摘要 |
Methods of and systems for securely monitoring a balance of a payment account include storing, in a first database, ledger data and storing, in a second database, wallet data. Wallet data includes a wallet balance value for the payment account. When a transaction is initiated using the payment account, an access operation is performed on the wallet table. Illicit or improper modifications can be detected by deriving a ledger comparison value from the ledger data and comparing the derived ledger comparison value to a wallet comparison value from the wallet data. |
主权项 |
1. A computer-implemented method of securely monitoring a balance of a payment account, the method comprising:
encrypting, by a request processor, ledger data, the ledger data including ledger transaction information for the payment account, whereby the encrypting produces encrypted ledger data; storing, in a first database by the request processor, a ledger table comprising the encrypted ledger data; storing, in a second database by the request processor, a wallet table comprising non-encrypted wallet data, the wallet data including a wallet balance value for the payment account; detecting, by the request processor during a detection operation, whether at least one of the ledger table or the wallet table has been improperly modified by an illicit event occurrence, wherein the detecting includes:
decrypting the ledger data, thereby obtaining decrypted ledger data;deriving a ledger comparison value from the decrypted ledger data; andcomparing the ledger comparison value to a wallet comparison value; and performing, by the request processor during a transaction operation using the payment account, an access operation on the wallet table; wherein the access operation comprises reading the wallet balance value from the wallet data in the wallet table; and wherein the transaction operation is initiated and approved without accessing the ledger table. |