Generating Secured Recommendations for Business Intelligence Enterprise Systems
First Claim
Patent Images
1. A computer-implemented method for recommending documents to a user, the method comprising:
- determining, by a computer, audit logs entries that are associated with members of a group that includes the user as a member, each audit log entry is associated with a file that a member of the group has accessed;
analyzing, by the computer, the associated audit log entries; and
generating, by the computer, a recommendation of at least one file for the user based on the analyzing of the associated audit log entries.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment a computer-implemented method for recommending documents to a user, the method comprises determining, by a computer, audit logs entries that are associated with members of a group that includes the user as a member, each audit log entry is associated with a file that a member of the group has accessed; analyzing, by the computer, the associated audit log entries; and generating, by the computer, a recommendation of at least one file for the user based on the analyzing of the associated audit log entries.
49 Citations
18 Claims
-
1. A computer-implemented method for recommending documents to a user, the method comprising:
-
determining, by a computer, audit logs entries that are associated with members of a group that includes the user as a member, each audit log entry is associated with a file that a member of the group has accessed; analyzing, by the computer, the associated audit log entries; and generating, by the computer, a recommendation of at least one file for the user based on the analyzing of the associated audit log entries. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer readable storage medium embodying a computer program for performing a method, the method comprising:
- ;
determining, by a computer, audit logs entries that are associated with members of a group that includes the user as a member, each audit log entry is associated with a file that a member of the group has accessed; analyzing, by the computer, the associated audit log entries; and generating, by the computer, a recommendation of at least one file for the user based on the analyzing of the associated audit log entries. - View Dependent Claims (8, 9, 10, 11, 12)
- ;
-
13. A computer system comprising:
-
one or more processors; a software program, executable on the computer system, the software program configured to; determine audit logs entries that are associated with members of a group that includes the user as a member, each audit log entry is associated with a file that a member of the group has accessed; analyze the associated audit log entries; and generate a recommendation of at least one file for the user based on the analyzing of the associated audit log entries. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification