SAP SE
Generation of honeypot data
Last updated:
Abstract:
Data is received that includes a plurality of fields. These fields are modified using at least one differential privacy algorithm to result in fake data. This fake data is subsequently used to seed and enable a honeypot so that access to such honeypot and fake data can be monitored and/or logged. Related apparatus, systems, techniques and articles are also described.
Status:
Grant
Type:
Utility
Filling date:
6 Dec 2018
Issue date:
23 Mar 2021