Electrical computers and digital processing systems: multicomput – Computer network managing – Computer network monitoring
Reexamination Certificate
2008-04-08
2008-04-08
Dalencourt, Yves (Department: 2157)
Electrical computers and digital processing systems: multicomput
Computer network managing
Computer network monitoring
C715S771000, C715S772000
Reexamination Certificate
active
07356583
ABSTRACT:
Systems and methods are provided for collecting a set of values from a computing device and associating the collected set of values with a process, such as an business process or industrial process. Process activity is monitored by collecting one or more parameters associated with specific repeatable tasks or activities performed on a computing device. The one or more collected parameters are then aggregated to form a specific process pattern that can be associated with the actual throughput and efficiency of a process.
REFERENCES:
patent: 5067977 (1991-11-01), Deb
patent: 5850548 (1998-12-01), Williams
patent: 5966510 (1999-10-01), Carbonneau et al.
patent: 6081207 (2000-06-01), Batio
patent: 7000193 (2006-02-01), Impink et al.
patent: 2002/0111887 (2002-08-01), McFarlane et al.
patent: WO 00 19664 (2000-06-01), None
Helman, P., et al.: “Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse”, IEEE Transactions on Software Engineering, IEEE Inc. New York, US, vol. 19, No. 9, Sep. 1, 1993, pp. 886-901, XP000415033 ISSN: 0098-5589, I. Introduction, II. Detection Objectives.
Heatley, S. K., et al.: “Data Mining Computer Audit Logs to Detect Computer Misuse”, International Journal of Intelligent Systems in Accounting, Finance and Management, Sep. 1998, Wiley, UK, vol. 7, No. 3, pp. 125-134, XP001156255, ISSN: 1055-615X, Introduction p. 125-27, Data Mining Process p. 127-32.
Lane, et al., “Temporal Sequence Learning and Data Reduction for Anomaly Detection” ACM Transactions on Information and System Security, ACM, New York, NY, US, vol. 2, No. 3, Aug. 1999, pp. 296-331, XP002907154, ISSN: 1094-9224, *Abstract*, 1. Introduction, 2. Building Classification Models.
Lee, et al., Data Mining Approaches for Intrusion of the Seventh Usenix Security Symposium, Proceedings of the Seventh Usenix Security Symposim, San Antonio, TX, USA, Jan. 26-29, 1998, pp. 79-93, XP002264916, 1998, Berkeley, CA, USA, Usenix Assoc, USA, ISBN: 1-880446-92-8, 1. Introduction, 2. Building Classification Models.
Palmer John
Vazquez George O.
Dalencourt Yves
Northrop Grumman Corporation
Tarolli, Sundheim Covell & Tummino LLP
LandOfFree
Indirect measurement of business processes does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Indirect measurement of business processes, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Indirect measurement of business processes will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2787896