Patent classifications
G06F16/24564
Database access, monitoring, and control system and method for reacting to suspicious database activities
A database access, monitoring, and control system and method monitor database access, detect suspicious database activities, and react to suspicious database activities by initiating one or more control functions. In at least one embodiment, suspicious database activities include activities related to a number of rows of data retrieved in response to one or more queries within a predetermined threshold window of time. Data retrieval row count above a predetermined threshold that represents an anticipated maximum request for legitimate users can indicate a suspicious database activity. In at least one embodiment, the database access, monitoring, and control system and method detects suspicious database activities even if a data requestor has thwarted other security measures or if the data requestor has authorized access but is potentially accessing data inappropriately.
Transformation rule generation and validation
Transformation rule generation and validation functionality is provided herein. Transformation rules can be generated for one or more mappings in an alignment between a source database and a target database. The transformation rules can transform instance data from the source data model to a form matching the target data model. One or more transformation rules can be generated for a mapping between fields in a source database and a field in a target database. The transformation rules can be generated based on one or more source fields and a target field of a mapping, and one or more identified functions. Evaluating the transformation rules can include generating test data based on the transformation rules applied to instance data from the source database. The test data can be evaluated against instance data from the target database. The transformation rules and the evaluation results can be provided in a user interface.
ENTITY HOUSEHOLD GENERATION BASED ON ATTRIBUTE-PAIR MATCHING
A method comprises storing a plurality of entity profiles; applying a predetermined first set of rules to a plurality of attribute-value pairs of the plurality of entity profiles; identifying a first set of entity profiles that satisfy the predetermined first set of rules; identifying a second set of entity profiles that satisfy the predetermined second set of rules; and updating a first attribute-value pair of the first and second sets of entity profiles by adding a first label to the first attribute-value pair responsive to determining the first set of entity profiles and the second set of entity profiles share a common entity profile.
Generating comparison information
A method performed by a computing device includes generating a comparative query entigen group set based on a comparative query in accordance with identigen rules, where the comparative query entigen group set represents a most likely interpretation of the comparative query. The method further includes obtaining a first response entigen group from a knowledge database based on a first comparative query entigen group of the comparative query entigen group set, where the first response entigen group substantially includes the first comparative query entigen group. The method further includes obtaining a second response entigen group from the knowledge database based on a second comparative query entigen group of the comparative query entigen group set, where the second response entigen group substantially includes the second comparative query entigen group. The method further includes generating a comparative response based on the first response entigen group and the second response entigen group.
Digital processing systems and methods for communications triggering table entries in collaborative work systems
Systems, methods, and computer-readable media for triggering table entries characterizing workflow-related communications occurring between workflow participants are disclosed. The systems and methods may involve presenting a table via a display, the table containing rows and columns defining cells, the rows and cells being configured to manage respective roles of the workflow participants; presenting on the display at least one active link for enabling workflow participants to join in a video or an audio communication; logging in memory, characteristics of the communication including identities of the workflow participants who joined in the communication; and generating an object associated with the table, the object containing the characteristics of the communication logged in memory.
Smart data warehouse protocols
Systems, methods and apparatus are provided for AI-based generation of data warehouse quality protocols. An attribute classifier may quantify relationships between source data and target data from an enterprise data warehouse. A data quality engine may apply these relationships to identify specific data quality concerns and generate customized data quality metrics. A user interface may enable a user to enter parameters for the classification protocols and corresponding rule-based generation of data quality metrics.
NATURAL LANGUAGE PROCESSING AND MACHINE-LEARNING FOR EVENT IMPACT ANALYSIS
Systems and methods may use natural language processing (NLP) and machine-learning techniques to detect an impact that an event will have on a domain-specific topic. For example, the system may use multi-stage cleaning using a rules-based and an artificial intelligence (AI)-based filter to filter large quantities of event items that may not be relevant to a domain of interest. The AI-based filter may be trained using labeled event items that were previously known to be impactful. The system may cluster the cleaned event items to group similar event items and eliminate redundancy. The system may then predict and quantify the impact that events described by clustered event items will have on the domain-specific topic. Such prediction may be based on a classifier trained using various model features that correlate with impactful events, including prior similar events.
Generation of Authentication Questions Based on User-Created Transaction Limitations
Methods, systems, and apparatuses are described herein for improving the accuracy of authentication questions using transaction limitations provided by users. A request for access to an account associated with a user may be received from a user device. An account restrictions database may be queried to determine one or more transaction rules associated with the account. The one or more transaction rules may have been created by the user and indicate limitations on financial transactions that may be performed via the account. An authentication question may be generated that is associated with a violation of the one or more transaction rules. The authentication question may be provided to the user device, and a response to the authentication question may be received. Access to the account may be provided to the user device based on the response.
Metadata-based scientific data characterization driven by a knowledge database at scale
A metadata-based scientific data characterization method, system, and computer program product include requesting a user input for a task to specify a rule for the task to determine a quality and a relationship of a data file in a data file database based on metadata associated with the data file, processing a user feedback of results using the rule run on the data file database and tracking the user feedback on the results in order to learn from the user feedback, and based on the learning, creating a modified rule to determine a quality and a relationship of a second data file.
System and method for data reconciliation
A system for data reconciliation is provided. The data reconciliation system includes a data processing subsystem. The data processing subsystem includes a computation module, configured to generate hash values for a set of tables located in a source database by a hashing technique and also configured generate hash values for a set of tables located in a destination database by the hashing technique. The data processing subsystem also includes an analysis module, configured to analyse the hash values located in the source database and the hash values located in the destination database by a pre-determined rule. The data processing subsystem also includes a suggestion module, configured to suggest output based on the analysis result. A data memory subsystem is configured to store the generated hash values for the source database and the generated hash values for the destination database. Present invention provides safe migration or transferring of data.