Hacker-resistant balance monitoring
First Claim
Patent Images
1. A computer-implemented method of securely monitoring a balance of a payment account, comprising:
- storing by a request processor, in a ledger table in a first database, ledger data, the first database being stored on a non-transitory computer-readable storage medium;
storing by the request processor, in a wallet table in a second database, wallet data that includes a wallet balance value for the payment account, the second database being stored in a cache with a cache data rate that is higher than a storage media data rate of the storage medium;
during a detection operation, detecting by the request processor that at least one of the ledger table and the wallet table has been improperly modified by an illicit event occurrence, the detecting including;
deriving by the request processor a ledger comparison value from the ledger data;
comparing by the request processor the derived ledger comparison value to a wallet comparison value from the wallet data; and
in response to the comparing, reconciling by the request processor the wallet data in the wallet table with the ledger data in the ledger table; and
during a transaction operation using the payment account, performing by the request processor an access operation on the wallet table with the reconciled wallet data;
wherein the access operation is a balance check operation that reads the wallet balance value from the reconciled wallet data in the wallet table; and
wherein during the transaction operation, the transaction is initiated and approved without performing any access operations on the reconciled ledger data in the ledger table.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods of and systems for securely monitoring a balance of a payment account include storing, in a first database, ledger data and storing, in a second database, wallet data. Wallet data includes a wallet balance value for the payment account. When a transaction is initiated using the payment account, an access operation is performed on the wallet table. Illicit or improper modifications can be detected by deriving a ledger comparison value from the ledger data and comparing the derived ledger comparison value to a wallet comparison value from the wallet data.
-
Citations
10 Claims
-
1. A computer-implemented method of securely monitoring a balance of a payment account, comprising:
-
storing by a request processor, in a ledger table in a first database, ledger data, the first database being stored on a non-transitory computer-readable storage medium; storing by the request processor, in a wallet table in a second database, wallet data that includes a wallet balance value for the payment account, the second database being stored in a cache with a cache data rate that is higher than a storage media data rate of the storage medium; during a detection operation, detecting by the request processor that at least one of the ledger table and the wallet table has been improperly modified by an illicit event occurrence, the detecting including; deriving by the request processor a ledger comparison value from the ledger data; comparing by the request processor the derived ledger comparison value to a wallet comparison value from the wallet data; and in response to the comparing, reconciling by the request processor the wallet data in the wallet table with the ledger data in the ledger table; and during a transaction operation using the payment account, performing by the request processor an access operation on the wallet table with the reconciled wallet data; wherein the access operation is a balance check operation that reads the wallet balance value from the reconciled wallet data in the wallet table; and wherein during the transaction operation, the transaction is initiated and approved without performing any access operations on the reconciled ledger data in the ledger table. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification