The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 23, 2025

Filed:

Dec. 21, 2023
Applicant:

Cisco Technology, Inc., San Jose, CA (US);

Inventors:

David Arthur Mcgrew, Poolesville, MD (US);

Hugo Mike Latapie, Long Beach, CA (US);

Blake Anderson, Chapel Hill, NC (US);

Assignee:

Cisco Technology, Inc., San Jose, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/40 (2022.01); G06F 11/34 (2006.01); G06F 16/334 (2025.01); G06F 16/34 (2019.01); G06F 16/901 (2019.01); G06F 21/31 (2013.01); G06F 21/55 (2013.01); G06F 21/56 (2013.01); G06F 21/57 (2013.01);
U.S. Cl.
CPC ...
H04L 63/1433 (2013.01); G06F 11/3476 (2013.01); G06F 16/334 (2019.01); G06F 16/345 (2019.01); G06F 16/9024 (2019.01); G06F 21/31 (2013.01); G06F 21/552 (2013.01); G06F 21/563 (2013.01); G06F 21/577 (2013.01); H04L 63/1425 (2013.01); H04L 63/145 (2013.01); H04L 63/1483 (2013.01); H04L 63/1491 (2013.01);
Abstract

In one aspect, a method for enhancing cybersecurity using Large Language Model (LLM)-generated honeypot schemes, the method includes generating a plurality of deceptive information using an LLM, configured to attract and engage potential attackers, where the plurality of deceptive information includes one or more characteristics referencing vulnerabilities of a network, continuously monitoring for interactions initiated by an interacting party with one or more components of the generated deceptive information, where the interaction is identified as a potential threat to the network, in response to detection of an interaction identified as a potential threat, extracting interaction data associated with the interacting party retrieved during the interaction, and retraining the LLM with the interaction data to create more effective honeypots.


Find Patent Forward Citations

Loading…