Methods and systems for enterprise data use monitoring and auditing user-data interactions
First Claim
1. A method for managing data use of an enterprise, comprising,(a) receiving login parameters from a user associated with user identification information, the login parameters being supplied through a user interface of a screen;
- (b) authenticating the login parameters;
(c) authenticating the user information to determine if the login parameters match the user identification information;
(d) providing access to specific data in a database that stores enterprise information, the specific data being managed by policy rules that determine if the specific data is shared by users of the enterprise and determine if the specific data is private to the user;
(e) upon providing access, initiating video capture of a viewing space for the screen, the video capture being stored in a non-volatile medium, the viewing space being configured to include a location where the user associate with the user identification information is predefined to reside when accessing the specific data;
(f) during the video capture, capturing image data presented on the screen, text embedded within the image data presented on the screen, and input received for the user interface of the screen, wherein the captured image data, text embedded within the image data, and the input received are stored in the non-volatile medium; and
(g) binding the video capture, the captured image data presented on the screen, the text embedded within the image data, and the input received, the binding acting to define audit data that defines a link between the user and actions taken by the user regarding the specific data, wherein the audit data is associated with one or more user policy violations, each policy violation being searchable to enable review of the user and actions taken that produced each policy violation, wherein the method is executed by a processor.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for managing data use of an enterprise is disclosed. The method includes receiving login parameters from a user associated with user identification information. The method authenticates the login parameters and the user information to determine if the login parameters match the user identification information. The method provides access to specific data in a database that stores enterprise information. Upon providing access, initiating video capture of a viewing space for the screen, the viewing space being configured to include a location where the user associate with the user identification information is predefined to reside when accessing the specific data. During the video capture, capturing image data presented on the screen and input received for the user interface of the screen. The method acts to bind the video capture and the captured image data presented on the screen and the input received.
48 Citations
16 Claims
-
1. A method for managing data use of an enterprise, comprising,
(a) receiving login parameters from a user associated with user identification information, the login parameters being supplied through a user interface of a screen; -
(b) authenticating the login parameters; (c) authenticating the user information to determine if the login parameters match the user identification information; (d) providing access to specific data in a database that stores enterprise information, the specific data being managed by policy rules that determine if the specific data is shared by users of the enterprise and determine if the specific data is private to the user; (e) upon providing access, initiating video capture of a viewing space for the screen, the video capture being stored in a non-volatile medium, the viewing space being configured to include a location where the user associate with the user identification information is predefined to reside when accessing the specific data; (f) during the video capture, capturing image data presented on the screen, text embedded within the image data presented on the screen, and input received for the user interface of the screen, wherein the captured image data, text embedded within the image data, and the input received are stored in the non-volatile medium; and (g) binding the video capture, the captured image data presented on the screen, the text embedded within the image data, and the input received, the binding acting to define audit data that defines a link between the user and actions taken by the user regarding the specific data, wherein the audit data is associated with one or more user policy violations, each policy violation being searchable to enable review of the user and actions taken that produced each policy violation, wherein the method is executed by a processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for managing data use of an enterprise, the method comprising:
-
(a) receiving login parameters from a user associated with user identification information, the login parameters being supplied through a user interface of a screen; (b) authenticating the login parameters; (c) authenticating the user information to determine if the login parameters match the user identification information; (d) providing access to specific data in a database that stores enterprise information, the specific data being managed by policy rules that determine if the specific data is shared by users of the enterprise or is private to the user; (e) upon providing access, initiating video capture of a viewing space for the screen, the video capture being stored in a non-volatile medium, the viewing space being configured to include a location where the user associate with the user identification information is predefined to reside when accessing the specific data; (f) during the video capture, capturing image data presented on the screen, text embedded within the image data presented on the screen, and input received for the user interface of the screen, wherein capturing image data of the user is performed either continuously or at predetermined intervals of time during a session of access; and (g) binding the video capture, the captured image data presented on the screen, the text embedded within the image data, and the input received, the binding acting to define audit data that defines a link between the user and actions taken by the user regarding the specific data, wherein the audit data is associated with one or more user policy violations, each policy violation being searchable to enable review of the user and actions taken that produced each policy violation, wherein the method is executed by a processor.
-
-
16. A method for managing data use of an enterprise, comprising,
(a) receiving login parameters from a user associated with user identification information, the login parameters being supplied through a user interface of a screen; -
(b) authenticating the login parameters; (c) authenticating the user information to determine if the login parameters match the user identification information; (d) providing access to specific data in a database that stores enterprise information, the specific data being managed by policy rules that determine if the specific data is shared by users of the enterprise and determine if the specific data is private to the user; (e) upon providing access, initiating video capture of a viewing space for the screen, the video capture being stored in a non-volatile medium, the viewing space being configured to include a location where the user associate with the user identification information is predefined to reside when accessing the specific data; (f) during the video capture, capturing image data presented on the screen, text embedded within the image data presented on the screen, and input received for the user interface of the screen; (g) binding the video capture, the captured image data presented on the screen, the text embedded within the image data, and the input received, the binding acting to define audit data that defines a link between the user and actions taken by the user regarding the specific data, wherein the audit data is associated with one or more user policy violations, each policy violation being searchable to enable review of the user and actions taken that produced each policy violation; (h) receiving login parameters from additional users, each of the additional users having respective user identification information; (i) processing (b)-(c) for the additional users of the enterprise; and (j) storing the audit data for the user and the additional users in a security database.
-
Specification