Unlock instant, AI-driven research and patent intelligence for your innovation.

Transaction data exception monitoring method, system, equipment and medium

A technology for abnormal monitoring and transaction data, applied in the direction of file system, file system function, file system type, etc., can solve the problem of strong code logic and data structure dependence, achieve strong portability, solve strong dependence, improve Get the effect of efficiency

Pending Publication Date: 2022-01-04
WEIKUN (SHANGHAI) TECH SERVICE CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, it is necessary to provide a transaction data abnormality monitoring method, system, device and readable storage medium to solve the technical problem that the existing transaction timeliness monitoring method is highly dependent on the code logic and data structure of the transaction system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transaction data exception monitoring method, system, equipment and medium
  • Transaction data exception monitoring method, system, equipment and medium
  • Transaction data exception monitoring method, system, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] refer to figure 1 , shows a flow chart of the steps of the transaction data abnormality monitoring method according to the embodiment of the present invention. It can be understood that the flowchart in this method embodiment is not used to limit the sequence of execution steps. The transaction data anomaly monitoring system in this embodiment can be implemented in the computer device 2, and the computer device 2 is used as the execution subject for an exemplary description below. details as follows.

[0047] Step S100, receiving log data provided by the transaction system, the log data being data generated by the transaction system when executing a transaction.

[0048] The data generated by the transaction system when executing a transaction may include transaction time, log timestamp, transaction serial number, and the like. The computer device 2 can receive log data provided by the transaction system.

[0049]It should be noted that the transaction operations of...

Embodiment 2

[0075] figure 2 It is a schematic diagram of program modules of Embodiment 2 of the transaction data abnormality monitoring system of the present invention. The transaction data anomaly monitoring system 20 may include or be divided into one or more program modules, one or more program modules are stored in a storage medium and executed by one or more processors to complete the present invention, and may Realize the above-mentioned transaction data abnormality monitoring method. The program module referred to in the embodiment of the present invention refers to a series of computer program instruction segments capable of completing specific functions, which is more suitable than the program itself to describe the execution process of the transaction data anomaly monitoring system 20 in the storage medium. The following description will specifically introduce the functions of each program module of the present embodiment:

[0076] The data receiving module 200 is used to rec...

Embodiment 3

[0089] refer to image 3 , is a schematic diagram of the hardware architecture of the computer device according to Embodiment 3 of the present invention. In this embodiment, the computer device 2 is a device capable of automatically performing numerical calculation and / or information processing according to preset or stored instructions. The computer device 2 may be a rack server, a blade server, a tower server or a cabinet server (including an independent server, or a server cluster composed of multiple servers) and the like. As shown in the figure, the computer device 2 at least includes, but is not limited to, a memory 21 , a processor 22 , a network interface 23 , and a transaction data anomaly monitoring system 20 that can communicate with each other through a system bus.

[0090] In this embodiment, the memory 21 includes at least one type of computer-readable storage medium, and the readable storage medium includes flash memory, hard disk, multimedia card, card-type me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of security monitoring, and provides a transaction data exception monitoring method. The method comprises the following steps: receiving log data provided by a transaction system, wherein the log data is data generated when the transaction system executes a transaction; judging whether a preset keyword exists in the log data or not through a preset keyword matching rule; if the preset keyword exists in the log data, judging whether the log data conforms to a regular expression in a preset mapping table or not; determining the log data conforming to the regular expression as to-be-extracted target log data; extracting a transaction serial number and a log timestamp from the target log data; and according to the transaction serial number and the log timestamp, judging whether a target transaction corresponding to the log data has transaction abnormity or not. According to the method, the acquisition efficiency of the transaction timeliness data is improved, and the problem that an existing transaction timeliness monitoring method is highly dependent on code logic and a data structure or logic of a transaction system is solved.

Description

technical field [0001] The embodiments of the present invention relate to the field of security monitoring, and in particular, to a method, system, device and medium for abnormal monitoring of transaction data. Background technique [0002] The timeliness of the transaction will affect the customer's user experience. Generally, the worse the timeliness is, the worse the customer experience will be. Attention to transaction timeliness and quick response play an important role in improving customer experience. At present, there are two main types of timeliness monitoring for transactions and corresponding transactions: one is the timeliness monitoring based on transaction order data in the transaction system database. Since the data in the transaction system database is real-time, this monitoring technology has high real-time performance. advantage. Moreover, the timeliness data can be obtained through simple adaptation, and the logic of the monitoring system will be very si...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/17G06F16/18G06F40/289G06Q40/04
CPCG06F11/3072G06F11/3006G06F11/302
Inventor 戴燃坡
Owner WEIKUN (SHANGHAI) TECH SERVICE CO LTD