Cisco technology, inc. (20240311512). AUTOMATED DATA ANONYMIZATION simplified abstract

From WikiPatents
Jump to navigation Jump to search

AUTOMATED DATA ANONYMIZATION

Organization Name

cisco technology, inc.

Inventor(s)

Gyana Ranjan Dash of San Jose CA (US)

Antonio Nucci of San Jose CA (US)

Donald Mark Allen of Colorado Springs CO (US)

Kabeer Noorudeen of Artarmon, NSW (AU)

Tatiana Alexandrovna Gaponova of Moscow (RU)

Konstantin Grechishchev of Moscow (RU)

AUTOMATED DATA ANONYMIZATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240311512 titled 'AUTOMATED DATA ANONYMIZATION

The abstract describes a server that processes sensitive information in service request records from a network, replacing repeated sequences of characters with tags to maintain data integrity.

  • The server obtains service request records containing sensitive information from network elements.
  • It identifies repeated sequences of characters in the records and tags them as specific sensitive information types.
  • The server replaces the tagged sequences of characters to protect the data integrity of the service request records.
  • After replacement, the server publishes the records for analysis without revealing the sensitive information.

Potential Applications: - Data security and privacy protection in network communication. - Compliance with data protection regulations. - Preventing unauthorized access to sensitive information.

Problems Solved: - Protecting sensitive information in service request records. - Ensuring data integrity and confidentiality. - Facilitating secure data analysis and sharing.

Benefits: - Enhanced data security and privacy. - Compliance with data protection laws. - Improved trust and reliability in network communication.

Commercial Applications: Title: Secure Data Processing Server for Network Communication This technology can be used in industries such as telecommunications, healthcare, finance, and government agencies to securely process sensitive information in network communication, ensuring data integrity and confidentiality.

Prior Art: Researchers can explore prior art related to data security protocols, network communication encryption methods, and data privacy regulations to understand the existing solutions and innovations in this field.

Frequently Updated Research: Researchers and developers can stay updated on advancements in data security, encryption technologies, and privacy protection measures to enhance the effectiveness of the server in processing sensitive information in network communication.

Questions about Secure Data Processing Server for Network Communication: 1. How does the server identify and tag sensitive information in service request records? The server uses algorithms to analyze the records and identify repeated sequences of characters, which are then tagged as specific sensitive information types.

2. What are the key benefits of replacing sensitive information in service request records? Replacing sensitive information helps maintain data integrity and confidentiality, ensuring secure data processing and analysis in network communication.


Original Abstract Submitted

in one example embodiment, a server that is in communication with a network that includes a plurality of network elements obtains, from the network, a service request record that includes sensitive information related to at least one of the plurality of network elements. the server parses the service request record to determine that the service request record includes a sequence of characters that is repeated in the service request record, and tags the sequence of characters as a particular sensitive information type. based on the tagging, the server identically replaces the sequence of characters so as to preserve an internal consistency of the service request record. after identically replacing the sequence of characters, the server publishes the service request record for analysis without revealing the sequence of characters.