SAP SE
APPLICATION SECURITY THROUGH DECEPTIVE AUTHENTICATION

Last updated:

Abstract:

Systems, methods, and computer media for securing software applications are provided herein. Through an enhanced authentication token, an application session request can be deceptively authenticated. When a malicious session request is detected, an enhanced authentication token can be generated that appears to successfully authenticate the session but contains information indicating that the session is malicious. The attacker believes that the session has been authenticated, but the information in the token indicating that the session is malicious causes an application clone session to be established instead of an actual application session. The clone session appears to be an actual application session but protects the valid user's account by including fake data instead of the user's actual data.

Status:
Application
Type:

Utility

Filling date:

28 Sep 2020

Issue date:

31 Mar 2022