US 12,407,700 B2
System and method to perform governance on suspicious activity detection pipeline in risk networks
Srinivasan S. Muthuswamy, Bangalore (IN); Subhendu Das, Chapel Hill, NC (US); Mukesh Kumar, Bangalore (IN); and Willie Robert Patten, Jr., Hurdle Mills, NC (US)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Nov. 30, 2021, as Appl. No. 17/538,420.
Prior Publication US 2023/0171274 A1, Jun. 1, 2023
Int. Cl. H04L 9/40 (2022.01); G06Q 20/40 (2012.01); H04L 41/0866 (2022.01)
CPC H04L 63/1425 (2013.01) [H04L 41/0866 (2013.01); G06Q 20/401 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A computer-implemented method for capturing data and metadata for providing traceability of data analytic pipeline runs comprising:
triggering a first pipeline run;
obtaining a pipeline configuration for the first pipeline run, including one or more tasks;
capturing and storing the pipeline configuration and starting inputs for the first pipeline run;
executing the first pipeline run;
capturing, before each task in the first pipeline run is executed, input data and input metadata for each task;
capturing, after each task in the first pipeline run is executed, output data and output metadata for each task;
generating a traceability view of the first pipeline run;
showing all tasks in the first pipeline run and their sequence; and
showing the input data, the input metadata, the output data, and the output metadata for each task of the first pipeline run.