System and method for information sharing across security boundaries
First Claim
1. A system for sharing information across security boundaries comprising:
- a server for sharing information between networks comprising;
a processor;
a memory, wherein the memory includes instructions for;
receiving data structured as semantic statements;
retrieving a set of rules and ontology;
processing a semantic statement from data with rules and ontology;
determining whether the semantic statement is consistent with rules and ontology;
determining a fact that gives rise to an inconsistency if the semantic statement is inconsistent;
removing the fact that gives rise to the inconsistency; and
releasing data when the semantic statement is consistent with rules and ontology.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for sharing information across security boundaries including a server for sharing information between networks. The method for includes receiving data structured as semantic statements, retrieving a set of rules and ontology, processing a semantic statement from data with rules and ontology, determining whether the semantic statement is consistent with rules and ontology, and determining a fact that gives rise to an inconsistency if the semantic statement is inconsistent. The method further includes removing the fact that gives rise to the inconsistency and releasing data when the semantic statement is consistent with rules and ontology.
-
Citations
20 Claims
-
1. A system for sharing information across security boundaries comprising:
a server for sharing information between networks comprising; a processor; a memory, wherein the memory includes instructions for; receiving data structured as semantic statements; retrieving a set of rules and ontology; processing a semantic statement from data with rules and ontology; determining whether the semantic statement is consistent with rules and ontology; determining a fact that gives rise to an inconsistency if the semantic statement is inconsistent; removing the fact that gives rise to the inconsistency; and releasing data when the semantic statement is consistent with rules and ontology. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A system for sharing information across security boundaries comprising:
a server for sharing information between networks comprising; a processor; a memory, wherein the memory includes instructions for; receiving data structured as semantic statements; retrieving a set of rules, ontology and aggregation history; processing a semantic statement from data with rules, ontology and aggregation history; determining whether the semantic statement is consistent with rules, ontology, and aggregation history; determining a fact that gives rise to an inconsistency if the semantic statement is inconsistent; removing the fact that gives rise to the inconsistency; and releasing data when the semantic statement is consistent with rules, ontology, and aggregation history. - View Dependent Claims (11, 12)
-
13. A method for sharing information across security boundaries comprising:
-
receiving data structured as semantic statements; retrieving a set of rules and ontology; processing a semantic statement from data with rules and ontology; determining whether the semantic statement is consistent with rules and ontology; determining a fact that gives rise to an inconsistency if the semantic statement is inconsistent; removing the fact that gives rise to the inconsistency; and releasing data when the semantic statement is consistent with rules and ontology. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A method for sharing information across security boundaries comprising:
-
receiving data structured as semantic statements; retrieving a set of rules and ontology; retrieving aggregation history; processing a semantic statement from data with rules, ontology and aggregation history; determining whether the semantic statement is consistent with rules, ontology, and aggregation history; determining a fact that gives rise to an inconsistency if the semantic statement is inconsistent; removing the fact that gives rise to the inconsistency; and releasing data when the semantic statement is consistent with rules, ontology, and aggregation history. - View Dependent Claims (19, 20)
-
Specification