Collaborative application security
    11.
    发明授权

    公开(公告)号:US11429716B2

    公开(公告)日:2022-08-30

    申请号:US16696594

    申请日:2019-11-26

    Applicant: SAP SE

    Abstract: Systems, methods, and computer media for collaboratively securing software applications are provided herein. Through a collaborative approach, the described examples allow detection and management of unauthorized users across applications and application suites. By communicating details regarding cyber-attacks among applications, threats to applications can be managed pre-emptively. For example, applications can use attacks on other applications to implement new honeytokens, threat detection points, and blacklisted usernames or other identifiers to limit data access in future attacks.

    AUTOMATIC GENERATION OF DECEPTIVE API ENDPOINTS

    公开(公告)号:US20220109692A1

    公开(公告)日:2022-04-07

    申请号:US17062903

    申请日:2020-10-05

    Applicant: SAP SE

    Abstract: Systems, methods, and computer media for securing software applications are provided herein. Using deceptive endpoints, attacks directed to API endpoints can be detected, and attackers can be monitored or blocked. Deceptive endpoints can be automatically generated by modifying valid endpoints for an application. Deceptive endpoints are not valid endpoints for the application, so if a deceptive endpoint is accessed, it is an indication of an attack. When a deceptive endpoint is deployed, accessing the deceptive endpoint can cause an alert to be generated, and an account, user, or device associated with accessing the deceptive endpoint can be blocked or monitored.

    Generation of honeypot data
    14.
    发明授权

    公开(公告)号:US10958685B2

    公开(公告)日:2021-03-23

    申请号:US16211802

    申请日:2018-12-06

    Applicant: SAP SE

    Abstract: Data is received that includes a plurality of fields. These fields are modified using at least one differential privacy algorithm to result in fake data. This fake data is subsequently used to seed and enable a honeypot so that access to such honeypot and fake data can be monitored and/or logged. Related apparatus, systems, techniques and articles are also described.

    IDENTIFIER-BASED APPLICATION SECURITY

    公开(公告)号:US20210067551A1

    公开(公告)日:2021-03-04

    申请号:US16552951

    申请日:2019-08-27

    Applicant: SAP SE

    Abstract: Systems, methods, and computer media for securing software applications are provided herein. Through the use of an identifier such as a digital fingerprint, application sessions or session requests that use the same credentials can be distinguished, and malicious users can be detected and managed. A request to establish a session with an application can be received. Based on a digital fingerprint associated with the request, it can be determined that although a credential included in the request is valid, the request is unauthorized by comparing the digital fingerprint to known malicious fingerprints. When the fingerprint is found to be malicious, a cloned application session having at least partially fake data can be established instead of the requested application, thus limiting an attacker's access to real application data without revealing to the attacker that the attack has been detected.

    Generation of Honeypot Data
    16.
    发明申请

    公开(公告)号:US20200186567A1

    公开(公告)日:2020-06-11

    申请号:US16211802

    申请日:2018-12-06

    Applicant: SAP SE

    Abstract: Data is received that includes a plurality of fields. These fields are modified using at least one differential privacy algorithm to result in fake data. This fake data is subsequently used to seed and enable a honeypot so that access to such honeypot and fake data can be monitored and/or logged. Related apparatus, systems, techniques and articles are also described.

    End user control of personal data in the cloud

    公开(公告)号:US10162982B2

    公开(公告)日:2018-12-25

    申请号:US14965194

    申请日:2015-12-10

    Applicant: SAP SE

    Abstract: Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving, by an authorization manager of a cloud-platform, a request from an application, the request indicating a request to access personal user data stored in a database system of the cloud-platform, determining, by the authorization manager and based on user input from a user, that access to the personal user data is to be granted, and in response: providing, by the authorization manager, an access token to the application, receiving an access request from the application, the access request including the access token, and selectively providing the personal user data from a database container of the database system based on the access token, the database container being specific to the user.

Patent Agency Ranking