Tracking methods for computer-readable files
First Claim
1. A computer-implemented method for tracking computer-readable files as they are accessed or created on a computing or data storage device, the method comprising:
- monitoring file access events and file creation events between at least one software, middleware, or firmware application and at least one file system;
associating a unique identifier with each high-risk file that is accessed or created on the file systems, wherein the unique identifiers are stored in a data store that is independent of the file systems; and
storing access-event information and creation-event information to records in the data store for the high-risk files associated with unique identifiers.
2 Assignments
0 Petitions
Accused Products
Abstract
Apparatuses and computer-implemented methods of tracking high-risk, computer-readable files as they are accessed or created on a computing or data storage device are described according to some aspects. In one embodiment, file access events and file creation events between at least one software, middleware, or firmware application and at least one file system are monitored. When a high-risk file is created or accessed on the file systems, a unique identifier can be associated with the file and stored in a data store, which is independent of the file system. Access-event and creation-even information can then be stored to records in the data store for the high-risk files associated with unique identifiers.
55 Citations
22 Claims
-
1. A computer-implemented method for tracking computer-readable files as they are accessed or created on a computing or data storage device, the method comprising:
-
monitoring file access events and file creation events between at least one software, middleware, or firmware application and at least one file system;
associating a unique identifier with each high-risk file that is accessed or created on the file systems, wherein the unique identifiers are stored in a data store that is independent of the file systems; and
storing access-event information and creation-event information to records in the data store for the high-risk files associated with unique identifiers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification