-
1.
公开(公告)号:US20200184106A1
公开(公告)日:2020-06-11
申请号:US16215358
申请日:2018-12-10
Applicant: SAP SE
Inventor: Anderson Santana de Oliveira , Lorenzo Frigerio , Laurent Gomez
Abstract: Streaming data is received that is derived from at least one sensor (e.g., IoT sensors, etc.). At least one differential privacy algorithm is subsequently used to anonymize the received streaming data. The modified streaming data can then be provided (e.g., made available, stored, transmitted over a network, etc.) to at least one consuming computing device. Related apparatus, systems, techniques and articles are also described.
-
2.
公开(公告)号:US11087025B2
公开(公告)日:2021-08-10
申请号:US16215358
申请日:2018-12-10
Applicant: SAP SE
Inventor: Anderson Santana de Oliveira , Lorenzo Frigerio , Laurent Gomez
Abstract: Streaming data is received that is derived from at least one sensor (e.g., IoT sensors, etc.). At least one differential privacy algorithm is subsequently used to anonymize the received streaming data. The modified streaming data can then be provided (e.g., made available, stored, transmitted over a network, etc.) to at least one consuming computing device. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:US10958685B2
公开(公告)日:2021-03-23
申请号:US16211802
申请日:2018-12-06
Applicant: SAP SE
Inventor: Cedric Hebert , Anderson Santana de Oliveira , Lorenzo Frigerio
Abstract: Data is received that includes a plurality of fields. These fields are modified using at least one differential privacy algorithm to result in fake data. This fake data is subsequently used to seed and enable a honeypot so that access to such honeypot and fake data can be monitored and/or logged. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:US20200186567A1
公开(公告)日:2020-06-11
申请号:US16211802
申请日:2018-12-06
Applicant: SAP SE
Inventor: Cedric Hebert , Anderson Santana de Oliveira , Lorenzo Frigerio
Abstract: Data is received that includes a plurality of fields. These fields are modified using at least one differential privacy algorithm to result in fake data. This fake data is subsequently used to seed and enable a honeypot so that access to such honeypot and fake data can be monitored and/or logged. Related apparatus, systems, techniques and articles are also described.
-
-
-