Abstract: A method and apparatus for defining the scope of a search is described. In one embodiment, user input is received, and the scope is defined, based on the user input, for a search of free-form text for information from any random rows within a tabular structure of source data. In one embodiment, the search is intended for finding, in the free-form text, a sub-set of data fragments that matches information from any single row within the tabular structure of the source data.
Type:
Grant
Filed:
November 6, 2008
Date of Patent:
August 9, 2011
Assignee:
Symantec Corporation
Inventors:
Kevin T. Rowney, Michael R. Wolfe, Chris Jones, Dirk Kessler, Hai Chen, Eric Bothwell
Abstract: A method and apparatus for scanning structured data from a data repository having an arbitrary data schema and for applying a policy to the data of the data repository are described. In one embodiment, the structured data is converted to unstructured text data to allow a schema-independent policy to be applied to the text data in order to detect a policy violation in the data repository regardless of the data schema used by the data repository.
Type:
Grant
Filed:
March 28, 2008
Date of Patent:
August 9, 2011
Assignee:
Symantec Corporation
Inventors:
Michel Zoppas, Jeremy Hermann, Conal O'Raghallaigh, Eric Bothwell, Alexander Fontana
Abstract: Techniques for object relational mapping in database technologies are described herein. According to one embodiment, in response to a query statement for accessing a relational database, a syntax tree is generated to represent semantic information of the query statement, where the query statement includes a wildcard parameter and is implemented as an object of a SQL. A data type of the wildcard parameter is predicted based on the semantic information obtained from the syntax tree in view of a structure representing the syntax tree. The predicted data type of the wildcard parameter is used to access the corresponding entry of the relational database. Other methods and apparatuses are also described.
Abstract: A method and apparatus for managing data loss due to policy violations in temporary files is described. In one embodiment, the method includes monitoring, by a client agent, information content on a client for violations of a policy. The method further includes determining, by the client agent, that a violation of the policy has occurred for content of a temporary file of an application. In one embodiment, the policy violation of the temporary file is correlated, by the client agent, with an original file of the application.
Abstract: A method and apparatus for revoking a digital signature using a signature revocation list. In one embodiment, the method includes generating the signature revocation list to indicate revocation status of a signature. The signature is created from an encryption key and a document. The method also includes computing an identifier of the signature in the signature revocation list based on contents of the signature. The method further includes publishing the signature revocation list for access by users of the document.