CN109299147B - Database access processing method, device, computer equipment and storage medium - Google Patents

Database access processing method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109299147B
CN109299147B CN201811122924.3A CN201811122924A CN109299147B CN 109299147 B CN109299147 B CN 109299147B CN 201811122924 A CN201811122924 A CN 201811122924A CN 109299147 B CN109299147 B CN 109299147B
Authority
CN
China
Prior art keywords
user
fingerprint
database
filter
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811122924.3A
Other languages
Chinese (zh)
Other versions
CN109299147A (en
Inventor
尹恺雯
郑榕俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Life Insurance Company of China Ltd
Original Assignee
Ping An Life Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Life Insurance Company of China Ltd filed Critical Ping An Life Insurance Company of China Ltd
Priority to CN201811122924.3A priority Critical patent/CN109299147B/en
Publication of CN109299147A publication Critical patent/CN109299147A/en
Application granted granted Critical
Publication of CN109299147B publication Critical patent/CN109299147B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The application relates to a database access processing method, a database access processing device, computer equipment and a storage medium. The method relates to database information security, comprising: receiving an access request message for requesting to access a database, wherein the access request message carries user identification information; inquiring a preset user filter; calculating the user identification information by adopting a user filter to obtain user fingerprint information corresponding to the user identification information; fingerprint matching is carried out on the user information fingerprint and the user information fingerprint meeting the request response condition in the user filter; and when the fingerprint matching results are consistent, responding to the access request message, and acquiring corresponding request data from the database to be accessed. By adopting the method, the access request message is filtered quickly, and the processing efficiency of the database for the access request is improved.

Description

Database access processing method, device, computer equipment and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a database access processing method, apparatus, computer device, and storage medium.
Background
With the development of computer technology, more and more services and businesses are realized based on computers, such as financial services, online shopping, social media and the like, and now enter the digital era, the volume of data is larger and larger, and the requirements and demands on database management are higher and higher.
At present, a technology for realizing rapid data reading through a cache relieves the reading pressure of a database to a certain extent, however, as invalid data requests are continuously increased, the cache is more and more limited in effect, the reading pressure of the database is increased, and the processing efficiency of the database on the data requests is reduced.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a database access processing method, apparatus, computer device, and storage medium that can improve the processing efficiency of a database for an access request.
A database access processing method, the method comprising:
receiving an access request message for requesting to access a database, wherein the access request message carries user identification information;
inquiring a preset user filter;
calculating the user identification information by adopting a user filter to obtain user fingerprint information corresponding to the user identification information;
Fingerprint matching is carried out on the user information fingerprint and the user information fingerprint meeting the request response condition in the user filter;
and when the fingerprint matching results are consistent, responding to the access request message, and acquiring corresponding request data from the database to be accessed.
In one embodiment, before the step of receiving an access request message for requesting access to the database, the method further comprises:
receiving a data acquisition message carrying user identification information, wherein the data acquisition message is used for requesting to acquire corresponding data to be acquired from a preset cache; executing a step of inquiring a preset user filter;
after the step of fingerprint matching the user information fingerprint with the user information fingerprint satisfying the request response condition in the user filter, the method further comprises: when the fingerprint matching results are consistent, information is acquired from the response data, and corresponding data to be acquired is acquired from the cache.
In one embodiment, when the fingerprint matching result is consistent, the step of acquiring the corresponding data to be acquired from the cache from the response data acquisition message includes:
inquiring data to be acquired in the cache according to the data acquisition message;
and when the query result in the cache is empty, generating an access request message according to the data acquisition message.
In one embodiment, before the step of querying the preset user filter, the method further includes:
determining user identification information meeting request response conditions;
classifying the user identification information meeting the request response condition according to the service requirements of the service system to which the database to be accessed corresponds;
determining corresponding user fingerprint mapping conditions according to the classified user identification information;
obtaining corresponding user information fingerprints according to the classified user identification information and user fingerprint mapping conditions;
and obtaining a user filter according to the user fingerprint mapping condition and the corresponding user information fingerprint.
In one embodiment, the step of obtaining the user filter according to the user fingerprint mapping condition and the corresponding user information fingerprint includes:
constructing each sub-filter according to the user fingerprint mapping condition and the corresponding user information fingerprint;
and combining all the sub-filters according to preset combination conditions to obtain the user filter.
In one embodiment, when the fingerprint matching results are consistent, responding to the access request message, and acquiring corresponding request data from the database to be accessed includes:
when the fingerprint matching results are consistent, determining a database to be accessed according to the access request message corresponding to the user information fingerprint;
Querying a database to be accessed;
and acquiring the request data from the database to be accessed according to the access request message.
In one embodiment, after the step of receiving an access request message for requesting access to the database, the method further comprises:
recording the access request information into a preset access frequency table, wherein the access frequency table records the database access frequency of the user corresponding to the access request information;
when the database access frequency meets a preset abnormality detection condition, performing code abnormality detection on the access request message;
when the abnormal detection result is normal, entering a step of inquiring a preset user filter; otherwise, the interrupt responds to the access request message and returns an exception prompt message.
A database access processing apparatus, the apparatus comprising:
the request message receiving module is used for receiving an access request message for requesting to access the database, wherein the access request message carries user identification information;
the filter inquiry module is used for inquiring a preset user filter;
the user fingerprint determining module is used for calculating the user identification information by adopting a user filter to obtain a user information fingerprint corresponding to the user identification information;
The fingerprint matching module is used for matching the user information fingerprint with the user information fingerprint meeting the request response condition in the user filter;
and the request response module is used for responding to the access request message when the fingerprint matching results are consistent, and acquiring corresponding request data from the database to be accessed.
A computer device comprising a memory storing a computer program and a processor which when executing the computer program performs the steps of:
receiving an access request message for requesting to access a database, wherein the access request message carries user identification information;
inquiring a preset user filter;
calculating the user identification information by adopting a user filter to obtain user fingerprint information corresponding to the user identification information;
fingerprint matching is carried out on the user information fingerprint and the user information fingerprint meeting the request response condition in the user filter;
and when the fingerprint matching results are consistent, responding to the access request message, and acquiring corresponding request data from the database to be accessed.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
Receiving an access request message for requesting to access a database, wherein the access request message carries user identification information;
inquiring a preset user filter;
calculating the user identification information by adopting a user filter to obtain user fingerprint information corresponding to the user identification information;
fingerprint matching is carried out on the user information fingerprint and the user information fingerprint meeting the request response condition in the user filter;
and when the fingerprint matching results are consistent, responding to the access request message, and acquiring corresponding request data from the database to be accessed.
According to the database access processing method, the device, the computer equipment and the storage medium, the user information fingerprint corresponding to the received access request message is obtained through calculation according to the preset user filter, fingerprint matching is carried out on the user information fingerprint and the user information fingerprint meeting the request response condition recorded in the user filter, when the fingerprint matching results are consistent, the corresponding access request message is responded, rapid filtration of the access request message is achieved, and the processing efficiency of the database on the access request is improved.
Drawings
FIG. 1 is an application scenario diagram of a database access processing method in one embodiment;
FIG. 2 is a flow diagram of a database access processing method in one embodiment;
FIG. 3 is a flow diagram of the steps for building a user filter in one embodiment;
FIG. 4 is a flow chart of a database access processing method in another embodiment;
FIG. 5 is a block diagram of a database access processing apparatus in one embodiment;
fig. 6 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
The database access processing method provided by the application can be applied to an application environment shown in figure 1. Wherein the terminal 102 communicates with the server 104 via a network. The terminal 102 sends an access request message carrying user identification information, the access request message is used for requesting to access the database, when the server 104 receives the access request message, a user information fingerprint corresponding to the received access request message is obtained through calculation according to a preset user filter, fingerprint matching is performed on the user information fingerprint and the user information fingerprint meeting request response conditions recorded in the user filter, when the fingerprint matching results are consistent, corresponding access request information is responded, corresponding request data is obtained from the database to be accessed, and finally the request data is issued to the terminal 102. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smartphones, tablet computers, and portable wearable devices, and the server 104 may be implemented by a stand-alone server or a server cluster composed of a plurality of servers.
In one embodiment, as shown in fig. 2, a database access processing method is provided, and the method is applied to the server 104 in fig. 1 for illustration, and includes the following steps:
step S201: an access request message for requesting access to the database is received, the access request message carrying user identification information.
The access request message may be a message sent by the terminal 102 and requesting to access the database, where the message carries user identification information, and the user identification information may be, but is not limited to, user characteristic information corresponding to a terminal user, such as a user account number, a terminal physical address, and the like. Generally, when acquiring data, the data is firstly queried in a cache, if a result is found in the cache, the required data is directly obtained from the cache, and if the required data does not exist in the cache, the corresponding data is further queried from a database. By the caching technology, data which are frequently read can be synchronized into the cache, so that the database is prevented from being frequently accessed, and the reading pressure of the database is relieved. In this embodiment, the access request message may be a generated message requesting access to the database after the data is not successfully queried from the cache.
Step S203: and querying a preset user filter.
The user filter is used for filtering the message information which requests to access the database or access the cache, and directly interrupting the request of the message information which does not meet the preset condition, such as the message information which is not sent by the terminal user in the response user list. The user filters may be correspondingly set according to the service requirements of the respective databases in combination with the service system, and may include, but are not limited to, a preset list of end users satisfying the response condition.
In particular implementations, the user filter may be a bloom filter, which is a long binary vector and a series of random mapping functions, which may be used to retrieve whether an element is in a collection. Bloom filters have a great advantage over other data structures in terms of both space and time, both bloom filter storage space and insert/query time being constant. Moreover, the Hash functions adopted in the bloom filter have no relation with each other, so that the Hash functions are conveniently realized by hardware in parallel, and meanwhile, the bloom filter does not need to store elements, so that the Hash functions have advantages in certain occasions with very strict security requirements. The rapid filtering of the terminal user sending the access request message can be realized through the bloom filter, and the processing efficiency of the user filtering is ensured.
Step S205: and calculating the user identification information by adopting a user filter to obtain user fingerprint information corresponding to the user identification information.
The user fingerprint information is calculated according to a mapping algorithm in the user filter and combined with the user identification information, and whether the terminal user corresponding to the user identification information is the terminal user in the response user list can be determined by comparing the user fingerprint information corresponding to the user identification information with the user fingerprint information in the response user list. Specifically, after a preset user filter is obtained by inquiry, user identification information is calculated through the user filter, so that user fingerprint information corresponding to the user identification information is obtained.
In a specific application, the user filter may be a bloom filter, and the mapping algorithm in the bloom filter may include a Hash function, and the response user list may be a user fingerprint information set calculated by the end user meeting the preset response condition according to the Hash function in the bloom filter. When the user filter is adopted to calculate the user identification information, the user identification information can be calculated according to a Hash function, and the user fingerprint information corresponding to the user identification information is obtained.
Step S207: and fingerprint matching is carried out on the user information fingerprint and the user information fingerprint meeting the request response condition in the user filter.
After the user information fingerprint corresponding to the user identification information extracted from the access request message is obtained through calculation, fingerprint matching is carried out on the user information fingerprint and the user information fingerprint meeting the request response condition in the user filter, so that whether the terminal service user corresponding to the user identification information meets the preset request response condition or not is judged, namely whether the terminal service user in the response user list is the terminal service user or not is judged. In a specific implementation, when the user filter is a bloom filter, the user information fingerprint obtained through calculation according to the Hash function can be compared and checked with the user information fingerprint meeting the request response condition in the bloom filter, so that fingerprint matching of the user information fingerprint is realized.
Step S209: and when the fingerprint matching results are consistent, responding to the access request message, and acquiring corresponding request data from the database to be accessed.
If the fingerprint matching results are consistent, the terminal user corresponding to the user identification information is indicated to meet the request response condition, the corresponding access request message is responded, corresponding request data is obtained from the database to be accessed, and the obtained request data is returned to the terminal sending the access request message. On the other hand, if the fingerprint matching results are inconsistent, the fact that the corresponding terminal user does not meet the request response condition is indicated, and the corresponding access request message is directly interrupted, so that the data to be accessed are prevented from being read and accessed.
According to the database access processing method, the user information fingerprint corresponding to the received access request message is obtained through calculation according to the preset user filter, fingerprint matching is carried out on the user information fingerprint and the user information fingerprint meeting the request response condition recorded in the user filter, when the fingerprint matching results are consistent, the corresponding access request message is responded, rapid filtration of the access request message is achieved, and the processing efficiency of the database on the access request is improved.
In one embodiment, before the step of receiving an access request message for requesting access to the database, further comprising: receiving a data acquisition message carrying user identification information, wherein the data acquisition message is used for requesting to acquire corresponding data to be acquired from a preset cache; executing a step of inquiring a preset user filter; after the step of fingerprint matching the user information fingerprint with the user information fingerprint satisfying the request response condition in the user filter, the method further comprises: when the fingerprint matching results are consistent, information is acquired from the response data, and corresponding data to be acquired is acquired from the cache.
The user filter is used for filtering the message which requests to access the database or access the cache, namely, the user filter can perform user filtering before accessing the cache or perform user filtering before accessing the database. In specific application, the user filter can be set only before caching or before the database, or different user filters can be set before caching and before the database at the same time, so that hierarchical filtering of the users is realized.
In this embodiment, when a data acquisition message for requesting to acquire corresponding data to be acquired from a preset cache is received, user identification information carried by the data acquisition message is extracted from the data acquisition message, and a preset user filter is queried. And then, calculating the user identification information extracted from the data acquisition message by adopting the user filter obtained by inquiry to obtain user fingerprint information corresponding to the user identification information, then, fingerprint matching is carried out on the user information fingerprint and the user information fingerprint meeting the request response condition in the user filter, and whether the terminal service user corresponding to the user identification information meets the preset request response condition, namely, whether the terminal service user is the terminal service user in the response user list is judged. If the fingerprint matching results are consistent, the terminal user corresponding to the user identification information is indicated to meet the request response condition, the corresponding data acquisition message is responded, the corresponding data to be acquired is acquired from the cache, and the acquired request data is returned to the terminal sending the access request message. If the matching results are inconsistent, the corresponding terminal users are indicated not to meet the request response conditions, the corresponding data acquisition messages are directly interrupted, the cache reading access of the corresponding terminal users is avoided, and the subsequent reading access of the data to be accessed is avoided.
In this embodiment, before the data acquisition message requests to access the cache, the user filter is used to combine the data acquisition message to determine whether the corresponding terminal user meets the request response condition, so that filtering of the terminal user is implemented before the cache is accessed, illegal attack of an illegal terminal user can be effectively avoided, and normal operation of the cache and the database is ensured.
In one embodiment, when the fingerprint matching result is consistent, the step of acquiring the corresponding data to be acquired from the cache from the response data acquisition message includes: inquiring data to be acquired in the cache according to the data acquisition message; and when the query result in the cache is empty, generating an access request message according to the data acquisition message.
When the data acquisition message request passes through a user filter before the cache, and the data acquisition message request is judged to be responded, inquiring corresponding data to be acquired in the cache according to the data acquisition message request, and if the data acquisition message request is successful in the cache, returning the acquired data to be acquired to the terminal; if the query result in the cache is empty, that is, the required data to be acquired is not synchronized to the cache, and the database is required to be accessed for query, an access request message is generated according to the data acquisition message, wherein the access request message carries user identification information and is used for requesting to access the database. If the required data to be acquired exists in the database, the data to be acquired is returned from the database to the terminal, and in addition, the data to be acquired can be synchronized into a cache so as to be convenient for subsequent quick reading and calling.
In this embodiment, in the process of responding to the data acquisition message, if there is no data to be acquired required by the data acquisition message in the cache, an access request message is generated to access the data to be acquired required by the database reading, so as to ensure the query and return of the data to be acquired required by the data acquisition message.
In one embodiment, as shown in fig. 3, before the step of querying the preset user filter, the method further includes a step of constructing the user filter, specifically including:
step S301: user identification information satisfying the request response condition is determined.
The user filter is used for filtering the message requesting to access the database or access the cache, and comprises a list of end users meeting the request response condition. In this embodiment, the user filter includes a user fingerprint mapping condition, and a user information fingerprint set calculated according to the user fingerprint mapping condition and user identification information corresponding to the terminal user satisfying the request response condition. When constructing the user filter, user identification information meeting the request response condition is determined first. The request response condition is set for each terminal user according to the service system, for example, the request response condition can be a successfully registered terminal user, and user identification information corresponding to the terminal user is recorded.
Step S303: and classifying the user identification information meeting the request response condition according to the service requirements of the service system to which the database to be accessed corresponds.
For different service systems, which may include a plurality of different service requirements, a corresponding user filter may be built according to each service requirement, so as to implement multi-stage filtering for the end user. Specifically, the service requirement of the service system to which the database to be accessed corresponds is queried, and the service requirement can be, but is not limited to, a user identity level, and the end user is classified by judging whether the identity of the end user is an important user or not. In this embodiment, according to the service requirement of the service system, the terminal users corresponding to the user identification information meeting the request response condition are classified, and then the corresponding user filters can be set according to the user identification information of each class, so as to implement multi-stage filtering for the terminal users.
Step S305: and determining corresponding user fingerprint mapping conditions according to the classified user identification information.
After classifying the user identification information meeting the request response condition, determining the corresponding user fingerprint mapping condition according to the classified user identification information. The user fingerprint mapping condition is used for calculating the user information fingerprint, and can be a mapping function, such as a Hash function, through which the user identification information can be mapped to obtain the corresponding user information fingerprint. In specific implementation, if the constructed user filter is a bloom filter and the user fingerprint mapping condition is a Hash function, the corresponding user information fingerprint can be calculated through the Hash function according to the user identification information meeting the request response condition, and the storage position corresponding to the bloom filter is set to be 1, so that a binary vector is obtained. The binary vector records the user information fingerprints corresponding to the user identification information meeting the request response condition, and fingerprint matching of the user information fingerprints can be achieved through the binary vector, so that the user filtering function of the user filter is achieved.
Step S307: and obtaining corresponding user information fingerprints according to the classified user identification information and the user fingerprint mapping conditions.
After the user fingerprint mapping condition is determined, based on the user fingerprint mapping condition, the user information fingerprint corresponding to the classified user identification information is calculated. After the user information fingerprints are summarized, a user information fingerprint set of the terminal user meeting the request response condition can be obtained, and fingerprint matching can be performed through the user information fingerprint set so as to judge whether the terminal user corresponding to the access request message meets the request response condition.
Step S309: and obtaining a user filter according to the user fingerprint mapping condition and the corresponding user information fingerprint.
The user filter comprises a user fingerprint mapping condition and a user information fingerprint set calculated according to the user fingerprint mapping condition and user identification information corresponding to a terminal user meeting a request response condition. Specifically, after obtaining the user information fingerprint corresponding to the terminal user meeting the request response condition, the user information fingerprint can be summarized to obtain a user information fingerprint set, the user information fingerprint set can be a binary vector, and the corresponding user filter is constructed through the user information fingerprint set and the user fingerprint mapping condition. The obtained user filter can calculate the user fingerprint information corresponding to the user identification information in the received access request message based on the user fingerprint mapping condition, and fingerprint match the user fingerprint information with the user information fingerprint set corresponding to the terminal user meeting the request response condition, so as to realize the user filtering of the terminal user.
In one embodiment, the step of obtaining the user filter according to the user fingerprint mapping condition and the corresponding user information fingerprint comprises: constructing each sub-filter according to the user fingerprint mapping condition and the corresponding user information fingerprint; and combining all the sub-filters according to preset combination conditions to obtain the user filter.
The number of user filters can be set correspondingly according to the actual service requirements of the service system. In this embodiment, after user identification information satisfying a request response condition is classified according to a service requirement to obtain user identification information of a plurality of categories, corresponding user fingerprint mapping conditions are determined according to the user identification information of each category, and corresponding sub-filters are further constructed. Specifically, according to the user fingerprint mapping conditions and the user information fingerprints of the categories corresponding to the user fingerprint mapping conditions, corresponding sub-filters are constructed, and then all the sub-filters are combined according to preset combination conditions to obtain the user filter. The combination condition of the sub-filters can be set according to the corresponding service requirements of each user identification information, the filtering sequence of each sub-filter can be determined through the combination condition, and finally the complete user filter is obtained through combination.
In this embodiment, corresponding sub-filters are built according to different service requirements, and each sub-filter is combined to obtain a complete user filter, so that diversified setting of the filters can be realized, layering processing is performed on the service requirements, and processing efficiency of database access can be effectively improved.
In one embodiment, when the fingerprint matching results are consistent, the step of obtaining the corresponding request data from the database to be accessed in response to the access request message includes: when the fingerprint matching results are consistent, determining a database to be accessed according to the access request message corresponding to the user information fingerprint; querying a database to be accessed; and acquiring the request data from the database to be accessed according to the access request message.
When the user filter filters the terminal user corresponding to the received access request message, if the fingerprint matching result of the user information fingerprint calculated according to the user identification information extracted from the access request message is inconsistent with the fingerprint matching result of the user information fingerprint meeting the request response condition in the user filter, the terminal user corresponding to the user identification information is an illegal user, and the access request is directly interrupted. And if the fingerprint matching results are consistent, indicating that the terminal user corresponding to the user identification information meets the request response condition, and responding to the access request if the terminal user is a legal user. Specifically, a database to be accessed is determined according to an access request message corresponding to the user information fingerprint, and request data is acquired from the database to be accessed. After obtaining the request data, the request data may be returned to the terminal.
In one embodiment, after the step of receiving an access request message for requesting access to the database, further comprising: recording the access request information into a preset access frequency table, wherein the access frequency table records the database access frequency of the user corresponding to the access request information; when the database access frequency meets a preset abnormality detection condition, performing code abnormality detection on the access request message; when the abnormal detection result is normal, entering a step of inquiring a preset user filter; otherwise, the interrupt responds to the access request message and returns an exception prompt message.
In addition to validity filtering of the terminal user through the user filter, the database access frequency of the terminal user can be counted, whether the corresponding terminal user is malicious access is judged according to the database access frequency, if the database access frequency of a certain terminal user suddenly increases, the terminal user is indicated to be possibly under virus control, when the terminal user tries to attack the database, if the terminal user is judged to be malicious access, the access request of the terminal user can be interrupted, and interrupt prompt information is fed back to prompt the terminal to perform virus searching and killing processing.
Specifically, after receiving an access request message for requesting to access a database, the access request message is recorded in a preset access frequency table, the access frequency table records the database access frequency of a user corresponding to the access request message, and when the data access frequency is monitored to meet a preset abnormality detection condition, if the preset abnormality frequency threshold is exceeded, code abnormality detection is performed on the access request message. The code anomaly detection can judge whether the corresponding terminal is infected by virus or not by analyzing the message of the access request message. If the abnormal detection result is normal, indicating that the access request message is normal, executing a step of filtering the user of the terminal user corresponding to the access request message through a user filter; if the abnormality detection result is abnormal, the terminal sending the access request message is possibly controlled by viruses, the access request message is interrupted, an abnormality prompt message is returned, the abnormality prompt message is used for prompting the terminal that the sent access request message is abnormal, virus killing processing is needed, and the access request message is resent to request to access the database.
In this embodiment, by monitoring the database access frequency of the same terminal user, if the database access frequency meets the preset abnormality detection condition, the code abnormality detection is performed on the database access frequency to determine whether the terminal is infected with viruses, so that a malicious access request can be found in advance, the database can be prevented from being attacked, and the normal work of the database is ensured.
In one embodiment, as shown in fig. 4, there is provided a database access processing method, including the steps of:
step S401: receiving a data acquisition message carrying user identification information, wherein the data acquisition message is used for requesting to acquire corresponding data to be acquired from a preset cache;
step S402: inquiring data to be acquired in the cache according to the data acquisition message;
step S403: and when the query result in the cache is empty, generating an access request message according to the data acquisition message.
In this embodiment, when a data acquisition message for requesting to acquire corresponding data to be acquired from a preset cache is received, the corresponding data to be acquired is requested to be queried in the cache according to the data acquisition message, and if the query in the cache is successful, the acquired data to be acquired is returned to the terminal; if the query result in the cache is empty, that is, the required data to be acquired is not synchronized to the cache, and the database is required to be accessed for query, an access request message is generated according to the data acquisition message, wherein the access request message carries user identification information and is used for requesting to access the database.
Step S404: receiving an access request message for requesting to access a database, wherein the access request message carries user identification information;
step S405: recording the access request information into a preset access frequency table, wherein the access frequency table records the database access frequency of the user corresponding to the access request information;
step S406: and when the database access frequency meets the preset abnormality detection condition, performing code abnormality detection on the access request message.
In this embodiment, in addition to performing validity filtering on the end user through the user filter, the database access frequency of the end user is counted, and whether the corresponding end user is malicious access is determined according to the database access frequency. Specifically, after receiving an access request message for requesting to access a database, the access request message is recorded in a preset access frequency table, the access frequency table records the database access frequency of a user corresponding to the access request message, and when the data access frequency is monitored to meet a preset abnormality detection condition, if the preset abnormality frequency threshold is exceeded, code abnormality detection is performed on the access request message.
If the abnormal detection result is normal, indicating that the access request message is normal, executing a step of filtering the user of the terminal user corresponding to the access request message through a user filter; if the abnormality detection result is abnormal, the terminal sending the access request message is possibly controlled by viruses, the access request message is interrupted, an abnormality prompt message is returned, the abnormality prompt message is used for prompting the terminal that the sent access request message is abnormal, virus killing processing is needed, and the access request message is resent to request to access the database.
By monitoring the database access frequency of the same terminal user, if the database access frequency meets the preset abnormality detection condition, the code abnormality detection is carried out on the database access frequency so as to judge whether the terminal is infected with viruses, thereby finding out malicious access requests in advance, avoiding the database from being attacked and ensuring the normal work of the database.
Step S407: inquiring a preset user filter when the abnormal detection result is normal;
step S408: calculating the user identification information by adopting a user filter to obtain user fingerprint information corresponding to the user identification information;
step S409: fingerprint matching is carried out on the user information fingerprint and the user information fingerprint meeting the request response condition in the user filter;
step S410: when the fingerprint matching results are consistent, determining a database to be accessed according to the access request message corresponding to the user information fingerprint;
step S411: querying a database to be accessed;
step S412: and acquiring the request data from the database to be accessed according to the access request message.
And when the abnormality detection result is normal, indicating that the access request message is normal, executing the step of filtering the user of the terminal user corresponding to the access request message through a user filter. Specifically, a preset user filter is queried, in this embodiment, the user filter is a bloom filter, a mapping algorithm in the bloom filter may include a Hash function, and the response user list may be a user fingerprint information set calculated by a terminal user meeting a preset response condition according to the Hash function in the bloom filter. And calculating the user identification information according to a Hash function to obtain user fingerprint information corresponding to the user identification information, and comparing and checking the user information fingerprint obtained by calculation according to the Hash function with the user information fingerprint meeting the request response condition in the bloom filter to realize fingerprint matching of the user information fingerprint.
If the fingerprint matching results are consistent, indicating that the terminal user corresponding to the user identification information meets the request response condition, responding to the corresponding access request message, and acquiring corresponding request data from the database to be accessed, wherein the method specifically comprises the following steps: determining a database to be accessed according to an access request message corresponding to the user information fingerprint; querying a database to be accessed; and acquiring the request data from the database to be accessed according to the access request message. And finally, returning the obtained request data to the terminal sending the access request message. If the fingerprint matching results are inconsistent, the corresponding terminal user is indicated not to meet the request response condition, and the corresponding access request message is directly interrupted, so that the data to be accessed are prevented from being read and accessed.
It should be understood that, although the steps in the flowcharts of fig. 2-4 are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 2-4 may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily occur sequentially, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or steps.
In one embodiment, as shown in fig. 5, there is provided a database access processing apparatus including: a request message receiving module 501, a filter querying module 503, a user fingerprint determining module 505, a fingerprint matching module 507 and a request responding module 509, wherein:
a request message receiving module 501, configured to receive an access request message for requesting to access a database, where the access request message carries user identification information;
a filter query module 503, configured to query a preset user filter;
the user fingerprint determining module 505 is configured to calculate user identification information by using a user filter, so as to obtain a user information fingerprint corresponding to the user identification information;
the fingerprint matching module 507 is configured to match the user information fingerprint with a user information fingerprint in the user filter that meets a request response condition;
and the request response module 509 is configured to respond to the access request message when the fingerprint matching results are consistent, and obtain corresponding request data from the database to be accessed.
According to the database access processing device, the user information fingerprint corresponding to the received access request message is obtained through calculation by the user fingerprint determining module according to the preset user filter, fingerprint matching is carried out on the user information fingerprint and the user information fingerprint meeting the request response condition recorded in the user filter through the fingerprint matching module, when the fingerprint matching results are consistent, the request response module responds to the corresponding access request message, rapid filtering of the access request message is achieved, and processing efficiency of the database on the access request is improved.
In one embodiment, the system further comprises a data acquisition message module and a cache response module, wherein: the data acquisition message module is used for receiving a data acquisition message carrying user identification information, wherein the data acquisition message is used for requesting to acquire corresponding data to be acquired from a preset cache and executing a step of inquiring a preset user filter; and the cache response module is used for acquiring a message from the response data and acquiring corresponding data to be acquired from the cache when the fingerprint matching results are consistent.
In one embodiment, the cache response module includes a cache query unit and an access request generation unit, wherein: the cache inquiring unit is used for inquiring the data to be acquired in the cache according to the data acquisition message; and the access request generation unit is used for generating an access request message according to the data acquisition message when the query result in the cache is empty.
In one embodiment, the system further comprises a user identification determining module, a user identification classifying module, a fingerprint mapping condition determining module, a fingerprint calculating module and a filter constructing module, wherein: the user identification determining module is used for determining user identification information meeting the request response condition; the user identification classification module is used for classifying the user identification information meeting the request response condition according to the service requirements of the service system to which the database to be accessed corresponds; the fingerprint mapping condition determining module is used for determining corresponding user fingerprint mapping conditions according to the classified user identification information; the fingerprint calculation module is used for obtaining corresponding user information fingerprints according to the classified user identification information and the user fingerprint mapping conditions; and the filter construction module is used for obtaining the user filter according to the user fingerprint mapping condition and the corresponding user information fingerprint.
In one embodiment, the filter construction module includes a sub-filter construction unit and a filter construction unit, wherein: the sub-filter construction unit is used for constructing each sub-filter according to the user fingerprint mapping condition and the corresponding user information fingerprint; and the filter construction unit is used for combining all the sub-filters according to preset combination conditions to obtain the user filter.
In one embodiment, the request response module 509 comprises a database determination unit, a database query unit, and a database access unit, wherein: the database determining unit is used for determining a database to be accessed according to the access request message corresponding to the user information fingerprint when the fingerprint matching results are consistent; the database query unit is used for querying the database to be accessed; and the database access unit is used for acquiring the request data from the database to be accessed according to the access request message.
In one embodiment, the method further comprises an access frequency recording module, a code anomaly detection module and a detection result feedback module, wherein: the access frequency recording module is used for recording the access request message into a preset access frequency table, and the access frequency table records the database access frequency of the user corresponding to the access request message; the code anomaly detection module is used for detecting code anomalies of the access request message when the database access frequency meets the preset anomaly detection conditions; the detection result feedback module is used for entering a step of inquiring a preset user filter when the abnormal detection result is normal; otherwise, the interrupt responds to the access request message and returns an exception prompt message.
The specific limitation of the database access processing device can be referred to the limitation of the database access processing method hereinabove, and will not be described herein. The various modules in the database access processing apparatus described above may be implemented in whole or in part by software, hardware, or a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 6. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a database access processing method.
It will be appreciated by those skilled in the art that the structure shown in fig. 6 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory storing a computer program and a processor that when executing the computer program performs the steps of:
receiving an access request message for requesting to access a database, wherein the access request message carries user identification information;
inquiring a preset user filter;
calculating the user identification information by adopting a user filter to obtain user fingerprint information corresponding to the user identification information;
fingerprint matching is carried out on the user information fingerprint and the user information fingerprint meeting the request response condition in the user filter;
and when the fingerprint matching results are consistent, responding to the access request message, and acquiring corresponding request data from the database to be accessed.
In one embodiment, the processor when executing the computer program further performs the steps of: receiving a data acquisition message carrying user identification information, wherein the data acquisition message is used for requesting to acquire corresponding data to be acquired from a preset cache; executing a step of inquiring a preset user filter; when the fingerprint matching results are consistent, information is acquired from the response data, and corresponding data to be acquired is acquired from the cache.
In one embodiment, the processor when executing the computer program further performs the steps of: inquiring data to be acquired in the cache according to the data acquisition message; and when the query result in the cache is empty, generating an access request message according to the data acquisition message.
In one embodiment, the processor when executing the computer program further performs the steps of: determining user identification information meeting request response conditions; classifying the user identification information meeting the request response condition according to the service requirements of the service system to which the database to be accessed corresponds; determining corresponding user fingerprint mapping conditions according to the classified user identification information; obtaining corresponding user information fingerprints according to the classified user identification information and user fingerprint mapping conditions; and obtaining a user filter according to the user fingerprint mapping condition and the corresponding user information fingerprint.
In one embodiment, the processor when executing the computer program further performs the steps of: constructing each sub-filter according to the user fingerprint mapping condition and the corresponding user information fingerprint; and combining all the sub-filters according to preset combination conditions to obtain the user filter.
In one embodiment, the processor when executing the computer program further performs the steps of: when the fingerprint matching results are consistent, determining a database to be accessed according to the access request message corresponding to the user information fingerprint; querying a database to be accessed; and acquiring the request data from the database to be accessed according to the access request message.
In one embodiment, the processor when executing the computer program further performs the steps of: recording the access request information into a preset access frequency table, wherein the access frequency table records the database access frequency of the user corresponding to the access request information; when the database access frequency meets a preset abnormality detection condition, performing code abnormality detection on the access request message; when the abnormal detection result is normal, entering a step of inquiring a preset user filter; otherwise, the interrupt responds to the access request message and returns an exception prompt message.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
receiving an access request message for requesting to access a database, wherein the access request message carries user identification information;
inquiring a preset user filter;
calculating the user identification information by adopting a user filter to obtain user fingerprint information corresponding to the user identification information;
fingerprint matching is carried out on the user information fingerprint and the user information fingerprint meeting the request response condition in the user filter;
and when the fingerprint matching results are consistent, responding to the access request message, and acquiring corresponding request data from the database to be accessed.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving a data acquisition message carrying user identification information, wherein the data acquisition message is used for requesting to acquire corresponding data to be acquired from a preset cache; executing a step of inquiring a preset user filter; when the fingerprint matching results are consistent, information is acquired from the response data, and corresponding data to be acquired is acquired from the cache.
In one embodiment, the computer program when executed by the processor further performs the steps of: inquiring data to be acquired in the cache according to the data acquisition message; and when the query result in the cache is empty, generating an access request message according to the data acquisition message.
In one embodiment, the computer program when executed by the processor further performs the steps of: determining user identification information meeting request response conditions; classifying the user identification information meeting the request response condition according to the service requirements of the service system to which the database to be accessed corresponds; determining corresponding user fingerprint mapping conditions according to the classified user identification information; obtaining corresponding user information fingerprints according to the classified user identification information and user fingerprint mapping conditions; and obtaining a user filter according to the user fingerprint mapping condition and the corresponding user information fingerprint.
In one embodiment, the computer program when executed by the processor further performs the steps of: constructing each sub-filter according to the user fingerprint mapping condition and the corresponding user information fingerprint; and combining all the sub-filters according to preset combination conditions to obtain the user filter.
In one embodiment, the computer program when executed by the processor further performs the steps of: when the fingerprint matching results are consistent, determining a database to be accessed according to the access request message corresponding to the user information fingerprint; querying a database to be accessed; and acquiring the request data from the database to be accessed according to the access request message.
In one embodiment, the computer program when executed by the processor further performs the steps of: recording the access request information into a preset access frequency table, wherein the access frequency table records the database access frequency of the user corresponding to the access request information; when the database access frequency meets a preset abnormality detection condition, performing code abnormality detection on the access request message; when the abnormal detection result is normal, entering a step of inquiring a preset user filter; otherwise, the interrupt responds to the access request message and returns an exception prompt message.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (10)

1. A database access processing method, the method comprising:
receiving an access request message for requesting to access a database, wherein the access request message carries user identification information;
inquiring a preset user filter; the user filter is a bloom filter and comprises all sub-filters indicating the filtering sequence, and the sub-filters are used for realizing multi-stage filtering for the end user; each sub-filter is constructed according to the user fingerprint mapping condition corresponding to the user identification information of each category and the user information fingerprint of the corresponding category; the user identification information of each category is obtained by classifying the user identification information meeting the request response condition; the user fingerprint mapping condition is used for calculating user information fingerprints;
Calculating the carried user identification information by adopting the user filter to obtain a user information fingerprint corresponding to the carried user identification information;
fingerprint matching is carried out on the obtained user information fingerprint and the user information fingerprint meeting the request response condition in the user filter;
and when the fingerprint matching results are consistent, responding to the access request message, and acquiring corresponding request data from the database to be accessed.
2. The method of claim 1, further comprising, prior to the step of receiving an access request message for requesting access to a database:
receiving a data acquisition message carrying the user identification information, wherein the data acquisition message is used for requesting to acquire corresponding data to be acquired from a preset cache; executing the step of inquiring a preset user filter;
after the step of fingerprint matching the obtained user information fingerprint with the user information fingerprint meeting the request response condition in the user filter, the method further comprises the following steps: and when the fingerprint matching results are consistent, corresponding data to be acquired are acquired from the cache in response to the data acquisition message.
3. The method of claim 2, wherein the step of retrieving the corresponding data to be retrieved from the cache in response to the data retrieval message when the fingerprint match results are consistent comprises:
inquiring the data to be acquired in the cache according to the data acquisition message;
and when the query result in the cache is empty, generating the access request message according to the data acquisition message.
4. The method of claim 1, further comprising, prior to the step of querying a preset user filter:
determining user identification information meeting request response conditions;
classifying the user identification information meeting the request response condition according to the service requirements of the service system to which the database to be accessed corresponds;
determining the corresponding user fingerprint mapping conditions according to the classified user identification information;
obtaining corresponding user information fingerprints according to the classified user identification information and the user fingerprint mapping conditions;
and obtaining the user filter according to the user fingerprint mapping condition and the corresponding user information fingerprint.
5. The method of claim 4, wherein the step of deriving the user filter based on the user fingerprint mapping condition and the corresponding user information fingerprint comprises:
Constructing each sub-filter according to the user fingerprint mapping condition and the corresponding user information fingerprint;
and combining the sub-filters according to preset combination conditions to obtain the user filter.
6. The method according to any one of claims 1 to 5, wherein the step of obtaining corresponding request data from the database to be accessed in response to the access request message when the fingerprint matching result is consistent comprises:
when the fingerprint matching results are consistent, determining the database to be accessed according to the access request message corresponding to the user information fingerprint;
querying the database to be accessed;
and acquiring the request data from the database to be accessed according to the access request message.
7. The method of claim 6, further comprising, after the step of receiving an access request message for requesting access to the database:
recording the access request message into a preset access frequency table, wherein the access frequency table records the database access frequency of the user corresponding to the access request message;
when the database access frequency meets a preset abnormality detection condition, performing code abnormality detection on the access request message;
When the abnormal detection result is normal, entering the step of inquiring a preset user filter; otherwise, the interrupt responds to the access request message and returns an exception prompt message.
8. A database access processing apparatus, the apparatus comprising:
the request message receiving module is used for receiving an access request message for requesting to access the database, wherein the access request message carries user identification information;
the filter inquiry module is used for inquiring a preset user filter; the user filter is a bloom filter and comprises all sub-filters indicating the filtering sequence, and the sub-filters are used for realizing multi-stage filtering for the end user; each sub-filter is constructed according to fingerprint mapping conditions corresponding to user identification information of each category and user information fingerprints of the corresponding category; the user identification information of each category is obtained by classifying the user identification information meeting the request response condition; the user fingerprint mapping condition is used for calculating user information fingerprints;
the user fingerprint determining module is used for calculating the carried user identification information by adopting the user filter to obtain a user information fingerprint corresponding to the carried user identification information;
The fingerprint matching module is used for performing fingerprint matching on the obtained user information fingerprint and the user information fingerprint meeting the request response condition in the user filter;
and the request response module is used for responding to the access request message when the fingerprint matching results are consistent, and acquiring corresponding request data from the database to be accessed.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 7 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 7.
CN201811122924.3A 2018-09-26 2018-09-26 Database access processing method, device, computer equipment and storage medium Active CN109299147B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811122924.3A CN109299147B (en) 2018-09-26 2018-09-26 Database access processing method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811122924.3A CN109299147B (en) 2018-09-26 2018-09-26 Database access processing method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109299147A CN109299147A (en) 2019-02-01
CN109299147B true CN109299147B (en) 2024-04-05

Family

ID=65164156

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811122924.3A Active CN109299147B (en) 2018-09-26 2018-09-26 Database access processing method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109299147B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008681B (en) * 2019-03-12 2023-04-07 创新先进技术有限公司 Access control method, device and system
CN110162529B (en) * 2019-05-27 2021-02-12 广州方硅信息技术有限公司 Data processing method, service server and data processing system
CN110210251A (en) * 2019-06-17 2019-09-06 阿里巴巴集团控股有限公司 Data query method, apparatus, equipment and computer readable storage medium
CN115085957A (en) * 2021-03-12 2022-09-20 中国电信股份有限公司 Malicious access data determination method, device, medium and electronic equipment
CN113806131A (en) * 2021-09-23 2021-12-17 深圳市元征软件开发有限公司 Access control method and device for fault code library, electronic equipment and storage medium
CN116186767B (en) * 2023-01-12 2023-10-03 北京万里开源软件有限公司 Method and device for marking row level in database

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102891826A (en) * 2011-06-27 2013-01-23 成都市华为赛门铁克科技有限公司 Control method, equipment and system for webpage access
CN103634268A (en) * 2012-08-20 2014-03-12 中国联合网络通信集团有限公司 A safety control method and an apparatus
CN104572727A (en) * 2013-10-22 2015-04-29 阿里巴巴集团控股有限公司 Data querying method and device
CN106161451A (en) * 2016-07-19 2016-11-23 青松智慧(北京)科技有限公司 The method of defence CC attack, Apparatus and system
CN107888659A (en) * 2017-10-12 2018-04-06 北京京东尚科信息技术有限公司 The processing method and system of user's request
CN108280365A (en) * 2017-09-19 2018-07-13 平安科技(深圳)有限公司 Data access authority management method, device, terminal device and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20150145327A (en) * 2014-06-18 2015-12-30 한국전자통신연구원 System and Method for mapping an identifier with a locator using a bloom filter

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102891826A (en) * 2011-06-27 2013-01-23 成都市华为赛门铁克科技有限公司 Control method, equipment and system for webpage access
CN103634268A (en) * 2012-08-20 2014-03-12 中国联合网络通信集团有限公司 A safety control method and an apparatus
CN104572727A (en) * 2013-10-22 2015-04-29 阿里巴巴集团控股有限公司 Data querying method and device
CN106161451A (en) * 2016-07-19 2016-11-23 青松智慧(北京)科技有限公司 The method of defence CC attack, Apparatus and system
CN108280365A (en) * 2017-09-19 2018-07-13 平安科技(深圳)有限公司 Data access authority management method, device, terminal device and storage medium
CN107888659A (en) * 2017-10-12 2018-04-06 北京京东尚科信息技术有限公司 The processing method and system of user's request

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
樊重俊 等.《大数据分析与应用》.立信会计出版社,2016,第104-105段第4.2.1节. *

Also Published As

Publication number Publication date
CN109299147A (en) 2019-02-01

Similar Documents

Publication Publication Date Title
CN109299147B (en) Database access processing method, device, computer equipment and storage medium
CN108491450B (en) Data caching method, device, server and storage medium
CN108304704B (en) Authority control method and device, computer equipment and storage medium
CN105590055B (en) Method and device for identifying user credible behaviors in network interaction system
CN108829781B (en) Client information query method, device, computer equipment and storage medium
CN108932426B (en) Unauthorized vulnerability detection method and device
CN109492019B (en) Service request response method, device, computer equipment and storage medium
CN112073389A (en) Cloud host security situation awareness system, method, device and storage medium
WO2019144548A1 (en) Security test method, apparatus, computer device and storage medium
CN112115167B (en) Cache system hot spot data access method, device, equipment and storage medium
CN108234426B (en) APT attack warning method and APT attack warning device
US8060577B1 (en) Method and system for employing user input for file classification and malware identification
CN112395157A (en) Audit log obtaining method and device, computer equipment and storage medium
US11652818B2 (en) Method and apparatus for accessing service system
US10742668B2 (en) Network attack pattern determination apparatus, determination method, and non-transitory computer readable storage medium thereof
US8364776B1 (en) Method and system for employing user input for website classification
CN110941530A (en) Method and device for acquiring monitoring data, computer equipment and storage medium
CN112581027A (en) Risk information management method and device, electronic equipment and storage medium
CN108650249B (en) POC attack detection method and device, computer equipment and storage medium
CN113590180B (en) Detection strategy generation method and device
CN115834345A (en) Alarm data processing method, device, equipment and medium
US11641371B2 (en) Systems, methods and computer-readable media for monitoring a computer network for threats using OLAP cubes
CN112953958B (en) Crawler detection method and device and electronic equipment
US11593505B2 (en) Database access, monitoring, and control system and method for reacting to suspicious database activities
CN109460500B (en) Hotspot event discovery method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant