Detecting logical relationships based on structured query statements

    公开(公告)号:US10324932B2

    公开(公告)日:2019-06-18

    申请号:US15055672

    申请日:2016-02-29

    摘要: An example computer-implemented method includes receiving, via a processor, a plurality of structured query statements associated with an application and a database. The method includes detecting, via the processor, a logical relationship between at least two of the plurality of structured query statements based on a common source, a predetermined threshold time, a common transaction. The method includes generating, via the processor, a model based on the detected logical relationship. The method further includes receiving, via the processor, a request to modify the database. The method also further includes modifying, via the processor, the database in response to detecting that a predetermined threshold probability of application functionality impairment is not exceeded.

    GENERATING FALSE DATA FOR SUSPICIOUS USERS
    33.
    发明申请

    公开(公告)号:US20190166159A1

    公开(公告)日:2019-05-30

    申请号:US15825543

    申请日:2017-11-29

    IPC分类号: H04L29/06 G06F15/18

    摘要: A method, computer program product and system for generating false data for suspicious users. A suspicious user is identified. Actions of the user are then tracked. The user attempting to access sensitive information is detected. Relevant false sensitive information corresponding to the sensitive information is then detected. The relevant false sensitive information is then mapped to the sensitive information. The relevant false sensitive information is provided to the suspicious user. In response to user input, at least one command is executed, where the at least one command includes the relevant false sensitive information and not the sensitive information.

    DYNAMICALLY PROVISIONING VIRTUAL MACHINES
    34.
    发明申请

    公开(公告)号:US20190080101A1

    公开(公告)日:2019-03-14

    申请号:US16190191

    申请日:2018-11-14

    摘要: Embodiments of the present invention disclose methods and systems which receive a user credential corresponding to a user, a task to be performed by the user, a security policy including a user role, and sensitive information. These methods and systems dynamically provision virtual machines including un-redacted information from received sensitive information. Furthermore, a set of tools process the redacted information, based on the user credential, the task to be performed, and the security policy.

    MANAGING ACCESS TO DOCUMENTS WITH A FILE MONITOR

    公开(公告)号:US20190034648A1

    公开(公告)日:2019-01-31

    申请号:US15856455

    申请日:2017-12-28

    IPC分类号: G06F21/60 G06F21/55 G06F21/62

    摘要: Disclosed herein is a system and method that can retrieve, via a file monitor, a file and policy data from a case management system or a content management system, wherein the file and the policy data are retrieved in response to detecting a user request for the file. A processor can also modify, via the file monitor, access to the file based on the policy data, and intercept a plurality of document management instructions executed with the file. The processor can also detect at least one of the document management instructions is a malicious action, wherein the malicious action is detected based on the policy data, wherein the policy data is updated in response to detecting each of the document management instructions. Additionally, the processor can execute a policy instruction to prevent execution of the at least one document management instruction.

    Detecting logical relationships based on structured query statements

    公开(公告)号:US10169417B2

    公开(公告)日:2019-01-01

    申请号:US15995478

    申请日:2018-06-01

    IPC分类号: G06F17/30

    摘要: An example computer-implemented method includes receiving, via a processor, a plurality of structured query statements associated with an application and a database. The method includes detecting, via the processor, a logical relationship between at least two of the plurality of structured query statements based on a common source, a predetermined threshold time, a common transaction. The method includes generating, via the processor, a model based on the detected logical relationship. The method further includes receiving, via the processor, a request to modify the database. The method also further includes modifying, via the processor, the database in response to detecting that a predetermined threshold probability of application functionality impairment is not exceeded.

    Detecting logical relationships based on structured query statements

    公开(公告)号:US10169416B2

    公开(公告)日:2019-01-01

    申请号:US15995335

    申请日:2018-06-01

    IPC分类号: G06F17/30

    摘要: An example computer-implemented method includes receiving, via a processor, a plurality of structured query statements associated with an application and a database. The method includes detecting, via the processor, a logical relationship between at least two of the plurality of structured query statements based on a common source, a predetermined threshold time, a common transaction. The method includes generating, via the processor, a model based on the detected logical relationship. The method further includes receiving, via the processor, a request to modify the database. The method also further includes modifying, via the processor, the database in response to detecting that a predetermined threshold probability of application functionality impairment is not exceeded.

    UPDATING MONITORING SYSTEMS USING MERGED DATA POLICIES

    公开(公告)号:US20180330108A1

    公开(公告)日:2018-11-15

    申请号:US15839899

    申请日:2017-12-13

    摘要: An example system includes a processor to monitor a data asset and associated access policies to be synchronized to detect a trigger. The processor is to also request and receive data lineage information on the monitored data asset in response to detecting the trigger. The processor is to further detect a source system and a target system based on the data lineage information. The processor is also to query an access policy of the source system and an access policy of the target system. The processor is to merge the access policy of the source system and the access policy of the target system based on a predetermined merger configuration to generate a merged access policy. The processor is to update a monitoring system based on the merged access policy.

    Detecting logical relationships based on structured query statements

    公开(公告)号:US10013458B2

    公开(公告)日:2018-07-03

    申请号:US15654969

    申请日:2017-07-20

    IPC分类号: G06F17/30

    摘要: An example computer-implemented method includes receiving, via a processor, a plurality of structured query statements associated with an application and a database. The method includes detecting, via the processor, a logical relationship between at least two of the plurality of structured query statements based on a common source, a predetermined threshold time, a common transaction. The method includes generating, via the processor, a model based on the detected logical relationship. The method further includes receiving, via the processor, a request to modify the database. The method also further includes modifying, via the processor, the database in response to detecting that a predetermined threshold probability of application functionality impairment is not exceeded.