Event-based data path detection
First Claim
Patent Images
1. A computer-implemented method, comprising:
- receiving data, in a data processing system, and involving a first node and a second node in a network, the data indicating at least a permission of the second node to access data managed by the first node;
updating, based at least in part on the permission, a first proximity measure between the first node and the second node to result in an updated first proximity measure;
determining, based at least in part on the updated first proximity measure and a second proximity measure between the second node and a third node, whether a data path exists between a data source and a data sink, wherein the third node is different from the first node and the second node; and
indicating whether the data path exists between the data source and the data sink.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for path detection are disclosed. In the method and apparatus, a data path may link two path-end nodes in a network. Event data for the network may be received and may be used to determine, for each node resident on the path, proximity measures to each path-end node. The proximity measure of network nodes may be evaluated to determine whether a path exists between the two path-end nodes.
65 Citations
22 Claims
-
1. A computer-implemented method, comprising:
-
receiving data, in a data processing system, and involving a first node and a second node in a network, the data indicating at least a permission of the second node to access data managed by the first node; updating, based at least in part on the permission, a first proximity measure between the first node and the second node to result in an updated first proximity measure; determining, based at least in part on the updated first proximity measure and a second proximity measure between the second node and a third node, whether a data path exists between a data source and a data sink, wherein the third node is different from the first node and the second node; and indicating whether the data path exists between the data source and the data sink. - View Dependent Claims (2, 3, 4, 5, 6, 7, 21, 22)
-
-
8. A system comprising:
at least one computing device that implements one or more services, wherein the one or more services; for a node pair including a first node and a second node in a network, receive data indicating at least a permission of the first node to access data managed by the second node; update a first proximity measure associated with first node based at least in part on the data to result in an updated first proximity measure; and detect a path between a data source and a data sink based at least in part on the updated first proximity measure and a second proximity measure associated with at least the second node and a third node, wherein the third node is different from the first node and the second node. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A non-transitory computer-readable storage medium comprising executable instructions that, if executed by one or more processors of a computer system, cause the computer system to at least:
-
update a first proximity measure associated with a first node and a second node in a network, based at least in part on information indicating at least a privilege of the second node to access data managed by the first node, to result in an updated first proximity measure, the updated first proximity measure being weighted according to a type of activity indicated by the information; determine, based at least in part on the updated first proximity measure and a second proximity measure associated with at least the second node and a third node, whether a data path exists between a data source and a data sink, wherein the third node is different from the first node and the second node; and indicate whether the data path exists between the data source and the data sink. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification