CPC G16H 40/67 (2018.01) [G16H 10/60 (2018.01); G16H 40/40 (2018.01); G16H 50/70 (2018.01)] | 20 Claims |
1. A method for managing data collection for managed devices and unmanaged devices, the method being performed by a data collection system that manages the managed devices and comprising:
obtaining a request to register an unmanaged device of the unmanaged devices for collection of the data, wherein
the managed devices being managed by a first entity and implements a first set of digital security control mechanisms defined by the first entity,
the unmanaged device being managed by a second entity different from the first entity and implements, before and after being registered for the collection of the data, a second set of digital security control mechanisms that are at least in part different from the first set of digital security mechanisms, and
the second set of digital security control mechanisms being defined by a third entity different from the second entity and the first entity;
based on the request to register the unmanaged device and before registering the unmanaged device for the collection of the data:
identifying one or more data collection hardware of the unmanaged device;
providing a capability test to the unmanaged device to cause the unmanaged device to operate at least one of the one or more data collection hardware to generate a piece of data specified in the capability test;
obtaining a measurement package from the unmanaged device, the measurement package being responsive to the capability test and comprising the piece of data generated by at least one of the one or more data collection hardware; and
qualifying the unmanaged device for collection of at least a portion of diagnostic data based on the measurement package; and
registering, in response to the qualifying of the unmanaged device, the unmanaged device for collection of the at least the portion of the diagnostic data and causing, as part of the registering, the unmanaged device to follow at least one of the first set of digital security control mechanisms that is not part of the second set of digital security mechanisms.
|