Log in
Enquire now
‌

US Patent 9462013 Managing security breaches in a networked computing environment

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent

Patent attributes

Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
Patent Number
9462013
Date of Patent
October 4, 2016
Patent Application Number
14699279
Date Filed
April 29, 2015
Patent Citations Received
‌
US Patent 12120145 Threat intelligence system and method
0
‌
US Patent 12093375 Generating and monitoring fictitious data entries to detect breaches
0
‌
US Patent 12093753 Method and system for synthetic generation of time series data
0
‌
US Patent 12113684 Identifying bogon address spaces
0
‌
US Patent 11687384 Real-time synthetically generated video from still frames
0
‌
US Patent 11683618 Application performance monitoring and management platform with anomalous flowlet resolution
0
‌
US Patent 11700190 Technologies for annotating process and user information for network flows
0
‌
US Patent 11695659 Unique ID generation for sensors
0
...
Patent Primary Examiner
‌
Amare F Tabor
Patent abstract

Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. The method also includes receiving, by the at least one computer device, a communication after the detecting the breach. The method further includes determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user. The method additionally includes, based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 9462013 Managing security breaches in a networked computing environment

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.