METHOD FOR THE PROTECTED DEPOSIT OF EVENT PROTOCOL DATA OF A COMPUTER SYSTEM, COMPUTER PROGRAM PRODUCT AND COMPUTER SYSTEM
1 Assignment
0 Petitions
Accused Products
Abstract
A method for the protected deposit of event protocol data of a computer system provides access control which prohibits access to event protocol data in the computer system and also performs:
- reading event protocol data generated in the computer system,
- sequential assignment of individual data sections of the read event protocol data to one of at least two categories in accordance with predetermined criteria,
- merging the categorized data sections for each respective category into a sub-file, and
- separate storage of created sub-files and setting up an access option to access the individual sub-files.
-
Citations
29 Claims
-
1-11. -11. (canceled)
-
12. A method for the protected deposit of event protocol data (Log_A_B) of a computer system, wherein an access control is provided which prohibits access to the event protocol data (Log_A_B) in the computer system and also performs:
-
reading of event protocol data (Log_A_B) generated in the computer system; sequential assignment of individual data sections (A1, A2, B1, B2) of the read event protocol data (Log_A_B) to one of at least two categories (A, B) in accordance with predetermined criteria; merging of the categorized data sections (A1, A2, B1, B2) for each respective category (A, B) to sub-data (Log_A, Log_B); separate storage of all created sub-data (Log_A, Log_B); and setting up a specific access option separately for the respective sub-data (Log_A, Log_B) in accordance with predetermined user groups. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification