TECHNIQUES FOR ANALYZING DATA FROM MULTIPLE SOURCES
First Claim
1. A computer-implemented method of detecting violations of policies of an organization, comprising:
- under the control of one or more computer systems configured with executable instructions,receiving external information from one or more external information sources;
receiving internal information from one or more internal information sources;
storing the external information and internal information in one or more data stores that collectively implement one or more ontologies;
applying one or more conditions to the external information and internal information in the one or more data stores to determine a conclusion; and
providing the conclusion.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques, including systems are methods, for analyzing data from multiple sources are disclosed and suggested herein. In an embodiment, external information from one or more external information sources and internal information from one or more internal information sources is received. The received external information and internal information are stored in one or more data stores that collectively implement one or more ontologies. One or more conditions are applied to the external information and internal information in the one or more data stores to determine a conclusion and the conclusion is provided to a user.
38 Citations
20 Claims
-
1. A computer-implemented method of detecting violations of policies of an organization, comprising:
under the control of one or more computer systems configured with executable instructions, receiving external information from one or more external information sources; receiving internal information from one or more internal information sources; storing the external information and internal information in one or more data stores that collectively implement one or more ontologies; applying one or more conditions to the external information and internal information in the one or more data stores to determine a conclusion; and providing the conclusion. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A computer-readable storage medium having stored thereon instructions for causing at least one computer system to detect policy violations for an organization, the instructions comprising:
-
instructions that cause the at least one computer system to receive external information from one or more external information sources; instructions that cause the at least one computer system to receive internal information from one or more internal information sources; instructions that cause the at least one computer system to store the external information and internal information in one or more data stores that collectively implement one or more ontologies; instructions that cause the at least one computer system to apply one or more conditions to the external information and internal information in the one or more data stores to determine a conclusion; and instructions that cause the at least one computer system to provide the conclusion. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system for detecting policy violations for an organization, comprising:
-
one or more communications devices collectively operable to receive external information from one or more external information sources and internal information from one or more internal information sources; a data store that receives at least a portion of the internal information and at least a portion of the external information, that transforms said at least a portion of the internal information and said at least a portion of the external information to a common schema that implements an ontology; and one or more computing devices that are collectively operable to; apply one or more conditions to contents of the data store to determine a conclusion, the contents including said at least a portion of the internal information and said at least a portion of the external information; and provide the conclusion. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification