US 12,149,538 B2
Techniques for deployment of deceptive decoy elements in computing environments
Ran Norman, Rishon LeZion (IL); Guy Ben Mayor, Rishon LeZion (IL); and Kfir Kimhi, Herzliya (IL)
Assigned to ITsMine Ltd., Herzliya (IL)
Filed by ITsMine Ltd., Herzliya (IL)
Filed on Dec. 29, 2021, as Appl. No. 17/646,337.
Claims priority of provisional application 63/132,557, filed on Dec. 31, 2020.
Prior Publication US 2022/0210163 A1, Jun. 30, 2022
Int. Cl. H04L 9/40 (2022.01); G06Q 10/0639 (2023.01)
CPC H04L 63/105 (2013.01) [G06Q 10/06395 (2013.01); H04L 63/20 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method for deployment of deceptive decoy elements in a computerized environment to increase cyber security policy compliance, comprising:
deploying at least one deceptive decoy element in at least one folder of a plurality of folders stored in a computerized environment, wherein a user is associated with a dataset indicating at least one user permission to access the at least one folder, each of the plurality of folders having a sensitivity level, wherein each deceptive decoy element is a data element deployed based on the sensitivity level of a respective folder of the plurality of folders in which the deceptive decoy element is deployed, wherein each deceptive decoy element is configured to provide an indication of a trigger event when triggered by the user;
generating a customized electronic message for the user when the indication of the trigger event is provided by one of the at least one deceptive decoy element, wherein the customized electronic message is generated based on the dataset associated with the user; and
sending the customized electronic message for display on a user device of the user.