G06F16/212

Systems and methods for understanding identity and organizational access to applications within an enterprise environment

Methods and systems for understanding identity and organizational access to applications within an enterprise environment are provided. Exemplary methods include collecting data about relationships between applications and metadata associated with the applications in a computing environment of an enterprise, the metadata including information concerning a plurality of users accessing the applications; updating a graph database including nodes representing the applications of the computing environment of the enterprise and edges representing relationships between the applications; enriching the graph database by associating the nodes with metadata associated with the applications and associating user accounts with metadata associated with roles, organizations membership, privileges, and permissions; analyzing the graph database to identify a subset of nodes being accessed by a user of the plurality of users; and displaying, via a graphical user interface, a graphical representation of the subset of nodes and relationships between the nodes in the subset of the nodes.

Securing computing resources through multi-dimensional enchainment of mediated entity relationships
11710052 · 2023-07-25 ·

Synthesizing a control object for a computing event, the control object for securing a computing resource based on a set of access and privilege information provided through a set of mediated associations that are represented by an enchained set of certificates, portions of which are encrypted including entity-specific paths to entity-specific predecessor certificates and partial decryption keys therefor, wherein the control object is applied to secure the computing resource for performing a computing action indicated by a process-type entity identified in the certificate for the control object.

Mapping of unlabeled data onto a target schema via semantic type detection

Automatically mapping unlabeled input data onto a target schema via semantic type detection is described. The input data includes data elements that are structured as 2D table rows and columns forming cells. Each data element is included in a cell. The target schema includes a set of fields. Schema mapping includes mapping each column to one or more fields. More particularly, the fields are clustered into field clusters, where each field cluster includes one or more of the fields. Each column is automatically mapped to one of the field clusters of the set of field clusters. The mapping between schema fields and data columns is automatically performed based on appropriate pairings of the detected semantic types, where the semantic types are encoded in vector representations of the fields, the field clusters, and the data elements.

DIFFUSE IDENTITY MANAGEMENT IN TRANSPOSABLE IDENTITY ENCHAINMENT SECURITY

A transposable identity enchainment system for diffuse identity management processing entities for each of users, data, and processes equivalently and having a recombinant access mediation system that mediates association among entities, an associational process management system that creates entity-defining indices, and a multi-dimensional enchainment system that enchains aspects of entity identities via mediated association certificates including at least one root certificate for at least one of the entities.

EXTRACTING DATA FROM A BLOCKCHAIN NETWORK

According to at least one embodiment, a method, computer system, and computer program product for model-driven extraction of event data by a computational device is provided. The present invention may include transforming event data of an event occurring on a blockchain network using an event schema to comply with a data model of an external data structure; mapping, based on the event schema and the data model, the event data to a logical structure of the external data structure; and loading the transformed event data to the external data structure to modify a data content of the external data structure based on the mapping.

Processing Techniques for Database Transaction Requests with Operations Defined by Different ORM Libraries

Techniques are disclosed relating to processing database transactions that include application operations defined by different object relational mapping (ORM) libraries. A transaction router module executing on a computer system receives, from an application, a request for a first database transaction, where the first database transaction includes first and second application operations. The transaction router module then translates the first application operation to one or more first database operations using a first ORM library and the second application operation to one or more second database operations using a second ORM library. Then, the transaction router module determines one or more database connections for the one or more first database operations and the one or more second database operations. Such techniques may advantageously allow applications to switch between using different persistence frameworks and message broker frameworks without substantial adjustments to application code.

System and method for management of functionally linked data

The invention describes a data management system, where a declaration of causal dependency of values is realized by unified abstract connectors directly at the level of data meta-description and, for these purposes, supplements the generally accepted data model with a new fundamental member. The technical result of the invention is a significant increase in the speed of development and reliability of execution of application programs. The technical result is achieved through the use of advanced methods of internal organization and interaction of data model managing structures, as well as by methods of declarative programming.

Reducing reliance on content management system resources in a content management system
11567910 · 2023-01-31 · ·

An analytics engine is described that can receive data associated with use of a content item in a content management system and measure and measure a use of content management system resources required to maintain the content item. Values of a usage metric can be assigned to the content item based on the received data associated with the use of the content item. A database schema can be generated by the analytics engine that is configured to reduce the use of content management system resources required to maintain the content item. The database schema can be provided to the content management system for implementation in a database associated with the content management system.

METHODS AND DEVICES FOR CUSTOMIZING KNOWLEDGE REPRESENTATION SYSTEMS
20230237028 · 2023-07-27 ·

Techniques for customizing knowledge representation systems including identifying, based on a plurality of concepts in a knowledge representation (KR), a group of one or more concepts relevant to user context information, and providing the identified group of one more concepts to a user. The KR may include a combination of modules. The modules may include a kernel and a customized module customized for the user. The kernel may accessible via a second KR.

SYSTEM AND METHOD FOR CONCEPT CREATION
20230237037 · 2023-07-27 · ·

Systems, methods, and non-transitory computer-readable storage media for concept creation, and more specifically to creating concepts in an automized process using data processing rules. A system can, upon receiving a request to generate a new concept data structure, receive data from a database and data sets. The system can then execute data processing rules on the data, resulting in processed data, and index and normalize that data. Using the index and the data processing rules, the system can organize the normalized data into a plurality of categories and create the new concept structure using the data processing rules, the index, and the categorized data.