ALLOWING ACCESS TO FALSE DATA
In one aspect, a device includes a processor and storage accessible to the processor. The storage bears instructions executable by the processor to determine that an attempt has occurred of unauthorized access to a computer system having a computer interface for presentation to an authorized user. T...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
22.02.2018
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In one aspect, a device includes a processor and storage accessible to the processor. The storage bears instructions executable by the processor to determine that an attempt has occurred of unauthorized access to a computer system having a computer interface for presentation to an authorized user. The instructions are also executable to, responsive to determining that an attempt has occurred of unauthorized access to the computer system, return from the computer system a proxy interface instead of the computer interface, the proxy interface permitting access to at least partially falsified data. |
---|---|
Bibliography: | Application Number: US201615237829 |