17984921. SYSTEM AND METHOD FOR IDENTIFYING AND REDIRECTING INCOMING UNAUTHORIZED DATA ACCESS REQUESTS simplified abstract (Bank of America Corporation)
Contents
- 1 SYSTEM AND METHOD FOR IDENTIFYING AND REDIRECTING INCOMING UNAUTHORIZED DATA ACCESS REQUESTS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SYSTEM AND METHOD FOR IDENTIFYING AND REDIRECTING INCOMING UNAUTHORIZED DATA ACCESS REQUESTS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
SYSTEM AND METHOD FOR IDENTIFYING AND REDIRECTING INCOMING UNAUTHORIZED DATA ACCESS REQUESTS
Organization Name
Inventor(s)
Christopher Daniel Birch of Tega Cay SC (US)
Sophie Morgan Danielpour of Durham NC (US)
Susan R. Hart of Addison TX (US)
Son Huynh of Charlotte NC (US)
Tyler Keith Prothro of Waxahachie TX (US)
Shannon Sabina Rolinger of Pineville NC (US)
Amado Jose Martinez Suarez of Addison TX (US)
Stephen Jack Williams of Charlotte NC (US)
SYSTEM AND METHOD FOR IDENTIFYING AND REDIRECTING INCOMING UNAUTHORIZED DATA ACCESS REQUESTS - A simplified explanation of the abstract
This abstract first appeared for US patent application 17984921 titled 'SYSTEM AND METHOD FOR IDENTIFYING AND REDIRECTING INCOMING UNAUTHORIZED DATA ACCESS REQUESTS
Simplified Explanation
The present invention provides a system for identifying and redirecting incoming unauthorized data access requests. The system continuously monitors incoming data access requests, identifies unauthorized requests, redirects them to a controlled environment, captures interactions associated with the requests, and generates controls to secure the real-time environment based on the captured interactions.
- Continuous monitoring of incoming data access requests
- Identification of unauthorized requests
- Redirection of unauthorized requests to a controlled environment
- Capturing interactions associated with the requests
- Generating controls to secure the real-time environment
Potential Applications
This technology could be applied in industries where data security is crucial, such as finance, healthcare, and government sectors.
Problems Solved
This technology helps prevent unauthorized access to sensitive data, reducing the risk of data breaches and ensuring data security.
Benefits
The system enhances data security by identifying and redirecting unauthorized access requests, providing real-time monitoring and control capabilities.
Potential Commercial Applications
Potential commercial applications include data security solutions for businesses, government agencies, and organizations handling sensitive information.
Possible Prior Art
One possible prior art could be intrusion detection systems that monitor and analyze network traffic to identify potential security threats.
What are the potential limitations of this technology in real-world applications?
Potential limitations of this technology in real-world applications could include false positives in identifying unauthorized requests, scalability issues in handling a large volume of data access requests, and compatibility challenges with existing systems.
How does this technology compare to existing data security solutions?
This technology offers a proactive approach to data security by identifying and redirecting unauthorized access requests in real-time, providing enhanced control and monitoring capabilities compared to traditional data security solutions like firewalls and encryption methods.
Original Abstract Submitted
Embodiments of the present invention provide a system for identifying and redirecting incoming unauthorized data access requests. The system is configured for continuously monitoring one or more incoming data access requests from one or more sources, identifying that a data access request of the one or more incoming data access requests is an unauthorized request, redirecting the data access request to a controlled environment, performing one or more actions in the controlled environment to capture one or more interactions associated with the data access request within the controlled environment, and automatically generating one or more controls to secure a real-time environment based on the one or more interactions captured within the controlled environment.
- Bank of America Corporation
- Christopher Daniel Birch of Tega Cay SC (US)
- Sophie Morgan Danielpour of Durham NC (US)
- Susan R. Hart of Addison TX (US)
- Son Huynh of Charlotte NC (US)
- Tyler Keith Prothro of Waxahachie TX (US)
- Shannon Sabina Rolinger of Pineville NC (US)
- Amado Jose Martinez Suarez of Addison TX (US)
- Stephen Jack Williams of Charlotte NC (US)
- G06F21/53
- G06F21/45