Data processing method and system

A data processing and data technology, applied in the field of data security, can solve the problems of lack of ability, no stream processing design, lack of configuration expansion ability, etc., to achieve the effect of high configurability, advanced architecture and stable technology

Inactive Publication Date: 2018-05-11
北京明朝万达科技股份有限公司
View PDF11 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the outstanding problems faced by commercial banks in information security risk management are: external attacks are more diversified; external attacks are more concentrated; existing security and audit measures are difficult to adapt to the business development needs in the big data environment; and lack of index

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and system
  • Data processing method and system
  • Data processing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Kafka is a high-throughput distributed publish-subscribe messaging system that can handle all action streaming data in consumer-scale websites. Such actions (web browsing, searching and other user actions) are a key factor in many social functions on the modern web. These data are usually addressed by processing logs and log aggregation due to throughput requirements. This is a viable solution for systems like Hadoop that log data and analyze offline, but require real-time processing constraints. The purpose of Kafka is to unify online and offline message processing through Hadoop's parallel loading mechanism, and to provide real-time consumption through clusters.

[0050] Redis is an open-source, log-type, Key-Value database written in ANSI C language, supports network, can be memory-based or persistent, and provides APIs in multiple languages. Redis is a key-value storage system. Similar to Memcached, it supports relatively more value types for storage, including s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data processing method. The method comprises the following steps that collected information data serves as log data to be stored in an information system; log data in the information system is read, the log data is classified, and a strategy tree is encapsulated by combining strategy tree cache and other cache information; alarm event information and security event information are generated according to rule configuration information and strategy tree cache strategy information; the rule configuration information is subjected to dynamic adjustment according to the alarm event information and the security event information. According to the scheme, the framework is advanced, the technology is stable, and the compatibility is high; the large data volume condition issupported; the rule system configurability is high.

Description

technical field [0001] The invention relates to the field of data security, in particular to a data processing method and system based on a flow processing rule engine. Background technique [0002] The complex internal security system of the enterprise and the security business rules that are constantly changing with external conditions require unified data storage and the ability to effectively separate business logic and technical decisions of application developers. The rule engine can realize the vertical and horizontal verification of system data and the verification of the logical relationship between tables. As an independent module, it can adapt to different business models to cope with dynamically changing environments. [0003] In recent years, information security risk incidents of commercial banks have occurred from time to time. While information technology promotes business innovation and transformation of small and medium-sized commercial banks, it also bring...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06F11/30
CPCG06F11/3072G06F21/552
Inventor 王春波喻波王志海安鹏
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products