Techniques for analyzing data from multiple sources
First Claim
Patent Images
1. A computer-implemented method of detecting violations of policies of an organization, comprising:
- receiving, by a computer system, information from one or more information sources;
specifying one or more parameters for identifying the information;
updating, by the computer system, an ontology model based at least in part on the information, the ontology model defining an association between the information and a data element in a database schema;
applying one or more conditions, based at least in part on the ontology model, to detect at least one policy violation;
identifying, based at least in part on the ontology model, one or more information sources associated with the policy violation; and
providing an identification of the one or more information sources associated with the policy violation.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques, including systems are methods, for analyzing data from multiple sources are disclosed and suggested herein. In an embodiment, information from one or more information sources is received. The received information is stored in one or more data stores that collectively implement one or more ontologies. One or more conditions are applied to the information in the one or more data stores to determine a conclusion.
118 Citations
20 Claims
-
1. A computer-implemented method of detecting violations of policies of an organization, comprising:
-
receiving, by a computer system, information from one or more information sources; specifying one or more parameters for identifying the information; updating, by the computer system, an ontology model based at least in part on the information, the ontology model defining an association between the information and a data element in a database schema; applying one or more conditions, based at least in part on the ontology model, to detect at least one policy violation; identifying, based at least in part on the ontology model, one or more information sources associated with the policy violation; and providing an identification of the one or more information sources associated with the policy violation. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable storage medium having stored thereon instructions for causing at least one computer system to detect policy violations for an organization, the instructions comprising:
-
instructions that cause the at least one computer system to receive information from one or more information sources; instructions that cause the at least one computer system to specify one or more parameters for identifying the information; instructions that cause the at least one computer system to update an ontology model based at least in part on the information, the ontology model defining an association between the information and a data element in a database schema; instructions that cause the at least one computer system to apply one or more conditions, based at least in part on the ontology model, to detect at least one policy violation; instructions that cause the at least one computer system to identify, based at least in part on the ontology model, one or more information sources associated with the policy violation; and instructions that cause the at least one computer system to provide an identification of the one or more information sources associated with the policy violation. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system for detecting policy violations for an organization, comprising:
-
one or more processors; and a memory coupled with the one or more processors, the memory configured to store instructions that when executed by the one or more processors cause the one or more processors to; receive information from one or more information sources; specify one or more parameters for identifying the information; update an ontology model based at least in part on the information, the ontology model defining an association between the information and one or more data elements in a database schema; apply one or more conditions, based at least in part on the ontology model, to detect at least one policy violation; identify, based at least in part on the ontology model, one or more information sources associated with the policy violation; and provide an identification of the one or more information sources associated with the policy violation. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification