×

Managing security breaches in a networked computing environment

  • US 10,666,670 B2
  • Filed: 05/20/2019
  • Issued: 05/26/2020
  • Est. Priority Date: 04/29/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method of managing security breaches in a networked computing environment, comprising:

  • receiving, by at least one computer device, a communication;

    determining, by the at least one computer device, whether the communication is associated with a valid user or a malicious user; and

    in response to determining that the communication is associated with the malicious user, routing the malicious user to an element of a decoy system in the networked computing environment which comprises the decoy system and a production system,wherein;

    the decoy system is separate from the production system and comprises elements corresponding to elements of the production system;

    the routing comprises permitting the malicious user to access at least one element of the production system in one or more first layers;

    the networked computing environment comprises layers, and further comprising determining one of the layers at which a breach occurred; and

    the routing further comprises routing the malicious user to at least one element of the decoy system in one or more second layers downstream of the determined one of the layers.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×