Method for detection of unauthorized computer system usage
First Claim
Patent Images
1. A method for detecting autonomous computer system usage comprising:
- monitoring an operation of said computer system;
monitoring a subscriber'"'"'s activity during usage of said computer system;
comparing said monitored computer system operation with said monitored subscriber activity to detect computer system operation that is inconsistent with said monitored subscriber'"'"'s activity; and
recording said inconsistent computer system activity in a log within said computer system.
1 Assignment
0 Petitions
Accused Products
Abstract
The method for detecting unauthorized computer system usage monitors the subscriber'"'"'s activities while using the computer system, the system activities and the Internet activities. When the computer system is initialized, the subscriber may manually or automatically set parameters for determining when an activity is unauthorized. When an activity is detected with deviates from normal system usage and operation, the activity is unauthorized. The unauthorized activity may be recorded in an activity log, may be terminated by the computer system, or the subscriber may be notified of the unauthorized usage.
-
Citations
23 Claims
-
1. A method for detecting autonomous computer system usage comprising:
-
monitoring an operation of said computer system;
monitoring a subscriber'"'"'s activity during usage of said computer system;
comparing said monitored computer system operation with said monitored subscriber activity to detect computer system operation that is inconsistent with said monitored subscriber'"'"'s activity; and
recording said inconsistent computer system activity in a log within said computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of preventing autonomous computer system Internet usage comprising:
-
monitoring an Internet activity;
monitoring a subscriber physical interaction with said computer system;
correlating said monitored Internet activity with said monitored subscriber physical interaction to detect computer system activity that is inconsistent with said monitored subscriber physical interaction; and
recording said inconsistent computer system activity in a log. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
Specification