Method and system for viewing embedded device log

An embedded device and log technology, applied in transmission systems, hardware monitoring, electrical components, etc., can solve problems such as reappearing abnormal status of applications, low efficiency of troubleshooting methods, and protection of product information security risks, so as to improve efficiency, Simplify viewing the effects of your process

Active Publication Date: 2014-07-23
FUJIAN STAR NET EVIDEO INFORMATION SYST CO LTD
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The efficiency of the above troubleshooting method is relatively low. When a bug is not inevitable, it is difficult to reproduce the abnormal state of the application when re-running. At the same time, the remote login password of the embedded device needs to be exposed to the outside during the remote login process. , there is a great risk in protecting the information security of the product itself

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for viewing embedded device log
  • Method and system for viewing embedded device log
  • Method and system for viewing embedded device log

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to describe the technical content, structural features, achieved goals and effects of the present invention in detail, the following will be described in detail in conjunction with the embodiments and accompanying drawings.

[0022] The present invention provides a system and method for viewing logs of embedded devices. By implementing a log daemon process to receive the log control protocol of the server, when receiving the log control protocol, it notifies other applications, and then the log modules in other applications According to the content of the agreement, the log information in the application program to which it belongs is transmitted to the log control server. The unified hierarchical management of log information of embedded devices is realized, and the viewing process of log information of embedded devices is effectively simplified.

[0023] see figure 1 , is a structural block diagram of a system for viewing embedded device logs in an embodimen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for viewing an embedded device log. The method comprises the following steps that a log control module in a log control server sends a log control protocol to an embedded device, wherein the log control protocol is used for controlling log information of the embedded device to be uploaded; after the log control protocol is received, the log daemon of the embedded device sends the log control protocol to a log module of an application program in the embedded device; the log module responds to the log control protocol and uploads the log information of the application program to the log control server. The invention further discloses a system for viewing the embedded device log.

Description

technical field [0001] The invention relates to a method and system for checking embedded device logs. Background technique [0002] At present, when the application program runs on the embedded device, for example, the embedded device terminal installed in multiple regions such as electronic billboards, the software maintenance personnel usually cannot view the output information of the application program of this type of device. When the application program runs When an exception occurs, the software maintenance personnel can only use telnet (Telnet protocol is a member of the TCP / IP protocol family, and it is the standard protocol and main method of Internet remote login service. It provides users with the ability to complete remote host work on the local computer. The ability to remotely control the Web server is a common method) or other ways to remotely log in to the embedded device, first close the application, then re-run the application, and locate the problem by vi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/34H04L29/06
Inventor 何美苗徐继芸
Owner FUJIAN STAR NET EVIDEO INFORMATION SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products