Automatically Reviewing Information Mappings Across Different Information Models
First Claim
1. A computer-implemented method of automatically reviewing a mapping between a first information model and a second information model comprising the steps of:
- receiving a mapping between an element in the first information model to an element in the second information model, wherein each element is associated with an element identifier and an element value, and wherein the mapping signifies a relationship between the element in the first information model and the element in the second information model;
comparing the received mapping against one or more known indications of suspicious mappings to determine if the received mapping resembles one of the indications of suspicious mappings; and
if the received mapping is determined to be suspicious, identifying the received mapping as one that requires review.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method, system, and program product for automatically reviewing a mapping between information models. The method includes: receiving a mapping between an element in the first information model to an element in the second information model. Each element is associated with an element identifier and an element value, and the mapping signifies a relationship between the element in the first information model and the element in the second information model. The method further includes comparing the received mapping against one or more known indications of suspicious mappings to determine if the received mapping resembles one of the indications of suspicious mappings. If the received mapping is determined to be suspicious, identifying the received mapping as one that requires review.
-
Citations
20 Claims
-
1. A computer-implemented method of automatically reviewing a mapping between a first information model and a second information model comprising the steps of:
-
receiving a mapping between an element in the first information model to an element in the second information model, wherein each element is associated with an element identifier and an element value, and wherein the mapping signifies a relationship between the element in the first information model and the element in the second information model; comparing the received mapping against one or more known indications of suspicious mappings to determine if the received mapping resembles one of the indications of suspicious mappings; and if the received mapping is determined to be suspicious, identifying the received mapping as one that requires review. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented system for automatically reviewing a mapping between information models, the system comprising:
-
an information receiving unit to receive content from a first information model and content a second information model, wherein content from the first information model has been mapped to content from the second information model, wherein the content from the first and second information models each contain at least one element that is associated with an element identifier and an element value, and wherein the mapping is based on a matching of an element in the first information model and to an element in the second information model; an analyzing unit to analyze the mapping between the content from the first and second information models based on a known indication of a suspicious mapping to determine if the received mapping is suspicious; and an reporting unit to report the mapping as one that requires review, if the mapping is determined to be suspicious. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer program product for automatically reviewing a mapping between information models, said computer program product comprising:
-
a computer readable storage medium having computer readable program code embodied therewith to perform the following; receiving a mapping between an element in the first information model to an element in the second information model, wherein each element is associated with an element identifier and an element value, and wherein the mapping signifies a relationship between the element in the first information model and the element in the second information model; comparing the received mapping against one or more known indications of suspicious mappings to determine if the received mapping resembles one of the indications of suspicious mappings; and if the received mapping is determined to be suspicious, identifying the received mapping as one that requires review. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification