Network based file storage system monitor
First Claim
1. A computer implemented method of monitoring files in a plurality of network based file storage systems, the method comprising:
- at a monitoring computing device;
requesting user authorization to access a data archive associated with a user on the plurality of network based file storage systems;
receiving the user authorization to access the data archive associated with the user on the plurality of network based file storage systems;
periodically determining, over a network and using the authorization, from the plurality of network based file storage systems, information about changes to one or more file system elements stored on the plurality of network based file storage systems;
monitoring a particular one of the one or more file system elements to determine an unauthorized access of the particular one of the one or more file system elements based upon the information about changes to the one or more file system elements;
determining, based upon a fingerprint of the particular one of the one or more file system elements, a set of users that have stored the particular one of the one or more file system elements in a plurality of data archives, each of the data archives associated with a respective user of the set of users on the plurality of network based file storage systems; and
responsive to deter mining an unauthorized access of the particular one of the one or more file system elements, providing a graphical user interface (GUI) with a list of the set of users and an indication that the unauthorized access occurred.
6 Assignments
0 Petitions
Accused Products
Abstract
Disclosed in some examples are methods, systems, and machine readable mediums which monitor, archive, and version file system elements stored in one or more different network based file storage systems for one or more different users. Any changes to file system elements stored in the network based file storage systems are recorded and versioned. The system may allow users to revert to a previous version of a file system element, recover a deleted file system element, and the system allows for audits to determine which users placed a file system element in which network based file storage systems and determine which users had access to the file system element in the network based file storage systems. As a result, the disclosed system improves the end-user experience by providing versioning and auditing capabilities as well as allowing organizations to monitor and control their digital property in network based file storage systems.
-
Citations
19 Claims
-
1. A computer implemented method of monitoring files in a plurality of network based file storage systems, the method comprising:
at a monitoring computing device; requesting user authorization to access a data archive associated with a user on the plurality of network based file storage systems; receiving the user authorization to access the data archive associated with the user on the plurality of network based file storage systems; periodically determining, over a network and using the authorization, from the plurality of network based file storage systems, information about changes to one or more file system elements stored on the plurality of network based file storage systems; monitoring a particular one of the one or more file system elements to determine an unauthorized access of the particular one of the one or more file system elements based upon the information about changes to the one or more file system elements; determining, based upon a fingerprint of the particular one of the one or more file system elements, a set of users that have stored the particular one of the one or more file system elements in a plurality of data archives, each of the data archives associated with a respective user of the set of users on the plurality of network based file storage systems; and responsive to deter mining an unauthorized access of the particular one of the one or more file system elements, providing a graphical user interface (GUI) with a list of the set of users and an indication that the unauthorized access occurred. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
14. A non-transitory machine readable medium, comprising instructions, which when performed by the machine, cause the machine to perform the operations comprising:
at a monitoring computing device; requesting user authorization to access a data archive associated with a user on the plurality of network based file storage systems; receiving the user authorization to access the data archive associated with the user on the plurality of network based file storage systems; periodically determining, over a network and using the authorization, from the plurality of network based file storage systems, information about changes to one or more file system elements stored on the plurality of network based file storage systems; monitoring a particular one of the one or more file system elements to determine an unauthorized access of the particular one of the one or more file system elements based upon the information about changes to the one or more file system elements; determining, based upon a fingerprint of the particular one of the one or more file system elements, a set of users that have stored the particular one of the one or more file system elements in a plurality of data archives, each of the data archives associated with a respective user of the set of users on the plurality of network based file storage systems; and responsive to determining an unauthorized access of the particular one of the one or more file system elements, providing a graphical user interface (GUI) with a list of the set of users and an indication that the unauthorized access occurred. - View Dependent Claims (15, 16)
-
17. A system comprising:
-
a processor; a memory, including instructions, which when performed by the processor causes the system to perform the operations comprising; at a monitoring computing device; requesting user authorization to access a data archive associated with a user on the plurality of network based file storage systems; receiving the user authorization to access the data archive associated with the user on the plurality of network based file storage systems; periodically determining, over a network and using the authorization, from the plurality of network based file storage systems, information about changes to one or more file system elements stored on the plurality of network based file storage systems; monitoring a particular one of the one or more file system elements to determine an unauthorized access of the particular one of the one or more file system elements based upon the information about changes to the one or more file system elements; determining, based upon a fingerprint of the particular one of the one or more file system elements, a set of users that have stored the particular one of the one or more file system elements in a plurality of data archives, each of the data archives associated with a respective user of the set of users on the plurality of network based file storage systems; and responsive to determining an unauthorized access of the particular one of the one or more file system elements, providing a graphical user interface (GUI) with a list of the set of users and an indication that the unauthorized access occurred. - View Dependent Claims (18, 19)
-
Specification