Patent application number | Description | Published |
20090262923 | METHOD FOR DISPATCHING SERVICE REQUESTS - Techniques for dispatching one or more services requests to one or more agents are provided. The techniques include obtaining one or more attributes of each service request, obtaining one or more attributes of each agent, obtaining feedback from each of one or more agent queues, and using the one or more attributes of each service request, the one or more attributes of each agent and the feedback from each of the one or more agent queues to determine one or more suitable agents to receive a dispatch for each of the one or more service requests. Techniques are also provided for generating a database of one or more attributes of one or more service requests and one or more attributes of one or more agents. | 10-22-2009 |
20100010790 | SYSTEM & METHOD FOR DYNAMIC STRUCTURING OF PROCESS ANNOTATIONS - A plurality of base templates are generated. Each of the base templates models a corresponding process. A plurality of instances of each of the base templates are instantiated. Each of the plurality of instances corresponds to an application of the corresponding process to a particular environment. Each of the instances of each of the base templates is annotated, based, in each case, upon observation of functioning of the instance in the particular environment. | 01-14-2010 |
20110247059 | Methods and Apparatus for Role-Based Shared Access Control to a Protected System Using Reusable User Identifiers - Methods and apparatus are provided for role-based shared access control to a protected system using reusable user identifiers while maintaining individual accountability. Role-based access control is provided for a protected system by receiving a request from an end user to access a given protected system; determining a role of the end user for the access to the given protected system; receiving a privileged reusable user identifier and password for the given protected system and role; and providing the privileged reusable user identifier and password to the given protected system on behalf of the end user. Role-based access control is also provided for a protected system by receiving a request to verify an end user requesting access to a given protected system; determining a role of the end user for the access to the given protected system; and providing a privileged reusable user identifier and password for the given protected system and role. A status of the privileged reusable user identifier and password can optionally be maintained. One or more events associated with the privileged reusable user identifier and password can be logged and investigated. | 10-06-2011 |
20130111583 | SYSTEM AND METHOD FOR HYBRID ROLE MINING | 05-02-2013 |
20130198827 | SERVICE COMPLIANCE ENFORCEMENT USING USER ACTIVITY MONITORING AND WORK REQUEST VERIFICATION - Auditing system logs of a remote client device is provided. Login session information entered at a workstation device accessing the remote client device to perform an activity associated with a work request is received. An access token is generated based on the login session information and information associated with the work request on the remote client device. The access token is compared with an audit log report of the remote client device that includes the activity associated with the work request performed by the workstation device on the remote client device. It is determined whether information in the access token matches information in the audit log report of the remote client device. In response to determining that the information in the access token does not match the information in the audit log report of the remote client device, an action alert is sent. | 08-01-2013 |
20130275579 | SERVICE COMPLIANCE ENFORCEMENT USING USER ACTIVITY MONITORING AND WORK REQUEST VERIFICATION - A computer implemented method, data processing system, and computer program product control point in time access to a remote client device and auditing system logs of the remote client device by an auditing server device to determine whether monitored user activity on the remote client device associated with a work request was in compliance with one or more regulations. | 10-17-2013 |
20130291127 | ENTERPRISE-LEVEL DATA PROTECTION WITH VARIABLE DATA GRANULARITY AND DATA DISCLOSURE CONTROL WITH HIERARCHICAL SUMMARIZATION, TOPICAL STRUCTURING, AND TRAVERSAL AUDIT - Access is obtained to a plurality of intermediately transformed electronic documents (with a plurality of sections and subsections) which have been transformed, by topical analysis and text summarization techniques, from a plurality of original electronic documents comprising at least some unstructured electronic documents. Audit and retrieval agent code is appended to the sections and subsections to create a plurality of finally transformed electronic documents. Users are allowed to access the finally transformed electronic documents. The users are provided with accountability reminders contemporaneous with the access. The access of the users to the sections and subsections of the finally transformed electronic documents is logged. An audit report is provided based on the logging. Also provided is a cloud service for enterprise-level sensitive data protection with variable data granularity, using one or more one guest virtual machine images. | 10-31-2013 |
20130311220 | EVALUATING DEPLOYMENT READINESS IN DELIVERY CENTERS THROUGH COLLABORATIVE REQUIREMENTS GATHERING - A method and data processing system for determining deployment readiness of a service is disclosed. A computer identifies tasks that must be performed to address requirements associated with categories of complexity for deploying the service in one or more locations. The computer assigns the identified tasks to experts based on skill and availability of the experts. The computer verifies whether the assigned tasks have been completed. The computer then provides an indication that the service is ready to be deployed in one or more locations responsive to the verification that the tasks have been completed. | 11-21-2013 |
20130311221 | EVALUATING DEPLOYMENT READINESS IN DELIVERY CENTERS THROUGH COLLABORATIVE REQUIREMENTS GATHERING - A data processing system for determining deployment readiness of a service is disclosed. A computer identifies tasks that must be performed to address requirements associated with categories of complexity for deploying the service in one or more locations. The computer assigns the identified tasks to experts based on skill and availability of the experts. The computer verifies whether the assigned tasks have been completed. The computer then provides an indication that the service is ready to be deployed in one or more locations responsive to the verification that the tasks have been completed. | 11-21-2013 |
20130311653 | SERVICE COMPLIANCE ENFORCEMENT USING USER ACTIVITY MONITORING AND WORK REQUEST VERIFICATION - A computer implemented method, data processing system, and computer program product control point in time access to a remote client device and auditing system logs of the remote client device by an auditing server device to determine whether monitored user activity on the remote client device associated with a work request was in compliance with one or more regulations. | 11-21-2013 |
20140165154 | USING DATA ANALYTICS AND CROWDSOURCING TO DETERMINE ROLES FOR A COMPUTER SYSTEM - In an embodiment of the invention, wherein users must be able to access a computer system to perform respective functions, initial data is acquired from data sources, some of the initial data pertaining to previously granted system access rights. The initial data is used to create a crowdsourcing task, which is executed to acquire crowdsourced data from SMEs in an SME population, wherein the crowdsourced data comprises additional data pertaining to previously granted system access. The crowdsourced data is used to create a set of role definitions, wherein the role definitions determine which of the users are assigned to be members of a particular role associated with the system, and further determine the access rights that are granted to each member of the particular role. | 06-12-2014 |
20140165188 | USING DATA ANALYTICS AND CROWDSOURCING TO DETERMINE ROLES FOR A COMPUTER SYSTEM - In an embodiment of the invention, wherein users must be able to access a computer system to perform respective functions, initial data is acquired from data sources, some of the initial data pertaining to previously granted system access rights. The initial data is used to create a crowdsourcing task, which is executed to acquire crowdsourced data from SMEs in an SME population, wherein the crowdsourced data comprises additional data pertaining to previously granted system access. The crowdsourced data is used to create a set of role definitions, wherein the role definitions determine which of the users are assigned to be members of a particular role associated with the system, and further determine the access rights that are granted to each member of the particular role. | 06-12-2014 |
20150074784 | USING SERVICE REQUEST TICKET FOR MULTI-FACTOR AUTHENTICATION - In an environment wherein a front end system receives a service request, and a back end system responds to the request, a user of a target endpoint must be authenticated. A ticket ID is assigned to the service request, and responsive to an initiating action of the user, a virtual token is generated that has a specified relationship with the ticket ID. The virtual token is delivered to the user, and the user is prompted to present the token to a validating component associated with one of the front end or back end systems, wherein the validating component is configured to verify the token validity. If the token is found to be valid, the user is authenticated to access the specified target endpoint. | 03-12-2015 |
20150074785 | USING SERVICE REQUEST TICKET FOR MULTI-FACTOR AUTHENTICATION - In an environment wherein a front end system receives a service request, and a back end system responds to the request, a user of a target endpoint must be authenticated. A ticket ID is assigned to the service request, and responsive to an initiating action of the user, a virtual token is generated that has a specified relationship with the ticket ID. The virtual token is delivered to the user, and the user is prompted to present the token to a validating component associated with one of the front end or back end systems, wherein the validating component is configured to verify the token validity. If the token is found to be valid, the user is authenticated to access the specified target endpoint. | 03-12-2015 |