System and method for monitoring secure data on a network
First Claim
Patent Images
1. A method of monitoring, the method comprising:
- instructing a browser on a network device to decrypt secure digital data and store the decrypted secure digital data in a first storage area of the network device, the secure digital data received from a content provider in communication with the network device, the instructing of the browser performed by a processor of the network device executing a monitoring program, the monitoring program received from a monitoring entity;
accessing the decrypted secure digital data from the first storage area to generate a tree structure associated with the decrypted secure digital data;
when a node of the tree structure includes a secure uniform resource locator (URL), storing the node of the tree structure associated with the secure URL in a second storage area;
determining auxiliary data from the stored node of the tree structure;
filtering the auxiliary data to remove sensitive information;
encrypting the auxiliary data; and
transmitting the encrypted auxiliary data to a server of the monitoring entity to monitor activity of the browser, the server being different from the network device and different from the content provider.
10 Assignments
0 Petitions
Accused Products
Abstract
A system and method for monitoring secure digital data on a network are provided. An exemplary network monitoring system may include a network device in communication with a user and a network. Further, a server may be in communication with the network. A browser and monitoring program may be stored on the network device, and the network device may receive secure digital data from the network. The browser may convert the secure digital data or a portion thereof into source data, and the monitoring program may transfer the source data or a portion thereof to the server. In an exemplary embodiment, the monitoring program may include a service component and an interface program.
-
Citations
17 Claims
-
1. A method of monitoring, the method comprising:
-
instructing a browser on a network device to decrypt secure digital data and store the decrypted secure digital data in a first storage area of the network device, the secure digital data received from a content provider in communication with the network device, the instructing of the browser performed by a processor of the network device executing a monitoring program, the monitoring program received from a monitoring entity; accessing the decrypted secure digital data from the first storage area to generate a tree structure associated with the decrypted secure digital data; when a node of the tree structure includes a secure uniform resource locator (URL), storing the node of the tree structure associated with the secure URL in a second storage area; determining auxiliary data from the stored node of the tree structure; filtering the auxiliary data to remove sensitive information; encrypting the auxiliary data; and transmitting the encrypted auxiliary data to a server of the monitoring entity to monitor activity of the browser, the server being different from the network device and different from the content provider. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus comprising:
-
a storage device including instructions for execution by a hardware processor in communication with a network device, the instructions, when executed, to cause the hardware processor to; instruct a browser on the network device to decrypt secure digital data and store the decrypted secure digital data in a storage area of the network device, the secure digital data received from a content provider in communication with the network device; and access the decrypted secure digital data from the storage area to generate a tree structure associated with the decrypted secure digital data; when a node of the tree structure includes a secure uniform resource locator (URL), determine auxiliary data from the node of the tree structure; filter the auxiliary data to remove sensitive information; encrypt the auxiliary data; and transmit the encrypted auxiliary data to a server of a monitoring entity to monitor activity of the browser, the server being different from the network device and different from the content provider. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A tangible computer readable storage device or storage disc comprising instructions that, when executed, cause a network device to execute a monitoring program to at least:
-
instruct a browser on the network device to decrypt secure digital data and store the decrypted secure digital data in a storage area of the network device, the secure digital data received from a content provider in communication with the network device, the instructing of the browser performed by a processor of the network device executing the monitoring program, the monitoring program received from a monitoring entity; access the decrypted secure digital data from the storage area to generate a tree structure associated with the decrypted secure digital data; when a node of the tree structure includes a secure uniform resource locator (URL), determine auxiliary data from the node of the tree structure; filter the auxiliary data to remove sensitive information; encrypt the auxiliary data; and transmit the encrypted auxiliary data to a server of the monitoring entity to monitor activity of the browser, the server being different from the network device and different from the content provider. - View Dependent Claims (14, 15, 16, 17)
-
Specification