×

Cloud protection techniques

  • US 9,894,098 B2
  • Filed: 07/21/2014
  • Issued: 02/13/2018
  • Est. Priority Date: 10/28/2011
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method, comprising:

  • creating a feigned cloud environment within a source cloud environment upon detection of an event from within the source environment, wherein creating further includes creating the feigned could environment on a set of cooperating computing resources including one or more processor-enabled and memory-enabled machines having one or more software and computing resources;

    migrating services from the source cloud environment to a target cloud environment, wherein creating and migrating further includes processing the creating of the feigned cloud environment in parallel and concurrently with processing the migrating of the services; and

    tracking activity of an intruder within the feigned cloud environment during the migration.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×