18671930. AUTOMATED DATA ANONYMIZATION simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

AUTOMATED DATA ANONYMIZATION

Organization Name

Cisco Technology, Inc.

Inventor(s)

Gyana Ranjan Dash of San Jose CA (US)

Antonio Nucci of San Jose CA (US)

Donald Mark Allen of Colorado Springs CO (US)

Kabeer Noorudeen of Artarmon, NSW (AU)

Tatiana Alexandrovna Gaponova of Moscow (RU)

Konstantin Grechishchev of Moscow (RU)

AUTOMATED DATA ANONYMIZATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18671930 titled 'AUTOMATED DATA ANONYMIZATION

Simplified Explanation: The abstract describes a method where a server obtains a service request record containing sensitive information, identifies repeated sequences of characters in the record, replaces these sequences to maintain confidentiality, and then publishes the record for analysis without revealing the sensitive information.

Key Features and Innovation:

  • Server obtains service request record with sensitive information.
  • Identifies repeated sequences of characters in the record.
  • Replaces these sequences to maintain confidentiality.
  • Publishes the record for analysis without revealing sensitive information.

Potential Applications: This technology can be applied in industries where sensitive information needs to be protected, such as healthcare, finance, and telecommunications.

Problems Solved: This technology addresses the issue of protecting sensitive information while allowing for analysis and processing of service request records.

Benefits:

  • Enhanced security and confidentiality of sensitive information.
  • Allows for analysis and processing of service request records without compromising privacy.
  • Maintains internal consistency of records while preserving confidentiality.

Commercial Applications: Potential commercial applications include data security services, network analysis tools, and privacy protection software for businesses handling sensitive information.

Prior Art: Readers can start their search for prior art related to this technology by looking into data security protocols, network privacy measures, and record anonymization techniques.

Frequently Updated Research: Stay updated on the latest advancements in data security, privacy protection, and network analysis tools to enhance the application of this technology.

Questions about the Technology: 1. How does the technology ensure the replacement of sensitive information does not affect the integrity of the service request record? 2. What are the potential challenges in implementing this technology across different network environments?


Original Abstract Submitted

In one example embodiment, a server that is in communication with a network that includes a plurality of network elements obtains, from the network, a service request record that includes sensitive information related to at least one of the plurality of network elements. The server parses the service request record to determine that the service request record includes a sequence of characters that is repeated in the service request record, and tags the sequence of characters as a particular sensitive information type. Based on the tagging, the server identically replaces the sequence of characters so as to preserve an internal consistency of the service request record. After identically replacing the sequence of characters, the server publishes the service request record for analysis without revealing the sequence of characters.