Configuring and utilizing call-home systems
First Claim
Patent Images
1. A method comprising:
- receiving, by one or more computer processors, an alert on a system administrator console, wherein the alert is generated and sent to the system administrator console by a customer device in response to the customer device (i) detecting an event that is associated with a product for which a support-service is provided and (ii) determining that the customer device requires approval to generate the log file;
sending to the customer device, via the system administrator console and by one or more computer processors, a request to generate a log file that includes information describing, at least in part, the event;
receiving on the system administrator console, by one or more computer processors, the log file generated by the customer device in response to the customer device receiving the request;
presenting, by one or more computer processors, the log file on a user interface of the system administrator console;
detecting, by one or more computer processors, one or more interactions with the user interface that are associated with one or more instructions to modify the log file in compliance with an information security policy;
automatically applying, by one or more computer processors, one or more modifications to confidential information within the log file, based on the one or more interactions, to create a modified version of the log file in compliance with an information security policy, wherein the one or more modifications include at least one of (i) a modification that omits confidential information from the log file, (ii) a modification that redacts confidential information in the log file, and (iii) a modification that obfuscates confidential information in the log file; and
transferring, by one or more computer processors, the modified version of the log file to a call-home server based on one or more data transfer options.
1 Assignment
0 Petitions
Accused Products
Abstract
Call-home systems are configured and utilized. A log file is presented on a user interface of a computing device. One or more interactions that are associated with one or more instructions to modify the log file are detected on the user interface. One or more modifications to the log file are applied to the log file based on the one or more interactions. The one or more modifications include at least one of a modification that omits information from the log file, a modification that redacts information in the log file, and a modification that obfuscates information in the log file. The modified version of the log file is transferred to a call-home server based on one or more data transfer options.
18 Citations
20 Claims
-
1. A method comprising:
-
receiving, by one or more computer processors, an alert on a system administrator console, wherein the alert is generated and sent to the system administrator console by a customer device in response to the customer device (i) detecting an event that is associated with a product for which a support-service is provided and (ii) determining that the customer device requires approval to generate the log file; sending to the customer device, via the system administrator console and by one or more computer processors, a request to generate a log file that includes information describing, at least in part, the event; receiving on the system administrator console, by one or more computer processors, the log file generated by the customer device in response to the customer device receiving the request; presenting, by one or more computer processors, the log file on a user interface of the system administrator console; detecting, by one or more computer processors, one or more interactions with the user interface that are associated with one or more instructions to modify the log file in compliance with an information security policy; automatically applying, by one or more computer processors, one or more modifications to confidential information within the log file, based on the one or more interactions, to create a modified version of the log file in compliance with an information security policy, wherein the one or more modifications include at least one of (i) a modification that omits confidential information from the log file, (ii) a modification that redacts confidential information in the log file, and (iii) a modification that obfuscates confidential information in the log file; and transferring, by one or more computer processors, the modified version of the log file to a call-home server based on one or more data transfer options. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
presenting on a user interface of a system administrator console, by one or more computer processors, one or more configuration options, wherein the one or more configuration options include at least one of (i) an option to automatically omit confidential information from one or more log files in compliance with an information security policy, (ii) an option to automatically redact confidential information in the one or more log files in compliance with the information security policy, and (iii) an option to automatically obfuscate confidential information in the one or more log files in compliance with the information security policy; sending to a customer device, by one or more computer processors, (i) one or more instructions to automatically generate the one or more log files based on one or more selected configuration options; receiving on the system administrator console, by one or more computer processors, a log file from the customer device, wherein the customer device automatically generated the log file in response to receiving the one or more instructions form the system administrator console and in response to detecting an event that is associated with a product for which a support-service is provided, and wherein the log file describes, at least in part, the event; presenting, by one or more computer processors, the log file on the user interface of the system administrator console; and transferring, by one or more computer processors, the log file to a call-home server based on one or more data transfer options. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer system comprising:
-
one or more computer processors; one or more computer readable storage media; program instructions stored on the one or more computer readable storage media for execution by at least one of the one or more processors, the program instructions comprising; program instructions to receive an alert on a system administrator console, wherein the alert is generated and sent to the system administrator console by a customer device in response to the customer device (i) detecting an event that is associated with a product for which a support-service is provided and (ii) determining that the customer device requires approval to generate the log file; program instructions to send to the customer device, via the system administrator console, a request to generate a log file that includes information describing, at least in part, the event; program instructions to receive on the system administrator console the log file generated by the customer device in response to the customer device receiving the request; program instructions to present the log file on a user interface of the system administrator console; program instructions to detect one or more interactions with the user interface that are associated with one or more instructions to modify the log file in compliance with an information security policy; program instructions to automatically apply one or more modifications to confidential information within the log file, based on the one or more interactions, to create a modified version of the log file in compliance with the information security policy, wherein the one or more modifications include at least one of (i) a modification that omits confidential information from the log file, (ii) a modification that redacts confidential information in the log file, and (iii) a modification that obfuscates confidential information in the log file; and program instructions to transfer the modified version of the log file to a call-home server based on one or more data transfer options. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification