System and method for data mining and security policy management
First Claim
1. A method, comprising:
- communicating a plurality of parameters from a client device, wherein the plurality of parameters are based, at least in part, on metadata information obtained from data mining one or more databases, at least one database including tags associated with objects, wherein the data mining includes applying one or more filters to the tags of the at least one database to obtain at least a portion of the metadata information, wherein the one or more filters are applied to one or more elements, respectively, of the tags;
creating a rule associated with at least some of the parameters; and
incorporating the rule into a security policy to be used by the client device and one or more additional client devices, wherein the security policy controls network communications involving the client device and the one or more additional client devices.
9 Assignments
0 Petitions
Accused Products
Abstract
A method is provided in one example and includes generating a query for a database for information stored in the database. The information relates to data discovered through a capture system. The method further includes generating an Online Analytical Processing (OLAP) element to represent information received from the query. A rule based on the OLAP element is generated and the rule affects data management for one or more documents that satisfy the rule. In more specific embodiments, the method further includes generating a capture rule that defines items the capture system should capture. The method also includes generating a discovery rule that defines objects the capture system should register. In still other embodiments, the method includes developing a policy based on the rule, where the policy identifies how one or more documents are permitted to traverse a network.
427 Citations
20 Claims
-
1. A method, comprising:
-
communicating a plurality of parameters from a client device, wherein the plurality of parameters are based, at least in part, on metadata information obtained from data mining one or more databases, at least one database including tags associated with objects, wherein the data mining includes applying one or more filters to the tags of the at least one database to obtain at least a portion of the metadata information, wherein the one or more filters are applied to one or more elements, respectively, of the tags; creating a rule associated with at least some of the parameters; and incorporating the rule into a security policy to be used by the client device and one or more additional client devices, wherein the security policy controls network communications involving the client device and the one or more additional client devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A client device, comprising:
-
a processor; and a memory, wherein the client device is configured for; communicating a plurality of parameters from a client device, wherein the plurality of parameters are based, at least in part, on metadata information to be obtained from data mining one or more databases, at least one database including tags associated with objects, wherein the data mining includes applying one or more filters to the tags of the at least one database to obtain at least a portion of the metadata information, wherein the one or more filters are applied to one or more elements, respectively, of the tags; creating a rule associated with at least some of the parameters; and incorporating the rule into a security policy to be used by the client device and one or more additional client devices, wherein the security policy is to control network communications involving the client device and the one or more additional client devices. - View Dependent Claims (12, 13, 14, 15)
-
-
16. One or more non-transitory tangible media that includes code for execution and when executed by a processor operable to perform operations comprising:
-
communicating a plurality of parameters from a client device, wherein the plurality of parameters are based, at least in part, on metadata information to be obtained from data mining one or more databases, at least one database including tags associated with objects, wherein the data mining includes applying one or more filters to the tags of the at least one database to obtain at least a portion of the metadata information, wherein the one or more filters are applied to one or more elements, respectively, of the tags; creating a rule associated with at least some of the parameters; and incorporating the rule into a security policy to be used by the client device and one or more additional client devices, wherein the security policy is to control network communications involving the client device and the one or more additional client devices. - View Dependent Claims (17, 18, 19, 20)
-
Specification