Methods and systems for enforcing network and computer use policy
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving data associated with a user'"'"'s interaction with a client computing device;
probabilistically analyzing said data to ascertain whether the data likely constitutes data of interest; and
in an event the data likely constitutes data of interest, applying one or more rules to ascertain whether any actions should be taken responsive to the user'"'"'s interaction.
7 Assignments
0 Petitions
Accused Products
Abstract
Network and computer use policy is enforced by employing client-side systems that analyze data usage at the client in terms of what the data is, who is using the data, and the context of the data, and then make an intelligent decision on what action(s) to take responsive to the analysis that is performed. Such systems and related methods can protect organizational resources from inappropriate activities that originate from within the organization.
-
Citations
26 Claims
-
1. A computer-implemented method comprising:
-
receiving data associated with a user'"'"'s interaction with a client computing device;
probabilistically analyzing said data to ascertain whether the data likely constitutes data of interest; and
in an event the data likely constitutes data of interest, applying one or more rules to ascertain whether any actions should be taken responsive to the user'"'"'s interaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
one or more computer-readable media;
computer-readable instructions on the computer-readable media which, when executed, implement a system comprising;
an engine component configured to receive data associated with a user'"'"'s interaction with a client computing device and probabilistically analyze said data to ascertain whether the data likely constitutes data of interest; and
a decision framework component communicatively coupled with the engine component and configured to, in an event the data likely constitutes data of interest, apply one or more rules to ascertain whether any actions should be taken responsive to the user'"'"'s interaction. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A computer-implemented method comprising:
-
receiving configuration information that describes one or more heuristics that are to be applied to data associated with a user'"'"'s interactions on a client computing device, said configuration information being structured in a hierarchical, tag-based language;
using the configuration information to configure a decision framework component;
receiving, with an engine component, data associated with a user'"'"'s interaction with a client computing device;
probabilistically analyzing, with the engine component, said data to ascertain whether the data likely constitutes data of interest; and
in an event the data likely constitutes data of interest, applying, with the configured decision framework component, one or more rules to ascertain whether any actions should be taken responsive to the user'"'"'s interaction. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification