CN112565111A - Service visualization method and system based on hardware bypass - Google Patents

Service visualization method and system based on hardware bypass Download PDF

Info

Publication number
CN112565111A
CN112565111A CN202011330979.0A CN202011330979A CN112565111A CN 112565111 A CN112565111 A CN 112565111A CN 202011330979 A CN202011330979 A CN 202011330979A CN 112565111 A CN112565111 A CN 112565111A
Authority
CN
China
Prior art keywords
data
service
database
user
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011330979.0A
Other languages
Chinese (zh)
Inventor
罗春江
尹亮
刘引
周期律
张轶
张�浩
委中原
税萍
王超
丁莉楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Rural Commercial Bank Co ltd
Original Assignee
Chongqing Rural Commercial Bank Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Rural Commercial Bank Co ltd filed Critical Chongqing Rural Commercial Bank Co ltd
Priority to CN202011330979.0A priority Critical patent/CN112565111A/en
Publication of CN112565111A publication Critical patent/CN112565111A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/20Support for services
    • H04L49/208Port mirroring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/26Visual data mining; Browsing structured data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Mathematical Physics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a service visualization method and a system based on a hardware bypass, wherein the system comprises a data acquisition module, a data integration module, a data application module and a data access module; wherein: the data acquisition module is used for: acquiring data generated by a service system by using a hardware bypass technology, acquiring externally input data, and determining that the acquired data are all service data; the data integration module is configured to: processing, cleaning and formatting the service data, and storing the processed service data into a database; the data application module is configured to: calling the service data in the database, and sending the called service data to corresponding application; the data access module is configured to: and calling and displaying the service data in the database. Therefore, unified management and control of corresponding service data can be achieved.

Description

Service visualization method and system based on hardware bypass
Technical Field
The invention relates to the technical field of information management, in particular to a service visualization method and system based on a hardware bypass.
Background
With the rapid development of information technology, in recent years, mobile payment, artificial intelligence, big data, universal internet, 5G, block chains and the like are popular, people gradually move from off-line to on-line in the aspects of work and life, and many demands can be realized only by logging in a website or opening an APP. For banks, no matter internal management or external business, realization of digitization and intellectualization is inevitable, however, a technical scheme capable of realizing unified management and control of corresponding business data in banks does not exist in the prior art.
Disclosure of Invention
The invention aims to provide a service visualization method and system based on a hardware bypass, which can realize the unified management and control of corresponding service data.
In order to achieve the above purpose, the invention provides the following technical scheme:
a service visualization system based on a hardware bypass comprises a data acquisition module, a data integration module, a data application module and a data access module; wherein:
the data acquisition module is used for: acquiring data generated by a service system by using a hardware bypass technology, acquiring externally input data, and determining that the acquired data are all service data;
the data integration module is configured to: processing, cleaning and formatting the service data, and storing the processed service data into a database;
the data application module is configured to: calling the service data in the database, and sending the called service data to corresponding application;
the data access module is configured to: and calling and displaying the service data in the database.
Preferably, the data acquisition module includes a data acquisition unit, and the data acquisition unit is configured to: acquiring data obtained by copying a message transmitted and received by a corresponding mirror image port from an observation port, and determining the acquired data to be data generated by the service system acquired by using the hardware bypass technology; the mirror image port is arranged in a switch connected with a server of the service system.
Preferably, the data acquisition unit includes a data acquisition subunit, and the data acquisition subunit is configured to: and determining the data acquired from the switch corresponding to the service system as the data of the corresponding service based on the corresponding relation between the service system and the service.
Preferably, the data access module includes a permission determination unit, and the permission determination unit is configured to: and determining the identity information of the user needing to access the service data in the database, and determining the service data with the access authority of the user based on the identity information, so that the user can realize corresponding calling and displaying.
Preferably, the data access module includes a login authentication unit, and the login authentication unit is configured to: and verifying login information input by a user needing to access the service data in the database, if the login information passes the verification, allowing the user to access the database, and if the login information does not pass the verification, refusing the user to access the database.
Preferably, the data access module includes a data presentation unit, and the data presentation unit is configured to: and displaying the service data called by the user in the database at the terminal corresponding to the user, wherein the terminal of the user comprises the APP, the data screen and the digital panel of the user.
Preferably, the data presentation unit includes a first data presentation subunit, and the first data presentation subunit is configured to: and graphically displaying the service data in the database called by the user at a terminal corresponding to the user.
Preferably, the data presentation unit includes a second data presentation subunit, and the second data presentation subunit is configured to: and carrying out voice broadcast on the service data in the database called by the user at a terminal corresponding to the user.
Preferably, the data application module includes a BI data tool platform and a machine learning data tool platform, and the BI data tool platform and the machine learning data tool platform are configured to: and the application calls the data analysis function to realize the corresponding data analysis function.
A service visualization method based on hardware bypass comprises the following steps:
acquiring data generated by a service system by using a hardware bypass technology, acquiring externally input data, and determining that the acquired data are all service data;
processing, cleaning and formatting the service data, and storing the processed service data into a database;
calling the service data in the database, and sending the called service data to corresponding application; or calling and displaying the service data in the database.
The invention provides a service visualization method and a system based on a hardware bypass, wherein the system comprises a data acquisition module, a data integration module, a data application module and a data access module; wherein: the data acquisition module is used for: acquiring data generated by a service system by using a hardware bypass technology, acquiring externally input data, and determining that the acquired data are all service data; the data integration module is configured to: processing, cleaning and formatting the service data, and storing the processed service data into a database; the data application module is configured to: calling the service data in the database, and sending the called service data to corresponding application; the data access module is configured to: and calling and displaying the service data in the database. Therefore, according to the application, after the data acquisition module acquires data generated by the service system by using a hardware bypass technology and receives externally input data, the data integration module can correspondingly process and store the data, and the data application module and the data access module can call required data and then send the data to an application or display the data, so that unified management and control of corresponding service data can be realized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a service visualization system based on hardware bypass according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a hardware bypass technology in a service visualization system based on hardware bypass according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a schematic diagram of an architecture of a service visualization system based on a hardware bypass according to an embodiment of the present invention is shown, where the system may include a data acquisition module, a data integration module, a data application module, and a data access module; wherein:
a data acquisition module to: acquiring data generated by a service system by using a hardware bypass technology, acquiring externally input data, and determining that the acquired data are all service data;
a data integration module to: processing, cleaning and formatting the service data, and storing the processed service data into a database;
a data application module to: calling the service data in the database, and sending the called service data to corresponding application;
a data access module to: and calling and displaying the service data in the database.
The data acquisition module can acquire data generated by the business system by using a hardware bypass technology, receive externally input data and further transmit the data serving as business data to the data integration module, wherein the data acquired by the data acquisition module specifically comprises credit management part data, risk management part data, asset management part data, personal business part data, small and micro business part data, lease data, financing sub-company data and the like. The data integration module processes, cleans and formats the in-line data and the out-of-line data transmitted by the data acquisition module (specifically, the data integration module can include loading, cleaning, conversion and distribution); the data integration module analyzes data (which can be messages) acquired by using a hardware bypass technology, and stores the data into a database in a structured data mode after the data are cleaned and processed for real-time analysis of big data; wherein, the data cleaning can include duplication removal, filling in (missing value), error correction (numerical value out of range, logic error) and the like; data processing may include data extraction, data sorting, data grouping, etc.; formatting may include converting poorly readable data and data types to formats that are more readable, including formatting strings and data, formatting dates, etc. After the data is stored in the database, the data can be called for the corresponding application by the data application module, and the data can be called and displayed for the corresponding user by the data access module, so that the application or the user can quickly acquire the required data through the database, and the corresponding analysis and other operations can be realized.
According to the data processing method and device, after the data acquisition module acquires data generated by the service system by using a hardware bypass technology and receives data input from the outside, the data integration module can correspondingly process and store the data, and the data application module and the data access module can call required data and then send the data to the application or display the data, so that unified management and control of corresponding service data can be realized.
In the service visualization system based on the hardware bypass, the data acquisition module may include a data acquisition unit, and the data acquisition unit is configured to: acquiring data obtained by copying a message received and sent by a corresponding mirror image port from an observation port, and determining the acquired data to be data generated by a service system acquired by using a hardware bypass technology; the mirror image port is arranged in a switch connected with a server of the service system.
The hardware bypass technology copies the message data in the switch port to the mirror port. The switch refers specifically to an access layer switch in the embodiment of the application, and the switch is deployed by a direct connection server. According to the method and the device, the observation port is arranged in the switch connected with the server of the service system, the corresponding observation port can directly acquire data, and then the data can be quickly acquired based on the hardware bypass. It should be noted that all application server ports have corresponding numbers, for example, when it is desired to acquire service data of a credit system, the ip address and the port number of a credit system service are fixed, and ports connected to an access layer switch are also fixed, so that port mirrors can be configured for the ports of the switch. Specifically, port mirroring is performed on the switch, that is, a mirroring port is set on the switch, all the messages of the service data are backed up to the mirroring port, and then the messages are analyzed, and a data portion in the messages is selected, so that the service data can be acquired. The message format may be as follows: southern frame head, ip head, tcp head, upper layer data, fcs. The IP header information may be as follows: head length: typically 20 bytes, and optionally longer, for a total of no more than 60 bytes; IP datagram length: 65535 bytes.
Specifically, the schematic diagram of the hardware bypass technology can be as shown in fig. 2, and the hardware bypass technology can also be in a hardware data bypass mode, which generally means that a data backup technology is implemented by a "port mirroring" function of a network device such as a switch, and in this mode, the device only needs to be connected to a designated mirroring port of the switch, so that the device is called "data bypass" visually. Real-time traffic data in the switch is backed up to the mirror port. Wherein, the mirror image port refers to a monitored port, and messages received and sent by the mirror image port are copied to a port connected with the monitoring equipment; the observation port is a port connected with the monitoring equipment and used for sending the message copied by the mirror image port to the monitoring equipment, and the general observation port is specially used for forwarding the mirror image flow, so that other services are not recommended to be configured on the observation port, and the mirror image flow and other service flows are prevented from being simultaneously forwarded on the observation port and influencing each other; the mirror image direction refers to copying a message in a direction specified by the mirror image port to the observation port, and comprises an incoming direction, an outgoing direction and a bidirectional direction, wherein the incoming direction is to copy a message received by the mirror image port to the observation port, the outgoing direction is to copy a message sent by the mirror image port to the observation port, and the bidirectional direction is to copy both messages received and sent by the mirror image port to the observation port; the port mirror image refers to that the equipment copies a message flowing through a mirror image port and transmits the message to a specified observation port for analysis and monitoring, the port mirror image is divided into a local port mirror image and a remote port mirror image according to different positions of the monitoring equipment in a network, the local port mirror image refers to that the observation port is directly connected with the monitoring equipment, the observation port is called a local observation port at the moment, the remote port mirror image refers to that the observation port and the monitoring equipment transmit a mirror image message through an intermediate network, and the observation port is called a remote observation port at the moment. The realization principle is as follows: the principle of the source port and the destination port being located on different switches is to mirror the traffic of the source port into the local VLAN and then to transmit to the destination device through TRUNK. And then mirroring the data in the VLAN in the local equipment to the designated port.
In addition, the observation port of the remote switch and the monitored port of the monitoring device can be added into the VLAN777, so that two-layer communication between the two devices can be ensured; the communication can use IP protocol, which is the power of TCP/IP protocol family, and it provides stateless, connectionless, unreliable service for upper layer protocol, and has the advantages of simplicity and high efficiency. The stateless state refers to the state information that both IP communication parties transmit data asynchronously, and the transmission of all IP datagrams is independent, so that duplication and disorder are easy to occur, and the IP layer does not process the duplicated and disorder, and then the disorder is handed to an upper layer transport layer (TCP/UDP, etc.) to process the disorder into order and correctly, and then the ordered and correctly processed data is handed to an application layer. (ii) a The unreliable state means that the IP protocol cannot guarantee that the IP datagram arrives accurately, so it provides ICMP message to assist, and notifies the upper layer protocol once the failure of sending IP datagram is detected.
The data bypass technology has the advantages that: 1. the bypass monitoring mode is flexible and convenient to deploy, and only a mirror image port needs to be configured on the switch. The existing network structure is not affected. 2. The bypass mode analysis is to copy the data from the mirror port, which will not delay the originally transmitted data packet and will not affect the network speed. 3. The bypass monitoring equipment cannot influence the normal reason of the existing network once the bypass monitoring equipment fails or stops running.
The data acquisition module acquires data generated by the service system by using a hardware bypass technology, and the data acquisition unit can comprise a data acquisition subunit which is used for: and determining the data acquired from the switch corresponding to the service system as the data of the corresponding service based on the corresponding relation between the service system and the service.
It should be noted that the present application can implement the division according to the services, thereby implementing the acquisition of different service data from the switches corresponding to different services; particularly, the switch port mirror image in the embodiment of the application can be planned and planned integrally and divided according to the services, so that all services in a bank can be planned and made into the port mirror image according to the switch port, the interception and storage of a full-row real-time data stream are realized, data support is provided for a visualization system, and a full-row digital transformation tamping foundation is provided. In a specific implementation, server ip address segment planning may be made first, for example, the credit system server ip address pool is 10.188.6.12-10.188.6.21, which corresponds to 10 ports of the switch, and the port description configured on the switch is classified into a credit service port class, such as: eth110.188.6.12 credit system port; then the flow data from the port is credit related data, and after the port is mirrored, the data from the port is credit business data, thus completing the credit business classification. By analogy, all service lines in a full row can be classified in this way.
In the service visualization system based on the hardware bypass provided in the embodiment of the present invention, the data access module may include an authority determination unit, and the authority determination unit is configured to: and determining the identity information of the user needing to access the service data in the database, and determining the service data with the access authority of the user based on the identity information, so that the user can realize corresponding calling and displaying.
In order to meet the requirements of a head office product operation manager on the operation and comparison of products in a whole row range and different branch rows and the requirements of a front-line product worker on related operation states, namely different user roles, an authority determining unit can be arranged in a data access module, the authority determining unit can be realized based on an authority system and an account system, and accounts in the account system can comprise a product operation post, a product management post, a wind control post, an anti-fraud post, a head office management post, a branch row management post, a client manager post, a network site master post and the like. Correspondingly, the identity information of the user accessing the database can be determined, namely the user belongs to which type of account in the account system, and then the user is only allowed to correspondingly access all service systems which can be accessed by the user to the account. In addition, different pages can be seen by different accounts when the database access is realized, different modules can also be seen by different accounts on the same page, and the visual content can be controlled according to business needs, such as: the risk radar module can be checked only by a risk management post, and other posts have no permission.
In the service visualization system based on the hardware bypass provided in the embodiment of the present invention, the data access module may include a login verification unit, and the login verification unit is configured to: and verifying the login information input by the user needing to access the service data in the database, if the verification is passed, allowing the user to access the database, and otherwise, refusing the user to access the database.
In order to ensure the security and reliability of data in the database, the embodiment of the application can perform identity authentication on a user needing to access the database, that is, judge whether the input login information is correct, if so, indicate that the identity of the user can be logged in and realize the access of the database, otherwise, indicate that the identity of the user cannot be logged in and realize the access of the database.
In the service visualization system based on the hardware bypass provided in the embodiment of the present invention, the data access module may include a data display unit, and the data display unit is configured to: and displaying the service data in the database called by the user at a terminal corresponding to the user, wherein the terminal of the user comprises an APP (application), a data screen and a digital panel of the user.
According to the embodiment of the application, the user can select the data to be displayed through the PC terminal interface, and the data is dragged to complete operation analysis such as addition, subtraction, multiplication, division, average number and summation of indexes. The data access module can realize multi-channel terminal display, such as APP, a PC terminal, a public number, IPAD, a data screen, a digital board (or referred to as a data board) and the like, and achieves the effect of experience upgrading.
In the service visualization system based on the hardware bypass provided in the embodiment of the present invention, the data display unit may include a first data display subunit and a second data display subunit, where:
the first data presentation subunit is configured to: carrying out graphical display on the service data in the database called by the user at a terminal corresponding to the user;
the second data presentation subunit is to: and carrying out voice broadcast on the service data in the database called by the user at the terminal corresponding to the user.
It should be noted that, this application can carry out graphical show or voice broadcast with the data that need show through cell-phone end etc. makes things convenient for corresponding personnel directly perceived to obtain, and the online product operation manager of being convenient for and operation analyst in time master product operation trend and analysis customer action to the influence of product operation state, the comprehensive operation control of the online product of being convenient for.
In the service visualization system based on the big data platform provided by the embodiment of the present invention, the data access module may include a data retrieving unit, and the data retrieving unit is configured to: and calling the service data in the database by calling an API (application programming interface) provided by the database.
In order to conveniently realize data calling, the application can set a corresponding API (application programming interface) for the database, so that the service data in the database can be called through the API, and further, corresponding data operations such as analysis and processing are realized.
In the service visualization system based on the hardware bypass, the data application module may include a BI data tool platform and a machine learning data tool platform, and the BI data tool platform and the machine learning data tool platform are configured to: the application calls are provided to implement the corresponding data analysis functions.
It should be noted that, two data tool platforms, namely, a data analysis (BI) and a machine learning, can be set up in the data application module, and then the two data tool platforms can be called as needed to realize corresponding data analysis, thereby improving the automatic analysis level of business personnel, reducing the threshold of user data use, and promoting the data to be quickly applied to business decisions. In addition, a report unified portal can be set up, so that the unified management and access of the report are realized; and based on the specific demand condition in the row, the business scenes such as APP, wind control, marketing, customer service and the like are supported. The BI is an operation analysis tool, the machine learning platform is index AI, and the two platforms call data of the data integration module and need to pass through a data scheduling layer, a service gateway layer and an atomic service layer. Specifically, the data scheduling layer supports service scheduling modes such as HTTP, RPC online service, batch file interfaces, message queues, asynchronous callback push and the like, and meets various scene requirements such as real-time and quasi-real-time; the service gateway layer comprises service registration, service discovery, service authentication and service combination; the atomic service layer comprises a marketing service group, an operation service group, a performance service group and a report service group. Inside each group is an index system divided according to the service lines. Because the generation of the index to the query result is real-time or quasi-real-time, and is data such as service operation, product performance, real-time report forms and the like, the terminal checks through a service monitoring large screen, an app end and the like, and the management layer also has account authority check, the leader has reference value for making management decisions and strategy adjustment. When the online business operation early warning system is applied to wind control, for example, a business lookout tower (which is a digitalized platform based on online business operation and provides professional and accurate management decision support for a user through digitalized monitoring and analysis in operation so as to achieve the purposes of optimizing operation, reducing operation cost and improving income) has pre-credit, mid-credit and post-credit in a smart early warning module, and enterprise concentration early warning, personal concentration early warning, anti-fraud index calling condition, fraud passing rate and anti-fraud rejection rate are arranged before credit; when the business lookout tower is applied to marketing, a module called a dragon and tiger list is arranged on the business lookout tower, full-line innovation line products are arranged inside the business lookout tower for marketing ranking, and according to branch lines or individual ranking, when the business lookout tower is used by a client manager, performance ranking, backlog and the like of the business lookout tower can be checked.
In addition, a data index data structure table can be created in a database such as Redis, an index data mapping API interface is added in a unified service scheduling layer for front-end UI to call by a React architecture, and the index data structure table is applied to a data application module. And index system construction may include: 1. the technical analysis of business department investigation, 2, report form combing, 3, storage process and the like; and finally, an atomic service layer is realized, wherein the atomic service layer comprises a marketing service group, an operation service group, a performance service group and a report service group.
In conclusion, the method and the system can apply, approve and use monitoring of the whole process link and tracking of overdue conditions, simultaneously comb up about 300 relevant indexes of the data of the buried points, and monitor the product access conditions of customers at the WeChat end and the mobile banking app end (including user behavior analysis, user event analysis, stay time, page retention, new attention, new binding cards and the like). The branch management personnel and the head office management personnel can be helped to quickly master the achievement completion condition, the branch ranking, the product information and the like, and the working efficiency is improved; the management personnel can master the product operation condition, risk indexes and organization performance in time, and the management efficiency is improved; the method is beneficial to the insight of the behavior of the customer, provides more timely and professional service, effectively improves the customer experience and increases the customer satisfaction.
The embodiment of the invention also provides a service visualization method based on the hardware bypass, which comprises the following steps:
s11: acquiring data generated by a service system by using a hardware bypass technology, acquiring externally input data, and determining that the acquired data are all service data;
s12: processing, cleaning and formatting the service data, and storing the processed service data into a database;
s13: calling the service data in the database, and sending the called service data to corresponding application; or calling and displaying the business data in the database.
It should be noted that for the description of the relevant part in the service visualization method based on the hardware bypass provided in the embodiment of the present invention, reference is made to the detailed description of the corresponding part in the service visualization system based on the hardware bypass provided in the embodiment of the present invention, and details are not described here again. In addition, parts of the above technical solutions provided in the embodiments of the present invention that are consistent with the implementation principles of the corresponding technical solutions in the prior art are not described in detail, so as to avoid redundant description.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A service visualization system based on a hardware bypass is characterized by comprising a data acquisition module, a data integration module, a data application module and a data access module; wherein:
the data acquisition module is used for: acquiring data generated by a service system by using a hardware bypass technology, acquiring externally input data, and determining that the acquired data are all service data;
the data integration module is configured to: processing, cleaning and formatting the service data, and storing the processed service data into a database;
the data application module is configured to: calling the service data in the database, and sending the called service data to corresponding application;
the data access module is configured to: and calling and displaying the service data in the database.
2. The system of claim 1, wherein the data acquisition module comprises a data acquisition unit to: acquiring data obtained by copying a message transmitted and received by a corresponding mirror image port from an observation port, and determining the acquired data to be data generated by the service system acquired by using the hardware bypass technology; the mirror image port is arranged in a switch connected with a server of the service system.
3. The system of claim 2, wherein the data acquisition unit comprises a data acquisition subunit configured to: and determining the data acquired from the switch corresponding to the service system as the data of the corresponding service based on the corresponding relation between the service system and the service.
4. The system of claim 3, wherein the data access module comprises a permission determination unit configured to: and determining the identity information of the user needing to access the service data in the database, and determining the service data with the access authority of the user based on the identity information, so that the user can realize corresponding calling and displaying.
5. The system of claim 4, wherein the data access module comprises a login authentication unit configured to: and verifying login information input by a user needing to access the service data in the database, if the login information passes the verification, allowing the user to access the database, and if the login information does not pass the verification, refusing the user to access the database.
6. The system of claim 5, wherein the data access module comprises a data presentation unit configured to: and displaying the service data called by the user in the database at the terminal corresponding to the user, wherein the terminal of the user comprises the APP, the data screen and the digital panel of the user.
7. The system of claim 6, wherein the data presentation unit comprises a first data presentation subunit configured to: and graphically displaying the service data in the database called by the user at a terminal corresponding to the user.
8. The system of claim 7, wherein the data presentation unit comprises a second data presentation subunit configured to: and carrying out voice broadcast on the service data in the database called by the user at a terminal corresponding to the user.
9. The system of claim 8, wherein the data application module comprises a BI data tool platform and a machine learning data tool platform, the BI data tool platform and the machine learning data tool platform configured to: and the application calls the data analysis function to realize the corresponding data analysis function.
10. A service visualization method based on hardware bypass is characterized by comprising the following steps:
acquiring data generated by a service system by using a hardware bypass technology, acquiring externally input data, and determining that the acquired data are all service data;
processing, cleaning and formatting the service data, and storing the processed service data into a database;
calling the service data in the database, and sending the called service data to corresponding application; or calling and displaying the service data in the database.
CN202011330979.0A 2020-11-24 2020-11-24 Service visualization method and system based on hardware bypass Pending CN112565111A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011330979.0A CN112565111A (en) 2020-11-24 2020-11-24 Service visualization method and system based on hardware bypass

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011330979.0A CN112565111A (en) 2020-11-24 2020-11-24 Service visualization method and system based on hardware bypass

Publications (1)

Publication Number Publication Date
CN112565111A true CN112565111A (en) 2021-03-26

Family

ID=75043356

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011330979.0A Pending CN112565111A (en) 2020-11-24 2020-11-24 Service visualization method and system based on hardware bypass

Country Status (1)

Country Link
CN (1) CN112565111A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113111089A (en) * 2021-04-09 2021-07-13 重庆农村商业银行股份有限公司 Information acquisition management system and method
CN113703886A (en) * 2021-07-21 2021-11-26 青岛海尔科技有限公司 User system behavior monitoring method, system, electronic equipment and storage medium
CN115988076A (en) * 2022-12-02 2023-04-18 广州通则康威智能科技有限公司 Method and system for transmitting equipment data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103678452A (en) * 2012-09-10 2014-03-26 Sap股份公司 Visualization and integration with analytics of business objects
CN106411659A (en) * 2016-11-29 2017-02-15 福建中金在线信息科技有限公司 Business data monitoring method and apparatus
CN108667921A (en) * 2018-04-27 2018-10-16 中国农业银行股份有限公司 A kind of banking recommendation information generation method and system based on network bypass
CN110991984A (en) * 2019-11-08 2020-04-10 卡斯柯信号有限公司 Digital operation analysis platform and method based on enterprise information heterogeneous system
CN111314296A (en) * 2020-01-15 2020-06-19 福建奇点时空数字科技有限公司 Network traffic analysis security service system based on bypass technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103678452A (en) * 2012-09-10 2014-03-26 Sap股份公司 Visualization and integration with analytics of business objects
CN106411659A (en) * 2016-11-29 2017-02-15 福建中金在线信息科技有限公司 Business data monitoring method and apparatus
CN108667921A (en) * 2018-04-27 2018-10-16 中国农业银行股份有限公司 A kind of banking recommendation information generation method and system based on network bypass
CN110991984A (en) * 2019-11-08 2020-04-10 卡斯柯信号有限公司 Digital operation analysis platform and method based on enterprise information heterogeneous system
CN111314296A (en) * 2020-01-15 2020-06-19 福建奇点时空数字科技有限公司 Network traffic analysis security service system based on bypass technology

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113111089A (en) * 2021-04-09 2021-07-13 重庆农村商业银行股份有限公司 Information acquisition management system and method
CN113703886A (en) * 2021-07-21 2021-11-26 青岛海尔科技有限公司 User system behavior monitoring method, system, electronic equipment and storage medium
CN113703886B (en) * 2021-07-21 2023-06-20 青岛海尔科技有限公司 User system behavior monitoring method, system, electronic equipment and storage medium
CN115988076A (en) * 2022-12-02 2023-04-18 广州通则康威智能科技有限公司 Method and system for transmitting equipment data
CN115988076B (en) * 2022-12-02 2023-10-13 广州通则康威智能科技有限公司 Method and system for transmitting equipment data

Similar Documents

Publication Publication Date Title
CN112565111A (en) Service visualization method and system based on hardware bypass
CN101094051B (en) System and method for synchronizing comparison of data consistency
US9420107B2 (en) Service request routing using passive skill certification
CN103679967B (en) Self-service dealing terminal, preposition equipment, self-service terminal system
CN103530772A (en) Mobile interaction payment risk control method and system
US11930051B2 (en) Network service system, computer storage medium for communication, and network service method
CN101482960A (en) Method and system for marketing in bank hall
CN109636307B (en) River chang APP system
CN112364086A (en) Business visualization method and system based on big data platform
CN108022195A (en) A kind of system platform for being used for urban track traffic internet and automatic ticket inspection
CN111628896A (en) IT operation and maintenance management method, device, equipment and computer storage medium
US20120035977A1 (en) Enterprise Consumer Complaints Program
CN113570468A (en) Enterprise payment wind control service platform
CN111080929A (en) Operation control method and device of automatic teller machine
CN113905129A (en) Method and device for intercepting crank call
CN109714434A (en) A kind of operation management method of the Metro AFC system based on Internet of Things
KR100237870B1 (en) Billing data processing method using packet traffic analyzing apparatus
US9025758B2 (en) Electronic communications system for multinodal expert networks
US20130090990A1 (en) Quality Assurance Management
CN110764931B (en) Processing method, system, equipment and storage medium for OTA website uploading certificate
CN112101810A (en) Risk event control method, device and system
CN108241923A (en) A kind of worker's information management system
CN112348515A (en) Business processing method and business service system
TWI662499B (en) A method and system for automatically processing corporate action events
US11809171B2 (en) Virtual assistant factory computing platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210326