METHOD AND APPARATUS TO DEFINE THE SCOPE OF A SEARCH FOR INFORMATION FROM A TABULAR DATA SOURCE
First Claim
Patent Images
1. A method comprising:
- monitoring, by a computer system, messages transmitted via a network for presence of pre-selected data, the pre-selected data being from a source having a tabular structure;
determining, by the computer system, that a message for transmission to a recipient via the network includes data fragments that match elements of the pre-selected data from at least one random row within the tabular structure of the source, the pre-selected data including security-sensitive information to be protected from being transmitted via the network; and
preventing, by the computer system, an unauthorized transmission of the pre-selected data to the recipient to prevent loss of the security-sensitive information.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for defining the scope of a search is described. In one embodiment, user input is received, and the scope is defined, based on the user input, for a search of free-form text for information from any random rows within a tabular structure of source data. In one embodiment, the search is intended for finding, in the free-form text, a sub-set of data fragments that matches information from any single row within the tabular structure of the source data.
108 Citations
20 Claims
-
1. A method comprising:
-
monitoring, by a computer system, messages transmitted via a network for presence of pre-selected data, the pre-selected data being from a source having a tabular structure; determining, by the computer system, that a message for transmission to a recipient via the network includes data fragments that match elements of the pre-selected data from at least one random row within the tabular structure of the source, the pre-selected data including security-sensitive information to be protected from being transmitted via the network; and preventing, by the computer system, an unauthorized transmission of the pre-selected data to the recipient to prevent loss of the security-sensitive information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
a memory; a processor, coupled to the memory; and a data monitoring system, executed from the memory by the processor, to; monitor messages transmitted via a network for presence of pre-selected data, the pre-selected data being from a source having a tabular structure, determine that a message for transmission to a recipient via the network includes data fragments that match elements of the pre-selected data from at least one random row within the tabular structure of the source, the pre-selected data including security-sensitive information to be protected from being transmitted via the network; and prevent an unauthorized transmission of the pre-selected data to the recipient to prevent loss of the security-sensitive information. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A computer readable storage medium that provides instructions, which when executed on a processing system cause the processing system to perform a method comprising:
-
monitoring messages transmitted via a network for presence of pre-selected data, the pre-selected data being from a source having a tabular structure; determining that a message for transmission to a recipient via the network includes data fragments that match elements of the pre-selected data from at least one random row within the tabular structure of the source, the pre-selected data including security-sensitive information to be protected from being transmitted via the network; and preventing an unauthorized transmission of the pre-selected data to the recipient to prevent loss of the security-sensitive information. - View Dependent Claims (18, 19, 20)
-
Specification