Extraction of transaction data for compliance monitoring
First Claim
1. A method of monitoring transactions stored in an enterprise database comprising a plurality of source records and a plurality of source fields in each of the plurality of source records, the method comprising:
- identifying, by a computer system, a subset of source fields of the plurality of source fields;
during an initial extraction, capturing, by the computer system, initial information from the subset of source fields in a first source record, of the subset of source records, corresponding a monitored entity;
storing, by the computer system, the initial information in a staging database;
transforming, by the computer system, the initial information into a first monitoring entity by storing the initial information in a plurality of target fields of a first target record of a plurality of target records in a monitoring database based on an ontology describing a mapping between the plurality of source fields and the plurality of target fields;
during a subsequent extraction, occurring after the initial extraction, capturing, by the computer system, subsequent information from the subset of source fields in the first source record corresponding the monitored entity;
storing, by the computer system, the subsequent information in the staging database;
transforming, by the computer system, the subsequent information into a second monitoring entity by storing the subsequent information in the plurality of target fields of a second target record of the plurality of target records in the monitoring database based on the ontology describing the mapping between the plurality of source fields and the plurality of target fields; and
processing, by the computer system, the first monitoring entity and the second monitoring entity to identify an occurrence of improper activity with respect to the monitored entity.
6 Assignments
0 Petitions
Accused Products
Abstract
A knowledge base and methods for use in connection with a policy compliance monitoring system operative to determine exceptions to policies expressed by computer-executable policy statements. The system allows establishment, codification, and maintenance of enterprise policies, monitors electronic transactions of the enterprise from various and possibly heterogeneous data sources, detects exceptions to established policies, reports exceptions to authorized users such as managers and auditors, and/or provides a case management system for tracking exceptions and their underlying transactions. The knowledge base comprises extractor files that are utilized for extracting information from data sources for utilization in policy compliance monitoring, a mapper for normalizing data from the data sources against a system ontology and storing normalized data in a monitoring database, and computer-executable compliance policy statements used by a transaction analysis engine. The policy statements represent predetermined policies of the enterprise that apply to data stored in the monitoring database.
-
Citations
13 Claims
-
1. A method of monitoring transactions stored in an enterprise database comprising a plurality of source records and a plurality of source fields in each of the plurality of source records, the method comprising:
-
identifying, by a computer system, a subset of source fields of the plurality of source fields; during an initial extraction, capturing, by the computer system, initial information from the subset of source fields in a first source record, of the subset of source records, corresponding a monitored entity; storing, by the computer system, the initial information in a staging database; transforming, by the computer system, the initial information into a first monitoring entity by storing the initial information in a plurality of target fields of a first target record of a plurality of target records in a monitoring database based on an ontology describing a mapping between the plurality of source fields and the plurality of target fields; during a subsequent extraction, occurring after the initial extraction, capturing, by the computer system, subsequent information from the subset of source fields in the first source record corresponding the monitored entity; storing, by the computer system, the subsequent information in the staging database; transforming, by the computer system, the subsequent information into a second monitoring entity by storing the subsequent information in the plurality of target fields of a second target record of the plurality of target records in the monitoring database based on the ontology describing the mapping between the plurality of source fields and the plurality of target fields; and processing, by the computer system, the first monitoring entity and the second monitoring entity to identify an occurrence of improper activity with respect to the monitored entity. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer readable medium having stored thereon program instructions for monitoring transactions stored in an enterprise database comprising a plurality of source records and a plurality of source fields in each of the plurality of source records that, when executed by a computer system, direct the computer system to:
-
identify a subset of source fields of the plurality of source fields; during an initial extraction, capture initial information from the subset of source fields in a first source record, of the subset of source records, corresponding a monitored entity; store the initial information in a staging database; transform the initial information into a first monitoring entity by storing the initial information in a plurality of target fields of a first target record of a plurality of target records in a monitoring database based on an ontology describing a mapping between the plurality of source fields and the plurality of target fields; during a subsequent extraction, occurring after the initial extraction, capture subsequent information from the subset of source fields in the first source record corresponding the monitored entity; store the subsequent information in the staging database; transform the subsequent information into a second monitoring entity by storing the subsequent information in the plurality of target fields of a second target record of the plurality of target records in the monitoring database based on the ontology describing the mapping between the plurality of source fields and the plurality of target fields; and process the first monitoring entity and the second monitoring entity to identify an occurrence of improper activity with respect to the monitored entity. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method of monitoring transactions, the method comprising:
-
capturing, by a computer system, in an initial extraction from an enterprise database being monitored, initial information relating to a monitored entity; storing, by the computer system, the initial information in a staging database; transforming, by the computer system, the initial information into a first monitoring entity corresponding to the monitored entity and storing the first monitoring entity in a monitoring database; capturing, by the computer system, in a subsequent extraction from the enterprise database occurring after the initial extraction, subsequent information relating to the monitored entity; storing, by the computer system, the subsequent information in the staging database; transforming, by the computer system, the subsequent information into a second monitoring entity corresponding to the monitored entity and storing the second monitoring entity in the monitoring database with the first monitoring entity; comparing, by the computer system, the first monitoring entity to the second monitoring entity to identify an occurrence of improper activity with respect to the monitored entity.
-
Specification