Method for Directing Audited Data Traffic to Specific Repositories
First Claim
Patent Images
1. A computer-implemented method for auditing data traffic, the computer-implemented process comprising:
- monitoring data traffic on a network and collecting data access elements thereof;
comparing the collected data access elements to security rules providing sets of predefined data access elements for identifying predefined data accesses; and
sending first audit data collections for data accesses to a first repository and, for a data access that matches one of the rules, sending a second audit data collection defined by the matching rule to at least a second repository designated by the matching rule.
1 Assignment
0 Petitions
Accused Products
Abstract
Data traffic is monitored on a network and data access elements thereof are collected. The collected data access elements are compared to security rules providing sets of predefined data access elements for identifying predefined data accesses. First audit data collections for data accesses are sent to a first repository. For a data access that matches one of the rules, a second audit data collection defined by the matching rule is sent to at least a second repository designated by the matching rule.
54 Citations
7 Claims
-
1. A computer-implemented method for auditing data traffic, the computer-implemented process comprising:
-
monitoring data traffic on a network and collecting data access elements thereof; comparing the collected data access elements to security rules providing sets of predefined data access elements for identifying predefined data accesses; and sending first audit data collections for data accesses to a first repository and, for a data access that matches one of the rules, sending a second audit data collection defined by the matching rule to at least a second repository designated by the matching rule. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification