System and method for monitoring access to a network by a computer
First Claim
1. A method for monitoring access to the Internet by a computer, the method comprising:
- providing at the computer a client-based monitoring module;
providing at a web server a web-based supervisor module that specifies guidelines which govern the access to the Internet by the computer;
sending the guidelines from the supervisor module to the client-based monitoring module;
at the client-based monitoring module, logging a request for Internet access in a log and logging any violation of the guidelines in the log; and
sending the log to the supervisor module where the following sub-steps are performed;
(1) copying the log into a web-based log; and
(2) notifying a designated administrator of any violation.
1 Assignment
0 Petitions
Accused Products
Abstract
Employee Internet usage is monitored to identify the web sites employees visit and the amount of time employees spend at each site. The system utilizes a client-based module which monitors Internet access, which operates in conjunction with an enforcement supervisor located on a remote web server. A client-based monitoring module performs all of the monitoring and logging activity. The previous web page title, location (URL) and time spent are stored by the client component in memory on the client computer. The web page title and URL are obtained from system notifications from the browser to the client component. The client computer uploads the log containing the web page information to a web-based supervising module.
-
Citations
58 Claims
-
1. A method for monitoring access to the Internet by a computer, the method comprising:
-
providing at the computer a client-based monitoring module;
providing at a web server a web-based supervisor module that specifies guidelines which govern the access to the Internet by the computer;
sending the guidelines from the supervisor module to the client-based monitoring module;
at the client-based monitoring module, logging a request for Internet access in a log and logging any violation of the guidelines in the log; and
sending the log to the supervisor module where the following sub-steps are performed;
(1) copying the log into a web-based log; and
(2) notifying a designated administrator of any violation. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for monitoring access to a network, the system comprising:
-
a computer operable to connect to the network;
a monitoring module associated with the computer, the monitoring module being operable to create a database containing a history log relative to the access of the network; and
a supervisor module provided at a server which is in periodic communication with the computer, the supervisor module including a web-based log operable to store the history log, wherein the monitoring module is operable to transfer the history log from the computer to the supervisor module. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for monitoring access to a network by a computer, the method comprising:
-
specifying guidelines which govern the access to the network by the computer;
storing the guidelines at the computer;
monitoring a request for access to the network at the computer;
responsive to a violation of the specified guidelines caused by the request for access, logging the violation in a log stored at the computer;
providing an indication of the violation to a user of the computer; and
permitting the request for access. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
-
28. A system for monitoring access to the Internet by a computer, the system comprising:
-
means for specifying guidelines which govern access to the Internet by the computer;
means for storing the guidelines at the computer;
at the computer, means for logging a request for access to the Internet in a log and logging any violation of the guidelines in the log; and
means for sending the log to a supervisor module associated with a server wherein the log is copied to a web-based log. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35)
-
-
36. A method for monitoring access to a network by a computer, the method comprising:
-
specifying guidelines which govern-the access to the network by the computer;
storing the guidelines at the computer; and
based upon the guidelines, monitoring an amount of authorized time a user of the computer has relative to the network. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45)
-
-
46. A system for monitoring access to a network, the system comprising:
-
a computer operable to connect to the network; and
a timer associated with the computer, the timer being operable to maintain an amount of authorized time a user of the computer has relative to the network. - View Dependent Claims (47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58)
-
Specification