-
公开(公告)号:US20210349803A1
公开(公告)日:2021-11-11
申请号:US17379789
申请日:2021-07-19
发明人: Natalie Meurer , Andrew Lampert , Dyon Balding , Yeong Wei Wee
IPC分类号: G06F11/34 , G06F3/0486 , G06F17/18
摘要: Systems and methods are provided for improved auditing of user actions associated with a software application. The system includes functionality to log user actions in a structured, standardized way. The system includes interactive user interfaces for analyzing the logs. The logging is based on a well-defined categorization of available actions. The log information includes (and distinguishes among) user details, context details, user inputs, and/or system outputs (including identification of data objects). The interactive user interfaces enable a user to view structured log data in an efficient manner, such as by presenting logs in a tabular format, executing queries on the log data, and/or presenting visualizations that summarize the log data. The interactive user interfaces provide functionality that allows a user to investigate and/or audit user interactions with a data object. A reviewer is permitted to drag and drop one or more data objects of interest from the software application directly into the interactive user interfaces. The interactive interfaces present log entries associated with the object(s) for further review by the reviewer.
-
公开(公告)号:US11614851B2
公开(公告)日:2023-03-28
申请号:US17067456
申请日:2020-10-09
发明人: Daniel Cervelli , Allen Chang , Andrew Elder , Andrew Lampert , John Carrino , Peter Austin
IPC分类号: G06F3/048 , G06F3/0483 , G06F16/29 , G06F3/0482 , G06F3/0484 , G06F21/34 , H04N7/18
摘要: Systems and methods are provided for providing an interface for conducting an investigation concerning at least one suspected unauthorized entry to an environment. A set of tabbed sub-interfaces for accessing information related to the environment can be provided in a first region of the interface. An interactive map of the environment can be provided in a second region of the interface, wherein the interactive map identifies locations within the environment that are associated with access control readers, and wherein the interactive map identifies locations within the environment that are associated with respective cameras that capture visual data describing those locations.
-
公开(公告)号:US20230090961A1
公开(公告)日:2023-03-23
申请号:US18058067
申请日:2022-11-22
发明人: Natalie Meurer , Andrew Lampert , Dyon Balding , Yeong Wei Wee
IPC分类号: G06F11/34 , G06F3/0486 , G06F17/18
摘要: Systems and methods are provided for improved auditing of user actions associated with a software application. The system includes functionality to log user actions in a structured, standardized way. The system includes interactive user interfaces for analyzing the logs. The logging is based on a well-defined categorization of available actions. The log information includes (and distinguishes among) user details, context details, user inputs, and/or system outputs (including identification of data objects). The interactive user interfaces enable a user to view structured log data in an efficient manner, such as by presenting logs in a tabular format, executing queries on the log data, and/or presenting visualizations that summarize the log data. The interactive user interfaces provide functionality that allows a user to investigate and/or audit user interactions with a data object. A reviewer is permitted to drag and drop one or more data objects of interest from the software application directly into the interactive user interfaces. The interactive interfaces present log entries associated with the object(s) for further review by the reviewer.
-
公开(公告)号:US11537496B2
公开(公告)日:2022-12-27
申请号:US17379789
申请日:2021-07-19
发明人: Natalie Meurer , Andrew Lampert , Dyon Balding , Yeong Wei Wee
IPC分类号: G06F15/16 , G06F11/34 , G06F3/0486 , G06F17/18
摘要: Systems and methods are provided for improved auditing of user actions associated with a software application. The system includes functionality to log user actions in a structured, standardized way. The system includes interactive user interfaces for analyzing the logs. The logging is based on a well-defined categorization of available actions. The log information includes (and distinguishes among) user details, context details, user inputs, and/or system outputs (including identification of data objects). The interactive user interfaces enable a user to view structured log data in an efficient manner, such as by presenting logs in a tabular format, executing queries on the log data, and/or presenting visualizations that summarize the log data. The interactive user interfaces provide functionality that allows a user to investigate and/or audit user interactions with a data object. A reviewer is permitted to drag and drop one or more data objects of interest from the software application directly into the interactive user interfaces. The interactive interfaces present log entries associated with the object(s) for further review by the reviewer.
-
公开(公告)号:US12093159B2
公开(公告)日:2024-09-17
申请号:US18058067
申请日:2022-11-22
发明人: Natalie Meurer , Andrew Lampert , Dyon Balding , Yeong Wei Wee
IPC分类号: G06F15/16 , G06F3/0486 , G06F11/34 , G06F17/18
CPC分类号: G06F11/3438 , G06F3/0486 , G06F11/3476 , G06F17/18
摘要: Systems and methods are provided for improved auditing of user actions associated with a software application. The system includes functionality to log user actions in a structured, standardized way. The system includes interactive user interfaces for analyzing the logs. The logging is based on a well-defined categorization of available actions. The log information includes (and distinguishes among) user details, context details, user inputs, and/or system outputs (including identification of data objects). The interactive user interfaces enable a user to view structured log data in an efficient manner, such as by presenting logs in a tabular format, executing queries on the log data, and/or presenting visualizations that summarize the log data. The interactive user interfaces provide functionality that allows a user to investigate and/or audit user interactions with a data object. A reviewer is permitted to drag and drop one or more data objects of interest from the software application directly into the interactive user interfaces. The interactive interfaces present log entries associated with the object(s) for further review by the reviewer.
-
公开(公告)号:US11068373B1
公开(公告)日:2021-07-20
申请号:US16450623
申请日:2019-06-24
发明人: Natalie Meurer , Andrew Lampert , Dyon Balding , Yeong Wei Wee
IPC分类号: G06F15/16 , G06F11/34 , G06F3/0486 , G06F17/18
摘要: Systems and methods are provided for improved auditing of user actions associated with a software application. The system includes functionality to log user actions in a structured, standardized way. The system includes interactive user interfaces for analyzing the logs. The logging is based on a well-defined categorization of available actions. The log information includes (and distinguishes among) user details, context details, user inputs, and/or system outputs (including identification of data objects). The interactive user interfaces enable a user to view structured log data in an efficient manner, such as by presenting logs in a tabular format, executing queries on the log data, and/or presenting visualizations that summarize the log data. The interactive user interfaces provide functionality that allows a user to investigate and/or audit user interactions with a data object. A reviewer is permitted to drag and drop one or more data objects of interest from the software application directly into the interactive user interfaces. The interactive interfaces present log entries associated with the object(s) for further review by the reviewer.
-
公开(公告)号:US20190182038A1
公开(公告)日:2019-06-13
申请号:US15991366
申请日:2018-05-29
发明人: Vaughan Shanks , Andrew Lampert
摘要: Systems are provided for managing access to a log of dataset that is generated when the dataset is accessed. A system stores, with respect to each of a log producer and a log accessor, an encrypted symmetric key for dataset that is encrypted using a corresponding public key. The system returns the encrypted symmetric key for the log producer, such that the log producer can decrypt the dataset that is encrypted using the symmetric key. A log of the dataset is generated when the log producer accesses the dataset.
-
公开(公告)号:US11728975B2
公开(公告)日:2023-08-15
申请号:US17481221
申请日:2021-09-21
发明人: Vaughan Shanks , Andrew Lampert
CPC分类号: H04L9/0825 , G06F21/62 , H04L9/083 , H04L9/0894 , H04L9/3226 , H04L63/0435 , H04W12/04 , H04W12/06 , H04W12/08 , G06F2221/2101 , G06F2221/2107
摘要: Systems are provided for managing access to a log of dataset that is generated when the dataset is accessed. A system stores, with respect to each of a log producer and a log accessor, an encrypted symmetric key for dataset that is encrypted using a corresponding public key. The system returns the encrypted symmetric key for the log producer, such that the log producer can decrypt the dataset that is encrypted using the symmetric key. A log of the dataset is generated when the log producer accesses the dataset.
-
公开(公告)号:US20220006623A1
公开(公告)日:2022-01-06
申请号:US17481221
申请日:2021-09-21
发明人: Vaughan Shanks , Andrew Lampert
摘要: Systems are provided for managing access to a log of dataset that is generated when the dataset is accessed. A system stores, with respect to each of a log producer and a log accessor, an encrypted symmetric key for dataset that is encrypted using a corresponding public key. The system returns the encrypted symmetric key for the log producer, such that the log producer can decrypt the dataset that is encrypted using the symmetric key. A log of the dataset is generated when the log producer accesses the dataset.
-
公开(公告)号:US11133925B2
公开(公告)日:2021-09-28
申请号:US15991366
申请日:2018-05-29
发明人: Vaughan Shanks , Andrew Lampert
摘要: Systems are provided for managing access to a log of dataset that is generated when the dataset is accessed. A system stores, with respect to each of a log producer and a log accessor, an encrypted symmetric key for dataset that is encrypted using a corresponding public key. The system returns the encrypted symmetric key for the log producer, such that the log producer can decrypt the dataset that is encrypted using the symmetric key. A log of the dataset is generated when the log producer accesses the dataset.
-
-
-
-
-
-
-
-
-