×

Methods and systems for enterprise data use monitoring and auditing user-data interactions

  • US 9,081,980 B2
  • Filed: 03/14/2013
  • Issued: 07/14/2015
  • Est. Priority Date: 04/11/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method for managing data use of an enterprise, comprising,(a) receiving login parameters from a user associated with user identification information, the login parameters being supplied through a user interface of a screen;

  • (b) authenticating the login parameters;

    (c) authenticating the user information to determine if the login parameters match the user identification information;

    (d) providing access to specific data in a database that stores enterprise information, the specific data being managed by policy rules that determine if the specific data is shared by users of the enterprise and determine if the specific data is private to the user;

    (e) upon providing access, initiating video capture of a viewing space for the screen, the video capture being stored in a non-volatile medium, the viewing space being configured to include a location where the user associate with the user identification information is predefined to reside when accessing the specific data;

    (f) during the video capture, capturing image data presented on the screen, text embedded within the image data presented on the screen, and input received for the user interface of the screen, wherein the captured image data, text embedded within the image data, and the input received are stored in the non-volatile medium; and

    (g) binding the video capture, the captured image data presented on the screen, the text embedded within the image data, and the input received, the binding acting to define audit data that defines a link between the user and actions taken by the user regarding the specific data, wherein the audit data is associated with one or more user policy violations, each policy violation being searchable to enable review of the user and actions taken that produced each policy violation, wherein the method is executed by a processor.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×