Apparatus and method for analysis of conversational patterns to position information and autonomic access control list management
First Claim
Patent Images
1. A method of analyzing conversational patterns to position information sources and autonomic access control list management comprising:
- calculating said conversational frequency patterns for a selected user from data stored in a first database;
calculating access of systems, applications, or documents by said selected user, including;
obtaining a list of systems, applications, or documents from a third database;
obtaining access control lists from said list of systems, applications, or documents;
calculating frequency of access to said systems, applications, or documents; and
storing said frequency of access in a fourth database;
finding other users from a second database;
obtaining a list of systems, applications, or documents utilized by said other users but not by said selected user; and
granting or withdrawing access to said selected user.
3 Assignments
0 Petitions
Accused Products
Abstract
A method employing a software application for operation for analyzing conversational patterns between people and teams within an organization, locating inconsistencies in the required and actual access level to knowledge repositories, which ultimately results in dynamically updating access control lists of the knowledge repositories, and having the originator and anticipated users being prompted to further enable informed, fact-based manual control of the access control lists.
-
Citations
27 Claims
-
1. A method of analyzing conversational patterns to position information sources and autonomic access control list management comprising:
-
calculating said conversational frequency patterns for a selected user from data stored in a first database; calculating access of systems, applications, or documents by said selected user, including; obtaining a list of systems, applications, or documents from a third database; obtaining access control lists from said list of systems, applications, or documents; calculating frequency of access to said systems, applications, or documents; and storing said frequency of access in a fourth database; finding other users from a second database; obtaining a list of systems, applications, or documents utilized by said other users but not by said selected user; and granting or withdrawing access to said selected user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of analyzing conversational patterns to position information sources and autonomic access control list management comprising:
-
calculating said conversational frequency patterns for a selected user from data stored in a first database; calculating access of systems, applications, or documents by said selected user; finding other users from a second database; matching conversational partners with system users; building a first structure identifying people with whom said selected user has documented conversations; building a second structure identifying people within said selected user'"'"'s group of said conversational partners who regularly access said systems, applications, or documents; identifying similarities between said first and second structures; identifying subsets not employed by said selected user, but matching frequently used systems, applications, or documents of said selected user'"'"'s conversational partners; prioritizing said subsets and presenting said subsets to said selected user; obtaining a list of systems, applications, or documents utilized by said other users but not by said selected user; and granting or withdrawing access to said selected user.
-
-
10. A method of analyzing conversational patterns to position information sources and autonomic access control list management comprising:
-
obtaining a list of sources from a first database; identifying individuals for analysis from said sources found in said first database; finding existing links among said identified individuals; calculating frequency of contacts among said identified individuals; matching conversational partners with said identified individuals; building a first structure identifying people with who said identified individuals have documented conversations; building a second structure identifying people within said identified individuals'"'"' groups of said conversational partners who regularly access said systems, applications, or documents; identifying similarities between said first and second structures; identifying subsets not employed by said identified individuals, but matching frequently used systems, applications, or documents of said identified individuals'"'"' conversational partners; prioritizing said subsets and presenting said subsets to said user; storing said frequency of contacts in a second database; obtaining a list of systems, applications, or documents from a third database; obtaining access control lists from said list of systems, applications, or documents; calculating frequency of access to said systems, applications, or documents; storing said frequency of access in a fourth database; obtaining a list of systems, applications, or documents utilized by other users but not by said identified individuals; and granting or withdrawing access to said identified individuals. - View Dependent Claims (11, 12)
-
-
13. A method of analyzing conversational patterns to position information sources and autonomic access control list management comprising:
-
deploying process software for analysis of conversational patterns to position information and autonomic access control list management, said deployment comprising; installing said process software on at least one server; identifying server addresses for users accessing said process software on said at least one server; installing a proxy server if needed; sending said process software to said at least one server via a file transfer protocol, or sending a transaction to said at least one server containing said process software and receiving and copying said process software to said at least one server'"'"'s file system; accessing said process software on a user'"'"'s client computer file system; and executing said process software by said users; calculating said conversational frequency patterns for a selected user from data stored in a first database; calculating access of systems, applications, or documents by said selected user; finding other users from a second database; obtaining a list of systems, applications, or documents utilized by said other users but not by said selected user; and granting or withdrawing access to said selected user. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method of analyzing conversational patterns to position information sources and autonomic access control list management comprising:
-
integrating process software for analysis of conversational patterns to position information and autonomic access control list management, said integration comprising; determining if said process software will execute on at least one server; identifying said at least one server address, including checking said at least one server for operating systems, applications, network operating systems, or version numbers for validation with said process software, and identifying any missing software applications that are required for integration; updating said operating systems, said applications, or said network operating systems that are not validated for said process software, and providing any of said missing software applications required for said integration; identifying client addresses and checking said client'"'"'s computers for operating systems, applications, network operating systems, or version numbers for validation with said process software, and identifying any missing software applications that are required for integration; updating said client'"'"'s computers with said operating systems, said applications, or said network operating systems that are not validated for said process software, and providing any of said missing software applications required for said integration; and installing said process software on said client'"'"'s computers and said at least one server; calculating said conversational frequency patterns for a selected user from data stored in a first database; calculating access of systems, applications, or documents by said selected user; finding other users from a second database; obtaining a list of systems, applications, or documents utilized by said other users but not by said selected user; and granting or withdrawing access to said selected user.
-
-
20. A method of analyzing conversational patterns to position information sources and autonomic access control list management comprising:
-
on demand sharing of process software for analysis of conversational patterns to position information and autonomic access control list management, said on demand sharing comprising; creating a transaction containing unique customer identification, requested service type, and service parameters; sending said transaction to at least one main server; querying said server'"'"'s central processing unit capacity for adequate processing of said transaction; and allocating additional central processing unit capacity when additional capacity is needed to process said transaction, and adding said additional central processing unit capacity to said server, or checking environmental capacity for processing said transaction, including network bandwidth, processor memory, or storage, and allocating said environmental capacity as required; calculating said conversational frequency patterns for a selected user from data stored in a first database; calculating access of systems, applications, or documents by said selected user; finding other users from a second database; obtaining a list of systems, applications, or documents utilized by said other users but not by said selected user; and granting or withdrawing access to said selected user. - View Dependent Claims (21, 22, 23, 24)
-
-
25. A method of analyzing conversational patterns to position information sources and autonomic access control list management comprising:
-
including deploying, accessing, and executing process software for analysis of conversational patterns to position information and autonomic access control list management through a virtual private network, said method further comprising; determining if said virtual private network is required; checking for remote access of said virtual private network; if said remote access does not exist, identifying a third party provider to provide secure, encrypted connections between a private network and remote users, identifying said remote users, and setting up a network access server for downloading and installing desktop client software for remotely accessing said virtual private network; accessing said process software; transporting said process software to said remote user'"'"'s desktop; and
executing said process software on said remote user'"'"'s desktop;calculating said conversational frequency patterns for a selected user from data stored in a first database; calculating access of systems, applications, or documents by said selected user; finding other users from a second database; obtaining a list of systems, applications, or documents utilized by said other users but not by said selected user; and granting or withdrawing access to said selected user. - View Dependent Claims (26, 27)
-
Specification