Xbridge Systems, Inc. Patent applications |
Patent application number | Title | Published |
20120226858 | METHOD FOR MANAGING HIERARCHICAL STORAGE DURING DETECTION OF SENSITIVE INFORMATION, COMPUTER READABLE STORAGE MEDIA AND SYSTEM UTILIZING SAME - Examples of methods, systems, and computer-readable media for detection of sensitive information on hierarchical storage management mainframes are described using multiple techniques. The techniques may include determining if data has been migrated from a first storage medium to a second storage medium, recalling the migrated data from a second storage medium to the first storage medium, reading the migrated data, then remigrating the data to the second storage medium. | 09-06-2012 |
20120226689 | METHOD FOR MANAGING MAINFRAME OVERHEAD DURING DETECTION OF SENSITIVE INFORMATION, COMPUTER READABLE STORAGE MEDIA AND SYSTEM UTILIZING SAME - Examples of methods, systems, and computer-readable media for managing mainframe overhead during detection of sensitive information are described using multiple techniques. The techniques may include manipulating a scan definition, defining scan parameters and limitations, utilizing user-supplied scan filters, and using a redrive operation. The redrive operation may include halting one or more analysis requests associated with scan definitions, storing a redrive position for each analysis request, and resuming the servicing of analysis requests at the redrive position for each request. | 09-06-2012 |
20120226677 | METHODS FOR DETECTING SENSITIVE INFORMATION IN MAINFRAME SYSTEMS, COMPUTER READABLE STORAGE MEDIA AND SYSTEM UTILIZING SAME - Examples of methods, systems, and computer-readable media for detection of sensitive information are described using multiple techniques. The techniques may include applying pre-defined field structure layouts to records, applying simple template structure to records as a single field, and inferring data structure by building a map of potential packed decimal locations. The resulting information may then be analyzed for detection of sensitive information. | 09-06-2012 |