PATTERN DRIVEN DATA PRIVACY MANAGEMENT
First Claim
1. A method for pattern driven data privacy management, the method comprising:
- monitoring different attempts by one or more end users to access data in a database and a context in which each of the different attempts occur;
computing different patterns of access to the data according to different contexts in which the different attempts occur;
mapping the computed different patterns to a respective portion of the data for which a mapped one of the patterns is computed; and
,responsive to a contemporaneous attempt to access a particular portion of the data, determining a contemporaneous context for the contemporaneous attempt, locating in the mapping a computed pattern for the particular portion of the data, comparing the contemporaneous context to the computed pattern of access for the particular portion of the data, and if the contemporaneous context deviates from a computed pattern of access for the particular portion of the data, enforcing a data privacy rule in respect to the particular portion of the data.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide a method, system and computer program product for pattern driven data privacy management. A method for pattern driven data privacy management includes monitoring different attempts by one or more end users to access data in a database and a context in which each of the different attempts occur. The method additionally includes computing different patterns of access to the data according to different contexts in which the different attempts occur. Finally, the method includes responding to a contemporaneous attempt to access a portion of the data, by determining a contemporaneous context for the contemporaneous attempt, by comparing the contemporaneous context to a computed pattern of access for the portion of the data, and if the contemporaneous context deviates from a computed pattern of access for the portion of the data, by enforcing a data privacy rule in respect to the portion of the data.
-
Citations
20 Claims
-
1. A method for pattern driven data privacy management, the method comprising:
-
monitoring different attempts by one or more end users to access data in a database and a context in which each of the different attempts occur; computing different patterns of access to the data according to different contexts in which the different attempts occur; mapping the computed different patterns to a respective portion of the data for which a mapped one of the patterns is computed; and
,responsive to a contemporaneous attempt to access a particular portion of the data, determining a contemporaneous context for the contemporaneous attempt, locating in the mapping a computed pattern for the particular portion of the data, comparing the contemporaneous context to the computed pattern of access for the particular portion of the data, and if the contemporaneous context deviates from a computed pattern of access for the particular portion of the data, enforcing a data privacy rule in respect to the particular portion of the data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A data processing system configured for pattern driven data privacy management, the system comprising:
-
a host computing system comprising one or more computers, each with memory and at least one processor; a database coupled to the host computing system and storing data in the database; an application executing in the memory of the host computing system, the application including program code configured to request access to the data in the database in response to utilization by an end user of the application; and
,a pattern driven data privacy management module comprising program code enabled upon execution in the memory of the computer to monitor different attempts by the end user to access data in the database and a context in which each of the different attempts occur, to compute different patterns of access to the data according to different contexts in which the different attempts occur, to map each of the computed different patterns to a respective portion of the data for which a mapped one of the patterns is computed, and to respond to a contemporaneous attempt to access a particular portion of the data by determining a contemporaneous context for the contemporaneous attempt, by locating in the map a computed pattern for the particular portion of the data, by comparing the contemporaneous context to the computed pattern of access for the particular portion of the data, and if the contemporaneous context deviates from a computed pattern of access for the particular portion of the data, by enforcing a data privacy rule in respect to the particular portion of the data. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computer program product for pattern driven data privacy management, the computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions executable by a device to cause the device to perform a method comprising:
-
monitoring different attempts by one or more end users to access data in a database and a context in which each of the different attempts occur; computing different patterns of access to the data according to different contexts in which the different attempts occur; mapping the computed different patterns to a respective portion of the data for which a mapped one of the patterns is computed; and
,responsive to a contemporaneous attempt to access a particular portion of the data, determining a contemporaneous context for the contemporaneous attempt, locating in the mapping a computed pattern for the particular portion of the data, comparing the contemporaneous context to the computed pattern of access for the particular portion of the data, and if the contemporaneous context deviates from a computed pattern of access for the particular portion of the data, enforcing a data privacy rule in respect to the particular portion of the data. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification