Enabling surveillance of network connected device
First Claim
Patent Images
1. A method comprising:
- enabling surveillance of a computer device connected to a communications network including a Network Surveillance Server (NSS), said network including the steps of;
upon joining said communications network, said computer device logging-in to said NSS;
discovering at least one said NSS within said communications network;
selecting one of said at least one NSS to perform the surveillance of said computer device;
sending credentials to said selected NSS;
thereby, if accepted by said selected NSS;
completing login;
however, if not accepted;
aborting log-in;
said NSS polling said computer device while connected on said communications network, said polling step including said NSS determining if said computer device responds, and if so, collecting information about said computer device and a registered user of said computer device, and comparing if said collected information matches records, in said NSS, about said computer device and said registered user, said collecting step and said comparing step being performed on top of said polling step and said checking step;
said NSS issuing an alarm, to a central surveillance unit if said computer device fails responding to polling;
wherein said collected information about said user includes a typing speed over a keyboard or a voice intonation; and
wherein said collected information about said computer device includes a current geographic location and an identification of a portal through which said communications network is accessed;
prior to leaving said communications network, when it is desired to leave said communications network, said computer device sending credentials to said selected NSS, wherein said credentials include knowing a personal identification number (PIN);
knowing a password; and
possessing a token or a smartcard;
thereby, if log-out is accepted by said NSS stops polling, said computer device thus completing log-out;
however, if log-out is not accepted, said NSS keeps polling, said computer device thus failing to complete log-out;
said computer device lagging-out from said NSS; and
allowing said computer device to be watched by NSS while being connected to said communications network.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention enables the surveillance of computer-like devices while they are connected to a communications network. This latter includes a Network Surveillance Server (NSS). Upon joining said communications network, a device is first required to log-in to NSS. After which, NSS polls it while connected on the network so that an alarm can be issued, from NSS, to a central surveillance unit, if the device fails responding to polling. Hence, prior to leaving the communications network, the computer-like device is also required to log-out to NSS. Thus, as long as it is connected to the communications network, the computer-like device is watched.
18 Citations
11 Claims
-
1. A method comprising:
enabling surveillance of a computer device connected to a communications network including a Network Surveillance Server (NSS), said network including the steps of; upon joining said communications network, said computer device logging-in to said NSS;
discovering at least one said NSS within said communications network;
selecting one of said at least one NSS to perform the surveillance of said computer device;
sending credentials to said selected NSS;
thereby, if accepted by said selected NSS;
completing login;
however, if not accepted;
aborting log-in;said NSS polling said computer device while connected on said communications network, said polling step including said NSS determining if said computer device responds, and if so, collecting information about said computer device and a registered user of said computer device, and comparing if said collected information matches records, in said NSS, about said computer device and said registered user, said collecting step and said comparing step being performed on top of said polling step and said checking step;
said NSS issuing an alarm, to a central surveillance unit if said computer device fails responding to polling;wherein said collected information about said user includes a typing speed over a keyboard or a voice intonation; and wherein said collected information about said computer device includes a current geographic location and an identification of a portal through which said communications network is accessed; prior to leaving said communications network, when it is desired to leave said communications network, said computer device sending credentials to said selected NSS, wherein said credentials include knowing a personal identification number (PIN);
knowing a password; and
possessing a token or a smartcard;
thereby, if log-out is accepted by said NSS stops polling, said computer device thus completing log-out;
however, if log-out is not accepted, said NSS keeps polling, said computer device thus failing to complete log-out;
said computer device lagging-out from said NSS; andallowing said computer device to be watched by NSS while being connected to said communications network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
Specification