Hierarchical organization of data associated with events
First Claim
Patent Images
1. A method of organizing security data, comprising:
- hierarchically relating a triggering security event at a first level of hierarchy with one or more additional security events at a second level of the hierarchy that is lower than the first level of the hierarchy based on a possible relationship between the triggering security event and the one or more additional security events in a computer database environment maintained in a computer readable storage medium and associated with a data processing system;
receiving, via the data processing system, a request from a user specifying the triggering security event at the computer database environment;
identifying, via the data processing system, a search region based on a location associated with the specified triggering security event and a search time period based on a date and time of the specified triggering security event, wherein the search time period and a size of the search region are customized by the user; and
providing, from the computer database environment, the one or more additional security events possibly associated with the specified triggering security event based on the identified search region and search time period responsive to the request, wherein the providing the one or more additional security events is based on a group of the user and role or title of the user.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, data structures, systems and computer program products are provided for organizing security data. A triggering security event is hierarchically related to at least one additional security event based on a possible relationship between the triggering security event and the at least one additional security event in a computer database environment.
-
Citations
14 Claims
-
1. A method of organizing security data, comprising:
-
hierarchically relating a triggering security event at a first level of hierarchy with one or more additional security events at a second level of the hierarchy that is lower than the first level of the hierarchy based on a possible relationship between the triggering security event and the one or more additional security events in a computer database environment maintained in a computer readable storage medium and associated with a data processing system; receiving, via the data processing system, a request from a user specifying the triggering security event at the computer database environment; identifying, via the data processing system, a search region based on a location associated with the specified triggering security event and a search time period based on a date and time of the specified triggering security event, wherein the search time period and a size of the search region are customized by the user; and providing, from the computer database environment, the one or more additional security events possibly associated with the specified triggering security event based on the identified search region and search time period responsive to the request, wherein the providing the one or more additional security events is based on a group of the user and role or title of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A data processing system for organizing security data comprising:
-
a computer database environment maintained in a computer readable storage medium and configured to store a triggering security event object at a first level of hierarchy and one or more additional security event objects at a second level of the hierarchy that is lower than the first level of the hierarchy, wherein the one or more additional security event objects are identified based on a possible relationship between the triggering security event object and the one or more additional security event objects; and a processor circuit configured to hierarchically relate the triggering security event object to the one or more additional security event objects in the computer database environment, receive a request from a user specifying the triggering security event object at the computer database environment, identify a search region based on a location associated with the specified triggering security event object and a search time period based on a date and time of the specified triggering security event object, wherein the search time period and a size of the search region are customized by the user, and provide the one or more additional security event objects possibly associated with the specified triggering security event object based on the identified search region and search time period responsive to the request, wherein the providing the one or more additional security event objects is based on a group of the user and role or title of the user. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification