System, method and computer program product for detecting policy violations
First Claim
1. A computer-implemented policy violation detection method, the method comprising:
- extracting a policy activity from a policy, the policy activity including an actor in the policy, an object within the policy, an action of the policy, and policy scope metadata, the object being a tangible, physical object;
capturing a transaction by a user including metadata of the transaction;
translating the transaction by the user into an actor in the transaction, an action of the transaction, and an object of the transaction; and
alerting the user of a policy violation by navigating a knowledge graph is-a hierarchy to relate the actor in the transaction to the actor in the policy, the object of the transaction to an object within the policy, and the action of the transaction to an action of the policy activity, thereby to verify that the object is related semantically to the transaction,wherein the alerting alerts the user of the at least one policy violation by running a rule-based inference model to predict if a portion of the policy activity is violated by a future action with the object of the transaction by the user based on an inference rule between the natural language of the transaction and the policy activity, andwherein the rule-based inference model includes;
an inference rule to check the object against the policy if an object is acquired;
an inference rule to check if the action enables a second action that can violate the policy in the future if the user does the action without the object; and
an inference rule based on if the user changes the object or changes a state of the object that can violate the in the future.
1 Assignment
0 Petitions
Accused Products
Abstract
A policy violation detection computer-implemented method, system, and computer program product, includes extracting a policy activity from a policy, the policy activity including an actor in the policy, an object of the policy, an action of the policy, and policy scope metadata, capturing a transaction by a user including metadata of the transaction, translating the transaction by the user into an actor in the transaction, an action of the transaction, and an object of the transaction, and alerting the user of a policy violation by navigating a knowledge graph is-a hierarchy to relate the actor in the transaction to the actor in the policy, the object of the transaction to an object of the policy, and the action of the transaction to an action of the policy activity.
-
Citations
14 Claims
-
1. A computer-implemented policy violation detection method, the method comprising:
-
extracting a policy activity from a policy, the policy activity including an actor in the policy, an object within the policy, an action of the policy, and policy scope metadata, the object being a tangible, physical object; capturing a transaction by a user including metadata of the transaction; translating the transaction by the user into an actor in the transaction, an action of the transaction, and an object of the transaction; and alerting the user of a policy violation by navigating a knowledge graph is-a hierarchy to relate the actor in the transaction to the actor in the policy, the object of the transaction to an object within the policy, and the action of the transaction to an action of the policy activity, thereby to verify that the object is related semantically to the transaction, wherein the alerting alerts the user of the at least one policy violation by running a rule-based inference model to predict if a portion of the policy activity is violated by a future action with the object of the transaction by the user based on an inference rule between the natural language of the transaction and the policy activity, and wherein the rule-based inference model includes; an inference rule to check the object against the policy if an object is acquired; an inference rule to check if the action enables a second action that can violate the policy in the future if the user does the action without the object; and an inference rule based on if the user changes the object or changes a state of the object that can violate the in the future. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product for policy violation detection, the computer program product comprising a computer-readable storage medium having program instructions embodied therewith, the program instructions executable by a device to cause the device to perform:
-
extracting a policy activity from a policy, the policy activity including an actor in the policy, an object within the policy, an action of the policy, and policy scope metadata, the object being a tangible, physical object; capturing a transaction by a user including metadata of the transaction; translating the transaction by the user into an actor in the transaction, an action of the transaction, and an object of the transaction; and alerting the user of a policy violation by navigating a knowledge graph is a hierarchy to relate the actor in the transaction to the actor in the policy, the object of the transaction to an object within the policy, and the action of the transaction to an action of the policy activity, thereby to verify that the object is related semantically to the transaction, wherein the alerting alerts the user of the at least one policy violation by running a rule-based inference model to predict if a portion of the policy activity is violated by a future action with the object of the transaction by the user based on an inference rule between the natural language of the transaction and the policy activity, and wherein the rule-based inference model includes; an inference rule to check the object against the policy if all object is acquired; an inference rule to check if the action enables a second action that can violate the policy in the future if the user does the action without the object; and an inference rule based on if the user changes the object or changes a state of the object that can violate, the policy in the future. - View Dependent Claims (10, 11)
-
-
12. A policy violation detection system, said system comprising:
-
a processor; and a memory, the memory storing instructions to cause the processor to perform; extracting a policy activity from a policy, the policy activity including an actor in the policy, an object within the policy, an action of the policy, and policy scope metadata, the object being a tangible, physical object; capturing a transaction by a user including metadata of the transaction; translating the transaction by the user into natural language indicating an actor in the transaction, a verb phrase for an object of the transaction, and a noun phrase of the transaction; and alerting the user of a policy violation by navigating a knowledge graph is-hierarchy to relate the natural language of a future action with the object of the transaction to the portion of the policy activity, relate the object of the transaction to the object within the policy, and verify that the object within the policy is related to the future action with the object of the transaction, thereby to verify that the object is related semantically to the transaction, wherein the alerting alerts the user of the at least one policy violation by running a rule-based inference model to predict if a portion of the policy activity is violated by a future action with the object of the transaction by the user based on an inference rule between the natural language of the transaction and the policy activity, and wherein the rule-based inference model includes; an inference rule to check the object against the policy if an object is acquired; are inference rule to check if the action enables a second action that can violate the policy in the future if the user does the action without the object; and an inference rule based on if the user changes the object or changes a state of the object that can violate the policy in the future. - View Dependent Claims (13, 14)
-
Specification