System and method for monitoring secure data on a network
First Claim
Patent Images
1. A method of monitoring, the method comprising:
- instructing a browser on a network device to store a copy of unencrypted source data in a storage area of the network device, the instructing of the browser performed by a processor of the network device executing a monitoring program, the monitoring program received from a monitoring entity, the unencrypted source data previously decrypted from at least a portion of secure webpage data received from a content provider, the browser having requested and received the secure webpage data from the content provider via a network;
accessing the copy of the unencrypted source data from the storage area;
determining auxiliary data from the copy of the unencrypted source data, the auxiliary data comprising at least one of timer data or input-tracking data corresponding to the secure webpage data; and
sending the copy of the unencrypted source data to a server of the monitoring entity, the server being different from the network device and different from the content provider, wherein the server is to analyze the copy of the unencrypted source data to generate log data, the accessing and sending being performed by the processor of the network device in response to execution of an instruction of the monitoring program by the processor.
12 Assignments
0 Petitions
Accused Products
Abstract
A system and method for monitoring secure digital data on a network are provided. An exemplary network monitoring system may include a network device in communication with a user and a network. Further, a server may be in communication with the network. A browser and monitoring program may be stored on the network device, and the network device may receive secure digital data from the network. The browser may convert the secure digital data or a portion thereof into source data, and the monitoring program may transfer the source data or a portion thereof to the server. In an exemplary embodiment, the monitoring program may include a service component and an interface program.
280 Citations
20 Claims
-
1. A method of monitoring, the method comprising:
-
instructing a browser on a network device to store a copy of unencrypted source data in a storage area of the network device, the instructing of the browser performed by a processor of the network device executing a monitoring program, the monitoring program received from a monitoring entity, the unencrypted source data previously decrypted from at least a portion of secure webpage data received from a content provider, the browser having requested and received the secure webpage data from the content provider via a network; accessing the copy of the unencrypted source data from the storage area; determining auxiliary data from the copy of the unencrypted source data, the auxiliary data comprising at least one of timer data or input-tracking data corresponding to the secure webpage data; and sending the copy of the unencrypted source data to a server of the monitoring entity, the server being different from the network device and different from the content provider, wherein the server is to analyze the copy of the unencrypted source data to generate log data, the accessing and sending being performed by the processor of the network device in response to execution of an instruction of the monitoring program by the processor. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising:
-
a storage device comprising machine readable instructions for execution by a processor, the machine readable instructions received from a monitoring entity, the machine readable instructions comprising; first instructions to instruct a browser to store a first copy of unencrypted source data in a storage area of the storage device of the apparatus, the unencrypted source data having been decrypted by the browser from at least a portion of secure webpage data received from a content provider, the browser having requested and received the secure webpage data from the content provider, the browser having stored a second copy of the unencrypted data in a cache different from the storage area; second instructions to access the first copy of the unencrypted source data from the storage area; third instructions to determine auxiliary data from the copy of the unencrypted source data, the auxiliary data comprising at least one of timer data or input-tracking data corresponding to the secure webpage data; and fourth instructions to send the first copy the of the unencrypted source data to a server of the monitoring entity, wherein the server is to analyze the copy of the unencrypted source data to generate log data. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A tangible computer readable storage device or storage disc comprising instructions that, when executed, cause a network device to execute a monitoring program to at least:
-
instruct a browser operating on the network device to store a copy of unencrypted source data in a storage area of the network device, the unencrypted source data previously decrypted from at least a portion of secure webpage data received from a content provider, the browser having requested and received the secure webpage data from the content provider via a network; retrieve the copy of the unencrypted source data from the storage area; determine auxiliary data from the copy of the unencrypted source data, the auxiliary data comprising at least one of timer data or input-tracking data corresponding to the secure webpage data; and send the copy of the unencrypted source data to a server of a monitoring entity, the server being different from the network device and the content provider, the server to analyze the copy of the unencrypted source data to generate log data, the monitoring program received from the monitoring entity. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification