×

Directing audited data traffic to specific repositories

  • US 10,397,279 B2
  • Filed: 12/20/2017
  • Issued: 08/27/2019
  • Est. Priority Date: 12/08/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for auditing data traffic, the computer-implemented process comprising:

  • monitoring data traffic on a network and collecting data access elements thereof;

    comparing the collected data access elements to security rules;

    sending a first audit data collection to a first repository based on a first security rule of the security rules,wherein the first security rule;

    defines a first condition based on a first data access element of the collected data access elements,defines the first audit data collection,designates the first audit data collection as a default audit data collection for a first user, anddesignates the first repository as a default repository for the first user,wherein the first audit data collection includes a second data access element of the collected data access elements andwherein the sending occurs in response to one or more of the collected data access elements of a data access by the first user matching the first condition in the first security rule and the sending directs the first audit data collection to the first repository responsive to the designation of the first repository in the first security rule; and

    sending, for the data access by the first user, a second audit data collection to a second repository based on a second security rule of the security rules,wherein the second security rule;

    defines a second condition based on a third data access element of the collected data access elements,defines the second audit data collection anddesignates the second repository as a repository for the second audit data collection,wherein the second audit data collection includes a fourth data access element of the collected data access elements andwherein the sending the second audit data collection to the second repository occurs in response to one or more of the collected data access elements of the data access by the first user matching the second condition in the second security rule and the sending the second audit data collection directs the second audit data collection to the second repository responsive to the designation of the second repository in the second security rule,wherein the third data access element is different than the fourth data access element, andwherein the third data access element is a database table name and the fourth data access element is an IP address from which the database table is accessed.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×