Digital asset usage accountability via event journaling

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S007000, C726S026000, C726S027000, C705S051000

Reexamination Certificate

active

07934091

ABSTRACT:
A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.

REFERENCES:
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5666411 (1997-09-01), McCarty
patent: 5692124 (1997-11-01), Holden et al.
patent: 5897635 (1999-04-01), Torres et al.
patent: 6118862 (2000-09-01), Dorfman et al.
patent: 6163506 (2000-12-01), Mundy
patent: 6192403 (2001-02-01), Jong et al.
patent: 6427140 (2002-07-01), Ginter et al.
patent: 6510513 (2003-01-01), Danieli
patent: 6678883 (2004-01-01), Berry et al.
patent: 6754890 (2004-06-01), Berry et al.
patent: 6839896 (2005-01-01), Coffman et al.
patent: 6990513 (2006-01-01), Belfiore et al.
patent: 7100047 (2006-08-01), Stamos et al.
patent: 7165174 (2007-01-01), Ginter et al.
patent: 7281011 (2007-10-01), Bradley et al.
patent: 7281020 (2007-10-01), Fine
patent: 7409547 (2008-08-01), Stamos et al.
patent: 7454462 (2008-11-01), Belfiore et al.
patent: 7472272 (2008-12-01), Stamos et al.
patent: 7814021 (2010-10-01), Stamos et al.
patent: 2001/0042043 (2001-11-01), Shear et al.
patent: 2002/0002609 (2002-01-01), Chung et al.
patent: 2002/0118220 (2002-08-01), Lui et al.
patent: 2002/0120685 (2002-08-01), Srivastava et al.
patent: 2002/0161766 (2002-10-01), Lawson et al.
patent: 2002/0165988 (2002-11-01), Khan et al.
patent: 2002/0178271 (2002-11-01), Graham et al.
patent: 2003/0005174 (2003-01-01), Coffman et al.
patent: 2003/0051026 (2003-03-01), Carter et al.
patent: 2003/0120935 (2003-06-01), Teal et al.
patent: 2003/0145235 (2003-07-01), Choo
patent: 2003/0169306 (2003-09-01), Makipaa et al.
patent: 2004/0039809 (2004-02-01), Ranous et al.
patent: 2004/0044912 (2004-03-01), Connary et al.
patent: 2004/0054894 (2004-03-01), Lambert
patent: 2004/0181794 (2004-09-01), Coleman et al.
patent: 2004/0255160 (2004-12-01), Stamos et al.
patent: 2005/0060537 (2005-03-01), Stamos et al.
patent: 2008/0034228 (2008-02-01), Shear et al.
patent: 2008/0288775 (2008-11-01), Baier et al.
patent: 07-295892 (1995-11-01), None
patent: 11-017915 (1999-01-01), None
patent: 2001-184264 (2001-07-01), None
patent: 2002-175210 (2002-06-01), None
patent: WO 00/22777 (2000-04-01), None
patent: WO 2004/066082 (2004-08-01), None
patent: WO 2004/066085 (2004-08-01), None
patent: WO 2004/066541 (2004-08-01), None
“Planning for CA-ACF2 Migration to OS/390 Security Server (RACF),”IBM International Technical Support Organization, Poughkeepsie, NY, 1sted. (1996).
Kirichenko, A., “F-Secure Kennel Mode Cryptographic Driver, FIPS 140-2 Validation Security Policy,” F-Secure Corp., Dec. 2001 entire document, cs-www.ncsi.nist.gov/cryptval/140-1/120sp/140sp237.pdf.
Reid, Jason, F., et al., DRM, Trusted Computing and Operating System Architecture', 2005, Information Security Research Centre, Queensland Univer. of Technology, entire document, ‘http://crpit.com/confpapers/CRPITV44Reid.pdf’.
International Search Report from International Application No. PCT/US2004/001454, Dated: Dec. 10, 2004.
Written Opinion of the International Searching Authority from International Application No. PCT/US2004/001454, Dated: Dec. 10, 2004.
International Search Report from International Application No. PCT/US2004/001508, Dated: Dec. 17, 2004.
Written Opinion of the International Searching Authority from International Application No. PCT/US2004/001508, Dated: Dec. 17, 2004.
Reply to Written Opinion from International Application No. PCT/US2004/001454, Dated: Mar. 10, 2005.
Reply to Written Opinion from International Application No. PCT/US2004/001508, Dated: Mar. 16, 2005.
International Search Report from International Application No. PCT/US2004/001529, Dated: May 6, 2005.
Written Opinion of the International Searching Authority from International Application No. PCT/US2004/001529, Dated: May 6, 2005.
Reply to Written Opinion from International Application No. PCT/US2004/001529, Dated: Aug. 8, 2005.
International Preliminary Report on Patentability from International Application No. PCT/US2004/001454, Dated: Oct. 21, 2005.
International Preliminary Report on Patentability from International Application No. PCT/US2004/001529, Dated: May 15, 2006.
International Search Report from International Application No. PCT/US2005/040395, Dated: Sep. 5, 2007.
Written Opinion of the International Searching Authority from International Application No. PCT/US2005/040395, Dated: Sep. 5, 2007.
International Preliminary Report on Patentability from International Application No. PCT/US2004/001508, 4 pages, Dated: Dec. 17, 2008.
Blaze, M., “A Cryptographic File System for Unix,” Conference on Computer and Communications Security, Proceedings of the 1st ACM Conference on Compute, ACM, 1993, pp. 9-16.
Wespi, A., et al., “Intrusion Detection Using Variable-Length Audit Trail Patterns,”RAID 2000, H. Debar, L. Mé, eds. (Berlin Heidelbergp: Springer-Verlag ), pp. 110-129 (2000).
Chari and Cheng, “BlueBoX: A Policy-Driven, Host-Based Intrusion Detection System,” Proceedings of the Network and Distributed System Security Symposium, San Diego, California, USA (2002).
Lunt, T.F. et al., “A Real-Time Intrusion-Detection Expert System (IDES),” (SRI Project 6784). Washington, D.C.: SPAWAR (Feb. 1992).
“HIBUN/Enterprise,” Open Space HAND Library, p. 18, Hitac2003-1, (mechanical English translation).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Digital asset usage accountability via event journaling does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Digital asset usage accountability via event journaling, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Digital asset usage accountability via event journaling will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2642520

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.