Data from network devices is commonly made available without any regard to, or concern, for the ability to provably verify the classification level of the involved data. The owner of a network device frequently will wish to restrict data access, visibility, and processing as a policy action. To address these types of challenges, techniques presented herein support a multi-step approach to addressing the issue of how owners of network device-generated data may share such data with other parties (e.g., a vendor’s technical assistance center, partners, etc.) in a controlled way that respects data and other privacy controls and provides verification of the integrity of the data. The presented techniques support, among other things, parsing, objectifying, classifying, verifying, and, optionally, encrypting multiple elements of network device-generated data streams and attaching the output of such a process as verifiable metadata that is associated with the various network data objects thus generated.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.