Methods and systems for enforcing network and computer use policy
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving from a client computing device data associated with a user'"'"'s interaction with the client computing device, wherein the client computing device is connected to a computer network that has a network policy;
probabilistically analyzing, by the client computing device, the data to ascertain whether the data constitutes data of interest, wherein the data comprises data of interest when it pertains to a policy selected from the group consisting of the network policy for the network and a computer use policy of the client computing device, and wherein probabilistically analyzing comprises;
performing lexical analysis on the data;
matching one or more portions of the received data with one or more cases of data defined in one or more pre-defined files; and
assigning a score to the received data based at least in part on the matching, the score indicative of whether the data constitutes data of interest,wherein individual pre-defined files are defined in a hierarchical tag-based language comprising a first top level tag encompassing multiple other tags including;
a second tag specifying a file to be used to perform the lexical analysis; and
a third tag specifying individual cases of data and having sub-tags identifying text patterns that are attempted to be matched and associated responses triggered in an event of a match; and
in an event the data constitutes data of interest, applying one or more rules to ascertain whether any actions should be taken responsive to the user'"'"'s interaction with the client computing device, wherein one or more actions are taken independent of input from the user with regard to the one or more actionsdetermining, by the client computer device, whether to apply a rule to take one or more actions when it is determined that the data is data of interest based on one or more rule set profiles that define when an action should be triggered; and
receiving, by the client computer device, configuration data for the one or more rule set profiles from a remote computer device connected to the client computer device via the computer network.
7 Assignments
0 Petitions
Accused Products
Abstract
Network and computer use policy is enforced by employing client-side systems that analyze data usage at the client in terms of what the data is, who is using the data, and the context of the data, and then make an intelligent decision on what action(s) to take responsive to the analysis that is performed. Such systems and related methods can protect organizational resources from inappropriate activities that originate from within the organization.
44 Citations
23 Claims
-
1. A computer-implemented method comprising:
-
receiving from a client computing device data associated with a user'"'"'s interaction with the client computing device, wherein the client computing device is connected to a computer network that has a network policy; probabilistically analyzing, by the client computing device, the data to ascertain whether the data constitutes data of interest, wherein the data comprises data of interest when it pertains to a policy selected from the group consisting of the network policy for the network and a computer use policy of the client computing device, and wherein probabilistically analyzing comprises; performing lexical analysis on the data; matching one or more portions of the received data with one or more cases of data defined in one or more pre-defined files; and assigning a score to the received data based at least in part on the matching, the score indicative of whether the data constitutes data of interest, wherein individual pre-defined files are defined in a hierarchical tag-based language comprising a first top level tag encompassing multiple other tags including; a second tag specifying a file to be used to perform the lexical analysis; and a third tag specifying individual cases of data and having sub-tags identifying text patterns that are attempted to be matched and associated responses triggered in an event of a match; and
in an event the data constitutes data of interest, applying one or more rules to ascertain whether any actions should be taken responsive to the user'"'"'s interaction with the client computing device, wherein one or more actions are taken independent of input from the user with regard to the one or more actionsdetermining, by the client computer device, whether to apply a rule to take one or more actions when it is determined that the data is data of interest based on one or more rule set profiles that define when an action should be triggered; and receiving, by the client computer device, configuration data for the one or more rule set profiles from a remote computer device connected to the client computer device via the computer network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system comprising:
-
a first computer device; and a client computer device connected to the first computer device via a computer network that has a network policyv, wherein the client computer device comrrises; one or more computer-readable media; computer-readable instructions stored in the computer-readable media which, when executed, implement a system comprising; an engine component configured to receive data associated with a user'"'"'s interaction with the client computing device and probabilistically analyze the data to ascertain whether the data constitutes data of interest, wherein the data constitutes data of interest when it pertains to one or more of the network policy and a computer use policy of the client computing device wherein the engine is configured to probabilistically analyze the data by performing the following; lexical analysis on the data; matching one or more portions of the data with one or more cases of data defined in one or more pre-defined files; and assigning a score to the data based at least in part on the matching, the score indicative of whether the data constitutes data of interest, wherein individual pre-defined files are defined in a hierarchical tag-based language comprising a first top level tag encompassing multiple other tags including; a second tag specifying a file to be used to perform the lexical analysis; and a third tag specifying individual cases of data and having sub-tags identifying text patterns that are attempted to be matched and associated responses triggered in an event of a match; and a decision framework component communicatively coupled with the engine component and configured to, in an event the data constitutes data of interest, apply one or more rules based on one or more rule set policies to ascertain whether any actions should be taken responsive to the user'"'"'s interaction, wherein one or more actions are taken independent of input from the user with regard to the one or more actions; wherein the first computer device is programmed to transmit configuration data to the client computer device for the one or more rule set profiles via the computer network. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A computer-implemented method comprising:
-
receiving, at a client computing device from a first computer device via a computer network, configuration information that describes one or more heuristics that are to be applied to data associated with a user'"'"'s interactions on the client computing device, the configuration information being structured in a hierarchical, tag-based language, wherein the hierarchical tag-based language comprises a top level tag that can contain a profile tag associated with a set of rules for deciding when certain actions should be taken, and a filter tag associated with a single rule, keyword or lexical program; using the configuration information to remotely configure a decision framework component of the client computing device; receiving, with an engine component of the client computing device, data associated with a user'"'"'s interaction with the client computing device; probabilistically analyzing, with the engine component of the client computing device, the data to ascertain whether the data constitutes data of interest, wherein the data constitutes data of interest if it pertains to one or more of a network policy of the computer network and a computer use policy of the client computing device, and wherein probabilistically analyzing comprises; matching one or more portions of the data with one or more cases of data defined in one or more pre-defined files; and assigning a score to the data based at least in part on the matching and indicative of whether the data constitutes data of interest; and in an event the data constitutes data of interest, applying, with the configured decision framework component of the client computing device, one or more rules to ascertain whether any actions should be taken responsive to the user'"'"'s interaction with the client computing device, wherein one or more actions are taken independent of input from the user with regard to the one or more actions. - View Dependent Claims (20, 21, 22, 23)
-
Specification