Recording activity-triggered computer video output
First Claim
1. A method of recording a network access policy violation, the method comprising:
- receiving computer input corresponding to a network access policy violation by a first computer on a network, wherein a network access policy comprises a specification of network access available to a user of the first computer, and wherein the computer input corresponding to the network access policy violation by the first computer comprises a threshold number of occurrences of the network access policy violation by the first computer;
detecting, by a second computer coupled to the first computer through the network, an occurrence of the network access policy violation by the first computer on the network;
incrementing, by the second computer in response to the detecting, a previous number of occurrences of the network access policy violation by the first computer to a current number of occurrences of the network access policy violation by the first computer;
determining, by the second computer, whether the current number of occurrences of the network access policy violation by the first computer satisfies the threshold number of occurrences; and
instructing, by the second computer in response to the determining that the current number of occurrences of the network access policy violation by the first computer satisfies the threshold number of occurrences, capturing of a video output of the first computer, wherein the captured video output of the first computer relates to the network access policy violation.
7 Assignments
0 Petitions
Accused Products
Abstract
An application that is capable of monitoring Internet or network traffic and performing recordings of computer video output based on one or more violations of network activity policies. The recording application can be installed on the computer to be recorded or another computer or server that is connected through the network to the computer to be recorded. The monitoring application contains a configuration interface that allows a user to set thresholds for certain types of network policy violations. When the one or more violations are detected, the recording application will begin recording video of the computer'"'"'s video activity. The application can be configured to include settings such as the length of the recording. In a typical environment, the application is a hardware appliance that is capable of monitoring web activity and network traffic and can connect to the computer over the network in order to perform the recording.
-
Citations
22 Claims
-
1. A method of recording a network access policy violation, the method comprising:
-
receiving computer input corresponding to a network access policy violation by a first computer on a network, wherein a network access policy comprises a specification of network access available to a user of the first computer, and wherein the computer input corresponding to the network access policy violation by the first computer comprises a threshold number of occurrences of the network access policy violation by the first computer; detecting, by a second computer coupled to the first computer through the network, an occurrence of the network access policy violation by the first computer on the network; incrementing, by the second computer in response to the detecting, a previous number of occurrences of the network access policy violation by the first computer to a current number of occurrences of the network access policy violation by the first computer; determining, by the second computer, whether the current number of occurrences of the network access policy violation by the first computer satisfies the threshold number of occurrences; and instructing, by the second computer in response to the determining that the current number of occurrences of the network access policy violation by the first computer satisfies the threshold number of occurrences, capturing of a video output of the first computer, wherein the captured video output of the first computer relates to the network access policy violation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-accessible medium encoding instructions that, when executed by data processing apparatus, cause the data processing apparatus to perform operations comprising:
-
receiving computer input corresponding to a network access policy violation by a first computer on a network, wherein a network access policy comprises a specification of network access available to a user of the first computer, and wherein the computer input corresponding to the network access policy violation by the first computer comprises a threshold number of occurrences of the network access policy violation by the first computer; detecting, through the network, the network access policy violation by the first computer on the network; incrementing, in response to the detecting, a previous number of occurrences of the network access policy violation by the first computer to a current number of occurrences of the network access policy violation by the first computer; determining whether the current number of occurrences of the network access policy violation by the first computer satisfies the threshold number of occurrences; and instructing, in response to the determining that the current number of occurrences of the network access policy violation by the first computer satisfies the threshold number of occurrences, capturing of a video output of the first computer, wherein the captured video output of the first computer relates to the network access policy violation. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a detector coupled to a computer through a network to detect through the network a network access policy violation, the network access policy violation being associated with an IP address of a monitored computer, wherein the network access policy comprises a specification of network access available to a user of the monitored computer, and wherein the network access policy violation associated with an IP address of a monitored computer comprises a threshold number of occurrences of the network access policy violation associated with an IP address of a monitored computer; a processor configured to cause performance of operations including; increment, in response to a detection of the network access policy violation associated with the IP address of the monitored computer, a previous number of occurrences of the network access policy violation associated with the IP address of the monitored computer to a current number of occurrences of the network access policy violation associated with the IP address of the monitored computer, and determine whether the current number of occurrences of the network access policy violation by the monitored computer satisfies the threshold number; a capturer configured to capture, in response to a determination that the current number of occurrences of the network access policy violation associated with the IP address of the monitored computer satisfies the threshold number, a video output of the monitored computer, wherein the captured video output of the monitored computer relates to the network access policy violation; and memory configured to store the captured video output of the monitored computer. - View Dependent Claims (18, 19, 20, 21, 22)
-
Specification