Method and apparatus to define the scope of a search for information from a tabular data source
First Claim
Patent Images
1. A method comprising:
- receiving, by a computer system, user input identifying tabular source data, the tabular source data representing data that has a tabular structure;
receiving, by the computer system, user input specifying one or more columns in the tabular source data to define parameters of a search, wherein the one or more columns comprises data that is to be protected from being transmitted via a network;
searching, by the computer system, a plurality of messages for presence of data that matches data in at least one of the specified columns within the tabular source data; and
preventing, by the computer system, an unauthorized transmission of the data in at least one of the plurality of messages that matches the data in at least one of the specified columns, wherein preventing comprises at least one of blocking the unauthorized transmission of the at least one of the plurality of messages containing the data that matches the data in at least one of the specified columns, rerouting the at least one of the plurality of messages containing the data that matches the data in at least one of the specified columns to a destination other than an intended recipient, or intercepting the unauthorized transmission of the data in the at least one of the plurality of messages that matches the data in at least one of the specified columns to a recipient.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for defining the scope of a search is described. In one embodiment, user input is received, and the scope is defined, based on the user input, for a search of free-form text for information from any random rows within a tabular structure of source data. In one embodiment, the search is intended for finding, in the free-form text, a sub-set of data fragments that matches information from any single row within the tabular structure of the source data.
161 Citations
17 Claims
-
1. A method comprising:
-
receiving, by a computer system, user input identifying tabular source data, the tabular source data representing data that has a tabular structure; receiving, by the computer system, user input specifying one or more columns in the tabular source data to define parameters of a search, wherein the one or more columns comprises data that is to be protected from being transmitted via a network; searching, by the computer system, a plurality of messages for presence of data that matches data in at least one of the specified columns within the tabular source data; and preventing, by the computer system, an unauthorized transmission of the data in at least one of the plurality of messages that matches the data in at least one of the specified columns, wherein preventing comprises at least one of blocking the unauthorized transmission of the at least one of the plurality of messages containing the data that matches the data in at least one of the specified columns, rerouting the at least one of the plurality of messages containing the data that matches the data in at least one of the specified columns to a destination other than an intended recipient, or intercepting the unauthorized transmission of the data in the at least one of the plurality of messages that matches the data in at least one of the specified columns to a recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a memory; a processor, coupled to the memory; and a data monitoring system, executed from the memory by the processor, to; receive user input identifying tabular source data, the tabular source data representing data that has a tabular structure, receive user input specifying one or more columns in the tabular source data, wherein the one or more columns comprises data that is to be protected; search a plurality of messages for presence of data that matches data in at least one of the specified columns within the tabular source data; and prevent an unauthorized transmission of the data in at least one of the plurality of messages that matches the data in at least one of the specified columns, wherein to prevent the unauthorized transmission comprises at least one of blocking the unauthorzied transmission of the at least one of the plurality of messages containing the data that matches the data in at least one of the specified columns, rerouting the at least one of the plurality of messages containing data that matches the data in at least one of the specified columns to a destination other than an intended recipient, or intercepting the unauthorized transmission of the data in the at least one of the plurality of messages that matches the data in at least one of the specified columns to a recipient. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A non-transitory computer readable storage medium that provides instructions, which when executed on a processing system cause the processing system to perform a method comprising:
-
receiving user input identifying tabular source data, the tabular source data representing data that has a tabular structure; receiving, by the processing system, user input specifying one or more columns in the tabular source data to define parameters of a search, wherein the one or more columns comprises data that is to be protected from being transmitted via a network; searching a plurality of messages for presence of data that matches the data in at least one of the specified columns within the tabular source data; and preventing an unauthorized transmission of the data in at least one of the plurality of messages that matches the data in at least one of the specified columns, wherein preventing comprises at least one of blocking the unauthorized transmission of the at least one of the plurality of messages containing the data that matches the data in at least one of the specified columns, rerouting the at least one of the plurality of messages containing the data that matches the data in at least one of the specified columns to a destination other than an intended recipient, or intercepting the unauthorized transmission of the data in the at least one of the plurality of messages that matches the data in at least one of the specified columns to a recipient. - View Dependent Claims (15, 16, 17)
-
Specification