Method and apparatus for monitoring a database system
First Claim
Patent Images
1. A method for monitoring a database system that includes a database server executing on one or more processors of a computer system, the method comprising the steps of:
- making a copy of content, managed by the database system, into a location of a device that is separate from the computer system without removing the content from the computer system,wherein said content is data that populates a database managed by the database system and does not form part of the structure, metadata, or schema of the database; and
in the device, detecting potential anomalies by;
a) reading criteria data, previously provided by a user through an interface for receiving user-specified security rules, that specifies criteria used by the one or more analysis operations, wherein the criteria data includes data that defines a condition that must be satisfied by a particular value within the copy of the content.b) performing the one or more analysis operations on the copy of the content in order to identify one or more data elements, within the copy of the content, that are potentially anomalous based on the criteria specified in the criteria data, wherein one of the one or more analysis operations involves determining whether the particular value within the copy of the content satisfies the condition; and
c) signaling a notification after identifying that the one or more data elements are potentially anomalous.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are provided for monitoring a database system. A set of data elements may be read from a database system into a device. The device may be external to the database system. From the device, a set of analysis operations are performed on the data elements in order to identify if any of the date elements satisfy a criteria for being considered potentially anomalous. A notification is signaled if potentially anomalous data is identified.
34 Citations
70 Claims
-
1. A method for monitoring a database system that includes a database server executing on one or more processors of a computer system, the method comprising the steps of:
-
making a copy of content, managed by the database system, into a location of a device that is separate from the computer system without removing the content from the computer system, wherein said content is data that populates a database managed by the database system and does not form part of the structure, metadata, or schema of the database; and in the device, detecting potential anomalies by; a) reading criteria data, previously provided by a user through an interface for receiving user-specified security rules, that specifies criteria used by the one or more analysis operations, wherein the criteria data includes data that defines a condition that must be satisfied by a particular value within the copy of the content. b) performing the one or more analysis operations on the copy of the content in order to identify one or more data elements, within the copy of the content, that are potentially anomalous based on the criteria specified in the criteria data, wherein one of the one or more analysis operations involves determining whether the particular value within the copy of the content satisfies the condition; and c) signaling a notification after identifying that the one or more data elements are potentially anomalous. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A computer-readable medium carrying one or more sequences of instructions for monitoring a database system that includes a database server executing on one or more processors of a computer system, which instructions, when executed by one or more processors, causes the one or more processors to carry out the steps of:
-
making a copy of content, managed by the database system, into a location of a device that is separate from the computer system without removing the content from the computer system, wherein said content is data that populates a database managed by the database system and does not form part of the structure, metadata, or schema of the database; and in the device, detecting potential anomalies by; a) reading criteria data, previously provided by a user through an interface for receiving user-specified security rules, that specifies criteria used by the one or more analysis operations, wherein the criteria data includes data that defines a condition that must be satisfied by a particular value within the copy of the content; b) performing the one or more analysis operations on the copy of the content in order to identify one or more data elements, within the copy of the content, that are potentially anomalous based on the criteria specified in the criteria data, wherein one of the one or more analysis operations involves determining whether the particular value within the copy of the content satisfies the condition; and c) signaling a notification after identifying that the one or more data elements are potentially anomalous. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70)
-
Specification