DATA PRIVACY FOR SMART SERVICES
First Claim
1. A method comprising:
- determining, at a first network device, that network device information includes non-sensitive data and sensitive data;
in response to the determining, generating mapping data that maps dummy data to the sensitive data;
generating output data that comprises the non-sensitive data and the dummy data;
sending the output data to a second network device.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are disclosed for hiding sensitive information from a provider of support services. In one embodiment, a first network device determines that network device information includes non-sensitive data and sensitive data. In response to the determining, the first network device generates mapping data that maps dummy information to the sensitive data. The first network device generates output data that comprises the non-sensitive data and the dummy data and sends the output data to a second network device. In other embodiments, the user may select the network parameters that are sensitive. The first network device may also receive first report data from the second network device that identifies a network problem and includes the dummy data and generate second report data by using the mapping data to replace the dummy information with the sensitive data.
14 Citations
20 Claims
-
1. A method comprising:
-
determining, at a first network device, that network device information includes non-sensitive data and sensitive data; in response to the determining, generating mapping data that maps dummy data to the sensitive data; generating output data that comprises the non-sensitive data and the dummy data; sending the output data to a second network device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more non-transitory computer-readable storage media comprising one or more sequences of instructions which when executed cause:
-
determining, at a first network device, that network device information includes non-sensitive data and sensitive data; in response to determining, generating mapping data that maps dummy information to the sensitive data; generating output data that comprises the non-sensitive data and the dummy data; sending the output data to a second network device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
receiving, at a first network device in a private network, input that identifies one or more sensitive network parameters that should not leave the private network; collecting network data from one or more network devices that are in the private network; based on the input, determining which of the collected network data is sensitive network data; in response to the determining, generating mapping data that maps dummy data to the sensitive network data; generating an output file that includes at least a portion of the collected network data; wherein the dummy data serves as a placeholder for the sensitive network data in the output file; sending the output file over a public network to a second network device for a network analysis of the one or more network devices in the private network; receiving a report file from the second network device; wherein the report file identifies network issues associated with the one or more network devices in the private network; wherein the dummy data serves as a placeholder for the sensitive network data in the report file; replacing, at the first network device, the dummy data with the sensitive network data. - View Dependent Claims (16, 17)
-
-
18. One or more non-transitory computer-readable storage media comprising one or more sequences of instructions which when executed cause:
-
receiving, at a first network device in a private network, input that identifies one or more sensitive network parameters that should not leave the private network; collecting network data from one or more network devices that are in the private network; based on the input, determining which of the collected network data is sensitive network data; in response to the determining, generating mapping data that maps dummy data to the sensitive network data; generating an output file that includes at least a portion of the collected network data; wherein the dummy data serves as a placeholder for the sensitive network data in the output file; sending the output file over a public network to a second network device for a network analysis of the one or more network devices in the private network; receiving a report file from the second network device; wherein the report file identifies network issues associated with the one or more network devices in the private network; wherein the dummy data serves as a placeholder for the sensitive network data in the report file; replacing, at the first network device, the dummy data with the sensitive network data. - View Dependent Claims (19, 20)
-
Specification