Database error information extracting method and system
A technology of error information and extraction methods, applied in the network field, to achieve the effect of simple algorithm implementation, guaranteed efficiency, and good scalability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] This embodiment is the basic mode of the database error information extraction method. systems used such as figure 1 shown. Including database type identification locator, error information return packet locator, error information location and extractor, error code library, auditing device, the operation process is as follows figure 2 Shown:
[0030] ① Database type identification and positioning steps. Different databases use different communication protocols, for example, Sybase database and sqlserver database use TDS protocol, Oracle database uses TNS protocol, Informix database uses its self-designed informix protocol, and so on. These databases will exchange some system information with each other during the initial connection and interaction between the client and the server during the operation of the actual network environment, such as the operating system of the server and the client, the type and version of the database currently in use, and so on. These ...
Embodiment 2
[0036] This embodiment is a preferred solution for the step of identifying and locating database types in Embodiment 1.
[0037] The basic idea of this embodiment is: firstly, in the process of connecting the database client and the server, use the protocol analysis method to find as much information as possible that can identify the database type and host state, including the static characteristics and ports of the protocol used. Wait. Because these information are unique identifiers of each database, and generally do not have the same protocol static characteristics or ports, it is feasible. In this embodiment, the port characteristics and static characteristics of the protocols used by various databases in the actual interaction process are selected as the distinguishing marks of the protocols. For example, the TDS protocol is used in the sybase database, and the server end uses the TCP5000 port for communication, and the TCP5000 port is used as the identification mark o...
Embodiment 3
[0039] This embodiment is an optimal solution for the step of locating the error information return packet in the first embodiment.
[0040] This embodiment is carried out on the premise of accurately identifying the database type used in the actual network environment in the database type identification and positioning stage. After determining the type of database actually used in the current network application environment, this step is responsible for identifying packets that may contain error information among the data packets captured during the actual interaction between the client and the server. In this step, it is mainly necessary to determine the type identification of the data packets related to business operations in different types of database environments, so as to further determine the type identification of the data packets returned to the server for the operation, and use these types of data packets as error messages Extracted object. For example, in the Orac...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com