×

Adapting decoy data present in a network

  • US 9,990,507 B2
  • Filed: 10/01/2015
  • Issued: 06/05/2018
  • Est. Priority Date: 03/25/2013
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, the program, when executed, causing the at least one computing device to at least:

  • obtain policy data, the policy data specifying decoy data eligible to be inserted in a data store and an access policy for accessing the data store;

    obtain a response to an access of the data store, the response to the access of the data store comprising the decoy data among a plurality of non-decoy data;

    determine legitimacy of the access of the data store based at least in part upon a comparison between the access policy and a characteristic associated with the access of the data store; and

    remove the decoy data from among the plurality of non-decoy data in the response to the access of the data store based at least in part upon the access being legitimate according to the access policy.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×