摘要 |
A technique for establishing usage control over digital assets such as computer files. The system model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storag e media or through network connections (Figure 2, 108) and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent (Figure 2, 308) process running at a point of use, such a background process in a client operating system kerne l interrupts requests for access to resources. The agent process senses low - level system events, filters, and aggregates them (Figure 2, 360). A policy engine (Figure 2, 308) analyzes sequences of aggregate events to determine when policy violations occur.
|
申请人 |
VERDASYS, INC. |
发明人 |
MACDONALD, KEITH A.;CARSON, DWAYNE A.;FLETCHER, WILLIAM E.;REVESZ, TOMAS JR.;BIRNBAUM, SETH N.;BUCCELLA, DONATO;STAMOS, NICHOLAS |