CN108667921A - A kind of banking recommendation information generation method and system based on network bypass - Google Patents

A kind of banking recommendation information generation method and system based on network bypass Download PDF

Info

Publication number
CN108667921A
CN108667921A CN201810391660.5A CN201810391660A CN108667921A CN 108667921 A CN108667921 A CN 108667921A CN 201810391660 A CN201810391660 A CN 201810391660A CN 108667921 A CN108667921 A CN 108667921A
Authority
CN
China
Prior art keywords
network
data packets
bypass
business
analysis server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810391660.5A
Other languages
Chinese (zh)
Other versions
CN108667921B (en
Inventor
张海峰
郭建根
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN201810391660.5A priority Critical patent/CN108667921B/en
Publication of CN108667921A publication Critical patent/CN108667921A/en
Application granted granted Critical
Publication of CN108667921B publication Critical patent/CN108667921B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/20Support for services
    • H04L49/208Port mirroring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The banking recommendation information generation method and system, method that this application discloses a kind of based on network bypass include:Network layer IP data packets are obtained based on network flow bypass technology, IP data packets are sent to bypass analysis server, rebuild TCP connection, obtain application layer message corresponding with network layer IP data packets, parsing application layer message obtains business factor, business factor is sent to marketing system, marketing system is based on business factor and generates business recommended information.The application can directly obtain the network packet of business transaction based on network flow bypass technology from network layer, pass through the service message of protocal analysis reduction transaction, to obtain banking recommendation information, compared with the existing technology, without being transformed to banking system.

Description

A kind of banking recommendation information generation method and system based on network bypass
Technical field
This application involves technical field of data processing more particularly to a kind of banking recommendation informations based on network bypass Generation method and system.
Background technology
Banking market marketing is the important means that banking is expanded, and principal mode is to handle industry when client comes bank When business, business personnel is according to recommending targetedly banking products the characteristics of the client.Quickly to distinguish existing customer Whether it is valuable marketing target, need to quickly collects relevant information and be sent to marketing backstage, current way is required for pair Existing business system is transformed, and Binding information acquisition sending module is this to ensure to obtain data in real time in operation system One distinct disadvantage of way is to need that operation system, and the transformation of banking system, especially core business system is transformed It is usually associated with certain risk and huge human cost.
Therefore, how effectively to get banking recommendation information is a urgent problem to be solved.
Invention content
In view of this, this application provides a kind of banking recommendation information generation method based on network bypass, it can The network packet for directly obtaining business transaction from network layer based on network flow bypass technology passes through the industry of protocal analysis reduction transaction Business message, to obtain banking recommendation information, compared with the existing technology, without being transformed to banking system.
The banking recommendation information generation method based on network bypass that this application provides a kind of, including:
Network layer IP data packets are obtained based on network flow bypass technology;
The IP data packets are sent to bypass analysis server;
TCP connection is rebuild, application layer message corresponding with the network layer IP data packets is obtained;
It parses the application layer message and obtains business factor, send the business factor to marketing system;
The marketing system is based on the business factor and generates business recommended information.
Preferably, described that network layer IP data packets are obtained based on network flow bypass technology, including:
The configuration network switch corresponding with operation system;
The network layer IP data packets of the operation system are replicated from the mirror port of the network switch.
Preferably, the IP data packets to the bypass analysis server that sends includes:
Based on IP package identifications, fragment mark and guarantor's bias internal amount to being recombinated by the IP data packets of fragment, It is reduced into original IP data packets;
The original IP data packets are filtered, filtered IP data packets are obtained;
The filtered IP data packets are sent to the bypass analysis server.
Preferably, the reconstruction TCP connection includes:
The bypass analysis server is based on the four-tuple in network packet header, to the transport layer of each service request/response Session is rebuild, wherein the four-tuple in the network packet header includes:Source IP, destination IP, source port and destination interface.
Preferably, the parsing application layer message obtains business factor and includes:
The application layer message, which is parsed, based on the buffer circle message queue without lock algorithm obtains business factor.
A kind of banking recommendation information generation system based on network bypass, including:
Acquisition module, for obtaining network layer IP data packets based on network flow bypass technology;
Sending module, for sending the IP data packets to bypass analysis server;
It rebuilds module and obtains application layer message corresponding with the network layer IP data packets for rebuilding TCP connection;
Parsing module obtains business factor for parsing the application layer message, sends the business factor to market and seeks Pin system;
Generation module is based on the business factor for the marketing system and generates business recommended information.
Preferably, the acquisition module includes:
Dispensing unit, for configuring the network switch corresponding with operation system;
Copied cells, the network layer IP data for replicating the operation system from the mirror port of the network switch Packet.
Preferably, the sending module includes:
Recomposition unit is used for based on IP package identifications, fragment mark and protects bias internal amount to the IP numbers by fragment It is recombinated according to packet, is reduced into original IP data packets;
Filter element obtains filtered IP data packets for being filtered to the original IP data packets;
Transmission unit, for sending the filtered IP data packets to the bypass analysis server.
Preferably, the reconstruction module is specifically used for:
The bypass analysis server is based on the four-tuple in network packet header, to the transport layer of each service request/response Session is rebuild, wherein the four-tuple in the network packet header includes:Source IP, destination IP, source port and destination interface.
Preferably, the parsing module is specifically used for:
The application layer message is parsed based on the buffer circle message queue without lock algorithm and obtains business factor, sends institute Business factor is stated to marketing system.
In conclusion this application discloses a kind of banking recommendation information generation method based on network bypass, first Network layer IP data packets are obtained based on network flow bypass technology, then send the IP data packets to bypass analysis server, TCP connection to be rebuild, application layer message corresponding with network layer IP data packets is obtained, parsing application layer message obtains business factor, Business factor is sent to marketing system, last marketing system is based on business factor and generates business recommended information.It can The network packet for directly obtaining business transaction from network layer based on network flow bypass technology passes through the industry of protocal analysis reduction transaction Business message, to obtain banking recommendation information, compared with the existing technology, without being transformed to banking system.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of banking recommendation information generation method embodiment 1 based on network bypass disclosed in the present application Flow chart;
Fig. 2 is a kind of banking recommendation information generation method embodiment 2 based on network bypass disclosed in the present application Flow chart;
Fig. 3 is that a kind of banking recommendation information based on network bypass disclosed in the present application generates system embodiment 1 Structural schematic diagram;
Fig. 4 is that a kind of banking recommendation information based on network bypass disclosed in the present application generates system embodiment 2 Structural schematic diagram.
Specific implementation mode
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
As shown in Figure 1, being a kind of banking recommendation information generation method based on network bypass disclosed in the present application The flow chart of embodiment 1, including:
S101, network layer IP data packets are obtained based on network flow bypass technology;
When needing to obtain the banking recommendation information for banking market marketing, skill is bypassed according to network flow first Art obtains service terminal network layer flow, i.e. network layer IP data packets.Wherein, network flow bypass technology refers to passing through interchanger " Port Mirroring " function of the equal network equipments, directly obtains network of relation layer data packet from network layer, by restoring TCP, UDP etc. Transport layer message reaches the technology of the capturing service system message in the case where not influencing existing business system.
S102, IP data packets are sent to bypass analysis server;
After getting network layer IP data packets, the IP data packets got are transmitted to bypass analysis server.
S103, TCP connection is rebuild, obtains application layer message corresponding with network layer IP data packets;
Bypass analysis server carries out TCP connection reconstruction, obtains the application layer message of entire service terminal business transaction.
S104, parsing application layer message obtain business factor, send business factor to marketing system;
After obtaining the application layer message of entire service terminal business transaction, application layer message includes service request and response Two parts, bypass analysis server are key assignments according to institute's monitoring business system ip address and port, navigate to corresponding business report Literary specification, and trading account, customer number, mechanism of exchange, hair are extracted from request/response message according to service message specification The business factors such as the terminal number of transaction are played, and these business factors are sent to marketing system.
S105, marketing system are based on business factor and generate business recommended information.
Marketing system backstage receives trading account, customer number, mechanism of exchange, initiates the business such as the terminal number merchandised After element, asset portfolio situation, friendship according to information retrievals such as Transaction Account number, customer numbers just in transacting business client in one's own profession The information such as easy preference, and relevant business recommended information is generated according to these information, and according to the service terminal number above given industry Business recommendation information is pushed to service terminal, and the teller of transacting business is reminded to carry out product marketing to client.
In conclusion in the above-described embodiments, being primarily based on network flow bypass technology and obtaining network layer IP data packets, so After send the IP data packets to bypass analysis server, rebuild TCP connection, obtain application corresponding with network layer IP data packets Layer message, parsing application layer message obtain business factor, send business factor to marketing system, last marketing system Business recommended information is generated based on business factor.It can be based on network flow bypass technology and directly obtain business transaction from network layer Network packet, by protocal analysis reduction transaction service message, to obtain banking recommendation information, relative to existing skill Art, without being transformed to banking system.
As shown in Fig. 2, being a kind of banking recommendation information generation method based on network bypass disclosed in the present application The flow chart of embodiment 2, including:
S201, the configuration network switch corresponding with operation system;
When needing to obtain the banking recommendation information for banking market marketing, configure first corresponding with operation system The network switch.
S202, the network layer IP data packets from the mirror port duplication service system of the network switch;
Then from the network layer IP data packets of the mirror port duplication service system of the network switch.
S203, the IP data packets for passing through fragment are carried out based on IP package identifications, fragment mark and guarantor's bias internal amount Recombination, is reduced into original IP data packets;
It, can be from the mirror port duplication service of the network switch when IP data packets are sent to bypass analysis server On the network layer flow (IP data packets) of system to (or several) physical network card for bypass analysis server, bypass analysis Server receives IP data packet needs by the way that these Network card setups can be read IP data packets at promiscuous mode from network interface card By IP data packet reorganization links.
Since the MTU of different network interface cards on network link may be different, it is possible to which the IP data packets received are by fragment Reason encounters such case and needs to carry out frament reassembling processing, and bypass analysis server can be according to IP packets mark, fragment mark, guarantor Bias internal amount carries out subsequent processing again to being recombinated by the IP packets of fragment after being reduced into original IP packets.
S204, original IP data packets are filtered, obtain filtered IP data packets;
The IP data packets of mirror image are typically to replicate the flow of the entire network segment on the network switch, need the IP that mirror image comes Data packet is filtered the service traffics packet for filtering out and really needing, and bypass analysis server uses BPF (Berkeley packet filterings Device) realize the filtering of IP data packets, such as need to obtain IP address to be 192.168.2.1, port is 4100 or 4200 industry The IP data packets of business system can use BPF to express " host 192.168.2.1and (port 4100or port 4200) " The IP data packets of this operation system are screened, are corresponded to by the BPF expression formulas of different IP address and port numbers Different operation systems, bypass analysis server realize the dynamic monitoring to different business systems.
S205, filtered IP data packets are sent to bypass analysis server;
S206, bypass analysis server are based on the four-tuple in network packet header, to the transport layer of each service request/response Session is rebuild, and application layer message corresponding with network layer IP data packets is obtained, wherein the four-tuple in the network packet header Including:Source IP, destination IP, source port and destination interface;
TCP connection is rebuild, and the step is the most important step of bypass analysis server, according in network packet header (source IP, destination IP, source port, destination interface) four-tuple, transmission of the bypass analysis server to each " service request/response " Layer conversation is rebuild.
The TCP sessions of service request/response are organized with the form of the Hash Table+ chained lists of four-tuple, each It is divided into request/response two parts according to Client-Server role inside TCP sessions, preserves the datagram of request/response respectively Text, and a series of data portion of continuous TCP messages is copied to according to the SEQ order of the field of conversation direction TCP message by number According to area, while after being received and confirmed by FIN in request/response side according to TCP state machine, the application layer of entire business transaction is obtained Message.
S207, business factor is obtained based on the buffer circle message queue parsing application layer message without lock algorithm, Business factor is sent to marketing system;
After obtaining the application layer message of entire service terminal business transaction, application layer message includes service request and response Two parts, bypass analysis server are key assignments according to institute's monitoring business system ip address and port, navigate to corresponding business report Literary specification, and trading account, customer number, mechanism of exchange, hair are extracted from request/response message according to service message specification The business factors such as the terminal number of transaction are played, and these business factors are sent to marketing system.
Since the network flow of banking is very big, for the flow that timely and effectively processing bypass comes, avoid Packet loss must use the multithreading asynchronous process based on message queue, in traditional network packet decode logic, packet capturing line Journey is put into data packet that one has just captured toward shared queue every time and data packet reduction thread is obtained from shared queue every time Data packet is required for a mutual exclusion lock.So packet capturing thread always has certain probability to be blocked, packet capturing thread is in blocking In flow through the data packet of network interface card and will can not capture, when the data volume for flowing through network interface card is larger, whole network decodes system packet loss Rate is higher.
In view of the above-mentioned problems, the present embodiment is original using the loop buffer queue replacement without lock that a length is len With shared queue obtained by mutual exclusion.Wherein record read pointer absolute position need to be recorded in annular comprising one 32 integer variables The offset rof of buffering queue and one 64 long records have been rotated through the variable rcy of the number of turns;It is absolute to record write pointer Position need to be recorded in the offset wof and one 64 longs note of loop buffer queue comprising one 32 integer variables Record has been rotated through the variable wcy of the number of turns.Due to we have found that the execution speed that data decode thread is much larger than in real process Packet capturing line thread packet capturing speed does not have to consider write pointer absolute position than reading to refer to when packet capturing thread writes data toward loop buffer queue The case where needle gage is from more than a len length, so only need wof and wcy being claimed as volatile variables, and i.e. It is not the newest value of system to make the wcyread and wofread of the reading of unpacking thread, then practical wcyreal*len+ wofreal>=wcyread*len+wofread, so only needing wcyread*len+wofread>Rcy*len+rof, can be true Protecting in buffer circle has the data that can be read.Since wcy and rcy are 64 long variables, as long as so setting Suitable len not consider the problems of that wcy and rcy values are overflowed substantially in many decades.It is past that packet capturing thread is described in detail below Loop buffer queue is written data packet and unpacks detailed step of the thread from loop buffer queue read data packet:
A. when packet capturing thread needs that a data packet is written toward loop buffer queue:
Step 1.wof=wof+1, if wof=len, jump procedure 2;
Step 2.wcy=wcy+1, wof=0.
B. when unpacking thread needs to read a data packet toward loop buffer queue:
Step 1. reads the value wofread of the value wcyread and wof of wcy.
If step 1. wcyread*len+wofread>Rcy*len+rof jumps to step 2, otherwise can not read The data taken;
Step 2. takes out a data packet from loop buffer queue, and rof=rof+1 is jumped to if rof=len Step 3;
Step 3.rcy=rcy+1, rof=0.
S208, marketing system are based on business factor and generate business recommended information.
Marketing system backstage receives trading account, customer number, mechanism of exchange, initiates the business such as the terminal number merchandised After element, asset portfolio situation, friendship according to information retrievals such as Transaction Account number, customer numbers just in transacting business client in one's own profession The information such as easy preference, and relevant business recommended information is generated according to these information, and according to the service terminal number above given industry Business recommendation information is pushed to service terminal, and the teller of transacting business is reminded to carry out product marketing to client.
In conclusion in the above-described embodiments, based on the marketing of network flow bypass, due to being obtained using from network layer The network packet for taking business transaction obtains account, customer ID, operation by way of the service message of protocal analysis reduction transaction Terminal etc. is marketed element, and more traditional banking market marketing system has a two big apparent advantages, and first, completely saturating to operation system It is bright, avoid risk and a large amount of human cost caused by transformation operation system;The second, marketing system and business system are reduced The degree of coupling of system so that marketing system reduces the dependence to specific transactions system as an autonomous system, convenient for various The development of marketing activity.
As shown in figure 3, being that a kind of banking recommendation information based on network bypass disclosed in the present application generates system The structural schematic diagram of embodiment 1, including:
Acquisition module 301, for obtaining network layer IP data packets based on network flow bypass technology;
When needing to obtain the banking recommendation information for banking market marketing, skill is bypassed according to network flow first Art obtains service terminal network layer flow, i.e. network layer IP data packets.Wherein, network flow bypass technology refers to passing through interchanger " Port Mirroring " function of the equal network equipments, directly obtains network of relation layer data packet from network layer, by restoring TCP, UDP etc. Transport layer message reaches the technology of the capturing service system message in the case where not influencing existing business system.
Sending module 302, for sending IP data packets to bypass analysis server;
After getting network layer IP data packets, the IP data packets got are transmitted to bypass analysis server.
It rebuilds module 303 and obtains application layer message corresponding with network layer IP data packets for rebuilding TCP connection;
Bypass analysis server carries out TCP connection reconstruction, obtains the application layer message of entire service terminal business transaction.
Parsing module 304 obtains business factor for parsing application layer message, sends business factor to marketing system System;
After obtaining the application layer message of entire service terminal business transaction, application layer message includes service request and response Two parts, bypass analysis server are key assignments according to institute's monitoring business system ip address and port, navigate to corresponding business report Literary specification, and trading account, customer number, mechanism of exchange, hair are extracted from request/response message according to service message specification The business factors such as the terminal number of transaction are played, and these business factors are sent to marketing system.
Generation module 305 is based on business factor for marketing system and generates business recommended information.
Marketing system backstage receives trading account, customer number, mechanism of exchange, initiates the business such as the terminal number merchandised After element, asset portfolio situation, friendship according to information retrievals such as Transaction Account number, customer numbers just in transacting business client in one's own profession The information such as easy preference, and relevant business recommended information is generated according to these information, and according to the service terminal number above given industry Business recommendation information is pushed to service terminal, and the teller of transacting business is reminded to carry out product marketing to client.
In conclusion in the above-described embodiments, being primarily based on network flow bypass technology and obtaining network layer IP data packets, so After send the IP data packets to bypass analysis server, rebuild TCP connection, obtain application corresponding with network layer IP data packets Layer message, parsing application layer message obtain business factor, send business factor to marketing system, last marketing system Business recommended information is generated based on business factor.It can be based on network flow bypass technology and directly obtain business transaction from network layer Network packet, by protocal analysis reduction transaction service message, to obtain banking recommendation information, relative to existing skill Art, without being transformed to banking system.
As shown in figure 4, being that a kind of banking recommendation information based on network bypass disclosed in the present application generates system The structural schematic diagram of embodiment 2, including:
Dispensing unit 401, for configuring the network switch corresponding with operation system;
When needing to obtain the banking recommendation information for banking market marketing, configure first corresponding with operation system The network switch.
Copied cells 402, the network layer IP data packets for the mirror port duplication service system from the network switch;
Then from the network layer IP data packets of the mirror port duplication service system of the network switch.
Recomposition unit 403 is used for based on IP package identifications, fragment mark and protects bias internal amount to the IP by fragment Data packet is recombinated, and original IP data packets are reduced into;
It, can be from the mirror port duplication service of the network switch when IP data packets are sent to bypass analysis server On the network layer flow (IP data packets) of system to (or several) physical network card for bypass analysis server, bypass analysis Server receives IP data packet needs by the way that these Network card setups can be read IP data packets at promiscuous mode from network interface card By IP data packet reorganization links.
Since the MTU of different network interface cards on network link may be different, it is possible to which the IP data packets received are by fragment Reason encounters such case and needs to carry out frament reassembling processing, and bypass analysis server can be according to IP packets mark, fragment mark, guarantor Bias internal amount carries out subsequent processing again to being recombinated by the IP packets of fragment after being reduced into original IP packets.
Filter element 404 obtains filtered IP data packets for being filtered to original IP data packets;
The IP data packets of mirror image are typically to replicate the flow of the entire network segment on the network switch, need the IP that mirror image comes Data packet is filtered the service traffics packet for filtering out and really needing, and bypass analysis server uses BPF (Berkeley packet filterings Device) realize the filtering of IP data packets, such as need to obtain IP address to be 192.168.2.1, port is 4100 or 4200 industry The IP data packets of business system can use BPF to express " host 192.168.2.1and (4100 or port 4200 of port) " The IP data packets of this operation system are screened, are corresponded to by the BPF expression formulas of different IP address and port numbers Different operation systems, bypass analysis server realize the dynamic monitoring to different business systems.
Transmission unit 405, for sending filtered IP data packets to bypass analysis server;
Rebuild module 406, for bypass analysis server based on the four-tuple in network packet header, to each service request/ The transmission layer conversation of response is rebuild, and application layer message corresponding with network layer IP data packets is obtained, wherein the network packet Head in four-tuple include:Source IP, destination IP, source port and destination interface;
TCP connection is rebuild, and the step is the most important step of bypass analysis server, according in network packet header (source IP, destination IP, source port, destination interface) four-tuple, transmission of the bypass analysis server to each " service request/response " Layer conversation is rebuild.
The TCP sessions of service request/response are organized with the form of the Hash Table+ chained lists of four-tuple, each It is divided into request/response two parts according to Client-Server role inside TCP sessions, preserves the datagram of request/response respectively Text, and a series of data portion of continuous TCP messages is copied to according to the SEQ order of the field of conversation direction TCP message by number According to area, while after being received and confirmed by FIN in request/response side according to TCP state machine, the application layer of entire business transaction is obtained Message.
Parsing module 407 is obtained for parsing the application layer message based on the buffer circle message queue without lock algorithm To business factor, business factor is sent to marketing system;
After obtaining the application layer message of entire service terminal business transaction, application layer message includes service request and response Two parts, bypass analysis server are key assignments according to institute's monitoring business system ip address and port, navigate to corresponding business report Literary specification, and trading account, customer number, mechanism of exchange, hair are extracted from request/response message according to service message specification The business factors such as the terminal number of transaction are played, and these business factors are sent to marketing system.
Since the network flow of banking is very big, for the flow that timely and effectively processing bypass comes, avoid Packet loss must use the multithreading asynchronous process based on message queue, in traditional network packet decode logic, packet capturing line Journey is put into data packet that one has just captured toward shared queue every time and data packet reduction thread is obtained from shared queue every time Data packet is required for a mutual exclusion lock.So packet capturing thread always has certain probability to be blocked, packet capturing thread is in blocking In flow through the data packet of network interface card and will can not capture, when the data volume for flowing through network interface card is larger, whole network decodes system packet loss Rate is higher.
In view of the above-mentioned problems, the present embodiment is original using the loop buffer queue replacement without lock that a length is len With shared queue obtained by mutual exclusion.Wherein record read pointer absolute position need to be recorded in annular comprising one 32 integer variables The offset rof of buffering queue and one 64 long records have been rotated through the variable rcy of the number of turns;It is absolute to record write pointer Position need to be recorded in the offset wof and one 64 longs note of loop buffer queue comprising one 32 integer variables Record has been rotated through the variable wcy of the number of turns.Due to we have found that the execution speed that data decode thread is much larger than in real process Packet capturing line thread packet capturing speed does not have to consider write pointer absolute position than reading to refer to when packet capturing thread writes data toward loop buffer queue The case where needle gage is from more than a len length, so only need wof and wcy being claimed as volatile variables, and i.e. It is not the newest value of system to make the wcyread and wofread of the reading of unpacking thread, then practical wcyreal*len+ wofreal>=wcyread*len+wofread, so only needing wcyread*len+wofread>Rcy*len+rof, can be true Protecting in buffer circle has the data that can be read.Since wcy and rcy are 64 long variables, as long as so setting Suitable len not consider the problems of that wcy and rcy values are overflowed substantially in many decades.It is past that packet capturing thread is described in detail below Loop buffer queue is written data packet and unpacks detailed step of the thread from loop buffer queue read data packet:
A. when packet capturing thread needs that a data packet is written toward loop buffer queue:
Step 1.wof=wof+1, if wof=len, jump procedure 2;
Step 2.wcy=wcy+1, wof=0.
B. when unpacking thread needs to read a data packet toward loop buffer queue:
Step 1. reads the value wofread of the value wcyread and wof of wcy.
If step 1. wcyread*len+wofread>Rcy*len+rof jumps to step 2, otherwise can not read The data taken;
Step 2. takes out a data packet from loop buffer queue, and rof=rof+1 is jumped to if rof=len Step 3;
Step 3.rcy=rcy+1, rof=0.
Generation module 408 is based on business factor for marketing system and generates business recommended information.
Marketing system backstage receives trading account, customer number, mechanism of exchange, initiates the business such as the terminal number merchandised After element, asset portfolio situation, friendship according to information retrievals such as Transaction Account number, customer numbers just in transacting business client in one's own profession The information such as easy preference, and relevant business recommended information is generated according to these information, and according to the service terminal number above given industry Business recommendation information is pushed to service terminal, and the teller of transacting business is reminded to carry out product marketing to client.
In conclusion in the above-described embodiments, based on the marketing of network flow bypass, due to being obtained using from network layer The network packet for taking business transaction obtains account, customer ID, operation by way of the service message of protocal analysis reduction transaction Terminal etc. is marketed element, and more traditional banking market marketing system has a two big apparent advantages, and first, completely saturating to operation system It is bright, avoid risk and a large amount of human cost caused by transformation operation system;The second, marketing system and business system are reduced The degree of coupling of system so that marketing system reduces the dependence to specific transactions system as an autonomous system, convenient for various The development of marketing activity.
Each embodiment is described by the way of progressive in this specification, the highlights of each of the examples are with other The difference of embodiment, just to refer each other for identical similar portion between each embodiment.For device disclosed in embodiment For, since it is corresponded to the methods disclosed in the examples, so description is fairly simple, related place is said referring to method part It is bright.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, depends on the specific application and design constraint of technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think to exceed scope of the present application.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
The foregoing description of the disclosed embodiments enables professional and technical personnel in the field to realize or use the application. Various modifications to these embodiments will be apparent to those skilled in the art, as defined herein General Principle can in other embodiments be realized in the case where not departing from spirit herein or range.Therefore, the application The embodiments shown herein is not intended to be limited to,
And it is to fit to widest range consistent with the principles and novel features disclosed in this article.

Claims (10)

1. a kind of banking recommendation information generation method based on network bypass, which is characterized in that including:
Network layer IP data packets are obtained based on network flow bypass technology;
The IP data packets are sent to bypass analysis server;
TCP connection is rebuild, application layer message corresponding with the network layer IP data packets is obtained;
It parses the application layer message and obtains business factor, send the business factor to marketing system;
The marketing system is based on the business factor and generates business recommended information.
2. according to the method described in claim 1, it is characterized in that, described obtain network layer IP based on network flow bypass technology Data packet, including:
The configuration network switch corresponding with operation system;
The network layer IP data packets of the operation system are replicated from the mirror port of the network switch.
3. according to the method described in claim 2, it is characterized in that, described send the IP data packets to bypass analysis server Including:
Based on IP package identifications, fragment mark and bias internal amount is protected to being recombinated by the IP data packets of fragment, is restored At original IP data packets;
The original IP data packets are filtered, filtered IP data packets are obtained;
The filtered IP data packets are sent to the bypass analysis server.
4. according to the method described in claim 3, it is characterized in that, the reconstruction TCP connection includes:
The bypass analysis server is based on the four-tuple in network packet header, to the transmission layer conversation of each service request/response It is rebuild, wherein the four-tuple in the network packet header includes:Source IP, destination IP, source port and destination interface.
5. according to the method described in claim 4, it is characterized in that, the parsing application layer message obtains business factor packet It includes:
The application layer message, which is parsed, based on the buffer circle message queue without lock algorithm obtains business factor.
6. a kind of banking recommendation information based on network bypass generates system, which is characterized in that including:
Acquisition module, for obtaining network layer IP data packets based on network flow bypass technology;
Sending module, for sending the IP data packets to bypass analysis server;
It rebuilds module and obtains application layer message corresponding with the network layer IP data packets for rebuilding TCP connection;
Parsing module obtains business factor for parsing the application layer message, sends the business factor to marketing system System;
Generation module is based on the business factor for the marketing system and generates business recommended information.
7. system according to claim 6, which is characterized in that the acquisition module includes:
Dispensing unit, for configuring the network switch corresponding with operation system;
Copied cells, the network layer IP data packets for replicating the operation system from the mirror port of the network switch.
8. system according to claim 7, which is characterized in that the sending module includes:
Recomposition unit is used for based on IP package identifications, fragment mark and protects bias internal amount to the IP data packets by fragment It is recombinated, is reduced into original IP data packets;
Filter element obtains filtered IP data packets for being filtered to the original IP data packets;
Transmission unit, for sending the filtered IP data packets to the bypass analysis server.
9. system according to claim 8, which is characterized in that the reconstruction module is specifically used for:
The bypass analysis server is based on the four-tuple in network packet header, to the transmission layer conversation of each service request/response It is rebuild, wherein the four-tuple in the network packet header includes:Source IP, destination IP, source port and destination interface.
10. system according to claim 9, which is characterized in that the parsing module is specifically used for:
The application layer message is parsed based on the buffer circle message queue without lock algorithm and obtains business factor, sends the industry Element of being engaged in is to marketing system.
CN201810391660.5A 2018-04-27 2018-04-27 Bank business recommendation information generation method and system based on network bypass Active CN108667921B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810391660.5A CN108667921B (en) 2018-04-27 2018-04-27 Bank business recommendation information generation method and system based on network bypass

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810391660.5A CN108667921B (en) 2018-04-27 2018-04-27 Bank business recommendation information generation method and system based on network bypass

Publications (2)

Publication Number Publication Date
CN108667921A true CN108667921A (en) 2018-10-16
CN108667921B CN108667921B (en) 2021-12-14

Family

ID=63780355

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810391660.5A Active CN108667921B (en) 2018-04-27 2018-04-27 Bank business recommendation information generation method and system based on network bypass

Country Status (1)

Country Link
CN (1) CN108667921B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111064770A (en) * 2019-11-12 2020-04-24 国网辽宁省电力有限公司信息通信分公司 Method and system for capturing and synchronizing data bypass of power grid system
WO2020088311A1 (en) * 2018-10-30 2020-05-07 中国银联股份有限公司 Data processing method and apparatus
CN111294798A (en) * 2018-12-07 2020-06-16 中国移动通信集团陕西有限公司 Data interaction method, device, terminal equipment and medium
CN111818154A (en) * 2020-07-06 2020-10-23 桦蓥(上海)信息科技有限责任公司 Service pushing system and method based on network layer message analysis
CN112565111A (en) * 2020-11-24 2021-03-26 重庆农村商业银行股份有限公司 Service visualization method and system based on hardware bypass

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080175242A1 (en) * 2007-01-19 2008-07-24 Harris Corporation Internet Protocol Based Encryptor/Decryptor Bypass Device
CN101296256A (en) * 2008-06-19 2008-10-29 中国电信股份有限公司 Method and system for implementing accurate information propelling by internet
CN101556609A (en) * 2009-05-19 2009-10-14 杭州信杨通信技术有限公司 Customer behavior analysis and service system based on web contents
US20150256448A1 (en) * 2014-03-07 2015-09-10 Nicira, Inc. Method and system for path discovery
CN105119756A (en) * 2015-09-10 2015-12-02 深圳市网誉科技有限公司 Network monitoring system and method based on network management platform and data analysis
CN105337976A (en) * 2015-11-06 2016-02-17 西安交大捷普网络科技有限公司 Real-time high-efficiency database audit realization method
CN105376092A (en) * 2015-11-19 2016-03-02 杭州当虹科技有限公司 HLS flow real-time monitoring and alarming system based on switch port mirroring
CA3010757A1 (en) * 2015-12-31 2017-07-06 Hughes Network Systems, Llc Method and system of providing carrier grade nat (cgn) to a subset of a subscriber base

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080175242A1 (en) * 2007-01-19 2008-07-24 Harris Corporation Internet Protocol Based Encryptor/Decryptor Bypass Device
CN101296256A (en) * 2008-06-19 2008-10-29 中国电信股份有限公司 Method and system for implementing accurate information propelling by internet
CN101556609A (en) * 2009-05-19 2009-10-14 杭州信杨通信技术有限公司 Customer behavior analysis and service system based on web contents
US20150256448A1 (en) * 2014-03-07 2015-09-10 Nicira, Inc. Method and system for path discovery
CN105119756A (en) * 2015-09-10 2015-12-02 深圳市网誉科技有限公司 Network monitoring system and method based on network management platform and data analysis
CN105337976A (en) * 2015-11-06 2016-02-17 西安交大捷普网络科技有限公司 Real-time high-efficiency database audit realization method
CN105376092A (en) * 2015-11-19 2016-03-02 杭州当虹科技有限公司 HLS flow real-time monitoring and alarming system based on switch port mirroring
CA3010757A1 (en) * 2015-12-31 2017-07-06 Hughes Network Systems, Llc Method and system of providing carrier grade nat (cgn) to a subset of a subscriber base

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
YASUHIKO KANEMASA; SHUJI SUZUKI: ""Single-View Performance Monitoring of On-Line Applications Running on a Cloud"", 《2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD)》 *
陈贤毅: ""网络透明打印审计系统的研究与实现"", 《中国优秀硕士学位论文全文数据库(电子期刊)信息科技辑》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020088311A1 (en) * 2018-10-30 2020-05-07 中国银联股份有限公司 Data processing method and apparatus
US11374878B2 (en) 2018-10-30 2022-06-28 China Unionpay Co., Ltd. Data processing method and apparatus
CN111294798A (en) * 2018-12-07 2020-06-16 中国移动通信集团陕西有限公司 Data interaction method, device, terminal equipment and medium
CN111064770A (en) * 2019-11-12 2020-04-24 国网辽宁省电力有限公司信息通信分公司 Method and system for capturing and synchronizing data bypass of power grid system
CN111064770B (en) * 2019-11-12 2021-11-05 国网辽宁省电力有限公司信息通信分公司 Method and system for capturing and synchronizing data bypass of power grid system
CN111818154A (en) * 2020-07-06 2020-10-23 桦蓥(上海)信息科技有限责任公司 Service pushing system and method based on network layer message analysis
CN111818154B (en) * 2020-07-06 2022-11-18 桦蓥(上海)信息科技有限责任公司 Service pushing system and method based on network layer message analysis
CN112565111A (en) * 2020-11-24 2021-03-26 重庆农村商业银行股份有限公司 Service visualization method and system based on hardware bypass

Also Published As

Publication number Publication date
CN108667921B (en) 2021-12-14

Similar Documents

Publication Publication Date Title
CN108667921A (en) A kind of banking recommendation information generation method and system based on network bypass
JP6882474B2 (en) Systems and methods for detecting replay attacks
CN108809932B (en) Block chain-based deposit certificate system, method and readable medium
US10963400B2 (en) Smart contract creation and monitoring for event identification in a blockchain
ES2957843T3 (en) Verification of data processes in a network of computing resources
JP6905059B2 (en) Systems and methods for detecting replay attacks
CN108009810A (en) A kind of Trusted Digital transaction in assets method
US20180075536A1 (en) Multiparty reconciliation systems and methods
CN107480990A (en) Block chain bookkeeping methods and device
CN110427774A (en) Data based on block chain deposit card method, data verification method and relevant apparatus
CN109118214A (en) The method and apparatus for running intelligent contract
CN109154885A (en) Business processing on block platform chain executes
US10200407B1 (en) Network gateway messaging systems and methods
CN107124281A (en) A kind of data security method and related system
CN108717466A (en) Collage-credit data storage method, device, computer equipment and storage medium
CN110430288A (en) Node visit method, apparatus, computer equipment and storage medium
CN113326165B (en) Data processing method and device based on block chain and computer readable storage medium
CN110490640A (en) Method, apparatus and system for object distribution processor
WO2020221292A9 (en) Network transaction verification method based on plurality of nodes, and system therefor and storage medium
CN108494557A (en) Social security digital certificate management method, computer readable storage medium and terminal device
CN106991339A (en) A kind of financial transaction data security method, server, client and system
CN107169364A (en) A kind of data security method and related system
CN109685336A (en) Collection task distribution method, device, computer equipment and storage medium
CN109492049A (en) Data processing, block generation and synchronous method for block chain network
CN109905412A (en) A kind of parallel encrypting and deciphering processing method of network data, device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant