×

Directing audited data traffic to specific repositories

  • US 9,973,536 B2
  • Filed: 07/21/2015
  • Issued: 05/15/2018
  • Est. Priority Date: 12/08/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for auditing data traffic, the computer-implemented process comprising:

  • monitoring data traffic on a network and collecting data access elements thereof;

    comparing the collected data access elements to security rules;

    sending a first audit data collection to a first repository in response to one or more data access elements of a first data access matching a first condition of one of the security rules, wherein the one of the security rules having the first condition designates the first audit data collection and the first repository;

    sending a second audit data collection to a second repository in response to one or more data access elements of a second data access matching a second condition of one of the security rules, wherein the one of the security rules having the second condition designates the second audit data collection and the second repository;

    applying, in response to the matching first condition, a tag to data traffic of the first data access and discontinuing, responsive to applying the tag, the comparing of collected data access elements to the corresponding one of the security rules having the matching first condition, wherein the tag indicates a repository and the data traffic includes at least one of a connection and session; and

    sending, in response to the tag in the tagged data traffic, an audit data collection to the repository indicated by the tag for a data access, wherein the computer-implemented process continues sending audit data for future data accesses that are in the tagged data traffic without the comparing to the corresponding one of the security rules again.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×