SAP SE
Generation of honeypot data

Last updated:

Abstract:

Data is received that includes a plurality of fields. These fields are modified using at least one differential privacy algorithm to result in fake data. This fake data is subsequently used to seed and enable a honeypot so that access to such honeypot and fake data can be monitored and/or logged. Related apparatus, systems, techniques and articles are also described.

Status:
Grant
Type:

Utility

Filling date:

6 Dec 2018

Issue date:

23 Mar 2021