×

Enabling surveillance of network connected device

  • US 7,058,709 B2
  • Filed: 11/07/2001
  • Issued: 06/06/2006
  • Est. Priority Date: 11/14/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • enabling surveillance of a computer device connected to a communications network including a Network Surveillance Server (NSS), said network including the steps of;

    upon joining said communications network, said computer device logging-in to said NSS;

    discovering at least one said NSS within said communications network;

    selecting one of said at least one NSS to perform the surveillance of said computer device;

    sending credentials to said selected NSS;

    thereby, if accepted by said selected NSS;

    completing login;

    however, if not accepted;

    aborting log-in;

    said NSS polling said computer device while connected on said communications network, said polling step including said NSS determining if said computer device responds, and if so, collecting information about said computer device and a registered user of said computer device, and comparing if said collected information matches records, in said NSS, about said computer device and said registered user, said collecting step and said comparing step being performed on top of said polling step and said checking step;

    said NSS issuing an alarm, to a central surveillance unit if said computer device fails responding to polling;

    wherein said collected information about said user includes a typing speed over a keyboard or a voice intonation; and

    wherein said collected information about said computer device includes a current geographic location and an identification of a portal through which said communications network is accessed;

    prior to leaving said communications network, when it is desired to leave said communications network, said computer device sending credentials to said selected NSS, wherein said credentials include knowing a personal identification number (PIN);

    knowing a password; and

    possessing a token or a smartcard;

    thereby, if log-out is accepted by said NSS stops polling, said computer device thus completing log-out;

    however, if log-out is not accepted, said NSS keeps polling, said computer device thus failing to complete log-out;

    said computer device lagging-out from said NSS; and

    allowing said computer device to be watched by NSS while being connected to said communications network.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×