Database error information extracting method and system

A technology of error information and extraction methods, applied in the network field, to achieve the effect of simple algorithm implementation, guaranteed efficiency, and good scalability

Inactive Publication Date: 2009-06-10
BEIJING VENUS INFORMATION TECH
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the deficiencies of the existing network business audit system for the extraction of error information returned by the server during database operations and the audit function, the present invention provides a method and system for extracting error information from the database, a method for the server-side during the six common database operations. The extraction method of the returned error message

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database error information extracting method and system
  • Database error information extracting method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] This embodiment is the basic mode of the database error information extraction method. systems used such as figure 1 shown. Including database type identification locator, error information return packet locator, error information location and extractor, error code library, auditing device, the operation process is as follows figure 2 Shown:

[0030] ① Database type identification and positioning steps. Different databases use different communication protocols, for example, Sybase database and sqlserver database use TDS protocol, Oracle database uses TNS protocol, Informix database uses its self-designed informix protocol, and so on. These databases will exchange some system information with each other during the initial connection and interaction between the client and the server during the operation of the actual network environment, such as the operating system of the server and the client, the type and version of the database currently in use, and so on. These ...

Embodiment 2

[0036] This embodiment is a preferred solution for the step of identifying and locating database types in Embodiment 1.

[0037] The basic idea of ​​this embodiment is: firstly, in the process of connecting the database client and the server, use the protocol analysis method to find as much information as possible that can identify the database type and host state, including the static characteristics and ports of the protocol used. Wait. Because these information are unique identifiers of each database, and generally do not have the same protocol static characteristics or ports, it is feasible. In this embodiment, the port characteristics and static characteristics of the protocols used by various databases in the actual interaction process are selected as the distinguishing marks of the protocols. For example, the TDS protocol is used in the sybase database, and the server end uses the TCP5000 port for communication, and the TCP5000 port is used as the identification mark o...

Embodiment 3

[0039] This embodiment is an optimal solution for the step of locating the error information return packet in the first embodiment.

[0040] This embodiment is carried out on the premise of accurately identifying the database type used in the actual network environment in the database type identification and positioning stage. After determining the type of database actually used in the current network application environment, this step is responsible for identifying packets that may contain error information among the data packets captured during the actual interaction between the client and the server. In this step, it is mainly necessary to determine the type identification of the data packets related to business operations in different types of database environments, so as to further determine the type identification of the data packets returned to the server for the operation, and use these types of data packets as error messages Extracted object. For example, in the Orac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a system for extracting database error message, in particular to a method and a system for extracting the error message returned from a server side during the operation of six frequently-used databases and carrying out related operation audit used in network business audit product. The system comprises a database type identification locator, an error message return package locator, an error message locating and extracting device, an error code library and an audit device. The invention solves the problem that the audit of the error message returned from the server side in the database operation process is lacked in the prior audit product, and overcomes the defects that the error message audit is difficult because different database types use different protocols. The invention has very good expansibility. For new database types, the system and the method have flexible expansibility to expand audit range and very high extraction efficiency and accuracy for the error message of the different database types, and can be widely applied to network business audit products.

Description

technical field [0001] The invention relates to a method for accurately extracting errors returned by six commonly used databases when an operation error occurs in the operation process, which can be used in network business audit products. It is a database error information extraction method and system, which is based on network data stream The characteristics of the message identify and extract the error information that occurs during the operation of six databases, and belong to the field of network technology. Background technique [0002] The network business audit system is an important means of network security protection that is increasingly widely used at present. It analyzes, records, and analyzes the network activities of trusted personnel in the business system to help managers plan and prevent in advance, monitor in real time, and violate regulations. Behavior prevention and post-event investigation of network operation accidents can help users strengthen intern...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06G06F17/30
Inventor 孙海波骆拥政刘晖李新鹏
Owner BEIJING VENUS INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products