CENTRALIZED READ ACCESS LOGGING
First Claim
1. A system including instructions and executable by at least one processor, the system comprising:
- the at least one processor; and
at least one memory storing;
a plurality of business applications, each business application configured to request data from an interface technology using one of a number of communication protocols,a log configuration file, wherein a record in the log configuration file identifies one of the plurality of business applications and maps a business application entity to a semantic entity,a number of read access hooks configured to use the at least one processor to;
observe requests from the business applications for data, the requests made over the communication protocols, anddetermine whether a particular request for data from a particular business application is log-relevant based on at least one record in the log configuration file for the particular business application, anda log writer configured to use the at least one processor to write a record in a read-access log when it is determined that the particular request for data is log-relevant, the record in the read-access log including information reflecting the particular request for data and a mapping of a business application entity returned in response to the particular request to its semantic entity in the at least one record in the log configuration file.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for creating a read-access log. A business application may send a request for data to a backend system using a communication protocol. At the backend system, the request may be observed and a determination made as to whether the request for data is log-relevant. The determination may be based on a log configuration record associated with the business application making the request. A record may be written in a read-access log when it is determined that the request for data is log-relevant. The log record may include information used to map entity information from the retrieved data to a semantic entity.
56 Citations
20 Claims
-
1. A system including instructions and executable by at least one processor, the system comprising:
-
the at least one processor; and at least one memory storing; a plurality of business applications, each business application configured to request data from an interface technology using one of a number of communication protocols, a log configuration file, wherein a record in the log configuration file identifies one of the plurality of business applications and maps a business application entity to a semantic entity, a number of read access hooks configured to use the at least one processor to; observe requests from the business applications for data, the requests made over the communication protocols, and determine whether a particular request for data from a particular business application is log-relevant based on at least one record in the log configuration file for the particular business application, and a log writer configured to use the at least one processor to write a record in a read-access log when it is determined that the particular request for data is log-relevant, the record in the read-access log including information reflecting the particular request for data and a mapping of a business application entity returned in response to the particular request to its semantic entity in the at least one record in the log configuration file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method stored on a computer readable storage medium and executed by one or more processors, the method comprising:
-
observing a request for data for a particular data field from a business application to a backend system, the request made over a communication protocol and observed at the backend system; determining at the backend system whether the request for data is log-relevant based on a log configuration record that identifies the business application and the particular data field; and writing a record in a read-access log when it is determined that the request for data is log-relevant. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer program product, the computer program product being tangibly embodied on a computer-readable storage medium and comprising instructions that, when executed, are configured to:
-
receive a request for data from a business application at a backend system; retrieve the requested data; determine at the backend system whether the retrieved data is log-relevant based on a log configuration record associated with the business application, wherein when the business application does not have an associated log configuration record the retrieved data is determined not to be log-relevant; and when the retrieved data is determined to be log-relevant; extract read event information from the retrieved data, extract entity information from the retrieved data based on the configuration record, the entity information including unstructured information for at least one entity from the request; and write the record in a read-access log that includes the read event information and the entity information, wherein the read event information includes information mapping to a semantic entity from the log configuration record. - View Dependent Claims (18, 19, 20)
-
Specification