×

Deception-Based Responses to Security Attacks

  • US 20140250524A1
  • Filed: 03/04/2013
  • Published: 09/04/2014
  • Est. Priority Date: 03/04/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • receiving automated or manual notification of an attack;

    transitioning the attack to a monitored computing process or device that is configured to pose to an adversary as a computing device impacted by the attack; and

    enabling the adversary to obtain deceptive information from the monitored computing process or device.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×