Non-Invasive Usage Tracking, Access Control, Policy Enforcement, Audit Logging, and User Action Automation On Software Applications
First Claim
1. Software for tracking and controlling access to legacy applications and/or related data records on a computer system using a state engine to define a set of states, triggers, and actions for use by an access agent running on an access point of the computer system to track and control user access to the legacy applications and/or related data records without modifying the legacy application and/or related data records.
1 Assignment
0 Petitions
Accused Products
Abstract
The present system, software, and methods relate to computer system security, particularly to tracking and controlling electronic access to legacy applications and data records without modifying the legacy applications or records. The present system, software, and methods allow for implementation of complex access audit and control rules even when the continued use of legacy application and data are required.
119 Citations
25 Claims
- 1. Software for tracking and controlling access to legacy applications and/or related data records on a computer system using a state engine to define a set of states, triggers, and actions for use by an access agent running on an access point of the computer system to track and control user access to the legacy applications and/or related data records without modifying the legacy application and/or related data records.
-
8. Software for tracking and controlling electronic access to legacy applications and/or related data records on a computer system without modifying the legacy applications and data records, the software comprising:
-
an access agent running on an access point in the computer system and controlling user access to legacy applications and related data records, the access agent comprising; one or more access profiles with instructions for identifying a legacy application and specifying one or more state engines for tracking and controlling access to the application, the state engine specifying a set of states, triggers, and actions for tracking and controlling access to the legacy application, wherein the access agent tracks and controls user access to legacy applications and related data records without modifying the legacy application.
-
-
9. A computer method for tracking and controlling electronic access to a legacy application or related data records running on a computer system, without modifying the legacy applications or data records, the method comprising:
-
defining a set of states, triggers, and actions for tracking and controlling access to the legacy application, and controlling user access to the legacy application and related data records using the states, triggers, and actions, wherein user access to the legacy applications and data records is tracked and controlled without modifying the legacy applications and data records. - View Dependent Claims (10, 11)
-
-
12. A system for tracking and controlling access to a legacy application in a network computer environment, the system comprising:
-
a computer-implemented access agent running on an access point in a network computer environment controlling user access to a legacy application and related data records, the access agent comprising; one or more access profiles with instructions for identifying a legacy application and specifying one or more state engines for tracking and controlling access to the application, the state engine specifying a set of states, triggers, and actions for tracking and controlling access to the legacy application, wherein the access agent tracks and controls user access to the legacy application and related data records using the states, triggers, and actions specified by the state engine, without modifying the legacy application. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification