Information infrastructure management data processing tools for processing data flow with distribution controls
DCFirst Claim
1. A method of processing data throughput in an information infrastructure in a distributed computing system with respective ones of a plurality of filters, comprising:
- identifying sensitive content or select content in said data throughput with one or more of said plurality of filters, said sensitive content represented by one or more sensitive words, characters, images, data elements or data objects therein grouped into a plurality of sensitivity levels, said select content represented by one or more predetermined words, characters, images, data elements or data objects;
extracting and storing said sensitive content from said data throughput in respective data stores based upon said plurality of sensitivity levels;
classifying both the extracted sensitive content and said select content with a taxonomic category filter and generating classification tags therefor;
associating respective classification tags to the classified extracted sensitive content and said select content;
using the classification tags for data processing the stored sensitive content and said select content with;
(a) a data mining process;
(b) a copy process;
(c) a transfer process to other predetermined storage stores;
(d) a supplemental data search process; and
(e) a presentation process responsive to a data inquiry;
using the classification tags in a structured data format for the transfer process and data storage; and
,repeating the extraction and storage on further data throughput.
1 Assignment
Litigations
0 Petitions
Accused Products
Abstract
Method of processing and organizing (sometimes sanitizing) data throughput in an information infrastructure of a distributed computing system with configurable filters. Data stores are created with the data throughput. Filters operate on data to locate, extract, separate and store sensitive content (e.g., trade secrets) or select content (e.g., critical content) in designated, distributed data stores. Configurable filters expand sensitive/select data throughput, contract throughput, inferencing throughput, and hierarchical/orthogonal classifier filters reorganize the sensitive/select data, all to segment and store sensitive/select data in designated stores. Data output enables (a) sanitation; (b) data storage organization; (c) classification; (d) application of data processing (copying, distribution, archiving, etc.).
-
Citations
18 Claims
-
1. A method of processing data throughput in an information infrastructure in a distributed computing system with respective ones of a plurality of filters, comprising:
- identifying sensitive content or select content in said data throughput with one or more of said plurality of filters, said sensitive content represented by one or more sensitive words, characters, images, data elements or data objects therein grouped into a plurality of sensitivity levels, said select content represented by one or more predetermined words, characters, images, data elements or data objects;
extracting and storing said sensitive content from said data throughput in respective data stores based upon said plurality of sensitivity levels; classifying both the extracted sensitive content and said select content with a taxonomic category filter and generating classification tags therefor; associating respective classification tags to the classified extracted sensitive content and said select content; using the classification tags for data processing the stored sensitive content and said select content with;
(a) a data mining process;
(b) a copy process;
(c) a transfer process to other predetermined storage stores;
(d) a supplemental data search process; and
(e) a presentation process responsive to a data inquiry;using the classification tags in a structured data format for the transfer process and data storage; and
,repeating the extraction and storage on further data throughput. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
- identifying sensitive content or select content in said data throughput with one or more of said plurality of filters, said sensitive content represented by one or more sensitive words, characters, images, data elements or data objects therein grouped into a plurality of sensitivity levels, said select content represented by one or more predetermined words, characters, images, data elements or data objects;
-
16. A method of sanitizing data processed in a distributed computing system having sensitive content and select content, said sensitive content represented by one or more sensitive words, characters, images, data elements or data objects therein, said sensitive content having a plurality of sensitivity levels, each sensitivity level having an associated security clearance, said select content represented by one or more predetermined words, characters, images, data elements or data objects, said distributed computing system having a plurality of extract data stores for respective ones of said plurality of sensitivity levels and having a plurality of select content data stores, said plurality of extract data stores and said select content data stores operatively coupled over a communications network, the method of sanitizing data comprising:
-
extracting said sensitive content from a data input to obtain extracted sensitive data for a corresponding sensitivity level and remainder data; storing said extracted sensitive data for said corresponding sensitivity level in a respective secure extract store in said distributed computer system; extracting said select content from either said data input or said remainder data and storing extracted select content in said select content data stores; wherein non-extracted data from said select content extraction and remainder data from said sensitive content extraction creates sanitized sensitive content data and select content data; inferencing said sanitized sensitive content data and select content data with (a) a content filter, (b) a contextual filter, and (c) a taxonomic filter; and obtaining an inferenced sensitive content data and an inferenced select content data therefrom. - View Dependent Claims (17, 18)
-
Specification