APPARATUS AND METHOD FOR ANALYSIS OF CONVERSATIONAL PATTERNS TO POSITION INFORMATION AND AUTONOMIC ACCESS CONTROL LIST MANAGEMENT
First Claim
Patent Images
1. A method of analyzing conversational patterns to position information sources and autonomic access control list management comprising:
- calculating said conversational frequency patterns for a selected user from data stored in a first database;
calculating access of systems, applications, or documents by said selected user;
finding other users from a second database;
obtaining a list of systems, applications, or documents utilized by said other users but not by said selected user; and
granting or withdrawing access to said selected user.
3 Assignments
0 Petitions
Accused Products
Abstract
A method employing a software application for operation for analyzing conversational patterns between people and teams within an organization, locating inconsistencies in the required and actual access level to knowledge repositories, which ultimately results in dynamically updating access control lists of the knowledge repositories, and having the originator and anticipated users being prompted to further enable informed, fact-based manual control of the access control lists.
29 Citations
29 Claims
-
1. A method of analyzing conversational patterns to position information sources and autonomic access control list management comprising:
-
calculating said conversational frequency patterns for a selected user from data stored in a first database;
calculating access of systems, applications, or documents by said selected user;
finding other users from a second database;
obtaining a list of systems, applications, or documents utilized by said other users but not by said selected user; and
granting or withdrawing access to said selected user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
11. A method of analyzing conversational patterns to position information sources and autonomic access control list management comprising:
-
obtaining a list of sources from a first database;
identifying individuals for analysis from said sources found in said first database;
finding existing links among said identified individuals;
calculating frequency of contacts among said identified individuals;
storing said frequency of contacts in a second database;
obtaining a list of systems, applications, or documents from a third database;
obtaining access control lists from said list of systems, applications, or documents;
calculating frequency of access to said systems, applications, or documents;
storing said frequency of access in a fourth database;
obtaining a list of systems, applications, or documents utilized by other users but not by said identified individuals; and
granting or withdrawing access to said identified individuals. - View Dependent Claims (12, 13, 14)
-
Specification