摘要 |
A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and th e like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process ( figure 2 , 300) senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server (figure 2 , 104-2) analyzes sequences of low level events to detect when aggregate events (figu re 2, 310) of interest occur, such as "FileEdit", network file transfers and th e like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.
|
申请人 |
VERDASYS, INC. |
发明人 |
MACDONALD, KEITH A.;CARSON, DWAYNE A.;FLETCHER, WILLIAM E.;STAMOS, NICHOLAS;BUCCELLA, DONATO;REVESZ, TOMAS JR.;BIRNBAUM, SETH N. |