| CPC G06F 21/53 (2013.01) [G06F 21/45 (2013.01); G06F 2221/034 (2013.01)] | 20 Claims |

|
1. A system for identifying and redirecting incoming unauthorized data access requests, the system comprising:
at least one network communication interface;
at least one non-transitory storage device; and
at least one processing device coupled to the at least one non-transitory storage device and the at least one network communication interface, wherein the at least one processing device is configured to:
continuously monitor one or more incoming data access requests from one or more sources;
identify that a data access request of the one or more incoming data access requests is an unauthorized request, wherein the data access request is associated with accessing data in a real-time environment;
in response to identifying that the data access request is unauthorized, instantaneously generate a controlled environment that has same operational functionalities and visual functionalities as that of the real-time environment;
redirect the data access request to the controlled environment;
perform one or more actions in the controlled environment to capture one or more interactions associated with the data access request within the controlled environment; and
automatically generate one or more controls to secure the real-time environment based on the one or more interactions captured within the controlled environment.
|