US 12,381,883 B2
Hierarchical based decryption for improved content security
Praveen Yedluri, Hyderabad (IN); Vittal Surya Narayana Goli, Hyderabad (IN); Saurabh Kumar, Haryana (IN); Swati Pandey, Hyderabad (IN); Vishal Prasad Gupta, Hyderabad (IN); and Ashisa Kumar Nayak, Miyapur (IN)
Assigned to Bank of America Corporation, Charlotte, NC (US)
Filed by Bank of America Corporation, Charlotte, NC (US)
Filed on Jan. 31, 2023, as Appl. No. 18/103,779.
Prior Publication US 2024/0259385 A1, Aug. 1, 2024
Int. Cl. H04L 9/40 (2022.01); H04L 9/08 (2006.01); H04L 67/306 (2022.01)
CPC H04L 63/105 (2013.01) [H04L 9/083 (2013.01); H04L 9/08 (2013.01); H04L 63/0428 (2013.01); H04L 67/306 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computing platform comprising:
at least one processor;
a communication interface communicatively coupled to the at least one processor; and
memory storing computer-readable instructions that, when executed by the processor, cause the computing platform to:
receive, from a first user device of a first user, a request to encrypt a file;
generate, for the file, a symmetric key;
encrypt, using the symmetric key, the file to produce an encrypted file;
receive, from a second user device of a second user, a request to decrypt the encrypted file;
identify a classification of the encrypted file;
based on identifying a first classification:
obtain, using a first application programming interface (API) call to an employee hub, an employee hierarchy corresponding to the first user, wherein the employee hub comprises a computer system storing employee information including the employee hierarchy,
compare the second user to the employee hierarchy, and
based on identifying that the second user is included in the employee hierarchy:
decrypt, using the symmetric key, the encrypted file, and
grant access, to the second user, to the file; and
based on identifying a second classification:
obtain, using a second API call to the employee hub, personnel information indicating one or more employees within an authorized department of a company corresponding to the second classification, wherein the authorized department is automatically identified based on contents of the file, wherein a subset of the authorized department is further identified based on the contents of the file, and wherein the personnel information indicates the subset of the authorized department,
compare the second user to the personnel information,
based on identifying that the second user is included in the personnel information:
decrypt, using the symmetric key, the encrypted file, and
grant access, by the second user, to the file.