Method of and system for searching unstructured data stored in a database
First Claim
1. A computer-implemented method of searching unstructured data stored in a database, the method comprising:
- receiving, at a first set of one or more computer systems, information indicative of a set of one or more application events that, upon occurrence, cause the first set of one or more computer systems to intercept database transactions instantiated by database applications with a database management system of the database and to generate electronic records from data in underlying database tables associated with execution of operations by the database applications identified in the database transactions;
storing, using the first set of one or more computer systems, a plurality of electronic records created based on mappings between underlying database tables associated with execution of operations by the database applications and the plurality of electronic records in response to occurrence of the set of one or more application events in a common repository of electronic records in the database that provides an audit trail that cannot be altered or disabled by users associated with the database, wherein each electronic record comprises unstructured data stored in a character large-object (CLOB) format in a column of a table of the database;
forwarding, to a client computer, information configured for generating a first graphical user interface, the first graphical user interface configured to enable users of the first graphical user interface to identify one or more references to sections of unstructured data within the plurality of electronic records stored in the database as elements of security rules;
receiving, at a second set of one or more computer systems, information from a user via the first graphical user interface identifying a reference to a section of unstructured data within an electronic record stored in the database as an element of one or more security rules;
generating, using the second set of one or more computer systems, the one or more security rules in response to the information from the user identifying the reference to a section of unstructured data within the electronic record as an element of the one or more security rules;
creating, using the second set of one or more computer systems, a security protocol that protects the plurality of electronic records stored in the database against unauthorized access based on the one or more security rules;
receiving, at a third set of one or more computer systems, a query designed to identify a set of electronic records stored in the database that meet criteria designated in the query;
prior to executing the query at the database management system, modifying the query using the third set of one or more computer systems in accordance with the security protocol to create a modified query that includes the reference to a section of unstructured data within the electronic document identified by the user as an element of the one or more security rules; and
running, using the database management system, the modified query against the unstructured data of the plurality of electronic records stored in the database.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of and system for searching unstructured data stored in a database. In one embodiment the method comprises storing a plurality of electronic records in a common repository of electronic records in the database that provides an audit trail that cannot be altered or disabled by users of the system where each electronic record comprises unstructured data stored in a character large-object (CLOB) format in a column of a table of the database; creating a security protocol that protects the electronic records against unauthorized access; and creating a query designed to identify electronic records in the database that meet criteria designated in the query. The method further comprises modifying the query in accordance with the security protocol to create a modified query prior to executing the query and running the modified query against the unstructured data. In one particular implementation, the unstructured data comprises a well-formed XML document stored within a column of a table stored in the database.
-
Citations
22 Claims
-
1. A computer-implemented method of searching unstructured data stored in a database, the method comprising:
-
receiving, at a first set of one or more computer systems, information indicative of a set of one or more application events that, upon occurrence, cause the first set of one or more computer systems to intercept database transactions instantiated by database applications with a database management system of the database and to generate electronic records from data in underlying database tables associated with execution of operations by the database applications identified in the database transactions; storing, using the first set of one or more computer systems, a plurality of electronic records created based on mappings between underlying database tables associated with execution of operations by the database applications and the plurality of electronic records in response to occurrence of the set of one or more application events in a common repository of electronic records in the database that provides an audit trail that cannot be altered or disabled by users associated with the database, wherein each electronic record comprises unstructured data stored in a character large-object (CLOB) format in a column of a table of the database; forwarding, to a client computer, information configured for generating a first graphical user interface, the first graphical user interface configured to enable users of the first graphical user interface to identify one or more references to sections of unstructured data within the plurality of electronic records stored in the database as elements of security rules; receiving, at a second set of one or more computer systems, information from a user via the first graphical user interface identifying a reference to a section of unstructured data within an electronic record stored in the database as an element of one or more security rules; generating, using the second set of one or more computer systems, the one or more security rules in response to the information from the user identifying the reference to a section of unstructured data within the electronic record as an element of the one or more security rules; creating, using the second set of one or more computer systems, a security protocol that protects the plurality of electronic records stored in the database against unauthorized access based on the one or more security rules; receiving, at a third set of one or more computer systems, a query designed to identify a set of electronic records stored in the database that meet criteria designated in the query; prior to executing the query at the database management system, modifying the query using the third set of one or more computer systems in accordance with the security protocol to create a modified query that includes the reference to a section of unstructured data within the electronic document identified by the user as an element of the one or more security rules; and running, using the database management system, the modified query against the unstructured data of the plurality of electronic records stored in the database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system for searching unstructured data stored in a database, the computer system comprising:
-
a processor; a database; and a computer-readable memory coupled to the processor, the computer-readable memory configured to store a computer program; wherein the processor is operative with the computer program to; receive information indicative of a set of one or more application events that, upon occurrence, cause the processor to intercept database transactions instantiated by database applications with a database management system of the database and to generate electronic records from data in underlying database tables associated with execution of operations by the database applications identified in the database transactions; store a plurality of electronic records created by the processor based on mappings between underlying database tables associated with execution of operations by the database applications and the plurality of electronic records in response to occurrence of the set of one or more application events in a common repository of electronic records in the database that provides an audit trail that cannot be altered or disabled by users associated with the database, wherein each electronic record comprises unstructured data stored in a character large-object (CLOB) format in a column of a table of the database; forward, to a client computer, information configured to generate a first graphical user interface configured to enable a user if the first graphical user interface to identify one or more reference to sections of unstructured data within the plurality of electronic records stored in the database as elements of security rules; receive information from a user via the first graphical user interface identifying a reference to a section of unstructured data within an electronic record as an element of one or more security rules; generate one or more security rules in response to the information from the user identifying the reference to a section of unstructured data within the electronic record as an element of the one or more security rules; create a security protocol that protects the plurality of electronic records stored in the database against unauthorized access to the unstructured data within each electronic record based on the one or more security rules; receive a query designed to identify a set of electronic records stored in the database that meet criteria designated in the query; modify the query in accordance with the security protocol to create a modified query prior to the database management system executing the query that includes the reference to a section of unstructured data within the electronic document identified by the user as an element of the one or more security rules; and cause the database management system to run the modified query against the unstructured data of the plurality of electronic records stored in the database. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer program product having a computer-readable memory medium storing a set of code modules which when executed by a processor of a computer system cause the processor to search unstructured data stored in a database, the computer program product comprising:
-
code for receiving information indicative of a set of one or more application events that, upon occurrence, causes database transactions instantiated by database applications with a database management system of the database to be intercepted and electronic records to be generated from data in underlying database tables associated with execution of operations by the database applications identified in the database transactions; code for storing a plurality of electronic records created based on mappings between underlying database tables associated with execution of operations by the database applications and the plurality of electronic records in response to occurrence of the set of one or more application events in a common repository of electronic records in the database that provides an audit trail that cannot be altered or disabled by users associated with the database, wherein each electronic record comprises unstructured data stored in a character large-object (GLOB) format in a column of a table of the database; code for generating a first graphical user interface and displaying the first graphical user interface on a display device, the first graphical user interface configured to enable a user to identify one or more reference to sections of unstructured data within the plurality of electronic records stored in the database as elements of security rules; code for receiving information from a user via the first graphical user interface identifying a reference to a section of unstructured data within an electronic record as an element of one or more security rules; code for generating the one or more security rules in response to the information from the user identifying the reference to a section of unstructured data within the electronic record as an element of the one or more security rules; code for creating a security protocol that protects the plurality of electronic records stored in the database against unauthorized access based on the one or more security rules; code for creating a query designed to identify a set of electronic records stored in the database that meet criteria designated in the query; code for modifying the query in accordance with the security protocol to create a modified query prior to executing the query, the modified query including the section of unstructured data within the electronic document identified by the user as an element of the one or more security rules; and code for running the modified query against the unstructured data of the plurality of electronic records stored in the database. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
Specification