Method and device for detecting data access exception
A technology for data anomaly and data detection, applied in the Internet field, can solve problems such as deviation or misjudgment accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0023] According to an embodiment of the present invention, a method embodiment of a method for detecting data access anomalies is also provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0024] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a hardware structural block diagram of a computer terminal for a method for detecting abnormal data access in an embodiment of the present invention. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in th...
Embodiment 2
[0071] According to the embodiment of the present application, an embodiment of a device for implementing the above method embodiment is also provided, and the device provided in the above embodiment of the present application can run on a computer terminal.
[0072] Figure 6 is a schematic structural diagram of an apparatus for detecting abnormal data access according to an embodiment of the present application.
[0073] Such as Figure 6 As shown, the apparatus for detecting abnormal data access may include a first acquiring unit 602 , an extracting unit 604 , a first determining unit 606 and a detecting unit 608 .
[0074] Wherein, the first acquiring unit 602 is configured to acquire the historical access data at the time point to be detected, wherein the historical access data includes the data amount of the access parameter and the time point corresponding to the data amount; the extracting unit 604 is configured to A pre-divided time period, determining a first time ...
Embodiment 3
[0091] The embodiment of the present application also provides a storage medium. Optionally, in this embodiment, the foregoing storage medium may be used to store program codes executed by the method for detecting data access exceptions provided in Embodiment 1 above.
[0092] Optionally, in this embodiment, the above-mentioned storage medium may be located in any computer terminal in the group of computer terminals in the computer network, or in any mobile terminal in the group of mobile terminals.
[0093] Optionally, in this embodiment, the storage medium is configured to store program codes for executing the following steps: acquiring historical access data at the time point to be detected, wherein the historical access data includes the data amount of the access parameters and the the time point corresponding to the amount of data; according to the pre-divided time period, determine the first time period to which the time point to be detected belongs, and extract the first ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com