Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for real-time processing of data requests

A data request and real-time processing technology, applied in the field of data processing, can solve the problems of occupying large system resources, low efficiency of security analysis, difficulty in satisfying security analysis, etc., and achieve the effect of improving efficiency and reducing times

Active Publication Date: 2020-04-10
ALIBABA GRP HLDG LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This method of security analysis for each data request requires a large amount of system resources, the efficiency of security analysis is low, and it is difficult to meet the needs of existing security analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for real-time processing of data requests
  • A method and device for real-time processing of data requests
  • A method and device for real-time processing of data requests

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] figure 1 It is a method flowchart of a data request processing method provided by an embodiment of the present invention, and the method includes:

[0065] S101: Obtain a data request of a database, where the data request is generated according to a corresponding database request protocol.

[0066] For example, the data request can be understood as a data request conforming to security analysis rules. The content format in the data request needs to comply with the database request protocol run by the database.

[0067] SQL is a general-purpose database request protocol. Therefore, optionally, the data request is specifically an SQL request. The security detection system can identify system risks and perform security certification by analyzing the SQL requests of the database. The content format in the SQL request must meet the requirements of SQL, which can be understood as the content format in the SQL request must use the paradigm specified by SQL.

[0068] S102:...

Embodiment 2

[0091] On the basis of the first embodiment, this embodiment will continue to explain the security analysis of the normalized request and whether to store the identifier in the cache. exist figure 1 On the basis of the corresponding embodiment, figure 2 It is a method flowchart of a data request processing method provided by an embodiment of the present invention, and the method includes:

[0092] S201: Obtain a data request of a database, where the data request is generated according to a corresponding database request protocol.

[0093] S202: Normalize the data request according to the database request protocol to obtain a normalized request. Let characters replace the variable part in the data request, the normalization request includes the fixed part, and the position of the original variable part is replaced by a preset character.

[0094] S203: Set a corresponding identifier for the normalization request.

[0095] S204: Determine whether the identifier is stored in ...

Embodiment 3

[0117] Figure 4 A device structure diagram of a data request real-time processing device provided in an embodiment of the present invention, including:

[0118] The obtaining unit 401 is configured to obtain a data request of the database, and the data request is generated according to a corresponding database request protocol.

[0119] For example, the data request can be understood as a data request conforming to security analysis rules. The content format in the data request needs to comply with the database request protocol run by the database.

[0120] SQL is a general-purpose database request protocol. Therefore, optionally, the data request is specifically an SQL request. The security detection system can identify system risks and perform security certification by analyzing the SQL requests of the database. The content format in the SQL request must meet the requirements of SQL, which can be understood as the content format in the SQL request must use the paradigm ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a real-time data request processing method and device. The method comprises the steps that a data request of a database is acquired; the data request is normalized according to a database request protocol to obtain a normalization request, wherein normalization is achieved through the steps of determining a fixed-normal-form fixed part according with the database request protocol in the data request and replacing a variable part in the data request with preset characters; a corresponding identifier is set for the normalization request; whether the identifier is stored in a cache or not is judged, and if yes, it is determined that safety analysis is conducted on the normalization request, the identifier is stored in the cache, and safety analysis is not conducted on the normalization request again. Accordingly, safety analysis does not need to be conducted on the normalization request of the data request; unnecessary repeated safety analysis is omitted, the safety analysis frequency is decreased, and the safety analysis efficiency is improved.

Description

technical field [0001] The invention relates to the field of data processing, in particular to a method and device for real-time processing of data requests. Background technique [0002] The safety detection system conducts safety analysis on the data requests of the database to identify possible system risks to ensure the safety of the database. [0003] For massive data requests, the online real-time analysis method adopted by the current security detection system is to perform security analysis on each data request that needs to be analyzed one by one under the existing security analysis rules. The security analysis can be understood as an in-depth security analysis, such as analyzing the risk value of the event through structured query language (Structured Query Language, SQL) analysis, judgment of objects stored in the database involved in SQL, and pattern matching. [0004] This method of performing security analysis on each data request needs to occupy a large amoun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/2452
CPCG06F16/24528
Inventor 徐大丁
Owner ALIBABA GRP HLDG LTD