CA2431491A1 - Context management with audit capability - Google Patents

Context management with audit capability Download PDF

Info

Publication number
CA2431491A1
CA2431491A1 CA002431491A CA2431491A CA2431491A1 CA 2431491 A1 CA2431491 A1 CA 2431491A1 CA 002431491 A CA002431491 A CA 002431491A CA 2431491 A CA2431491 A CA 2431491A CA 2431491 A1 CA2431491 A1 CA 2431491A1
Authority
CA
Canada
Prior art keywords
data
context
storage location
application
centralized storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002431491A
Other languages
French (fr)
Other versions
CA2431491C (en
Inventor
Robert Seliger
David Fusari
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sentillion Inc
Original Assignee
Sentillion, Inc.
Robert Seliger
David Fusari
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=22965462&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CA2431491(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Sentillion, Inc., Robert Seliger, David Fusari filed Critical Sentillion, Inc.
Publication of CA2431491A1 publication Critical patent/CA2431491A1/en
Application granted granted Critical
Publication of CA2431491C publication Critical patent/CA2431491C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6272Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H40/00ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
    • G16H40/60ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices
    • G16H40/67ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/912Applications of a database
    • Y10S707/952Malicious software
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99942Manipulating data structure, e.g. compression, compaction, compilation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99944Object-oriented database structure
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99944Object-oriented database structure
    • Y10S707/99945Object-oriented database structure processing

Abstract

A context management framework is given that provides in various embodiments , numerous advantages over previously-existing systems. In some instances, an architecture having a centralized storage location coupled to a context manager is provided for servicing and logging context events from a pluralit y of sources. This type of system uses a synchronization scheme to perform orderly storage and retrieval of data to and from the centralized storage location. In other instances, information stored in the centralized storage location or signals from the context manager are used to achieve an auditing capacity for reviewing and acting on context data events and gestures. Selective blocking or allowance of impending context gestures or data-access events is accomplished based on a rule set or lookup table containing rules or other data to make such access-control decisions. Access to private data and other security measures may thus be implemented using the teachings presente d herein. Furthermore, a communication paradigm, using a Web-proxy, which identifies ordinarily-unidentified applications to a concert manager is provided according to some embodiments of the invention.

Claims (86)

1. ~A method for auditing data-access events occurring in a context management system, the method comprising:
(A) collecting context data from a plurality of applications that use the context management system;
(B) storing data corresponding to the collected context data on a centralized storage location; and (C) extracting audit information by processing at least a subset of the data stored on the centralized storage location.
2. ~The method of claim 1, wherein the context data comprises user context data items.
3. ~The method of claim 1, wherein the context data comprises patient context data items.
4. ~The method of claim 3, further comprising:
(D) appending an application-identifying tag to a URL to yield a compound URL; and (E) exchanging the compound URL with an application such that future communications with the application allow a context manager to identify the application from the application-identifying tag.
5. ~The method of claim 1, wherein the audit data comprises application-identifying information.
6. ~The method of claim 1, wherein the data corresponding to the collected context data is the same as the context data.
7. ~The method of claim 1, wherein the context management system supports the CCOW standard set.
8. ~The method of claim 1, wherein any of the plurality of applications supports the, CCOW standard set.
9. ~The method of claim 1, wherein the context data is formatted according to the CCOW standard set.
10. ~The method of claim 1, further comprising, prior to (B), converting the context data between a first format, complying with the CCOW standard set, and a second data format.
11. The method of claim 1, wherein at least a first application executes on a first machine at the point-of-use and at least a second application executes on a second machine.
12. The method of claim 1, wherein at least a first application executes on a first machine comprising a remote server and at least a second application executes on a second machine.
13. The method of claim 1, wherein at least two applications execute on a same machine.
14. The method of claim 1, wherein a first application and a second application are each separate instances of the same application executing simultaneously.
15. The method of claim 1, wherein a first application and a second application are two different applications executing simultaneously.
16. The method of claim 1, wherein the processing in (C) comprises querying the data stored in the centralized storage location.
17. The method of claim 1, wherein the method is performed by software executing on a machine coupled to the centralized storage location over a network.
18. The method of claim 1, wherein the method is performed by software executing on a machine housing the centralized storage location.
19. The method of claim 1, wherein (B) comprises:
(i) storing the context data onto an intermediate collection platform, disposed between the context management system and the centralized storage location;
and (ii) sending the context data from the intermediate collection platform to the centralized storage location.
20. The method of claim 19, wherein the intermediate collection platform comprises a message queue.
21. The method of claim 19, wherein the intermediate collection platform comprises a storage buffer.
22. The method of claim 1, further comprising, following (C):
(D) based on the extracted audit information, determining whether a data access event is authorized under a set of access control rules.
23. The method of claim 22, further comprising, following (D):
(E) preventing execution of the data access event if the data access event is not authorized.
24. The method of claim 22, further comprising, following (D):
(E) sending a message to a monitor, indicating an attempt to execute the data access event.
25. The method of claim 24, wherein the monitor is at least one of an electronic mail server, a telephony server, a paging server, a portable communicator, an alarm device and a human operator.
26. The method of claim 22, wherein the set of access control rules is accessible to the context management system.
27. The method of claim 1, wherein the method is performed by software, execution of which is not subject to preemption by a user.
28. The method of claim 1, wherein the centralized centralized storage location is a database.
29. The method of claim 1, further comprising:
(D) passing the context data between a first application and a second application using a context manager.
30. The method of claim 1, further comprising:
(D) collecting active-application data indicative of which of the plurality of applications is in immediate use by a user.
31. The method of claim 1, further comprising, prior to (C):
(D) granting an authorized auditor access to the centralized storage location.
32. The method of claim 1, further comprising, prior to (C):
(D) collecting point-of use data identifying a point-of-use machine.
33. The method of claim 1, further comprising:
(D) evaluating the audit data to make an assessment of compliance with a set of regulations.
34. The method of claim 33, wherein the set of regulations corresponds to the HIPAA.
35. The method of claim 1, wherein (B) comprises storing of the context data according to a synchronization scheme that combines into the centralized storage location context data from at least two sources.
36. A method for storing context data, from a plurality of sources in a context management system, onto a centralized storage location, comprising:
(A) receiving context data from the plurality of sources;
(B) synchronizing the context data using a context manager; and (C) storing the context data in the centralized storage location;
wherein (C) is performed according to a synchronization scheme, that includes context data from at least two sources.
37. The method of claim 36, wherein the centralized storage location is accessed over a network.
38. The method of claim 36, further comprising, prior to (C):
(D) storing the context data on a plurality of intermediate clustered storage locations sharing a centralized index.
39. The method of claim 36, wherein the synchronization scheme is chronological.
40. The method of claim 36, wherein the synchronization scheme is not application-vendor-specific.
41. The method of claim 36, further comprising:
(D) converting the context data from a first data format to a second data format.
42. A method for controlling access to a stored data object, comprising:
determining whether a data-access event is authorized wider a predetermined rule, wherein a context manager is operable to allow or deny execution of said data-access event based on (i) context data, corresponding to the data-access event, and (ii) the predetermined rule.
43. The method of claim 42, further comprising determining whether the data-access event is authorized based on determining whether a context gesture corresponding to the data-access event is authorized.
44. The method of claim 42, wherein the context manager is operable to allow or deny execution of the data-access event.
45. The method of claim 42, further comprising: storing a record of the data-access event on a centralized storage location coupled to the context manager.
46. A method for assessing compliance with the HIPAA, in a context management system, the method comprising:
(A) collecting context data from a plurality of applications that use the context management system;
(B) storing data corresponding to the collected context data on a centralized storage location; and (C) extracting audit information by processing at least a subset of the data stored on the centralized storage location, the audit information suitable for making an assessment of compliance with a provision of the HIPAA.
47. The method of claim 46, wherein any of the plurality of applications supports the CCOW standard set.
48. The method of claim 46, wherein the plurality of applications exchange context data through a context manager operating in a healthcare facility and the context data relates to patient records.
49. A method for auditing data access events in a data processing system, comprising:
(A) transferring context information from a first software application executing in the data processing system to a second software application executing in the data processing system;
(B) storing the context data in a centralized storage location; and (C) extracting from the centralized storage location information indicative of data access events occurring in the data processing system.
50. A data processing system for auditing data access events in a context management framework, comprising:
a plurality of software applications executing in the data processing system;
a context manager coupled to the software applications that manages context data exchanges between the software applications;
a centralized storage location, coupled to the context manager, that stores a central record of the context data exchanges; and an auditor, coupled to the centralized storage location, that retrieves information from the centralized storage location indicative of data access events occurring in the data processing system.
51. The system of claim 50, further comprising a network that connects the context manager to the centralized storage location.
52. The system of claim 50, further comprising a machine that hosts both the context manager and the centralized storage location.
53. The system of claim 50, further comprising a first machine that executes a first software application and a second machine that executes a second software application.
54. The system of claim 53, wherein the first machine is a local point-of-access machine and the second machine is coupled to the first machine over a network.
55. The system of claim 53, wherein the first machine is a remote server and the second machine is coupled to the first machine over a network.
56. The system of claim 50, wherein the software applications comply with the CCOW standard set.
57. The system of claim 50, further comprising a data formatter, arranged to convert data passing between the context manager and the centralized storage location between a first format, supported by the CCOW standard set, and a second format.
58. The system of claim 50, further comprising communication signals carrying context data.~
59. The system of claim 50, further comprising a message dispatcher that sends a message to a monitor based on an output from the auditor.
60. The system of claim 59, wherein the monitor comprises at least one of: an electronic mail server, a telephony server, a paging server, a portable communicator, an alarm device and a human operator.
61. The system of claim 50, further comprising an authorizer that determines whether a data access event is authorized.
62. The system of claim 61, further comprising an access controller that controls data-access events responsive to an output from the authorizer.
63. The system of claim 50, wherein the centralized storage location comprises a database.
64. The system of claim 50, further comprising a plurality of clustered storage locations sharing a common index, the clustered storage locations holding data used by the context manager.
65. The system of claim 50, further comprising an intermediate collection platform disposed between the context manager and the centralized storage location.
66. The system of claim 65, wherein the intermediate collection platform comprises a message queue.
67. The system of claim 65, wherein the intermediate collection platform comprises a storage buffer.
68. The system of claim 50, further comprising means for blocking execution of a data-access event on a machine coupled to the system.
69. The system of claim 50, further comprising a Web-proxy that converts communications between a first, World Wide Web-based, format and a second format.
70. The system of claim 69, wherein the second format is COM-based.
71. The system of claim 69, further comprising a Web interface coupled between the context manager and the Web-proxy.
72. A machine-readable medium having thereon instructions, which when executed:
(A) collect context data from a plurality of applications that use a context management system;
(B) store data corresponding to the collected context data on a centralized storage location; and (C) extract audit information by processing at least a subset of the data stored on the centralized storage location.
73. The medium of claim 72, wherein any of the plurality of applications supports the CCOW standard set.
74. The medium of claim 72, further having instructions, which when executed:
(D) convert context data from a first data format to a second data format.
75. The medium of claim 74, wherein any of the first and second data formats is according to the CCOW standard set.
76. The medium of claim 72, wherein the centralized storage location comprises a database.
77. The medium of claim 72, wherein (B) comprises sending data over a network coupling the context manager and the centralized storage location.
78. The medium of claim 72, further having instructions, which when executed:
(D) couple application-identification information to a URL being delivered through the context manager.
79. The medium of claim 72, further having instructions, which when executed:
(D) determine whether a data-access event is authorized under a set of access control rules.
80. The medium of claim 79, further having instructions, which when executed:
(E) prevent execution of the data-access event if the data-access event is not authorized.
81. The medium of claim 79, further having instructions, which when executed:
(E) send a message to a monitor, indicating an attempt to execute the data-access event.
82. The medium of claim 81, wherein the monitor is at least one of: an electronic mail server, a telephony server, a paging server, a portable communicator, an alarm device and a human operator.
83. The medium of claim 79, wherein (D) comprises comparing context data to a rule available to the context manager.
84. The medium of claim 72, wherein execution of the instructions is performed by software, execution of which is not subject to preemption by a user.
85. A method for identifying an application in a context management environment, wherein the application is coupled to a context manager, comprising:
(A) associating the application with an information tag when the application invokes a method that carries application-identifying information;
(B) augmenting a URL, passing between the context manager and the application, with the information tag, yielding a compound URL containing the URL and the information tag;
(C) parsing a communication from the application containing the compound URL
to extract information corresponding to the information tag therefrom when the application invokes a method that does not carry application-identifying information; and (D) looking up the identity of the application corresponding to the information tag.
86. The method of claim 85, further comprising: converting communications between a first Web-based format and a second format.
CA2431491A 2000-12-11 2001-12-11 Context management with audit capability Expired - Fee Related CA2431491C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US25475300P 2000-12-11 2000-12-11
US60/254,753 2000-12-11
PCT/US2001/047877 WO2002048865A2 (en) 2000-12-11 2001-12-11 Context management with audit capability

Publications (2)

Publication Number Publication Date
CA2431491A1 true CA2431491A1 (en) 2002-06-20
CA2431491C CA2431491C (en) 2012-03-20

Family

ID=22965462

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2431491A Expired - Fee Related CA2431491C (en) 2000-12-11 2001-12-11 Context management with audit capability

Country Status (4)

Country Link
US (2) US6941313B2 (en)
EP (1) EP1350164A2 (en)
CA (1) CA2431491C (en)
WO (1) WO2002048865A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10257302B2 (en) 2008-06-27 2019-04-09 Telecom Italia S.P.A. Method and communication system for providing a context-based communication service

Families Citing this family (90)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7275220B2 (en) * 2000-12-22 2007-09-25 Epic Systems Corporation System and method for a seamless user interface for an integrated electronic health care information system
US7143437B2 (en) * 2001-01-12 2006-11-28 Siemens Medical Solutions Health Services Corporation System and user interface for managing user access to network compatible applications
US7127608B2 (en) * 2001-01-12 2006-10-24 Siemens Medical Solutions Health Services Corporation System and user interface supporting URL processing and concurrent application operation
US7043752B2 (en) * 2001-01-12 2006-05-09 Siemens Medical Solutions Health Services Corporation System and user interface supporting concurrent application initiation and interoperability
US7127609B2 (en) * 2001-01-12 2006-10-24 Siemens Medical Solutions Health Services Corporation System and user interface for adaptively processing and communicating URL data between applications
US7334031B2 (en) * 2001-01-12 2008-02-19 Siemens Medical Solutions Health Services Corporation System and user interface supporting processing and activity management for concurrently operating applications
US7103666B2 (en) * 2001-01-12 2006-09-05 Siemens Medical Solutions Health Services Corporation System and user interface supporting concurrent application operation and interoperability
US20050256863A1 (en) * 2001-07-31 2005-11-17 Crivella Arthur R Context management system
EP1512266A1 (en) * 2002-06-11 2005-03-09 Siemens Medical Solutions Health Services Corporation System and method for supporting concurrent applications interoperability
FR2841416B1 (en) * 2002-06-20 2005-01-28 Cegetel Groupe METHOD FOR MANAGING CONTEXT INFORMATION BY INTERMEDIATE SERVER
US7689902B1 (en) 2002-10-30 2010-03-30 Siemens Product Lifecycle Management Software Inc. Unified management of contextual information for a user interaction in an HTML interface
US20060069726A1 (en) * 2002-12-11 2006-03-30 Leader Technologies, Inc. Hospitality environment communications architecture
US7925246B2 (en) * 2002-12-11 2011-04-12 Leader Technologies, Inc. Radio/telephony interoperability system
US8195714B2 (en) * 2002-12-11 2012-06-05 Leaper Technologies, Inc. Context instantiated application protocol
US20040122791A1 (en) * 2002-12-19 2004-06-24 Sea Brian S Method and system for automated source code formatting
US9781154B1 (en) 2003-04-01 2017-10-03 Oracle International Corporation Systems and methods for supporting information security and sub-system operational protocol conformance
US10063523B2 (en) 2005-09-14 2018-08-28 Oracle International Corporation Crafted identities
US10275723B2 (en) 2005-09-14 2019-04-30 Oracle International Corporation Policy enforcement via attestations
US20040250125A1 (en) * 2003-05-22 2004-12-09 International Business Machines Corporation Security context maintenance within a distributed environment
US7392203B2 (en) * 2003-07-18 2008-06-24 Fortrex Technologies, Inc. Vendor security management system
EP1538506A3 (en) * 2003-12-05 2005-07-13 Quadrat Security system based on rules and selection criteria
WO2005064458A1 (en) * 2003-12-23 2005-07-14 Sentillion, Inc. Methods and apparatus for externally controlling a software application to create new application behavior
US20060064327A1 (en) * 2004-08-19 2006-03-23 Simon Jeffrey A Global synchronization technology
US20060069714A1 (en) * 2004-09-08 2006-03-30 Blount Marion L System enhancement using client context information
WO2006036991A2 (en) * 2004-09-24 2006-04-06 Encomia, L.P. A method and system for building audit rule sets for electronic auditing of documents
US8099296B2 (en) 2004-10-01 2012-01-17 General Electric Company System and method for rules-based context management in a medical environment
US7647328B2 (en) 2004-10-08 2010-01-12 Sentillion, Inc. Method and apparatus for processing a context change request in a CCOW environment
US20060111936A1 (en) * 2004-11-23 2006-05-25 General Electric Company Container system and method for hosting healthcare applications and componentized archiecture
US7501995B2 (en) * 2004-11-24 2009-03-10 General Electric Company System and method for presentation of enterprise, clinical, and decision support information utilizing eye tracking navigation
CA2642080A1 (en) * 2005-02-11 2006-08-17 Hipaat Inc. System and method for privacy managemen
GB2428317A (en) * 2005-07-13 2007-01-24 Hewlett Packard Development Co Data collation system
GB2428318A (en) * 2005-07-13 2007-01-24 Hewlett Packard Development Co Auditing networked devices
US20070033196A1 (en) * 2005-08-02 2007-02-08 Sap Ag Service directory
WO2007021823A2 (en) * 2005-08-09 2007-02-22 Tripwire, Inc. Information technology governance and controls methods and apparatuses
US10318894B2 (en) 2005-08-16 2019-06-11 Tripwire, Inc. Conformance authority reconciliation
US7752178B2 (en) * 2005-08-30 2010-07-06 Mckesson Information Solutions Llc Method to indicate context synchronization of applications on a computer desktop
EP1934849A1 (en) 2005-10-06 2008-06-25 General Electric Company System and method for rules-based context management in a medical environment
US7912933B2 (en) * 2005-11-29 2011-03-22 Microsoft Corporation Tags for management systems
US7617190B2 (en) * 2005-11-29 2009-11-10 Microsoft Corporation Data feeds for management systems
US8725533B2 (en) * 2006-03-09 2014-05-13 International Business Machines Corporation Policy-driven relocation of electronic healthcare records in a network environment
US8024770B2 (en) * 2006-06-21 2011-09-20 Microsoft Corporation Techniques for managing security contexts
US8176467B2 (en) * 2006-07-25 2012-05-08 Harris Corporation Computer program generation system and method thereof
US20080040162A1 (en) * 2006-08-08 2008-02-14 Siemens Medical Solutions Usa, Inc. System for Processing and Testing of Electronic Forms and Associated Templates
US7962899B2 (en) 2006-12-01 2011-06-14 Harris Corporation System for monitoring a target application and method thereof
US20080172669A1 (en) * 2007-01-12 2008-07-17 Carefx Corporation System capable of executing workflows on target applications and method thereof
CA2578390A1 (en) * 2007-01-12 2008-07-12 Truecontext Corporation Method and system for managing mobile applications
US20080228529A1 (en) * 2007-03-16 2008-09-18 Siemens Medical Solutions Usa, Inc. Context Adaptive Patient Medical Data Access and Viewing System
US8327456B2 (en) * 2007-04-13 2012-12-04 Microsoft Corporation Multiple entity authorization model
US8244761B1 (en) 2007-10-18 2012-08-14 United Services Automobile Association (Usaa) Systems and methods for restricting access to internal data of an organization by external entity
US20090106155A1 (en) * 2007-10-19 2009-04-23 Castellanos Marcos System and Method for Archival of Electronic and Tangible Records
US9171344B2 (en) 2007-10-30 2015-10-27 Onemednet Corporation Methods, systems, and devices for managing medical images and records
US9760677B2 (en) 2009-04-29 2017-09-12 Onemednet Corporation Methods, systems, and devices for managing medical images and records
US8065166B2 (en) 2007-10-30 2011-11-22 Onemednet Corporation Methods, systems, and devices for managing medical images and records
US20090151957A1 (en) * 2007-12-12 2009-06-18 Edgar Van Sickle Zonal Isolation of Telescoping Perforation Apparatus with Memory Based Material
US9098290B2 (en) * 2008-01-30 2015-08-04 Intuit Inc. Method and apparatus for facilitating diagnostic logging for software components
US20090217340A1 (en) * 2008-02-21 2009-08-27 General Electric Company Methods and systems for clinical context management via context injection into components and data
US8914341B2 (en) 2008-07-03 2014-12-16 Tripwire, Inc. Method and apparatus for continuous compliance assessment
US8543713B2 (en) * 2008-08-19 2013-09-24 Apple Inc. Computing environment arranged to support predetermined URL patterns
US8793339B2 (en) * 2008-08-29 2014-07-29 Red Hat, Inc. Facilitating client server interaction
US8793398B2 (en) * 2008-08-29 2014-07-29 Red Hat, Inc. Facilitating client server interaction
US20110029592A1 (en) * 2009-07-28 2011-02-03 Galen Heathcare Solutions Inc. Computerized method of organizing and distributing electronic healthcare record data
US8528066B2 (en) * 2009-08-25 2013-09-03 Microsoft Corporation Methods and apparatus for enabling context sharing
US8959192B1 (en) 2009-12-15 2015-02-17 Emc Corporation User-context management
US20110209197A1 (en) * 2010-02-23 2011-08-25 Donna Sardanopoli Web-based audit system and related audit tool
CA2800163A1 (en) * 2010-05-21 2011-11-24 Vaultive Ltd. System and method for controlling and monitoring access to data processing applications
US8789132B2 (en) 2010-06-07 2014-07-22 Oracle International Corporation Enterprise model for provisioning fine-grained access control
US9704207B2 (en) 2011-02-25 2017-07-11 International Business Machines Corporation Administering medical digital images in a distributed medical digital image computing environment with medical image caching
US9836485B2 (en) 2011-02-25 2017-12-05 International Business Machines Corporation Auditing database access in a distributed medical computing environment
US8949427B2 (en) 2011-02-25 2015-02-03 International Business Machines Corporation Administering medical digital images with intelligent analytic execution of workflows
US9779376B2 (en) 2011-07-13 2017-10-03 International Business Machines Corporation Dynamically allocating business workflows
US8914247B2 (en) 2011-08-01 2014-12-16 General Electric Company Systems and methods to monitor the operation of a power generation system
US9104985B2 (en) 2011-08-17 2015-08-11 International Business Machines Corporation Processing system using metadata for administering a business transaction
US8935804B1 (en) 2011-12-15 2015-01-13 United Services Automobile Association (Usaa) Rules-based data access systems and methods
US9235693B2 (en) 2012-12-06 2016-01-12 Doat Media Ltd. System and methods thereof for tracking and preventing execution of restricted applications
USD735225S1 (en) 2013-01-03 2015-07-28 Par8O, Inc. Display screen of a computing device with graphical user interface
EP3087504A4 (en) * 2013-12-23 2017-05-31 Intel Corporation Contextual contacts for html5
CN104811419B (en) * 2014-01-24 2019-05-03 腾讯科技(深圳)有限公司 The method and server handled online game information
PL3189463T3 (en) * 2014-07-29 2021-06-28 Aztrix Nv Privacy by design database and methods operating thereon
CN104317843B (en) * 2014-10-11 2017-08-25 上海瀚之友信息技术服务有限公司 A kind of data syn-chronization ETL system
US10684866B2 (en) 2015-02-17 2020-06-16 Amazon Technologies, Inc. Context sensitive framework for providing data from relevant applications
US9489247B2 (en) * 2015-02-17 2016-11-08 Amazon Technologies, Inc. Context sensitive framework for providing data from relevant applications
US9740467B2 (en) 2015-02-17 2017-08-22 Amazon Technologies, Inc. Context sensitive framework for providing data from relevant applications
US11450415B1 (en) 2015-04-17 2022-09-20 Medable Inc. Methods and systems for health insurance portability and accountability act application compliance
US10142353B2 (en) 2015-06-05 2018-11-27 Cisco Technology, Inc. System for monitoring and managing datacenters
US10536357B2 (en) 2015-06-05 2020-01-14 Cisco Technology, Inc. Late data detection in data center
US10754968B2 (en) * 2016-06-10 2020-08-25 Digital 14 Llc Peer-to-peer security protocol apparatus, computer program, and method
US11283840B2 (en) * 2018-06-20 2022-03-22 Tugboat Logic, Inc. Usage-tracking of information security (InfoSec) entities for security assurance
US11425160B2 (en) 2018-06-20 2022-08-23 OneTrust, LLC Automated risk assessment module with real-time compliance monitoring
US10642715B1 (en) * 2019-02-21 2020-05-05 Cyberark Software Ltd. Dynamic authorization of requested actions using adaptive context-based matching
KR20210055387A (en) * 2019-11-07 2021-05-17 삼성전자주식회사 Context based application providing server and controlling method thereof

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0569605A1 (en) 1992-05-06 1993-11-18 International Business Machines Corporation Method for controlling the access of multiple processors to shared data
US5524238A (en) * 1994-03-23 1996-06-04 Breakout I/O Corporation User specific intelligent interface which intercepts and either replaces or passes commands to a data identity and the field accessed
US5878258A (en) * 1996-05-06 1999-03-02 Merrill Lynch, Pierce, Fenner & Smith Seamless application interface manager
US6401138B1 (en) * 1996-10-28 2002-06-04 Koninklijke Philips Electronics N.V. Interface for patient context sharing and application switching
US6134552A (en) * 1997-10-07 2000-10-17 Sap Aktiengesellschaft Knowledge provider with logical hyperlinks
US6691118B1 (en) * 1997-10-31 2004-02-10 Oracle International Corporation Context management system for modular software architecture
US6397253B1 (en) * 1998-10-06 2002-05-28 Bull Hn Information Systems Inc. Method and system for providing high performance Web browser and server communications
US6560655B1 (en) * 1999-06-22 2003-05-06 Microsoft Corporation Synchronization manager for standardized synchronization of separate programs

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10257302B2 (en) 2008-06-27 2019-04-09 Telecom Italia S.P.A. Method and communication system for providing a context-based communication service

Also Published As

Publication number Publication date
WO2002048865A2 (en) 2002-06-20
WO2002048865A3 (en) 2003-04-24
US20050165790A1 (en) 2005-07-28
US6941313B2 (en) 2005-09-06
US7483908B2 (en) 2009-01-27
US20020107875A1 (en) 2002-08-08
CA2431491C (en) 2012-03-20
EP1350164A2 (en) 2003-10-08

Similar Documents

Publication Publication Date Title
CA2431491A1 (en) Context management with audit capability
CN111680199A (en) File management system and operation process
CN101853287B (en) Data compression quick retrieval file system and method thereof
US20090299830A1 (en) Data analysis and flow control system
CN108763957A (en) A kind of safety auditing system of database, method and server
US20180157851A1 (en) Systems and methods for authentication of access based on multi-data source information
CN111125042A (en) Method and device for determining risk operation event
CN101632076A (en) Realtime unification management information data conversion and monitoring apparatus and method for thereof
CN107766480A (en) A kind of general file information system
CN107770030B (en) Stage equipment control system, control method and control device based on VPN technology
JP5752932B2 (en) Device information management system
JP4479431B2 (en) Information life cycle management system and data arrangement determination method thereof
CN112448972B (en) Data exchange and sharing platform
JP4676329B2 (en) Service providing system, interactive display apparatus, and service providing method
WO2022059826A1 (en) Digital twin environment-based convergence-type smart-iot connected middleware device, and method for providing same
US20030158859A1 (en) System and method for project log storage and retrieval
CN113379384A (en) Medical event big data platform
CN102456045A (en) Database cluster encrypting method and system
CN112464071A (en) Management system based on big data platform data sharing
US20030014427A1 (en) System for recording process information of a plurality of systems
CN113282431B (en) Abnormal data processing method and device, storage medium and electronic equipment
CN107612721B (en) Management system and method of operation and maintenance data, convergence server and processing server
CN113824592B (en) Quantum network management system
CN102195780A (en) Electronic key system
JP2001312527A (en) Information management system and information recording medium

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20141211