The present invention relates to data management generally and more particularly enterprise level data management.
The following patent publications and articles are believed to represent the current state of the art:
U.S. Pat. Nos. 7,031,984; 6,338,082; 6,928,439; 7,555,482; 7,606,801; 6,393,468; 5,899,991; 7,068,592 and 5,465,387.
U.S. Published Patent Application Nos. 2003/0051026; 2004/0249847; 2004/0186809; 2005/0108206; 2005/0278334; 2005/0203881; 2005/0120054; 2005/0086529; 2006/0064313; 2006/0184530; 2006/0277184; 2006/0184459 and 2007/0203872.
The present invention provides improved systems and methodologies for data management.
There is thus provided in accordance with a preferred embodiment of the present invention a system for identifying data of interest from among a multiplicity of data elements residing on multiple platforms in an enterprise, the system including background data characterization functionality characterizing the data of interest at least by at least one content characteristic thereof and at least one access metric thereof, the at least one access metric being selected from data access permissions and actual data access history and near real time data matching functionality selecting the data of interest by considering only data elements which have the at least one content characteristic thereof and the at least one access metric thereof from among the multiplicity of data elements.
Preferably, the near real time data matching functionality includes background field of search definition and searching functionality operative to define a field of search in accordance with the at least one access metric and to search within the field of search based on the at least one content characteristic.
In accordance with a preferred embodiment of the present invention the near real time data matching functionality includes background field of search definition and searching functionality operative to define a field of search in accordance with the at least one access metric multiple times and to search within the field of search multiple times, wherein the at least one access metric is different at least some of the multiple times.
Preferably, the at least one access metric is a dynamic metric which changes over time during operation of the enterprise.
In accordance with a preferred embodiment of the present invention the system also includes automatic field of search redefinition and search functionality operative to redefine the field of search in accordance with the at least one access metric multiple times and search within the field of search multiple times, wherein the at least one access metric is different at least some of the multiple times. Additionally, the automatic field of search redefinition and search functionality is operative to search only within those portions of the field of search that have been modified or added as the result of redefining the field of search in accordance with changes in the at least one access metric. Alternatively or additionally, the system also includes data element status monitoring functionality, noting the current status of data elements that have been modified, added or removed in accordance with changes in the at least one access metric.
Preferably, the searching is prioritized at least in accordance with at least one access metric related prioritization characteristic. Additionally, results of the searching are ordered at least in accordance with at least one access metric related prioritization characteristic.
In accordance with a preferred embodiment of the present invention the near real time data matching functionality includes searching functionality for searching for data elements which have the at least one content characteristic thereof and identification functionality operative separately from the searching for data elements which have the at least one content characteristic thereof, identifying data elements from among the multiplicity of data elements in accordance with the at least one access metric and combining functionality, combining results of the searching and the identifying. Additionally, the searching and the identifying are performed by separate entities.
There is also provided in accordance with another preferred embodiment of the present invention a method for identifying data of interest from among a multiplicity of data elements residing on multiple platforms in an enterprise, the method including characterizing the data of interest at least by at least one content characteristic thereof and at least one access metric thereof, the at least one access metric being selected from data access permissions and actual data access history and selecting the data of interest by considering only data elements which have the at least one content characteristic thereof and the at least one access metric thereof from among the multiplicity of data elements.
Preferably, the considering includes defining a field of search in accordance with the at least one access metric and searching within the field of search based on the at least one content characteristic.
In accordance with a preferred embodiment of the present invention the considering includes defining a field of search in accordance with the at least one access metric multiple times and searching within the field of search multiple times, wherein the at least one access metric is different at least some of the multiple times.
Preferably, the at least one access metric is a dynamic metric which changes over time during operation of the enterprise.
In accordance with a preferred embodiment of the present invention the method also includes automatically redefining the field of search in accordance with the at least one access metric multiple times and searching within the field of search multiple times, wherein the at least one access metric is different at least some of the multiple times. Additionally, the searching includes searching only within those portions of the field of search that have been modified or added as the result of redefining the field of search in accordance with changes in the at least one access metric. Alternatively or additionally, the method also includes noting the current status of data elements that have been modified, added or removed in accordance with changes in the at least one access metric.
In accordance with a preferred embodiment of the present invention the searching is prioritized at least in accordance with at least one access metric related prioritization characteristic. Additionally, results of the searching are ordered at least in accordance with at least one access metric related prioritization characteristic.
Preferably, the selecting the data of interest by considering only data elements which have the at least one content characteristic thereof and the at least one access metric thereof from among the multiplicity of data elements includes searching for data elements which have the at least one content characteristic thereof, separately from the searching for data elements which have the at least one content characteristic thereof, identifying data elements from among the multiplicity of data elements in accordance with the at least one access metric and combining results of the searching and the identifying. Additionally, the searching and the identifying are performed by separate entities.
The present invention will be understood and appreciated more fully from the following detailed description, taken in conjunction with the drawings in which:
Reference is now made to
Two essential functions are performed:
characterizing the data of interest at least by at least one content characteristic thereof and at least one access metric thereof, the at least one access metric being selected from data access permissions and actual data access history; and
selecting the data of interest by considering only data elements which have the at least one content characteristic thereof and the at least one access metric thereof from among the multiplicity of data elements.
In the example of
As illustrated pictorially at stage A in
The system and methodology of the present invention also operates in the background to crawl over subsets of all files in the enterprise and to maintain lists of files which include one or more specified item such as a text or non-text item, a string and one or more specified keywords.
Preferably, subsets of all files are selected in accordance with access permission metrics. For example, for personnel having access permission to legal department files, the subset for crawling is the legal department files.
The specified text item or items may be selected by a manager as being appropriate for each subset. Thus, for example for the subject of legal department files, keywords such as “confidential” “lawsuit” and “judgment” may be appropriate. In other contexts, strings of various types, such as sequences of numbers or non-textual characters, may be employed. The set of items may be updated from time to time by an authorized manager.
Returning to the example of
It is a particular feature of the present invention that due to the background operation of the system and methodology of the present invention whereby the history of actual access of every user to every file in the enterprise is recorded and lists of files which include specified items are maintained, the query of the IT Security Manager can be responded to in near real time. The system and methodology of the present invention achieves this near real time response by combining currently available actual access and access permissions information with preliminary search result information.
Reference is now made to
As in the example of
As illustrated pictorially at stage A in
The system and methodology of the present invention also operates in the background to crawl over subsets of all files in the enterprise and to maintain lists of files which include one or more specified items.
Preferably, subsets of all files are selected in accordance with access permission metrics. For example, for personnel having access permission to legal department files, the subset for crawling is the legal department files.
The specified items may be selected by a manager as being appropriate for each subset. Thus, for example for the subject of legal department files, keywords such as “merger” “acquisition” and “buyout” may be appropriate. The set of keywords may be updated from time to time by an authorized manager.
Returning to the example of
1. Did the person to whom the leak is attributed actually access the computer files relating to mergers and acquisitions?
2. Are the computer files relating to mergers and acquisitions available to “everyone” in the enterprise?
The IT Security Manager receives a response to his query in near real time, typically within a minute.
It is a particular feature of the present invention that due to the background operation of the system and methodology of the present invention whereby the history of actual access and access permissions of every user to every file in the enterprise is recorded and lists of files which include specified items are maintained, the query of the IT Security Manager can be responded to in near real time. The system and methodology of the present invention achieves this near real time response by combining currently available actual access and access permissions information with preliminary search result information.
On the basis of the response to his queries, the IT Security Manager immediately orders elimination of the access permission of “everyone” to the merger and acquisition files and orders that the access permission to the mergers and acquisitions files be henceforth limited to the legal department and the business development department.
Reference is now made to
Actual access of every user to every file in the enterprise is recorded and stored in a database. Access permissions of every user to every file in the enterprise are recorded and stored in a database. This functionality is embodied in a system, commercially available under the trademark DatAdvantage by an affiliate of the assignee of the present invention, Varonis Systems Inc. of New York, N.Y. and is described in U.S. Pat. No. 7,606,801 and in U.S. Published Patent Application 2009/0265780 of the present assignee, the disclosures of which are hereby incorporated by reference. Access permissions and/or actual access are together designated as access metrics and may be used to designate subsets of all of the files in the enterprise.
Crawling through files which are designated by one or more access metrics to identify files containing one or more specified items.
Upon receipt of a query, which could include a request for a report, the system combines information relating to actual access and/or access permissions with preliminary search result information, such as that provided by the crawling functionality described hereinabove, to provide a response which indicates which files which meet criteria established by access metrics specified in the query include items specified in the query.
Reference is now made to
The crawling functionality of
The system examines each file in the defined field of search for the presence of at least one item from among a collection of items stored in a item list database. Identification of files containing at least one item in the collection is stored in a preliminary search results database.
Reference is now made to
All of the files whose identification appear in the preliminary search results database are examined:
1. to ascertain which files include the selected items set forth in the query; and
2. to ascertain which files meet criteria established by the selected access metrics set forth in the query.
The foregoing two examinations may be conducted in any suitable order.
Files that both include the selected items set forth in the query and meet criteria established by the selected access metrics set forth in the query are reported in a response to the query.
It will be appreciated by persons skilled in the art that the present invention is not limited by what has been particularly shown and described hereinabove. Rather the scope of the present invention includes both combinations and sub combinations of the various features described hereinabove as well as modifications thereof which would occur to persons skilled in the art upon reading the foregoing description and which are not in the prior art.
Reference is made to U.S. Provisional Patent Application Ser. No. 61/240,726, filed Sep. 9, 2009 and entitled USE OF ACCESS METRIC IN LARGE SCALE DATA MANIPULATION, the disclosure of which is hereby incorporated by reference and priority of which is hereby claimed pursuant to 37 CFR 1.78(a) (4) and (5)(i). Reference is also made to the following patents and patent applications, owned by assignee, the disclosures of which are hereby incorporated by reference, which are believed to relate to subject matter similar to the subject matter of the present application: U.S. Pat. Nos. 7,555,482 and 7,606,801; U.S. Published Patent Application Nos. 2007/0244899, 2008/0271157, 2009/0100058, 2009/0265780 and 2009/0119298; and U.S. patent application Ser. No. 12/498,675.
Number | Name | Date | Kind |
---|---|---|---|
5465387 | Mukherjee | Nov 1995 | A |
5889952 | Hunnicutt | Mar 1999 | A |
5899991 | Karch | May 1999 | A |
5941947 | Brown | Aug 1999 | A |
6023765 | Kuhn | Feb 2000 | A |
6308173 | Glasser et al. | Oct 2001 | B1 |
6338082 | Schneider | Jan 2002 | B1 |
6393468 | McGee | May 2002 | B1 |
6675161 | Suchter | Jan 2004 | B1 |
6772350 | Belani et al. | Aug 2004 | B1 |
6928439 | Satoh | Aug 2005 | B2 |
17031984 | Kawamura et al. | Apr 2006 | |
7068592 | Duvaut et al. | Jun 2006 | B1 |
7124272 | Kennedy et al. | Oct 2006 | B1 |
7401087 | Copperman et al. | Jul 2008 | B2 |
7403925 | Schlesinger et al. | Jul 2008 | B2 |
7421740 | Fey et al. | Sep 2008 | B2 |
7478035 | Wrench et al. | Jan 2009 | B1 |
7529748 | Wen et al. | May 2009 | B2 |
7555482 | Korkus | Jun 2009 | B2 |
7606801 | Faitelson et al. | Oct 2009 | B2 |
7716240 | Lim | May 2010 | B2 |
7720858 | Dettinger et al. | May 2010 | B2 |
7882098 | Prahlad et al. | Feb 2011 | B2 |
8166071 | Korablev et al. | Apr 2012 | B1 |
8250048 | Yalamanchi et al. | Aug 2012 | B2 |
8285748 | Thomas et al. | Oct 2012 | B2 |
8296255 | Wawda | Oct 2012 | B1 |
8306999 | Gass, III et al. | Nov 2012 | B2 |
9904685 | Korkus et al. | Feb 2018 | B2 |
20030023476 | Gainey | Jan 2003 | A1 |
20030048301 | Menninger | Mar 2003 | A1 |
20030051026 | Carter et al. | Mar 2003 | A1 |
20030231207 | Huang | Dec 2003 | A1 |
20040030915 | Sameshima et al. | Feb 2004 | A1 |
20040186809 | Schlesinger et al. | Sep 2004 | A1 |
20040205342 | Roegner | Oct 2004 | A1 |
20040249847 | Wang et al. | Dec 2004 | A1 |
20040254919 | Giuseppini | Dec 2004 | A1 |
20040267729 | Swaminathan et al. | Dec 2004 | A1 |
20050065823 | Ramraj et al. | Mar 2005 | A1 |
20050086529 | Buchsbaum | Apr 2005 | A1 |
20050108206 | Lam et al. | May 2005 | A1 |
20050120054 | Shulman et al. | Jun 2005 | A1 |
20050203881 | Sakamoto et al. | Sep 2005 | A1 |
20050240457 | Connally et al. | Oct 2005 | A1 |
20050246762 | Girouard et al. | Nov 2005 | A1 |
20050278334 | Fey et al. | Dec 2005 | A1 |
20060064313 | Steinbarth et al. | Mar 2006 | A1 |
20060085788 | Amir et al. | Apr 2006 | A1 |
20060184459 | Parida | Aug 2006 | A1 |
20060184530 | Song et al. | Aug 2006 | A1 |
20060277184 | Faitelson et al. | Dec 2006 | A1 |
20070011091 | Smith | Jan 2007 | A1 |
20070033340 | Tulskie et al. | Feb 2007 | A1 |
20070061487 | Moore et al. | Mar 2007 | A1 |
20070073696 | Kanayama et al. | Mar 2007 | A1 |
20070112743 | Giampaolo et al. | May 2007 | A1 |
20070156693 | Soin et al. | Jul 2007 | A1 |
20070198608 | Prahlad et al. | Aug 2007 | A1 |
20070203872 | Flinn et al. | Aug 2007 | A1 |
20070244899 | Faitelson et al. | Oct 2007 | A1 |
20070266006 | Buss | Nov 2007 | A1 |
20070276823 | Borden et al. | Nov 2007 | A1 |
20070292855 | Chen et al. | Dec 2007 | A1 |
20080097998 | Herbach | Apr 2008 | A1 |
20080126172 | Melamed et al. | May 2008 | A1 |
20080162707 | Beck et al. | Jul 2008 | A1 |
20080172720 | Botz et al. | Jul 2008 | A1 |
20080183680 | Meynier et al. | Jul 2008 | A1 |
20080209535 | Athey et al. | Aug 2008 | A1 |
20080256619 | Neystadt et al. | Oct 2008 | A1 |
20080270462 | Thomsen | Oct 2008 | A1 |
20080271157 | Faitelson et al. | Oct 2008 | A1 |
20090031418 | Matsuda et al. | Jan 2009 | A1 |
20090043775 | Cotner et al. | Feb 2009 | A1 |
20090100058 | Faitelson et al. | Apr 2009 | A1 |
20090119298 | Faitelson et al. | May 2009 | A1 |
20090150981 | Amies et al. | Jun 2009 | A1 |
20090157570 | Pall et al. | Jun 2009 | A1 |
20090182715 | Falkenberg | Jul 2009 | A1 |
20090198892 | Alvarez et al. | Aug 2009 | A1 |
20090249446 | Jenkins et al. | Oct 2009 | A1 |
20090265780 | Korkus et al. | Oct 2009 | A1 |
20090320088 | Gill et al. | Dec 2009 | A1 |
20100023523 | Chung et al. | Jan 2010 | A1 |
20100037324 | Grant et al. | Feb 2010 | A1 |
20100100524 | Bae et al. | Apr 2010 | A1 |
20100174731 | Vermeulen et al. | Jul 2010 | A1 |
20100185650 | Topatan et al. | Jul 2010 | A1 |
20100257456 | Lieb et al. | Oct 2010 | A1 |
20100299763 | Marcus et al. | Nov 2010 | A1 |
20100319067 | Mohanty et al. | Dec 2010 | A1 |
20110017058 | Kaminsky | Jan 2011 | A1 |
20110047466 | Michelman | Feb 2011 | A1 |
20110060916 | Faitelson et al. | Mar 2011 | A1 |
20110061093 | Korkus et al. | Mar 2011 | A1 |
20110061111 | Faitelson et al. | Mar 2011 | A1 |
20120221550 | Korkus et al. | Aug 2012 | A1 |
Number | Date | Country |
---|---|---|
1588889 | Mar 2005 | CN |
1906613 | Jan 2007 | CN |
1916903 | Feb 2007 | CN |
101283357 | Oct 2008 | CN |
101692228 | Apr 2010 | CN |
1248178 | Oct 2002 | EP |
2011030324 | Mar 2011 | WO |
2011092684 | Aug 2011 | WO |
2011092685 | Aug 2011 | WO |
2011092686 | Aug 2011 | WO |
2011148376 | Dec 2011 | WO |
2011148377 | Dec 2011 | WO |
2013132476 | Sep 2013 | WO |
Entry |
---|
Sahadeb De et al; “Secure Access Control in a Multi-user Geodatabase”, available on the Internet at the URL http://www10.qiscafe.com.2005, 10 pages. |
Findutils; “GNU Project-Free Software Foundation (FSF)”, 3 pages, Nov. 2006. |
Genunix; “Writing Filesystems—VFS and Vnode Interfaces”, 5 pages, Oct. 2007. |
S.R. Kleiman; “Vnodes: An Architecture for Multiple File System Types in Sun UNIX”, USENIX Association: Summer Conference Proceedings, Atlanta 1986, 10 pages. |
Sara C. Madeira, et al; “Biclustering Algorithms for Biological Data Analysis: A Survey”, Mar. 2004; http://www.cs.princeton.edu/courses/archive/spr05/cos598E/bib/bicluster.pdf. |
Sara C. Madeira; “Clustering, Fuzzy Clustering and Biclustering: An Overview”, pp. 31-53, Jun. 27, 2003. |
Edgar Weippl, et al; “Content-based Management of Document Access Control”, 14th International Conference on Applications of Prolog (INAP), 2001. |
Extended European Search Report dated Apr. 11, 2016; Appln. No. 10815067.3. |
Extended European Search Report dated Nov. 26, 2015; Appln. No. 12870552.2. |
First Chinese Office Action dated Jun. 3, 2014, Appln. No. 201080046731.X. |
Second Chinese Office Action dated Feb. 16, 2015; Appln. No. 201080046731.X. |
Notice of Allowance from Chinese Patent Office dated Nov. 6, 2015; Appln. No. 201080046731.X. |
First Chinese Office Action dated Jul. 4, 2016; Appln. No. 201280071155.3. |
Second Chinese Office Action dated Mar. 1, 2017; Appln. No. 201280071155.3. |
Third Chinese Office Action dated Sep. 1, 2017; Appln. No. 201280071155.3. |
Fourth Chinese Office Action dated Feb. 26, 2018; Appln. No. 201280071155.3. |
Translation of German Office Action dated Sep. 14, 2012; Official File No. 11 2006 001 378.5. |
International Preliminary Report on Patentability dated Mar. 13, 2012; PCT/IL2010/000069. |
International Preliminary Report on Patentability dated Jul. 31, 2012; PCT/IL2011/000065. |
International Preliminary Report on Patentability dated Jul. 31, 2012; PCT/IL2011/000066. |
International Preliminary Report on Patentability dated Jul. 31, 2012; PCT/IL2011/000078. |
International Preliminary Report on Patentability dated Sep. 9, 2014; PCT/IL2012/000240. |
ISR and WO dated May 20, 2010; PCT/il10/00069. |
ISR and WO dated May 23, 2011; PCT/il11/00065. |
ISR and WO dated May 24, 2011; PCT/IL11/00077. |
ISR and WO dated May 25, 2011; PCT/IL11/00078. |
ISR and WO dated Jun. 14, 2011; PCT/IL11/00066. |
ISR and WO dated Oct. 1, 2012; PCT/IL2012/000240. |
ISR and WO dated Nov. 15, 2011; PCT/IL11/00408. |
U.S. Appl. No. 61/240,726, filed Sep. 9, 2009. |
USPTO Corrected NOA dated Nov. 17, 2017 in connection with U.S. Appl. No. 12/673,691. |
USPTO NFOA dated Jan. 16, 2013 in connection with U.S. Appl. No. 13/413,748. |
USPTO NFOA dated Feb. 12, 2008 in connection with U.S. Appl. No. 11/258,256. |
USPTO NFOA dated Apr. 16, 2013 in connection with U.S. Appl. No. 12/673,691. |
USPTO NFOA dated Apr. 27, 2017 in connection with U.S. Appl. No. 12/673,691. |
USPTO NFOA dated Jun. 22, 2012 in connection with U.S. Appl. No. 12/814,807. |
USPTO NFOA dated Jul. 5, 2012 in connection with U.S. Appl. No. 12/772,450. |
USPTO NFOA dated Jul. 9, 2010 in connection with U.S. Appl. No. 11/789,884. |
USPTO NFOA dated Jul. 21, 2015 in connection with U.S. Appl. No. 12/673,691. |
USPTO NFOA dated Aug. 14, 2014 in connection with U.S. Appl. No. 12/673,691. |
USPTO NFOA dated Aug. 17, 2017 in connection with U.S. Appl. No. 13/413,748. |
USPTO NFOA dated Aug. 28, 2012 in connection with U.S. Appl. No. 12/673,691. |
USPTO NFOA dated Sep. 1, 2016 in connection with U.S. Appl. No. 12/673,691. |
USPTO NFOA dated Sep. 5, 2014 in connection with U.S. Appl. No. 13/413,748. |
USPTO NFOA dated Sep. 14, 2012 in connection with U.S. Appl. No. 12/861,967. |
USPTO NFOA dated Oct. 31, 2008 in connection with U.S. Appl. No. 11/635,736. |
USPTO NFOA dated Oct. 31, 2016 in connection with U.S. Appl. No. 13/413,748. |
USPTO NFOA dated Dec. 14, 2010 in connection with U.S. Appl. No. 11/786,522. |
USPTO FOA dated Feb. 9, 2016 in connection with U.S. Appl. No. 12/673,691. |
USPTO FOA dated Feb. 14, 2013 in connection with U.S. Appl. No. 13/014,762. |
USPTO FOA dated Mar. 4, 2013 in connection with U.S. Appl. No. 12/814,807. |
USPTO FOA dated Mar. 24, 2015 in connection with U.S. Appl. No. 13/413,748. |
USPTO FOA dated Mar. 25, 2013 in connection with U.S. Appl. No. 13/303,826. |
USPTO FOA dated Apr. 7, 2015 in connection with U.S. Appl. No. 12/673,691. |
USPTO FOA dated Jul. 2, 2013 in connection with U.S. Appl. No. 13/413,748. |
USPTO FOA mailed Aug. 1, 2008 in connection with U.S. Appl. No. 11/258,256. |
USPTO FOA dated Nov. 18, 2014 in connection with U.S. Appl. No. 13/384,459. |
USPTO FOA dated Dec. 14, 2010 in connection with U.S. Appl. No. 11/789,884. |
USPTO FOA dated Dec. 18, 2013 in connection with U.S. Appl. No. 12/673,691. |
USPTO NOA dated Jul. 12, 2013 in connection with U.S. Appl. No. 12/814,807. |
USPTO NOA dated Oct. 12, 2017 in connection with U.S. Appl. No. 12/673,691. |
USPTO AA dated Jan. 7, 2014 in connection with U.S. Appl. No. 13/413,748. |
USPTO AA dated Jul. 27, 2015 in connection with U.S. Appl. No. 13/413,748. |
USPTO AA dated Jul. 27, 2016 in connection with U.S. Appl. No. 12/673,691. |
Number | Date | Country | |
---|---|---|---|
20180157672 A1 | Jun 2018 | US |
Number | Date | Country | |
---|---|---|---|
61240726 | Sep 2009 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12673691 | US | |
Child | 15847153 | US |