Intrusion threat detection
First Claim
Patent Images
1. A method of monitoring for security information about an access system, comprising the steps of:
- detecting an access system event in said access system;
determining that said access system event is of a type that is being monitored; and
reporting information about said access system event.
5 Assignments
0 Petitions
Accused Products
Abstract
A system is disclosed that can be used to monitor for an attempted intrusion of an access system. The system detects an access system event in the access system and determines whether the access system event is of a type that is being monitored. If the access system event is of a type that is being monitored, the system reports information about the access system event. This information can be used by a rules engine or other process to determine if the access system event was part of an attempted intrusion of the access system.
329 Citations
43 Claims
-
1. A method of monitoring for security information about an access system, comprising the steps of:
-
detecting an access system event in said access system;
determining that said access system event is of a type that is being monitored; and
reporting information about said access system event. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 27, 28, 29, 30, 31)
-
-
26. A method of security monitoring, comprising the steps of:
-
detecting an access system event;
reporting said access system event; and
determining whether said access system event is part of an attempted intrusion of said access system.
-
-
32. One or more processor readable storage devices having processor readable code embodied on said processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
detecting an access system event in an access system;
determining that said access system event is of a type that is being monitored; and
reporting information about said access system event. - View Dependent Claims (33, 34, 35, 36, 37, 39, 40, 41, 42, 43)
-
-
38. An access system, comprising:
-
a communication interface;
one or more storage devices; and
one or more processors in communication with said one or more storage devices and said communication interface, said one or more processors programmed to preform a method comprising the steps of;
detecting an access system event, determining that said access system event is of a type that is being monitored, and reporting information about said access system event.
-
Specification