Method and system for monitoring individual devices in networked environments
First Claim
1. A method, comprising:
- recognizing events at a computer;
interpreting the events to obtain synoptic information;
forwarding the synoptic information to at least one other computer for display;
determining if the synoptic information indicates an unauthorized access; and
optically imaging a computer located within a work area if an unauthorized access occurs.
1 Assignment
0 Petitions
Accused Products
Abstract
According to the present invention, improved techniques for monitoring and managing access and activity at individual devices in a networked environment. Specific embodiments can provide individual and workplace productivity enhancement through self-regulation enforced by peer-group monitoring of network and application usage. In accordance with the specific embodiments of the present invention, techniques that reveal activity of individual users at any device, such as a computer telephone, or other device, within the network environment can be used to analyze flows of information within an enterprise, workplace productivity, network security and other applications in enterprises, including business entities, technical entities, and governmental entities. Specific embodiments provide systems, methods, computer programs and apparatus for monitoring activity at networked entities, such as individual devices, computers, other devices, or other networked computing entities. The information obtained from such monitoring can be used to populate databases, for example. Further, or in the alternative, specific embodiments include analyzing the information, and sharing the information with one or more networked computers and/or with other computational entities locally or remotely connectable with the network. Specific embodiments can have a broad range of functionality in a variety of business, technical and governmental applications.
-
Citations
12 Claims
-
1. A method, comprising:
-
recognizing events at a computer; interpreting the events to obtain synoptic information; forwarding the synoptic information to at least one other computer for display; determining if the synoptic information indicates an unauthorized access; and optically imaging a computer located within a work area if an unauthorized access occurs. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus, comprising:
-
means for recognizing events at a computer; means for interpreting the events to obtain synoptic information; means for forwarding the synoptic information to at least one other apparatus for display; means for determining if the synoptic information indicates an unauthorized access; and means for optically imaging a computer located within a work area if an unauthorized access occurs.
-
-
12. A computer program product for providing a user environment at a computer, comprising:
-
code that recognizes events at the computer; code that interprets the events to obtain synoptic information; code that forwards the synoptic information to at least one other computer for display; code that determines if the synoptic information indicates an unauthorized access; a computer readable storage medium for holding the codes; and code that optically imaging a computer located within a work area if an unauthorized access occurs.
-
Specification