System and method for monitoring the internet access of a computer
First Claim
1. A method for monitoring the Internet access of a computer, the method comprising:
- providing at the computer a client-based monitoring module;
providing at a web server a web-based supervisor module that specifies guidelines which govern Internet access by the computer, sending the guidelines from the supervisor module to the client-based monitoring module;
at the client-based monitoring module, logging a request for Internet access in a log, and logging any violations of the guidelines in the log;
displaying at the computer an amount of Internet access time a user of the computer has remaining; and
sending the log to the supervisor module where the following sub-steps are performed;
(1) copying the log into a web-based log; and
(2) notifying a designated administrator of any violation.
1 Assignment
0 Petitions
Accused Products
Abstract
Employee Internet usage is monitored to identify the web sites employees visit and the amount of time employees spend at each site. The system utilizes a client-based module which monitors Internet access, which operates in conjunction with an enforcement supervisor located on a remote web server. A client-based monitoring module performs all of the monitoring and logging activity. The previous web page title, location (URL) and time spent are stored by the client component in memory on the client computer. The web page title and URL are obtained from system notifications from the browser to the client component. The client computer uploads the log containing the web page information to a web-based supervising module.
218 Citations
43 Claims
-
1. A method for monitoring the Internet access of a computer, the method comprising:
-
providing at the computer a client-based monitoring module;
providing at a web server a web-based supervisor module that specifies guidelines which govern Internet access by the computer, sending the guidelines from the supervisor module to the client-based monitoring module;
at the client-based monitoring module, logging a request for Internet access in a log, and logging any violations of the guidelines in the log;
displaying at the computer an amount of Internet access time a user of the computer has remaining; and
sending the log to the supervisor module where the following sub-steps are performed;
(1) copying the log into a web-based log; and
(2) notifying a designated administrator of any violation. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for monitoring network access, comprising:
-
a computer operable to connect to the network;
a monitoring module associated with the computer, the monitoring module operable to create a database containing a history log relative to access of the network;
a display associated with the monitoring module, the display operable to indicate an amount of authorized time a user of the computer has remaining on the network; and
a supervisor module provided at a server which is in periodic communication with the computer, the supervisor module including a web-based log operable to store the history log, wherein the monitor module is operable to transfer the history log from the computer system to the supervisor module. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for monitoring the network access of a computer, the method comprising:
-
specifying guidelines which govern network access by the computer;
storing the guidelines at the computer;
displaying at the computer an amount of authorized network access time a user of the computer has remaining;
monitoring a request for network access at the computer;
responsive to a violation of the specified guidelines caused by the request for network access, logging the violation in a log stored at the computer;
providing an indication of the violation to a user of the computer; and
permitting the request for network access. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
(1) copying the log into a web-based log; and
(2) notifying a designated administrator of the violation.
-
-
23. The method as recited in claim 19, wherein the operation of specifying guidelines further comprises specifying guidelines relative to interactive usage of the network by a user of the network.
-
24. The method as recited in claim 19, wherein the operation of specifying guidelines further comprises specifying guidelines relative to the times at which a user of the computer can interactively use the network.
-
25. The method as recited in claim 19, wherein the operation of logging a request for network access in a log further comprises the operation of detecting the activation of a browser.
-
26. The method as recited in claim 19, wherein the operation of logging a request for network access in a log further comprises intercepting a universal resource link request between a browser and a network programming interface.
-
27. A method for monitoring the network access of a computer, the method comprising:
-
specifying guidelines which govern network access by the computer;
storing the guidelines at the computer;
displaying an amount of authorized time a user of the computer has remaining on the network; and
at the computer, logging a request for network access in a log and logging any violations of the guidelines in the log. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36)
(1) copying the log into a web-based log; and
(2) notifying a designated administrator of the a violation.
-
-
31. The method as recited in claim 27, wherein the operation of specifying guidelines further comprises specifying guidelines relative to interactive usage of the network by a user.
-
32. The method as recited in claim 27, wherein the operation of specifying guidelines further comprises specifying guidelines relative to the times at which a user of the computer can interactively use the network.
-
33. The method as recited in claim 27, wherein the operation of logging a request for network access in a log further comprises the operation of detecting the activation of a browser.
-
34. The method as recited in claim 27, wherein the operation of logging a request for network access in a log further comprises intercepting a universal resource link request between a browser and a network programming interface.
-
35. The method as recited in claim 27, wherein the operation of displaying the amount of authorized time a user of the computer has remaining on the network further comprises displaying a time selected from the group consisting of number of permitted minutes/week, number of minutes already consumed/week, monitored and restricted start and end times, and current system time at the computer.
-
36. The method as recited in claim 27, wherein the operation of displaying the amount of authorized time a user of the computer has remaining on the network further comprises indicating a period of use selected from the group consisting of monitored, restricted, and unrestricted.
-
37. A system for monitoring the Internet access of a computer, the system comprising:
-
means for specifying guidelines which govern Internet access by the computer;
means for storing the guidelines at the computer;
at the computer, means for displaying an amount of authorized time a user of the computer has remaining on the Internet;
at the computer, means for logging a request for Internet access in a log and logging any violations of the guidelines in the log; and
means for sending the log to a supervisor module associated with a server wherein the log is copied to a web-based log. - View Dependent Claims (38, 39, 40, 41, 42, 43)
-
Specification