CN116702008A - System risk management method, device, terminal equipment and storage medium - Google Patents

System risk management method, device, terminal equipment and storage medium Download PDF

Info

Publication number
CN116702008A
CN116702008A CN202310740600.0A CN202310740600A CN116702008A CN 116702008 A CN116702008 A CN 116702008A CN 202310740600 A CN202310740600 A CN 202310740600A CN 116702008 A CN116702008 A CN 116702008A
Authority
CN
China
Prior art keywords
risk
data
service
information
platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310740600.0A
Other languages
Chinese (zh)
Inventor
赵蕴娉
蒋毅
胡斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Merchants Bank Co Ltd
Original Assignee
China Merchants Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Merchants Bank Co Ltd filed Critical China Merchants Bank Co Ltd
Priority to CN202310740600.0A priority Critical patent/CN116702008A/en
Publication of CN116702008A publication Critical patent/CN116702008A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Business, Economics & Management (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Marketing (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Evolutionary Computation (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Artificial Intelligence (AREA)
  • Mathematical Physics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a system risk management method, a device, terminal equipment and a storage medium, wherein the method comprises the following steps: acquiring service system information of the bank escrow service system; performing rule configuration on the service system information based on preset configuration rules; carrying out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal; and managing the risk of the service system based on the risk classification signal. The invention can evaluate the importance degree of the risk of the information, thereby focusing on key business.

Description

System risk management method, device, terminal equipment and storage medium
Technical Field
The present invention relates to the field of risk management, and in particular, to a system risk management method, apparatus, terminal device, and storage medium.
Background
In the banking industry, along with the continuous development of technology, "intelligent" gradually replaces "online", and is taken as the main stream development direction of the current system tool. The intelligent system tool brings a lot of convenience to business personnel, and the coupling degree between the operation of the business personnel and the system tool is also higher and higher. However, this also presents new challenges to the bank, such as presenting a system risk problem.
To address the system risk problem, several effective systems risk management methods have been developed in the banking industry. However, the current common system risk management method has a defect that the importance degree of each risk is not evaluated, so that the awareness of focusing on important business is lacking. For example, when an abnormal risk occurs in a non-critical business, unnecessary early warning is sent out, and research, development or business personnel may waste time and effort to deal with the unnecessary early warning, while delay handling the abnormal critical business.
Disclosure of Invention
The invention mainly aims to provide a system risk management method, a system risk management device, terminal equipment and a storage medium, and aims to solve the problem that the importance degree of each risk is not evaluated in the current risk management method, so that the awareness of focusing on important business is lacked.
To achieve the above object, the present invention provides a system risk management method, which is applied to a banking system, the method including:
acquiring service system information of the bank escrow service system;
performing rule configuration on the service system information based on preset configuration rules;
Carrying out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal;
and managing the risk of the service system based on the risk classification signal.
Optionally, the step of acquiring the business system information of the banking system includes:
the obtaining the system side information and the user side information specifically includes:
acquiring early warning signals of the application system and the data system;
collecting data which relates to user operation and does not need monitoring in the unified log platform as behavior data;
performing data processing on the early warning signals of the application system and the data system and the behavior data to obtain system side information;
and collecting user data, and sorting the user data to obtain user side information.
Optionally, the step of acquiring early warning signals of the application class system and the data class system includes:
accessing the data to be monitored in the unified log platform and the performance monitoring platform to the pre-known early-warning platform, and monitoring the data to be monitored through the pre-known early-warning platform based on preset early-warning rules;
When the data to be monitored accords with the preset early warning rule, acquiring an early warning signal of the application system sent by the precedent early warning platform;
performing data quality check on the data in the job scheduling platform;
and when the data in the job scheduling platform has abnormal risk, acquiring an early warning signal of the data system.
Optionally, the step of sorting the user data to obtain user side information includes:
and based on the system, the function and the operation of the user in different time periods, sorting the user data to obtain a high-frequency operation function and a high-frequency operation time period, and taking the high-frequency operation function and the high-frequency operation time period as user side information.
Optionally, the step of collecting user data, sorting the user data, and obtaining user side information includes:
associating early warning signals of the application system and the data system with the user data to generate a service code;
and when the early warning signal of the application system and/or the data system is acquired next time, searching and obtaining the user data based on the service code.
Optionally, the preset configuration rule at least includes one of the following:
in a certain time interval, the index in the service system information has a change trend;
comparing the index in the service system information with a corresponding index threshold;
the performance of the system or the platform where the service system information is located continuously drops, and/or the occupancy rate of the system or the platform where the service system information is located increases exponentially;
the function to which the service system information belongs has user attention;
the service system information is in a key time period.
Optionally, the step of managing the risk of the service system based on the risk classification signal includes:
processing the risk of the service system through the research and development side based on the risk classification signal;
the risk classification signals are confirmed through the service side and the research and development side, and a confirmation result is obtained;
if the confirmation result shows that the risk classification signal needs to be corrected, executing at least one of the following steps:
iterating the configuration rule through the service side;
iterating the early warning rule through the research and development side;
and adjusting the risk classification signal through the service side.
The embodiment of the invention also provides a system risk management device, which comprises:
the information acquisition module acquires service system information of the bank escrow service system;
the risk signal grading module is used for carrying out rule configuration on the business system information based on a preset configuration rule; carrying out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal;
and the rule management module is used for managing the risk of the service system based on the risk classification signal.
The embodiment of the invention also provides a terminal device, which comprises a memory, a processor and a system risk management program stored on the memory and capable of running on the processor, wherein the system risk management program realizes the system risk management method when being executed by the processor.
The embodiment of the invention also provides a computer readable storage medium, wherein a system risk management program is stored on the computer readable storage medium, and the system risk management program realizes the system risk management method when being executed by a processor.
The system risk management method, the device, the terminal equipment and the storage medium provided by the embodiment of the invention acquire the business system information of the banking managed business system; performing rule configuration on the service system information based on preset configuration rules; carrying out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal; and managing the risk of the service system based on the risk classification signal. The embodiment of the invention carries out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal, thereby carrying out importance degree assessment on the risk of the business system information. And the corresponding information can be sequentially processed according to the height of the risk classification signal, and the risk classification signal of the key service is higher than that of the non-key service, so that the key service can be focused more. In addition, the embodiment of the invention manages the system risk based on the risk classification signal, and can adjust the risk classification signal of the non-key business, thereby focusing on the key business more pertinently.
Drawings
FIG. 1 is a schematic diagram of functional modules of a terminal device to which a risk management device of the system of the present invention belongs;
FIG. 2 is a flowchart of a first embodiment of a system risk management method according to the present invention;
fig. 3 is a schematic diagram of a system risk management flow in the system risk management method of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The main solutions of the embodiments of the present invention are: acquiring service system information of the bank escrow service system; performing rule configuration on the service system information based on preset configuration rules; carrying out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal; and managing the risk of the service system based on the risk classification signal. The embodiment of the invention carries out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal, thereby carrying out importance degree assessment on the risk of the business system information. And the corresponding information can be sequentially processed according to the height of the risk classification signal, and the risk classification signal of the key service is higher than that of the non-key service, so that the key service can be focused more. In addition, the embodiment of the invention manages the system risk based on the risk classification signal, and can adjust the risk classification signal of the non-key business, thereby focusing on the key business more pertinently.
The embodiment of the invention considers that: the current common system risk management method does not evaluate the importance degree of each risk, so that the awareness of focusing on important business is lacking. For example, when an abnormal risk occurs in a non-critical business, unnecessary early warning is sent out, and research, development or business personnel may waste time and effort to deal with the unnecessary early warning, while delay handling the abnormal critical business.
Therefore, the embodiment of the invention provides a solution, and the risk classification signal is obtained by classifying the risk signal of the business system information after the rule configuration, so that the risk of the business system information is evaluated in importance degree. And the corresponding information can be sequentially processed according to the height of the risk classification signal, and the risk classification signal of the key service is higher than that of the non-key service, so that the key service can be focused more. In addition, the embodiment of the invention manages the system risk based on the risk classification signal, and can adjust the risk classification signal of the non-key business, thereby focusing on the key business more pertinently.
Specifically, referring to fig. 1, fig. 1 is a schematic diagram of functional modules of a device to which a risk management apparatus of the system of the present invention belongs. The system risk management device may be a device-independent, data processing capable device that may be carried on the device in either hardware or software. The device can be an intelligent mobile terminal with a data processing function such as a mobile phone and a tablet personal computer, and can also be a fixed device or a server with a data processing function.
In this embodiment, the apparatus to which the system risk management device belongs at least includes an output module 110, a processor 120, a memory 130, and a communication module 140.
The memory 130 stores an operating system and a system risk management program; the output module 110 may be a display screen or the like. The communication module 140 may include a WIFI module, a bluetooth module, and the like, and communicate with an external device or a server through the communication module 140.
Wherein the system risk management program in the memory 130, when executed by the processor, performs the steps of:
acquiring service system information of the bank escrow service system;
performing rule configuration on the service system information based on preset configuration rules;
carrying out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal;
and managing the risk of the service system based on the risk classification signal.
Further, the system risk management program in the memory 130, when executed by the processor, further performs the steps of:
the obtaining the system side information and the user side information specifically includes:
acquiring early warning signals of the application system and the data system;
Collecting data which relates to user operation and does not need monitoring in the unified log platform as behavior data;
performing data processing on the early warning signals of the application system and the data system and the behavior data to obtain system side information;
and collecting user data, and sorting the user data to obtain user side information.
Further, the system risk management program in the memory 130, when executed by the processor, further performs the steps of:
accessing the data to be monitored in the unified log platform and the performance monitoring platform to the pre-known early-warning platform, and monitoring the data to be monitored through the pre-known early-warning platform based on preset early-warning rules;
when the data to be monitored accords with the preset early warning rule, acquiring an early warning signal of the application system sent by the precedent early warning platform;
performing data quality check on the data in the job scheduling platform;
and when the data in the job scheduling platform has abnormal risk, acquiring an early warning signal of the data system.
Further, the system risk management program in the memory 130, when executed by the processor, further performs the steps of:
And based on the system, the function and the operation of the user in different time periods, sorting the user data to obtain a high-frequency operation function and a high-frequency operation time period, and taking the high-frequency operation function and the high-frequency operation time period as user side information.
Further, the system risk management program in the memory 130, when executed by the processor, further performs the steps of:
associating early warning signals of the application system and the data system with the user data to generate a service code;
and when the early warning signal of the application system and/or the data system is acquired next time, searching and obtaining the user data based on the service code.
Further, the system risk management program in the memory 130, when executed by the processor, further performs the steps of:
in a certain time interval, the index in the service system information has a change trend;
comparing the index in the service system information with a corresponding index threshold;
the performance of the system or the platform where the service system information is located continuously drops, and/or the occupancy rate of the system or the platform where the service system information is located increases exponentially;
the function to which the service system information belongs has user attention;
The service system information is in a key time period.
Further, the system risk management program in the memory 130, when executed by the processor, further performs the steps of:
processing the risk of the service system through the research and development side based on the risk classification signal;
the risk classification signals are confirmed through the service side and the research and development side, and a confirmation result is obtained;
if the confirmation result shows that the risk classification signal needs to be corrected, executing at least one of the following steps:
iterating the configuration rule through the service side;
iterating the early warning rule through the research and development side;
and adjusting the risk classification signal through the service side.
According to the scheme, the embodiment specifically obtains the business system information of the bank escrow business system; performing rule configuration on the service system information based on preset configuration rules; carrying out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal; and managing the risk of the service system based on the risk classification signal. The embodiment of the invention carries out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal, thereby carrying out importance degree assessment on the risk of the business system information. And the corresponding information can be sequentially processed according to the height of the risk classification signal, and the risk classification signal of the key service is higher than that of the non-key service, so that the key service can be focused more. In addition, the embodiment of the invention manages the system risk based on the risk classification signal, and can adjust the risk classification signal of the non-key business, thereby focusing on the key business more pertinently.
Based on the above device architecture, but not limited to the above architecture, the method embodiments of the present invention are presented.
The execution subject of the method of this embodiment may be a system risk management device, which may be a device-independent device capable of data processing, and may be carried on the device in the form of hardware or software. The execution subject of the method of this embodiment may also be a banking system. The embodiment takes a banking and hosting business system as an example, and realizes business system information acquisition, rule configuration, risk signal classification and system risk management through the banking and hosting business system.
Referring to fig. 2, fig. 2 is a flowchart of a first embodiment of a system risk management method according to the present invention. The system risk management method comprises the following steps:
step S10, acquiring service system information of the bank escrow service system.
In order to better explain the devices and architecture used in the scheme, a banking system can be introduced, and the implementation method is applied to the banking system.
The bank escrow business system comprises a system side, a user side, a research and development side and a business side.
The system side refers to an infrastructure and services in a banking host business system for providing support for the business system. The system side comprises an application class system and a data class system.
The application system is a system platform for supporting the application system in the bank escrow business system, and the platform can provide the functions of acquisition, storage and inquiry of logs, monitoring and evaluation of performance, intelligent early warning, anomaly monitoring and the like for the business system. The application system comprises a unified log platform, a performance monitoring platform and a pre-known early warning platform.
The data class system refers to a platform for data processing and management in a banking managed business system, and the core aim of the data class system is automatic management and processing of data. The data class system includes a job scheduling platform.
In addition, the user side refers to a user interface and an interaction platform in the banking managed business system, namely, a front-end interaction interface of the user using system, the interaction interface can provide various functions operation, information inquiry, data analysis and other services for the user, collect user data, user behaviors and other information, and provide basis for subsequent user behavior analysis and system optimization.
The research and development side refers to a technology research and development side in a banking system, and includes design and development of all systems, such as demand analysis, system design, code development, test debugging, rule modification, and the like.
The business side refers to a business operation side in a banking escrow business system, and comprises functions and processes for operating all business using systems, such as customer management, asset management, transaction settlement, risk signal confirmation and modification, rule modification and the like.
In addition, the banking system also comprises a risk closed-loop management platform. And carrying out rule configuration on the business system information of the bank escrow business system based on the risk closed-loop management platform.
Step S10, acquiring service system information of the bank escrow service system.
The business system information of the banking escrow business system comprises system side information and user side information.
And step S20, carrying out rule configuration on the service system information based on a preset configuration rule.
In the risk closed-loop management platform, in order to better classify the risk signals of the service system information, the service system information is regularly configured based on preset configuration rules.
And step S30, carrying out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal.
The risk classification signal is a risk identifier given after risk evaluation is performed on the business system information subjected to rule configuration based on a risk signal classification rule.
Specifically, as one embodiment, the risk classification signal may include information of three aspects: risk level, risk type, and risk description. The risk level may be classified into three levels, high, medium, and low, corresponding to the urgency of the risk. Risk types are then classified for different business scenarios and functions, such as transaction risk, credit risk, market risk, etc. The risk description is a detailed description of risks so that business side personnel and research and development side personnel can understand and process them.
And carrying out risk signal classification on the business system information subjected to rule configuration according to the risk signal classification rule.
Specifically, as an embodiment, the risk signal classification rule may be:
1. and judging and scoring each configuration rule hit by the service system information. For example, in a configuration rule of comparing an index in service system information with a corresponding index threshold, if the index in service system information is 80% of the corresponding index threshold, a risk score of the service system information is 8 points (full score is 10 points) in the configuration rule; when the configuration rule of the business system information hit is that the index in the business system information has a change trend within a certain time interval, if the index in the business system information increases by 30% compared with the last month in the monthly statistics, the risk score of the business system information is 3 points (full score is 10 points) in the configuration rule. And after judging and scoring the configuration rules hit by the service system information, accumulating the risk score of the service system information. If the risk score of the service system information is between 1 and 20 points, judging that the risk level of the service system information is a low level, and obtaining a corresponding risk classification signal; if the risk score of the service system information is between 21 and 40 points, judging that the risk level of the service system information is a medium level, and obtaining a corresponding risk classification signal; if the risk score of the service system information is between 41 and 50 points, judging that the risk level of the service system information is high, and obtaining a corresponding risk classification signal.
2. Counting the number of configuration rule hits, and judging the risk level of the service system information according to the number of configuration rule hits. For example, if the number of configuration rule hits is 1, judging that the risk level of the service system information is a low level, and obtaining a corresponding risk classification signal; if the number of the configuration rule hits is 2-3, judging that the risk level of the service system information is a middle level, and obtaining a corresponding risk classification signal; if the number of the configuration rule hits is 4-5, judging that the risk level of the service system information is high, and obtaining a corresponding risk classification signal.
It should be noted that the risk signal classification rule is not limited to the above two items, and the risk signal classification rule may be formulated according to practical experience and actual requirements.
And step S40, managing the risk of the service system based on the risk classification signal.
After the service side personnel and the research side personnel acquire the risk classification signals, the research side personnel process the service system risks corresponding to the risk classification signals.
Then, in order to enable the risk classification signal to reflect the risk of the service system more closely and meet the requirements of the service side, service side personnel and research side personnel confirm the risk classification signal, and a confirmation result is obtained. If the confirmation result shows that the risk classification signal needs to be corrected, the service side personnel and the research side personnel can execute different operations according to actual conditions so as to correct the risk classification signal.
According to the scheme, the embodiment specifically obtains the business system information of the bank escrow business system; performing rule configuration on the service system information based on preset configuration rules; carrying out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal; and managing the risk of the service system based on the risk classification signal. The embodiment of the invention carries out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal, thereby carrying out importance degree assessment on the risk of the business system information. And the corresponding information can be sequentially processed according to the height of the risk classification signal, and the risk classification signal of the key service is higher than that of the non-key service, so that the key service can be focused more. In addition, the embodiment of the invention manages the system risk based on the risk classification signal, and can adjust the risk classification signal of the non-key business, thereby focusing on the key business more pertinently.
Further, the present embodiment refines the above steps S10, S20 and S40 based on the embodiment shown in fig. 2.
Referring to fig. 3, fig. 3 is a schematic diagram of a system risk management flow in the system risk management method according to the present invention.
The bank escrow business system comprises a system side and a user side, wherein the system side comprises an application system and a data system, and the application system comprises a unified log platform.
In this embodiment, the step S10 described above, acquiring the service system information of the banking system may include:
step S11, acquiring the system side information and the user side information.
The step S11 of obtaining the system side information and the user side information specifically includes:
step S111, acquiring early warning signals of the application system and the data system.
The application system also comprises a performance monitoring platform and a pre-known early warning platform, and the data system comprises a job scheduling platform.
Step S111, acquiring early warning signals of the application system and the data system specifically includes:
and S1111, accessing the data to be monitored in the unified log platform and the performance monitoring platform to the pre-known early warning platform, and monitoring the data to be monitored through the pre-known early warning platform based on preset early warning rules.
The data to be monitored in the unified log platform and the performance monitoring platform can be selected according to actual requirements.
Specifically, as an implementation manner, the data to be monitored may be various data for recording the running condition of the application system, including system performance index, running information of the application program, statistics of network traffic data, access log, and the like. These data are critical to maintaining the stability and high availability of application-like systems.
The early warning rule can be formulated based on the type of the data to be monitored. For example, if the data to be monitored is system performance index data, when the index of the CPU, the memory or the disk I/O exceeds a preset threshold, the pre-warning platform sends a pre-warning signal. If the data to be monitored is the application program running information, when the response time of the user request or the program breakdown times exceed a preset threshold value, or when an error log occurs, the pre-warning platform sends a pre-warning signal. It should be noted that, the set early warning rule is not limited to the above example, and the early warning rule may be set according to practical experience and actual requirements.
In addition, in order to enable the risk classification signal to more closely reflect the risk of the service system and meet the requirements of the service side, service side personnel and research and development side personnel need to confirm the risk classification signal to obtain a confirmation result. If the confirmation result shows that the risk classification signal needs to be corrected, the service side personnel and the research side personnel can execute different operations according to actual conditions so as to correct the risk classification signal. The research and development side personnel can set or adjust the early warning rules to correct the early warning signals, so that the risk classification signals are corrected.
Step S1112, when the data to be monitored accords with the preset pre-warning rule, acquiring a pre-warning signal of the application system sent by the pre-warning platform.
When the data to be monitored accords with the preset early warning rule, the early warning platform sends out an early warning signal of the application system.
Specifically, as one embodiment, the early warning signal may include information of three aspects: early warning level, early warning type and early warning description. The early warning level can be divided into three levels of high, medium and low, and the emergency degree of early warning is corresponding. The early warning types are classified according to different service scenes and functions, such as system performance early warning, application program running early warning and the like. The early warning description is a detailed description of early warning so that service side personnel and research and development side personnel can understand and process the early warning.
Step S1113, performing data quality check on the data in the job scheduling platform.
The job scheduling platform is a tool for managing and scheduling various jobs, and can perform centralized management, scheduling, monitoring, early warning and the like on various jobs.
The data quality check refers to comprehensive inspection and quality evaluation of data in the job scheduling platform so as to ensure the integrity, consistency, accuracy and timeliness of the data in the job scheduling platform.
Specifically, as one embodiment, the data quality check includes, but is not limited to, the following:
1. integrity check: it is checked whether the data in the job scheduling platform is missing or there is a duplicate record.
2. Consistency check: and checking keywords of data in the job scheduling platform, such as customer names, contact modes and the like, and checking whether the keywords are consistent.
3. Accuracy inspection: and checking keywords of the data in the job scheduling platform to ensure the accuracy of the data.
4. And (3) timeliness inspection: and checking an update time field of the data in the job scheduling platform, so as to ensure timeliness and timeliness of the data.
Step S1114, when there is an abnormal risk in the data in the job scheduling platform, acquiring an early warning signal of the data class system.
When data quality check is carried out on the data in the job scheduling platform, if the data quality check checks that the data in the job scheduling platform has abnormal risk, the bank escrow business system sends out an early warning signal of the data system.
Step S112, collecting data which relates to user operation and does not need monitoring in the unified log platform as behavior data.
The unified log platform is characterized in that data which relate to user operation and do not need to be monitored can be selected according to actual requirements. In particular, as one embodiment, the data related to the user operation and not requiring monitoring may include user behavior path data, user preference data, user activity data, and the like.
And step S113, carrying out data processing on the early warning signals of the application system and the data system and the behavior data to obtain system side information.
In one embodiment, the data cleaning may be performed on the early warning signals of the application system and the data system and the behavior data, and then the data aggregation may be performed to obtain system side information.
The data cleaning refers to processing, cleaning, screening, converting and other operations on early warning signals and behavior data of an application system and a data system so as to remove noise, errors and redundant information in the data and ensure the accuracy of the data.
The data aggregation refers to the step of summarizing and counting data in a plurality of data sources to obtain information on a system side. Data aggregation may categorize data and generate summary information to discover valuable information hidden in the data.
Step S114, collecting user data, and sorting the user data to obtain user side information.
After collecting the user data, the user data is arranged based on the system, the function and the operation of the user in different time periods, so that the user side information is obtained.
Specifically, as an implementation manner, the sorting the user data to obtain the user side information may include:
and based on the system, the function and the operation of the user in different time periods, sorting the user data to obtain a high-frequency operation function and a high-frequency operation time period, and taking the high-frequency operation function and the high-frequency operation time period as user side information.
The frequency of the user operating in the system is relatively high in a specific time period, so that user data is sorted based on the operation of the system and the user in different time periods to obtain a high-frequency operation time period. In a specific time period, the user uses a relatively high frequency for certain specific functions, so that the user data is collated based on the functions and the operations of the user in different time periods to obtain the high-frequency operation function.
Then, the high-frequency operation function and the high-frequency operation period are taken as user-side information.
As an embodiment, in step S114, collecting user data, sorting the user data to obtain user side information may include:
firstly, the early warning signals of the application system and the data system are associated with the user data to generate service codes.
And then, when the early warning signal of the application system and/or the data system is acquired next time, searching and obtaining the user data based on the service code.
Wherein the service code may be a string of letters and numbers.
After acquiring the early warning signal, the service side personnel generates a requirement for searching user data corresponding to the early warning signal, at this time, the service side personnel needs to inform the research and development side personnel of the requirement, the research and development side personnel searches the user data corresponding to the early warning signal through a log or a code, and then the research and development side personnel transmit the user data corresponding to the early warning signal back to the service side personnel. At this time, the research and development side personnel can correlate the early warning signal with the user data and generate a unique service code, so that the service side personnel can quickly find the corresponding user data through the service code after obtaining the early warning signal next time, and the research and development side does not need to be in butt joint. In this way, the search efficiency of the user data can be greatly improved.
Specifically, as one embodiment, the following can be exemplified: when a user carries out transaction, abnormal data appears, the abnormal data accords with a preset early warning rule, so that the early warning platform sends out an early warning signal, and research and development side personnel generate a unique service code through a hash function based on the early warning signal. And then, the personnel at the research and development side store the early warning signal and the service code into a unified log platform, and record the user data and the service code corresponding to the early warning signal into a database. When the same early warning signal is acquired next time, service side personnel can inquire the service code corresponding to the early warning signal through an interface of the unified log platform, and then the service side personnel inquire user data associated with the early warning signal in a database based on the inquired service code. It should be noted that, the method of generating the service code in this embodiment is not limited to generating the service code by the hash function, but may also generate the service code by other methods that can generate the unique character string; in addition, in this embodiment, the early warning signal and the service code are not only stored in the unified log platform, but also stored in the database, and the early warning signal and the user data corresponding to the early warning signal can be associated through other data structures.
In this embodiment, in step S20, rule configuration is performed on the service system information based on a preset configuration rule, where the preset configuration rule at least includes one of the following:
(1) In a certain time interval, the index in the service system information has a change trend;
for example, one week is regarded as a period of time during which the number of early warning signals in the service system information is changing. Or, in the time interval, the level of a certain early warning signal in the service system information changes.
The change trend of the early warning signal in the service system information is feedback that service side personnel and research and development side personnel manage the risk of the service system based on the risk classification signal.
(2) Comparing the index in the service system information with a corresponding index threshold;
the method comprises the steps of carrying out rule restriction on service system information based on a system, a platform or an index threshold of service where the service system information is located. For example, in the unified log platform, setting the database capacity index threshold to be 500TB, and when the database capacity in the current unified log platform is 0% -20% of the index threshold of the unified log platform database capacity, determining that the service system information is low risk; when the database capacity in the current unified log platform is 21% -40% of the index threshold value of the unified log platform database capacity, judging that the service system information is medium risk; when the database capacity in the current unified log platform is 41% -100% of the index threshold value of the unified log platform database capacity, the service system information can be judged to be high risk.
Specifically, the index threshold may also be set based on the system, platform, or container CPU of the service, and the memory usage of the service where the service system information is located. The specific index threshold may be set according to system resources, service characteristics, or empirical values.
It should be noted that the final risk signal classification condition is also determined in combination with the risk signal classification rule.
(3) The performance of the system or the platform where the service system information is located continuously drops, and/or the occupancy rate of the system or the platform where the service system information is located increases exponentially;
the performance of the system or the platform comprises response time, throughput, concurrency number and the like, and if the performance of the system or the platform has a continuous falling trend, the system or the platform may have problems of performance bottleneck, overload, insufficient resources and the like, so that the business system information has a high level of risk.
The occupancy rate of the system or the platform comprises the occupancy rate of resources such as a CPU (central processing unit), a memory, a disk space and the like, and if the occupancy rate of the system or the platform grows exponentially, the risk of insufficient resources exists in the system or the platform, so that the business system information has high-level risk.
It should be noted that the final risk signal classification condition is also determined in combination with the risk signal classification rule.
(4) The function to which the service system information belongs has user attention;
the higher the user attention, the higher the risk level of the service system information.
The user attention may be determined by experience of a service-side person, or may be determined comprehensively by functional importance, frequency of use of a function, and the like.
(5) The service system information is in a key time period.
Wherein, the service system information is generally provided with a time tag, so that the time period of the service system information can be determined. Wherein the time period is an important element for identifying risk.
Wherein the key time period comprises a peak period of user use and a service important time period. In the peak period of user usage, the usage amount and access frequency of the user are greatly increased compared to other periods. The peak period of user use is determined by natural time factor, seasonal factor, activity factor, industry factor, etc.
In addition, when the service is developed, because the service has timeliness, the service system needs to provide quick service for the user and process the application in the service flow in time, so that a service important period exists. Wherein, the important time period of the business is comprehensively determined by the business type, business flow, customer type and the like.
Wherein, in the key time period, the load pressure of the service system is larger, so that the service system information in the key time period is more likely to be at risk than the service system information in the non-key time period.
In this embodiment, the step S40 of managing the risk of the service system based on the risk classification signal may include:
and step S41, processing the risk of the service system through the research and development side based on the risk classification signal.
Wherein, based on the risk level in the risk classification signal, the risk processing priority is confirmed, the higher the risk level, the higher the risk processing priority.
And then, the research and development side personnel process the risk of the service system according to the risk processing priority.
And step S42, confirming the risk classification signal through the service side and the research and development side to obtain a confirmation result.
After the risk classification signal is obtained, service side personnel and research side personnel confirm the risk classification signal, and whether the risk classification signal can accurately reflect actual risk conditions or not needs to be confirmed, such as whether the set risk level is reasonable or not. Then, it is also necessary to confirm whether the risk classification signal needs to be used or whether a new risk classification signal needs to be added to adapt to a new service situation through the service side, and then obtain a confirmation result.
In one embodiment, after the risk classification signals are confirmed by service personnel and research and development personnel, a dedicated monitoring report displayed on a monitoring large screen and various reports such as daily reports, weekly reports and monthly reports can be generated based on the confirmation results, system risk management suggestions are provided in the reports, and closed-loop management such as follow-up and periodic analysis is performed on system risks.
Step S43, if the confirmation result indicates that the risk classification signal needs to be modified, executing at least one of the following steps:
step S431, iterating the configuration rule through the service side.
And the service side personnel configures or adjusts the configuration rules in the risk closed-loop management platform through the service side.
Step S432, iterating the early warning rule through the development side.
And the research and development side personnel configure or adjust the early warning rules in the early warning platform through the research and development side.
And step S433, the risk classification signal is adjusted through the service side.
And if the confirmation result shows that the risk classification signal needs to be corrected, executing one or more steps according to the actual situation to correct the risk classification signal.
For example, after confirming the risk classification signal, the service side finds that a certain risk level is set too high, resulting in that the number of risks of the level is too large to be effectively handled, and then the risk classification signal needs to be corrected. The risk classification signal can be adjusted through the service side, the risk level is reduced, or the risk of the level is combined with other levels, so that the risk classification is more reasonable and accurate. The configuration rules may also be iterated through the service side, and specifically, the risk classification signal may be corrected by adjusting the threshold.
According to the scheme, the embodiment specifically obtains the business system information of the bank escrow business system; performing rule configuration on the service system information based on preset configuration rules; carrying out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal; and managing the risk of the service system based on the risk classification signal. The method comprises the steps of acquiring early warning signals of an application system and a data system; collecting data which relates to user operation and does not need monitoring in the unified log platform as behavior data; performing data processing on the early warning signals of the application system and the data system and the behavior data to obtain system side information; and collecting user data, and sorting the user data to obtain user side information. The unified log platform and the performance monitoring platform are connected with the pre-known early warning platform, and the data to be monitored are monitored through the pre-known early warning platform based on preset early warning rules; when the data to be monitored accords with the preset early warning rule, acquiring an early warning signal of the application system sent by the precedent early warning platform; performing data quality check on the data in the job scheduling platform; and when the data in the job scheduling platform has abnormal risk, acquiring an early warning signal of the data system. And the user data are arranged based on the system, the functions and the user operation in different time periods to obtain a high-frequency operation function and a high-frequency operation time period, and the high-frequency operation function and the high-frequency operation time period are used as user side information. In addition, the early warning signals of the application system and the data system are associated with the user data to generate service codes; and when the early warning signal of the application system and/or the data system is acquired next time, searching and obtaining the user data based on the service code. Further, the preset configuration rule at least comprises one of the following: in a certain time interval, the index in the service system information has a change trend; comparing the index in the service system information with a corresponding index threshold; the performance of the system or the platform where the service system information is located continuously drops, and/or the occupancy rate of the system or the platform where the service system information is located increases exponentially; the function to which the service system information belongs has user attention; the service system information is in a key time period. Further, processing the risk of the service system through the research and development side based on the risk classification signal; the risk classification signals are confirmed through the service side and the research and development side, and a confirmation result is obtained; if the confirmation result shows that the risk classification signal needs to be corrected, executing at least one of the following steps: iterating the configuration rule through the service side; iterating the early warning rule through the research and development side; and adjusting the risk classification signal through the service side.
The embodiment of the invention carries out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal, thereby carrying out importance degree assessment on the risk of the business system information. And the corresponding information can be sequentially processed according to the height of the risk classification signal, and the risk classification signal of the key service is higher than that of the non-key service, so that the key service can be focused more. In addition, the embodiment of the invention manages the system risk based on the risk classification signal, and can adjust the risk classification signal of the non-key business, thereby focusing on the key business more pertinently. According to the embodiment of the invention, the data to be monitored in the unified log platform and the performance monitoring platform are accessed into the pre-known early warning platform, and the data to be monitored is monitored, so that the bank escrow business system is facilitated to better know the use condition of the user and the system load condition, and better service can be provided for the user. In addition, the embodiment of the invention can improve the accuracy, the integrity and the practicability of the data and strengthen the supervision of the data by carrying out the data quality inspection on the data in the job scheduling platform, thereby providing more reliable service for users. According to the embodiment of the invention, the high-frequency operation function and the high-frequency operation time period are obtained by arranging the user data, and through analysis of the high-frequency operation function and the high-frequency operation time period, the functions of a system which are frequently used by a user and the frequencies of the system which are used by the user in the time periods can be better known, so that the system performance can be optimized according to the conditions, and the use experience of the user is improved. In addition, the embodiment of the invention associates the early warning signals of the application system and the data system with the user data to generate the service code, and searches for the user data based on the service code when the early warning signals of the application system and/or the data system are acquired next time, so that the service side can save time and improve the efficiency when searching for the corresponding user data according to the early warning signals. Further, processing the risk of the service system through the research and development side based on the risk classification signal; and confirming the risk classification signals through the service side and the research and development side to obtain a confirmation result, so that system risk management not only starts from the system side and focuses on system side problems, such as performance problems, but also starts from the service perspective and manages system risks according to service requirements. And the system risk can be subjected to closed-loop management such as follow-up and periodic analysis according to the confirmation result, so that the whole coverage of risk management can be realized, and the reliability and stability of the system are improved.
In addition, an embodiment of the present application further provides a system risk management device, where the system risk management device includes:
the information acquisition module acquires service system information of the bank escrow service system;
the risk signal grading module is used for carrying out rule configuration on the business system information based on a preset configuration rule; carrying out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal;
and the rule management module is used for managing the risk of the service system based on the risk classification signal.
The principles and implementation processes of the system risk management are implemented in this embodiment, please refer to the above embodiments, and are not described herein.
In addition, the embodiment of the application also provides a terminal device, which comprises a memory, a processor and a system risk management program stored on the memory and capable of running on the processor, wherein the system risk management program realizes the steps of the system risk management method when being executed by the processor.
Because the system risk management program is executed by the processor and adopts all the technical schemes of all the embodiments, the system risk management program at least has all the beneficial effects brought by all the technical schemes of all the embodiments and is not described in detail herein.
In addition, the embodiment of the application also provides a computer readable storage medium, wherein a system risk management program is stored on the computer readable storage medium, and the system risk management program realizes the steps of the system risk management method when being executed by a processor.
Because the system risk management program is executed by the processor and adopts all the technical schemes of all the embodiments, the system risk management program at least has all the beneficial effects brought by all the technical schemes of all the embodiments and is not described in detail herein.
According to the scheme, the embodiment specifically obtains the business system information of the bank escrow business system; performing rule configuration on the service system information based on preset configuration rules; carrying out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal; and managing the risk of the service system based on the risk classification signal. The embodiment of the application carries out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal, thereby carrying out importance degree assessment on the risk of the business system information. And the corresponding information can be sequentially processed according to the height of the risk classification signal, and the risk classification signal of the key service is higher than that of the non-key service, so that the key service can be focused more. In addition, the embodiment of the application manages the system risk based on the risk classification signal, and can adjust the risk classification signal of the non-key business, thereby focusing on the key business more pertinently.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or method. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or method that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, a controlled terminal, or a network device, etc.) to perform the method of each embodiment of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (10)

1. A system risk management method, wherein the system risk management method is applied to a banking system, and the system risk management method comprises the following steps:
acquiring service system information of the bank escrow service system;
performing rule configuration on the service system information based on preset configuration rules;
carrying out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal;
and managing the risk of the service system based on the risk classification signal.
2. The method of claim 1, wherein the banking system comprises a system side and a user side, the system side comprises an application class system and a data class system, the application class system comprises a unified log platform, and the step of obtaining the business system information of the banking system comprises:
Acquiring system side information and user side information, specifically including:
acquiring early warning signals of the application system and the data system;
collecting data which relates to user operation and does not need monitoring in the unified log platform as behavior data;
performing data processing on the early warning signals of the application system and the data system and the behavior data to obtain system side information;
and collecting user data, and sorting the user data to obtain user side information.
3. The method of claim 2, wherein the application class system further comprises a performance monitoring platform and a pre-knowledge early warning platform, the data class system comprises a job scheduling platform, and the step of obtaining early warning signals for the application class system and the data class system comprises:
accessing the data to be monitored in the unified log platform and the performance monitoring platform to the pre-known early-warning platform, and monitoring the data to be monitored through the pre-known early-warning platform based on preset early-warning rules;
when the data to be monitored accords with the preset early warning rule, acquiring an early warning signal of the application system sent by the precedent early warning platform;
Performing data quality check on the data in the job scheduling platform;
and when the data in the job scheduling platform has abnormal risk, acquiring an early warning signal of the data system.
4. The method of claim 2, wherein the step of sorting the user data to obtain user side information comprises:
and based on the system, the function and the operation of the user in different time periods, sorting the user data to obtain a high-frequency operation function and a high-frequency operation time period, and taking the high-frequency operation function and the high-frequency operation time period as user side information.
5. The method of claim 2, wherein the step of collecting user data, sorting the user data, and obtaining user side information comprises:
associating early warning signals of the application system and the data system with the user data to generate a service code;
and when the early warning signal of the application system and/or the data system is acquired next time, searching and obtaining the user data based on the service code.
6. The method of claim 1, wherein the pre-set configuration rules include at least one of:
In a preset time interval, the index in the service system information has a change trend;
comparing the index in the service system information with a corresponding index threshold;
the performance of the system or the platform where the service system information is located continuously drops, and/or the occupancy rate of the system or the platform where the service system information is located increases exponentially;
the function to which the service system information belongs has user attention;
the service system information is in a key time period.
7. The method of claim 3, wherein the banking system further comprises a business side and a development side, and wherein managing the business system risk based on the risk classification signal comprises:
processing the risk of the service system through the research and development side based on the risk classification signal;
the risk classification signals are confirmed through the service side and the research and development side, and a confirmation result is obtained;
if the confirmation result shows that the risk classification signal needs to be corrected, executing at least one of the following steps:
iterating the configuration rule through the service side;
iterating the early warning rule through the research and development side;
And adjusting the risk classification signal through the service side.
8. A system risk management device, the device comprising:
the information acquisition module is used for acquiring service system information of a banking escrow service system;
the risk signal grading module is used for carrying out rule configuration on the business system information based on a preset configuration rule; carrying out risk signal classification on the business system information subjected to rule configuration to obtain a risk classification signal;
and the rule management module is used for managing the risk of the service system based on the risk classification signal.
9. A system risk management device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, which when executed by the processor implements the system risk management method of any of claims 1-7.
10. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the system risk management method according to any of claims 1-7.
CN202310740600.0A 2023-06-20 2023-06-20 System risk management method, device, terminal equipment and storage medium Pending CN116702008A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310740600.0A CN116702008A (en) 2023-06-20 2023-06-20 System risk management method, device, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310740600.0A CN116702008A (en) 2023-06-20 2023-06-20 System risk management method, device, terminal equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116702008A true CN116702008A (en) 2023-09-05

Family

ID=87823717

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310740600.0A Pending CN116702008A (en) 2023-06-20 2023-06-20 System risk management method, device, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116702008A (en)

Similar Documents

Publication Publication Date Title
US10960541B2 (en) Analytical robotic process automation
US9317829B2 (en) Diagnosing incidents for information technology service management
US20070168696A1 (en) System for inventing computer systems and alerting users of faults
CN111367760B (en) Log collection method and device, computer equipment and storage medium
US11822578B2 (en) Matching machine generated data entries to pattern clusters
KR20180037342A (en) Application software error monitoring, statistics management service and solution method.
CN115982012A (en) Evaluation model and method for interface management capability maturity
CN108228432A (en) A kind of distributed link tracking, analysis method and server, global scheduler
CN113608952A (en) System fault processing method and system based on log construction support environment
KR101288535B1 (en) Method for monitoring communication system and apparatus therefor
CN110113428B (en) System and method for acquiring and analyzing data of wifi product on production line
CN112291085A (en) Fault positioning method, device, equipment and medium
CN111835566A (en) System fault management method, device and system
CN110968475A (en) Method and device for monitoring webpage, electronic equipment and readable storage medium
CN116702008A (en) System risk management method, device, terminal equipment and storage medium
CN113742400B (en) Network data acquisition system and method based on self-adaptive constraint conditions
CN113419924B (en) Database operation risk prompt processing method and device based on session maintenance
KR101415528B1 (en) Apparatus and Method for processing data error for distributed system
CN113472881B (en) Statistical method and device for online terminal equipment
KR102011694B1 (en) Public institutional income property linkage data verification system and its recording medium
CN112604295A (en) Method and device for reporting game update failure, management method and server
CN111275348A (en) Electronic order information processing method, server and electronic order information processing system
CN117421198B (en) Visual asset management system and method based on security
CN114519059B (en) Data processing method, device, electronic equipment and storage medium
CN112579526B (en) Data processing method, system and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination