Integrated visualization of security information for an individual
First Claim
Patent Images
1. A security method comprising:
- receiving equipment usage data indicating access to a network asset, the equipment usage data associated with a uniquely identified object;
receiving physical access data identifying the physical location of the uniquely identified object from at least one physical security device; and
normalizing said received equipment usage data and physical access data based on the uniquely identified object; and
storing the equipment usage data and physical access data in a record associated with the uniquely identified object.
1 Assignment
0 Petitions
Accused Products
Abstract
A security method including receiving data from devices and normalizing the received data based on uniquely identified objects.
40 Citations
20 Claims
-
1. A security method comprising:
-
receiving equipment usage data indicating access to a network asset, the equipment usage data associated with a uniquely identified object; receiving physical access data identifying the physical location of the uniquely identified object from at least one physical security device; and normalizing said received equipment usage data and physical access data based on the uniquely identified object; and storing the equipment usage data and physical access data in a record associated with the uniquely identified object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A security monitoring system comprising:
-
a network asset operable to transmit equipment usage data associated with a uniquely identified object; at least one physical security device operable to transmit physical access data identifying the physical location of the uniquely identified object; and a processor operable to; receive the equipment usage data and physical access data; and normalize the equipment usage data and physical access data based on the uniquely identified object; and a database for storing the equipment usage data and physical access data in a record associated with the uniquely identified object. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. Logic for providing security within an enterprise, the logic encoded in a medium and operable to:
-
receive equipment usage data indicating access to a network asset, the equipment usage data associated with a uniquely identified object; receive physical access data identifying the physical location of the uniquely identified object from at least one physical security device; and normalize said received equipment usage data and physical access data based on the uniquely identified object; and store the equipment usage data and physical access data in a record associated with the uniquely identified object. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification