IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0495090
(2009-06-30)
|
등록번호 |
US-8925034
(2014-12-30)
|
발명자
/ 주소 |
- Tsaur, Ynn-Pyng “Anker”
- Fletcher, Douglas J.
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
3 인용 특허 :
32 |
초록
▼
Computer systems and methods for protecting data. A computer system includes a processor, a policy generator, and resources. Each resource has associated data. The processor accesses a data protection requirements specification (DPRS). The DPRS uses a common, non-application specific schema to repre
Computer systems and methods for protecting data. A computer system includes a processor, a policy generator, and resources. Each resource has associated data. The processor accesses a data protection requirements specification (DPRS). The DPRS uses a common, non-application specific schema to represent first and second schema for expressing data protection policies. The processor triggers the policy generator to generate a first data protection policy for protecting a resource. The processor uses the first data protection policy to protect data associated with the resource. To generate the first data protection policy, the policy generator scans the DPRS and identifies elements of the DPRS. The elements of the DPRS are pre-defined in the common schema. The policy generator translates values of the elements to corresponding attributes of the first data protection policy expressed in the first schema. A value of a first element in the common schema corresponds to the resource to be protected.
대표청구항
▼
1. A method of protecting data in a computer system using a common schema, the method comprising: performing by a processor: extracting attributes from a first data protection policy corresponding to a first data protection product for protecting data associated with at least one resource, wherein t
1. A method of protecting data in a computer system using a common schema, the method comprising: performing by a processor: extracting attributes from a first data protection policy corresponding to a first data protection product for protecting data associated with at least one resource, wherein the attributes are expressed in a first application specific schema;mapping the extracted attributes to values of elements pre-defined by a common, non-application specific schema for representing a plurality of application specific schemas;combining the values of elements in a document using the common, non-application specific schema;generating from the document a second data protection policy corresponding to a second data protection product for protecting the at least one resource, wherein attributes of the second data protection policy are expressed in the second application specific schema, wherein the second data protection product is different from the first data protection product; andusing the second data protection policy migrated from the first data protection policy to protect data associated with the at least one resource;wherein generating the second data protection policy comprises a policy generator executed by the processor: scanning the document;identifying one or more elements of the document; andtranslating values of the one or more elements to corresponding one or more attributes of the second data protection policy expressed in the second schema;wherein a value of a first element in the common schema corresponds to the at least one resource to be protected. 2. The method of claim 1, wherein the second data protection policy includes one or more tasks to be performed to protect the at least one resource, each task having at least one of the one or more attributes. 3. The method of claim 2, wherein the one or more attributes are taken from a group of attributes including at least one of: storing data used to protect the at least one resource on a particular type of medium;executing one or more tasks at a particular frequency; andretaining data used to protect the at least one resource for a particular length of time. 4. The method of claim 2, wherein at least one of the one or more elements specifies a frequency level, and wherein the method further comprises including in the second data protection policy, a frequency of execution of data protection tasks for the at least one resource corresponding to the frequency level. 5. The method of claim 2, wherein at least one of the one or more elements specifies a retention level, and wherein the method further comprises including in the second data protection policy, a time period during which a dataset that is used to protect the at least one resource is retained that corresponds to the retention level. 6. The method of claim 1, further comprising: receiving requirements for protecting data associated with the at least one resource as user input data; andconverting the user input data into the common schema using one or more elements pre-defined by the common schema. 7. The method of claim 1, wherein the document utilizes the format of a data protection requirements specification (DPRS). 8. A computer system comprising: at least one processor;a policy generator component executable by the processor; andat least one resource, each resource having associated data to be protected;wherein the policy generator is executable to: extract attributes from a first data protection policy corresponding to a first data protection product for protecting data associated with at least one resource, wherein the attributes are expressed in a first application specific schema;map the extracted attributes to values of elements pre-defined by a common, non-application specific schema for representing a plurality of application specific schemas;combine the values of elements in a document using the common, non-application specific schema;generate from the document a second data protection policy corresponding to a second data protection product for protecting the at least one resource, wherein attributes of the second data protection policy are expressed in the second application specific schema, wherein the second data protection product is different from the first data protection product; anduse the second data protection policy migrated from the first data protection policy to protect data associated with the at least one resource;wherein to generate the second data protection policy, the policy generator is configured to: scan the document;identify one or more elements of the document; andtranslate values of the one or more elements to corresponding one or more attributes of the second data protection policy expressed in the second schema;wherein a value of a first element in the common schema corresponds to the at least one resource to be protected. 9. The system of claim 8, wherein the second data protection policy includes one or more tasks to be performed to protect the at least one resource, each task having at least one of the one or more attributes. 10. The system of claim 9, wherein the one or more attributes are taken from a group of attributes including at least one of: storing data used to protect the at least one resource on a particular type of medium;executing one or more tasks at a particular frequency; andretaining data used to protect the at least one resource for a particular length of time. 11. The system of claim 9, wherein at least one of the one or more elements specifies a frequency level and wherein the policy generator is further configured to include in the second data protection policy, a frequency of execution of data protection tasks for the at least one resource corresponding to the frequency level. 12. The system of claim 9, wherein at least one of the one or more elements specifies a retention level and wherein the at least one processor is further configured to include in the second data protection policy, a time period during which a dataset that is used to protect the at least one resource is retained that corresponds to the retention level. 13. The system of claim 8, wherein the policy generator is further configured to: receive requirements for protecting data associated with the at least one resource as user input data; andconvert the user input data into the DPRS using one or more elements pre-defined by the common schema. 14. The system of claim 8, wherein the document utilizes the format of a data protection requirements specification (DPRS). 15. A non-transitory computer readable storage medium storing computer instructions that are executable by a processor to: extract attributes from a first data protection policy corresponding to a first data protection product for protecting data associated with at least one resource, wherein the attributes are expressed in a first application specific schema;map the extracted attributes to values of elements pre-defined by a common, non-application specific schema for representing a plurality of application specific schemas;combine the values of elements in a document using the common, non-application specific schema;generate from the document a second data protection policy corresponding to a second data protection product for protecting the at least one resource, wherein attributes of the second data protection policy are expressed in the second application specific schema, wherein the second data protection product is different from the first data protection product; anduse the second data protection policy migrated from the first data protection policy to protect data associated with the at least one resource;wherein generating the second data protection policy comprises: scanning the document;identifying one or more elements of the document; andtranslating values of the one or more elements to corresponding one or more attributes of the second data protection policy expressed in the second schema;wherein a value of a first element in the common schema corresponds to the at least one resource to be protected. 16. The computer readable medium as recited in claim 15, wherein the second data protection policy includes one or more tasks to be performed to protect the at least one resource, each task having at least one of the one or more attributes; andwherein the one or more attributes are taken from a group of attributes including at least one of:storing data used to protect the at least one resource on a particular type of medium;executing one or more tasks at a particular frequency; andretaining data used to protect the at least one resource for a particular length of time. 17. The computer readable medium as recited in claim 15, wherein the instructions are further executable by the processor to: receive requirements for protecting data associated with the at least one resource as user input data; andconvert the user input data into the DPRS using one or more elements pre-defined by the common schema.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.