Logging access system events
First Claim
Patent Images
1. A method for logging access system events, comprising the steps of:
- detecting an access system event;
creating a log entry for said access system event; and
storing information from an identity profile in said log entry, said identity profile pertains to a first user, said access system event involves said first user.
5 Assignments
0 Petitions
Accused Products
Abstract
A system is disclosed that logs access system events. When an access system event occurs, a log entry is created for the access system event. Information from an identity profile is stored in the log entry. The identity profile pertains to a first user. The first user is the entity who caused or was involved with the access system event. In one embodiment, the access system includes identity management and access management functionality.
-
Citations
34 Claims
-
1. A method for logging access system events, comprising the steps of:
-
detecting an access system event;
creating a log entry for said access system event; and
storing information from an identity profile in said log entry, said identity profile pertains to a first user, said access system event involves said first user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 19, 20, 21, 22, 23, 24, 25, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
18. One or more processor readable storage devices having processor readable code embodied on said processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
detecting an access system event;
creating a log entry for said access system event; and
storing information from an identity profile in said log entry, said identity profile pertains to a first user, said access system event involves said first user.
-
-
26. An access system, comprising:
-
a communication interface;
one or more storage devices; and
one or more processors in communication with said one or more storage devices and said communication interface, said one or more processors programmed to preform a method comprising the steps of;
detecting an access system event, creating a log entry for said access system event, and storing information from an identity profile in said log entry, said identity profile pertains to a first user, said access system event involves said first user.
-
Specification