Reference is made to the following patents and patent applications, owned by assignee, the disclosures of which are hereby incorporated by reference:
U.S. Pat. Nos. 7,555,482 and 7,606,801;
U.S. Published Patent Application Nos.: 2007/0244899, 2008/0271157, 2009/0100058, 2009/0119298; 2009/0265780; 2011/0010758; 2011/0060916; 2011/0061093, 2011/0061111, 2011/0184989, 2011/0296490 and 2012/0054283; and
U.S. patent application Ser. Nos. 13/106,023; 13/159,903; and 13/303,826.
The present invention relates generally to enterprise level data element review systems and methodologies.
The following publications are believed to represent the current state of the art:
U.S. Pat. Nos. 7,555,482 and 7,606,801; and
U.S. Published Patent Application Nos.: 2011/0060916, 2011/0061111 and 2011/0296490.
The present invention seeks to provide enterprise level data element review systems and methodologies.
There is thus provided in accordance with a preferred embodiment of the present invention an enterprise level data element review system including a data access event collection subsystem operative to collect data access event notifications relating to ones of a multiplicity of data elements, a data element metadata modification subassembly receiving an output from the data access event collection subsystem and providing a script indicating which data elements have had a metadata modification over a given period of time, and a data element dancer operative to collect at least one of metadata and access permissions for a selected plurality of data elements which is substantially less than the multiplicity of data elements and is selected on the basis of the script.
There is also provided in accordance with another preferred embodiment of the present invention an enterprise level data element review system including a data access event collection subsystem operative to collect data access event notifications relating to ones of a multiplicity of data elements, a data element modified metadata collector which is operative to collect at least one of metadata and access permissions for a plurality of data elements which is substantially less than the multiplicity of data elements, and a data element crawler operative to crawl over the multiplicity of data elements thereby to collect at least one of metadata and access permissions for the multiplicity of data elements.
There is also provided in accordance with another preferred embodiment of the present invention an enterprise level data element review system including a data access event collection failure monitoring subsystem operative to ascertain failure to collect data access events and to provide a failure notification, and a data element crawler operative in response to receipt of the failure notification to crawl over the multiplicity of data elements thereby to collect at least one of metadata and access permissions for the multiplicity of data elements.
There is also provided in accordance with another preferred embodiment of the present invention a method for enterprise level data element review including collecting data access event notifications relating to ones of a multiplicity of data elements, providing a script indicating which data elements have had a metadata modification over a given period of time, and collecting at least one of metadata and access permissions for a selected plurality of data elements which is substantially less than the multiplicity of data elements and is selected on the basis of the script.
There is also provided in accordance with another preferred embodiment of the present invention a method for enterprise level data element review including collecting data access event notifications relating to ones of a multiplicity of data elements collecting at least one of metadata and access permissions for a plurality of data elements which is substantially less than the multiplicity of data elements, and crawling over the multiplicity of data elements thereby to collect at least one of metadata and access permissions for the multiplicity of data elements.
There is also provided in accordance with another preferred embodiment of the present invention a method for enterprise level data element review including ascertaining failure to collect data access events, providing a failure notification, and in response to receipt of the failure notification, crawling over the multiplicity of data elements thereby to collect at least one of metadata and access permissions for the multiplicity of data elements.
The present invention will be understood and appreciated more fully from the following detailed description taken in conjunction with the drawing in which:
Reference is now made to
The system of
As shown in
As further shown in
It is a particular feature of the present invention that continuous collection of data access event notifications by the system is operative to enable efficient maintaining of a generally up-to-date collection of metadata of all data elements by periodically selectively collecting metadata only of data elements which are known to have been accessed during a particular period of time. It is appreciated that the time and computer resources needed to periodically selectively collect metadata only from data elements which are known to have been accessed during a particular period of time is substantially less than the time needed to collect metadata from all data elements.
This particular feature is further illustrated in
Contrarily, as illustrated in option B, a data element crawler 160 begins to crawl through a plurality of data elements 162 at 8:27 AM., however, as crawler 160 crawls through data elements 162, he lands on every one of data elements 162, thereby completing to crawl over data elements 162 at 8:47 AM., significantly later than data element dancer 150.
It is appreciated that the system also comprises a data access event collection failure monitoring subsystem operative to ascertain failure to collect data access events and to provide a corresponding failure notification to a data element crawler which is operative in response to receipt of the failure notification to crawl over the multiplicity of data elements stored on servers 104 and storage devices 106 and to thereby collect at least one of metadata and access permissions for the multiplicity of data elements.
Reference is now made to
As shown in option A of
Contrarily, as illustrated in option B, a second pesticide applicator 210 begins to walk through the rows of a planted field 212 at 6:00 AM., however as second pesticide applicator 210 walks through field 212 he applies pesticide to every one of the plants of field 212 regardless of whether they are infested or not, thereby completing to walk through the field at 7:15 AM, significantly later than first pesticide applicator 200.
Reference is now made to
As shown in
System 300 also includes a data access event collection failure monitoring subsystem 310 operative to ascertain failure of data access event collection subsystem 302 to collect data access events and to provide a corresponding failure notification to a data element crawler 312 which is operative in response to receipt of the failure notification to crawl over the multiplicity of data elements stored in the enterprise and to thereby collect at least one of metadata and access permissions for the multiplicity of data elements.
As shown in
As shown in
It will be appreciated by persons skilled in the art that the present invention is not limited by what has been particularly shown and described hereinabove. Rather the scope of the present invention includes both combinations and subcombinations of the various features described hereinabove as well as modifications thereof which would occur to persons skilled in the art upon reading the foregoing description and which are not in the prior art.
Number | Name | Date | Kind |
---|---|---|---|
6574630 | Augustine et al. | Jun 2003 | B1 |
6701324 | Nair et al. | Mar 2004 | B1 |
7444655 | Sardera | Oct 2008 | B2 |
7555482 | Korkus | Jun 2009 | B2 |
7596571 | Sifry | Sep 2009 | B2 |
7606801 | Faitelson et al. | Oct 2009 | B2 |
7653836 | Chatterjee et al. | Jan 2010 | B1 |
20020144142 | Shohat | Oct 2002 | A1 |
20030153991 | Visser | Aug 2003 | A1 |
20040123183 | Tripathi et al. | Jun 2004 | A1 |
20070005665 | Vaitzblit et al. | Jan 2007 | A1 |
20070244899 | Faitelson et al. | Oct 2007 | A1 |
20080115076 | Frank et al. | May 2008 | A1 |
20080172720 | Botz et al. | Jul 2008 | A1 |
20080271157 | Faitelson et al. | Oct 2008 | A1 |
20090100058 | Faitelson et al. | Apr 2009 | A1 |
20090119298 | Faitelson et al. | May 2009 | A1 |
20090150981 | Amies et al. | Jun 2009 | A1 |
20090265780 | Korkus et al. | Oct 2009 | A1 |
20100179940 | Gilder | Jul 2010 | A1 |
20100180349 | Koohgoli et al. | Jul 2010 | A1 |
20110010758 | Faitelson et al. | Jan 2011 | A1 |
20110060916 | Faitelson et al. | Mar 2011 | A1 |
20110061093 | Korkus et al. | Mar 2011 | A1 |
20110061111 | Faitelson et al. | Mar 2011 | A1 |
20110184989 | Faitelson et al. | Jul 2011 | A1 |
20110296490 | Faitelson et al. | Dec 2011 | A1 |
20120054283 | Korkus et al. | Mar 2012 | A1 |
20120084595 | Dutch | Apr 2012 | A1 |
20120221550 | Korkus et al. | Aug 2012 | A1 |
20130227352 | Kumarasamy et al. | Aug 2013 | A1 |
20130246477 | Faitelson et al. | Sep 2013 | A1 |
20150227933 | Serebrennikov | Aug 2015 | A1 |
Number | Date | Country |
---|---|---|
1 248 178 | Jan 2004 | EP |
Entry |
---|
USPTO NFOA mailed Sep. 14, 2012 in connection with U.S. Appl. No. 12/861,967. |
International Search Report and Written Opinion dated Sep. 21, 2012 issued during prosecution of PCT/IL2012/000147. |
An English Translation of an Office Action dated Sep. 14, 2012, which issued during the prosecution of German Patent Application No. 11 2006 001 378.5. |
Weippl et al., Content-Based Management of Documents Access Control, 14th International Conference on Applications of Prolog (INAP), Oct. 20-22, 2001, University of Tokyo, Tokyo, Japan, pp. 78-86. |
An Office Action dated Jul. 10, 2014, which issued during the prosecution of U.S. Appl. No. 13/439,276. |
An Office Action dated Aug. 1, 2014, which issued during the prosecution of U.S. Appl. No. 14/101,883. |
USPTO NOA mailed Oct. 16, 2015 in connection with U.S. Appl. No. 13/439,276. |
European Search Report dated May 13, 2016, which issued during the prosecution of Applicant's European App No. 12873556. |
An Office Action dated Jul. 13, 2016, which issued during the prosecution of U.S. Appl. No. 14/101,883. |
U.S. Appl. No. 13/106,023, filed May 12, 2011. |
U.S. Appl. No. 13/159,903, filed Jun. 14, 2011. |
U.S. Appl. No. 13/303,826, filed Nov. 23, 2011. |
Number | Date | Country | |
---|---|---|---|
20130268562 A1 | Oct 2013 | US |