embedded equipment are disclosed and transparent for other parts in the system, and the other parts do not need to perform any operation processing on the logs or store the logs, so that the storage space of the system is saved to the maximum extent, and the utilization rate of hardware resources in the system is improved. In addition, the request protocol and the file transmission protocol used in the invention are mostly realized based on the prior art, so that the stability in the use process is fully ensured, the workload of developers is reduced, and the operation efficiency of enterprises is improved.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
Furthermore, it should be understood that although the present disclosure describes embodiments, not every embodiment is provided with a separate embodiment, and that this description is provided for clarity only, and that the disclosure is not limited to the embodiments described in detail below, and that the embodiments described in the examples may be combined as appropriate to form other embodiments that will be apparent to those skilled in the art.
Claims (8)
1. The remote access method for the embedded software log is characterized by comprising the following steps of:
s1, a terminal unit is set, a log access request is generated and sent through the terminal unit, and a returned log result is received and checked;
s2, a network cloud platform unit is arranged, log information is obtained through the network cloud platform unit, a log access request from a terminal unit is received and responded, the log access request is converted into a log access message and then sent down, and a fed-back log result is returned to the terminal unit;
s3, an embedded equipment unit is arranged, a log access message from the network cloud platform unit is received and decoded through the embedded equipment unit, a log result is generated according to the log access message, and the log result is fed back to the network cloud platform unit;
the log access request comprises a log list access request, a log file consulting request and a log file deleting request;
the log access request is an HTTP request, and the log access message is an HTTPS request;
when the log access request is a log list access request, the response to the log access request includes the steps of:
the terminal unit is connected with the network cloud platform unit for login authentication,
the terminal unit initiates a log list access request to the network cloud platform unit by HTTPS, the request contains a unique identifier of the equipment and an application name of the log to be checked,
after receiving the HTTP request, the remote log service module of the network cloud platform unit decodes the request content to obtain the unique identifier of the equipment and check the application name,
the network cloud platform unit generates a log file list viewing message according to the request application name,
the network cloud platform unit pushes messages to the embedded device unit with the device unique identification as the message topic,
the embedded equipment unit decodes the message after receiving the message, obtains the message type and views the application,
the embedded device unit lists a list of log files for a given application,
the embedded device unit returns a list of log files to the network cloud platform unit,
the network cloud platform unit encapsulates the return result into an HTTPS request into Response,
the network cloud platform unit returns a log file list to the terminal unit;
when the log access request is a log file reference request, the response to the log access request includes the steps of: the terminal unit initiates a request for checking the content of the log file to the network cloud platform unit by HTTPS, the request contains a unique identifier of the equipment and the name of the log file to be checked,
after receiving the HTTP request, the remote log service of the network cloud platform unit decodes the request content to obtain the unique identifier and log file name of the equipment,
the network cloud platform unit generates a log file view message according to the request log file name,
the network cloud platform unit pushes messages to the embedded device unit with the device unique identification as the message topic,
the embedded device unit reads the specified log file content,
the embedded device unit returns log file content to the network cloud platform unit,
the network cloud platform unit encapsulates the return result into an HTTPS request into Response,
the network cloud platform unit returns log file contents to the terminal unit;
when the log access request is a log file delete request, the response to the log access request includes the steps of:
the terminal unit initiates a request for deleting the log file to the network cloud platform unit by HTTPS, the request comprises a unique identifier of the equipment and the name of the log file to be checked,
after receiving the HTTP request, the remote log service of the network cloud platform unit decodes the request content to obtain the unique identifier and log file name of the equipment,
the network cloud platform unit generates a log file delete message according to the request log file name,
the network cloud platform unit pushes messages to the embedded device unit with the device unique identification as the message topic,
the embedded equipment unit decodes the message after receiving the message, acquires the message type and the log file name,
the embedded device unit returns the deletion result to the cloud platform,
the network cloud platform unit encapsulates the return result into an HTTPS request into Response,
and the network cloud platform unit returns a deleting result to the terminal unit.
2. The method for remote access to embedded software log according to claim 1, wherein the step of S1 includes:
s11, a login authentication step, namely setting a login authentication module, and performing login authentication on user information of the user terminal unit through the login authentication module;
s12, a log terminal module is arranged, a log access request is generated and sent through the log terminal module, and a returned log result is received and checked in a text form.
3. The method for remote access to embedded software log according to claim 1, wherein S2 the network cloud platform step includes a remote log service step of setting a remote log service module through which remote log service is performed, the remote log service step including:
s21, a log management sub-step, wherein a log management sub-module is arranged, the log message queue is managed by the log management sub-module,
s22, setting a receiving connection sub-module, receiving the message queue of the embedded equipment unit and establishing message connection through the receiving connection sub-module,
s23, a request encryption sub-step, setting a request encryption sub-module, encrypting the log access request generated by the terminal unit through the request encryption sub-module,
s24, a message pushing sub-step, a message pushing sub-module is arranged, the encrypted log access request is converted through the message pushing sub-module, a log access message is generated and pushed to the appointed embedded equipment unit,
s25, setting a result returning sub-module, receiving and converting the log result fed back by the embedded equipment unit through the result returning sub-module, and returning the converted log result to the terminal unit.
4. The method for remote access to an embedded software log according to claim 1, wherein each of the embedded device units corresponds to an embedded device, and S3 the step of the embedded device comprises:
s31, an Internet of things service application step, namely setting an Internet of things service application module, and managing and controlling service applications and system tools in the Internet of things through the Internet of things service application module;
s32, a remote log application step, namely setting a remote log application module, receiving the log access message pushed by the network cloud platform unit through the remote log application module, decoding the log access message, generating a log result according to the type of the log access request, and feeding back the log result to the network cloud platform unit.
5. An embedded software log remote access system based on the embedded software log remote access method as claimed in claim 1, wherein the system comprises the following units:
the terminal unit is used for generating and sending a log access request, and receiving and checking a returned log result;
the network cloud platform unit is used for acquiring log information, receiving and responding to the log access request from the terminal unit, converting the log access request into log access information, then issuing the log access information, and returning the fed-back log result to the terminal unit;
the embedded equipment unit is used for receiving and decoding the log access message from the network cloud platform unit, generating a log result according to the log access message and feeding back the log result to the network cloud platform unit.
6. The embedded software log remote access system of claim 5, wherein the terminal unit comprises: the login authentication module is used for carrying out login authentication on the user information of the user terminal unit through the login authentication module;
and the log terminal module is used for generating and sending a log access request through the log terminal module, receiving and checking the returned log result in a text form.
7. The embedded software log remote access system of claim 5, wherein the network cloud platform unit comprises:
the remote log service module is used for performing remote log service;
the remote log service module includes:
a log management sub-module for managing the log message queue,
a receiving connection sub-module for receiving the message queue of the embedded equipment unit and establishing message connection,
a request encryption sub-module for encrypting the log access request generated by the terminal unit,
a message pushing sub-module for converting the log access request after encryption processing, generating log access message and pushing to the appointed embedded equipment unit,
and the result returning sub-module is used for receiving and converting the log result fed back by the embedded equipment unit and returning the converted log result to the terminal unit.
8. The embedded software log remote access system of claim 5, wherein each of the embedded device units corresponds to an embedded device, the embedded device unit comprising:
the service application module of the Internet of things is used for managing and controlling service applications and system tools in the Internet of things;
the remote log application module is used for receiving the log access message pushed by the network cloud platform unit, decoding the log access message, generating a log result according to the type of the log access request, and feeding back the log result to the network cloud platform unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810520718.1A CN108418903B (en) | 2018-05-28 | 2018-05-28 | Remote access system and access method for embedded software log |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810520718.1A CN108418903B (en) | 2018-05-28 | 2018-05-28 | Remote access system and access method for embedded software log |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108418903A CN108418903A (en) | 2018-08-17 |
CN108418903B true CN108418903B (en) | 2024-02-02 |
Family
ID=63140595
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810520718.1A Active CN108418903B (en) | 2018-05-28 | 2018-05-28 | Remote access system and access method for embedded software log |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108418903B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109240126B (en) * | 2018-11-21 | 2024-03-08 | 国网湖北省电力有限公司电力科学研究院 | Distributed application service monitoring system and method with analog operation function |
CN110209564A (en) * | 2019-06-03 | 2019-09-06 | 宜春宜联科技有限公司 | Acquisition methods, printer, server and the printer system of printer log |
CN110557563B (en) * | 2019-08-05 | 2021-03-26 | 深圳市天视通电子科技有限公司 | Remote communication method and system for network camera |
CN111628967B (en) * | 2020-04-20 | 2023-01-17 | 深圳市广和通无线股份有限公司 | Log data transmission method and device, computer equipment and storage medium |
CN114679397B (en) * | 2022-05-06 | 2023-12-12 | 苏州德姆斯信息技术有限公司 | Fault analysis system and method for embedded equipment |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001063411A2 (en) * | 2000-02-25 | 2001-08-30 | Navic Systems, Inc. | Method and system for embedded network device installation |
WO2003021464A2 (en) * | 2001-09-05 | 2003-03-13 | Rubenstein, Allen, I. | Secure remote access between peers |
JP2010277144A (en) * | 2009-05-26 | 2010-12-09 | Nippon Telegr & Teleph Corp <Ntt> | User authentication system, user terminal, log authentication server, user authentication method, and program |
CN103942134A (en) * | 2014-04-04 | 2014-07-23 | 福建星网视易信息系统有限公司 | Method and system for viewing embedded device log |
CN103973785A (en) * | 2014-05-07 | 2014-08-06 | Tcl集团股份有限公司 | Log reading system based on P2P and method thereof |
JP2015082183A (en) * | 2013-10-22 | 2015-04-27 | キヤノン株式会社 | Document creation system |
CN106534257A (en) * | 2016-09-29 | 2017-03-22 | 国家电网公司 | Multi-level cluster-type construction multi-source safety log collection system and method |
CN106789431A (en) * | 2016-12-26 | 2017-05-31 | 中国银联股份有限公司 | A kind of overtime monitoring method and device |
CN106789153A (en) * | 2016-11-09 | 2017-05-31 | 苏州数言信息技术有限公司 | The log recording of self adaptation by all kinds of means of Internet of things system terminal device, output intent and system |
CN107193669A (en) * | 2017-05-09 | 2017-09-22 | 千寻位置网络有限公司 | The system and design method of maintenance interface based on mixed cloud or large-scale cluster |
-
2018
- 2018-05-28 CN CN201810520718.1A patent/CN108418903B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001063411A2 (en) * | 2000-02-25 | 2001-08-30 | Navic Systems, Inc. | Method and system for embedded network device installation |
WO2003021464A2 (en) * | 2001-09-05 | 2003-03-13 | Rubenstein, Allen, I. | Secure remote access between peers |
JP2010277144A (en) * | 2009-05-26 | 2010-12-09 | Nippon Telegr & Teleph Corp <Ntt> | User authentication system, user terminal, log authentication server, user authentication method, and program |
JP2015082183A (en) * | 2013-10-22 | 2015-04-27 | キヤノン株式会社 | Document creation system |
CN103942134A (en) * | 2014-04-04 | 2014-07-23 | 福建星网视易信息系统有限公司 | Method and system for viewing embedded device log |
CN103973785A (en) * | 2014-05-07 | 2014-08-06 | Tcl集团股份有限公司 | Log reading system based on P2P and method thereof |
CN106534257A (en) * | 2016-09-29 | 2017-03-22 | 国家电网公司 | Multi-level cluster-type construction multi-source safety log collection system and method |
CN106789153A (en) * | 2016-11-09 | 2017-05-31 | 苏州数言信息技术有限公司 | The log recording of self adaptation by all kinds of means of Internet of things system terminal device, output intent and system |
CN106789431A (en) * | 2016-12-26 | 2017-05-31 | 中国银联股份有限公司 | A kind of overtime monitoring method and device |
CN107193669A (en) * | 2017-05-09 | 2017-09-22 | 千寻位置网络有限公司 | The system and design method of maintenance interface based on mixed cloud or large-scale cluster |
Non-Patent Citations (3)
Title |
---|
Poster Abstract: 5GHealthNet — A Cloud Based Framework for Faster and Authorized Access to Private Medical Records through 5G Wireless Network;Narasimha Kamath Ardi 等;《2016 IEEE/ACM Symposium on Edge Computing》;全文 * |
X射线单晶衍射仪远程控制系统消息通信系统;武佳颖;于碧辉;;计算机系统应用(02);全文 * |
一种数字校园日志获取模型及实现方法;康金辉;;计算机与数字工程(04);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN108418903A (en) | 2018-08-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108418903B (en) | Remote access system and access method for embedded software log | |
WO2017063442A1 (en) | Private cloud desktop system, and method and apparatus thereof for implementing service | |
CN102148835A (en) | Method and system for transmitting and sharing electronic documents | |
CN101472140B (en) | System for distributing and requiring multimedia program and implementing method thereof | |
CN101399729B (en) | Management system and method for file download and upload | |
CN101204039B (en) | System and method of device-to-server registration | |
US10034057B2 (en) | Message processing method, device, gateway, STB and IPTV | |
US20070049258A1 (en) | System and method of mobile to desktop document interaction using really simple syndication | |
CN111787517A (en) | Method and device for binding activation of intelligent equipment | |
CN103780700A (en) | Application system and method for achieving compatibility and sharing among multi-source heterogeneous systems | |
CN104009938A (en) | Method and system for long connections based on router level | |
WO2008040224A1 (en) | Data synchronous method, system and apparatus | |
CN103188283A (en) | Method, server and system for file uploading and downloading | |
CN102571941B (en) | Cloud point-to-point data transmission method and system | |
CN104486388A (en) | Accessing method and device of cloud storage file | |
CN102368768A (en) | Identification method, equipment and system as well as identification server | |
WO2008087374A2 (en) | SYSTEM AND METHOD FOR REMOTELY ACCESSING UNIVERSAL PLUG AND PLAY (UPnP) NETWORKS | |
WO2013131477A1 (en) | Remote monitoring device and method | |
CN103780641A (en) | Cloud desktop access method, home gateway and system | |
JP2012008731A (en) | Document generation device, document generation system, document upload method and program | |
CN112416396B (en) | Application program updating method and system | |
CN105743746A (en) | Intelligent home electric appliance management method, management apparatus and management system | |
US20140189055A1 (en) | Migration of usage sessions between devices | |
CN103685485A (en) | Mobile terminal VoIP (voice over internet protocol) communication audio management system | |
CN109831404B (en) | Instant communication system and method compatible with multiple terminals |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |