17984921. SYSTEM AND METHOD FOR IDENTIFYING AND REDIRECTING INCOMING UNAUTHORIZED DATA ACCESS REQUESTS simplified abstract (Bank of America Corporation)

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD FOR IDENTIFYING AND REDIRECTING INCOMING UNAUTHORIZED DATA ACCESS REQUESTS

Organization Name

Bank of America Corporation

Inventor(s)

Christopher Daniel Birch of Tega Cay SC (US)

Sophie Morgan Danielpour of Durham NC (US)

Susan R. Hart of Addison TX (US)

Son Huynh of Charlotte NC (US)

Tyler Keith Prothro of Waxahachie TX (US)

Shannon Sabina Rolinger of Pineville NC (US)

Amado Jose Martinez Suarez of Addison TX (US)

Stephen Jack Williams of Charlotte NC (US)

SYSTEM AND METHOD FOR IDENTIFYING AND REDIRECTING INCOMING UNAUTHORIZED DATA ACCESS REQUESTS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17984921 titled 'SYSTEM AND METHOD FOR IDENTIFYING AND REDIRECTING INCOMING UNAUTHORIZED DATA ACCESS REQUESTS

Simplified Explanation

The present invention provides a system for identifying and redirecting incoming unauthorized data access requests. The system continuously monitors incoming data access requests, identifies unauthorized requests, redirects them to a controlled environment, captures interactions associated with the requests, and generates controls to secure the real-time environment based on the captured interactions.

  • Continuous monitoring of incoming data access requests
  • Identification of unauthorized requests
  • Redirection of unauthorized requests to a controlled environment
  • Capturing interactions associated with the requests
  • Generating controls to secure the real-time environment

Potential Applications

This technology could be applied in industries where data security is crucial, such as finance, healthcare, and government sectors.

Problems Solved

This technology helps prevent unauthorized access to sensitive data, reducing the risk of data breaches and ensuring data security.

Benefits

The system enhances data security by identifying and redirecting unauthorized access requests, providing real-time monitoring and control capabilities.

Potential Commercial Applications

Potential commercial applications include data security solutions for businesses, government agencies, and organizations handling sensitive information.

Possible Prior Art

One possible prior art could be intrusion detection systems that monitor and analyze network traffic to identify potential security threats.

What are the potential limitations of this technology in real-world applications?

Potential limitations of this technology in real-world applications could include false positives in identifying unauthorized requests, scalability issues in handling a large volume of data access requests, and compatibility challenges with existing systems.

How does this technology compare to existing data security solutions?

This technology offers a proactive approach to data security by identifying and redirecting unauthorized access requests in real-time, providing enhanced control and monitoring capabilities compared to traditional data security solutions like firewalls and encryption methods.


Original Abstract Submitted

Embodiments of the present invention provide a system for identifying and redirecting incoming unauthorized data access requests. The system is configured for continuously monitoring one or more incoming data access requests from one or more sources, identifying that a data access request of the one or more incoming data access requests is an unauthorized request, redirecting the data access request to a controlled environment, performing one or more actions in the controlled environment to capture one or more interactions associated with the data access request within the controlled environment, and automatically generating one or more controls to secure a real-time environment based on the one or more interactions captured within the controlled environment.