Tokenization

You are here:
< All Topics

NP-Live can preserve the privacy of sensitive configuration file information by fully and automatically tokenizing input files. If your version of NP-Live includes a Tokenize data checkbox when you create a new workspace, then you can turn on tokenization for every file uploaded to the workspace.

The tokenization technique works in such a way that configuration files are first tokenized using random values on the client side, and sent to the server for analysis. Next the computation is performed on them and finally, the results are returned to the client where they are de-tokenized. The server-based computation has no knowledge of the pre-tokenized information, and the tokenization can be transparent to the client, except for providing a key upon which the tokenization depends. Information currently tokenized includes IP addresses, device names, object group names, and interface names. This technique provably leaks no information about the pre-tokenized values of the IP addresses and object names, and so provides the best possible protection for the privacy of the data.

For any question about the tokenization technique, please contact support@network-perception.com.

Table of Contents