Browse Prior Art Database

Method and System for Sending Analytics Data to a Central Server in a Restricted Network Environment

IP.com Disclosure Number: IPCOM000240354D
Publication Date: 2015-Jan-26
Document File: 1 page(s) / 32K

Publishing Venue

The IP.com Prior Art Database

Abstract

A method and system is disclosed for gathering and sending users’ usage analytics data in a restricted network to an external central server without compromising security of the restricted network. The method and system uses existing deployed network elements of the restricted network for gathering users’ usage analytics data.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 78% of the total text.

Page 01 of 1

Method and System for Sending Analytics Data to a Central Server in a Restricted Network Environment

A method and system is disclosed for gathering and sending users' usage analytics data in a restricted network to an

external central server without compromising security of the restricted network. The method and system uses existing deployed network elements of the restricted network for gathering users' usage analytics data.

Network Elements such as, but not limited to, storage, cable video routers, and switches, are constantly under monitoring and are well protected. Inside the restricted network in order to prevent Denial-of-Service (DoS), exposing critical and/or confidential data, a specific outbound tunnel is used. The outbound tunnel gathers the information automatically forms the network elements, including service-level agreement (SLA) enforcement. Thereafter, the gathered information is used to support automatic event generation. When an event occurs on the network elements, it generates a mail which is passed to a call home server. The restricted network also provides an option to authorized users' to generate custom events.

Usually, users store usage analytics data on a device such as, but not limited to, a mobile device, a tablet and a computer. Accordingly, in accordance with the method and system disclosed herein, an authorized user generates a custom event on one of the network elements which generates a mail. The method and system loads the usag...