Patent classifications
G06F16/24564
HEURISTIC SEARCH FOR K-ANONYMIZATION
A device searches for an anonymization of a data set using a heuristic search. The device receives a generalization lattice and one or more scoring functions. The device further can include selecting a start node in the generalization lattice. For each of the one or more scoring functions, the device can further include computing a path the generalization lattice from the start node that traverses the generalization lattice. In addition, the device can include determining an optimal path node from each of the one or more paths. Furthermore, the method can include selecting an optimal node from the one or more optimal path nodes.
Segmenting machine data into events based on source signatures
Methods and apparatus consistent with the invention provide the ability to organize and build understandings of machine data generated by a variety of information-processing environments. Machine data is a product of information-processing systems (e.g., activity logs, configuration files, messages, database records) and represents the evidence of particular events that have taken place and been recorded in raw data format. In one embodiment, machine data is turned into a machine data web by organizing machine data into events and then linking events together.
System, method and computer program for ingesting, processing, storing, and searching technology asset data
A system, method and computer program for handling inbound events on a technology network may include ingesting an inbound event from a connector, interfacing with one of different technology systems on the technology network, extracting a data element or a technology asset from the inbound event, and searching a database storing a new or existing inventory of technology assets in the technology network with respect to the data element or the technology asset. When the technology asset is extracted, a relationship between the technology asset and a record in the database is created. When the data element is extracted, a match between the data element and a record in the database is determined. When the match equals or exceeds a first predetermined threshold, the record in the database is enriched. When the match is less than a second predetermined threshold, a new technology asset in the database is created.
Data certification process for cloud database platform
Methods, systems, and apparatuses for providing access to records of a database stored on a database server in a cloud database platform are described herein. A data sharing platform may determine a shared view definition for access to the database. The data sharing platform may determine rules that specify criteria that limit access to the records stored by the database. The one or more first rules may be received via a user interface. The data sharing platform may perform, based on the rules, a data access certification process on the records stored by the database to generate a table of certification results. The data sharing platform may generate, based on the table of certification results, and without modifying the records stored by the database, a limited consumer view definition. Based on updates to the records, a new limited consumer view definition may be generated.
Systems and methods for security operations maturity assessment
Systems and methods for assessing, tracking and improving security maturity of an organization are provided. Described is a system for assessing security maturity of an organization. The system receives a list of data sources located across multiple jurisdictions for the organization, collects data sources/data using custom rules from a plurality of data sources of the list of data sources, determine criticality score for each of the plurality of data sources, calculates data source coverage and asset collection coverage, determines use case coverage, and determines security maturity score using a maturity score model. The maturity score model is a logistic equation which is a function of the data source coverage, the asset collection coverage, the criticality score associated with each of the plurality of data sources, the use case coverage, asset coverage by each the plurality of data sources.
DATA ANALYSIS TOOL WITH PRECALCULATED METRICS
In the general, the subject matter of the present disclosure relates to a data analysis tool that helps consumers, such as data scientists and engineers, understand datasets better. The disclosed data analysis framework/tool surfaces metrics to data consumers to visually inspect and understand large datasets more efficiently. In addition to the pre-computed and pre-collected metrics on given datasets or tables, the disclosed data analysis tool may also provide a way to detect various anomalies associated with the datasets.
AUTHORIZATION CHECK FOR NESTED QUERIES IN DATABASE SYSTEMS
Implementations of the present disclosure include receiving, by a database system, a query, providing, by the database system, a set of checker objects including one or more inner checker objects and an outer checker object, each checker object corresponding to a nested sub-query of the query, providing, by the database system, an authorization list associated with the outer checker object, and executing an authorization check on the query at least partially by: adding collected objects of each inner checker object to the authorization list, adding collected objects of the outer checker object to the authorization list, and determining authorization of an entity based on the authorization list.
Segmenting machine data into events to identify matching events
Methods and apparatus consistent with the invention provide the ability to organize and build understandings of machine data generated by a variety of information-processing environments. Machine data is a product of information-processing systems (e.g., activity logs, configuration files, messages, database records) and represents the evidence of particular events that have taken place and been recorded in raw data format. In one embodiment, machine data is turned into a machine data web by organizing machine data into events and then linking events together.
Method for dynamic data minimization of a data set by means of whitelisting
A computer-implemented method is for dynamic data minimization of a data set for transfer of the minimized data set from a central instance to outside of the central instance, the data set including a second set of individual attributes. The method includes provisioning a whitelist including a first set of attributes being a subset of a second set of attributes. The minimized data set includes the first set of attributes. The method further includes determining an attribute list including a third set of attributes, the third set of attributes including at least the complement of the first set of attributes in relation to the second set of attributes. The method also includes provisioning the attribute list by the central instance for use outside of the central instance.
Method and system for managing approval workflow processes in a network system
Coordination and management of workflows in parallel among a plurality of approval applications executing on machines within an enterprise network by receiving, at a central location, workflows from an initiating application, determining a set of approvals for each respective workflow and respective approval routes, performing an initial distribution of the respective workflows from the central location by propagating the workflows across their respective approval routes to respective members of the set of approval applications, applying at respective approval applications a set of approval rules to the workflow to determine a workflow's approval status as either approved or rejected, returning the workflow's approval status to the initiating application via the central location, and performing one or more follow-up distributions of workflows from the central location until either all approval applications indicate a status of approved or a number of follow-up distributions reaches a pre-defined maximum number of follow-up distributions.