US 12,406,055 B2
System and method for identifying and redirecting incoming unauthorized data access requests
Christopher Daniel Birch, Tega Cay, SC (US); Sophie Morgan Danielpour, Durham, NC (US); Susan R. Hart, Addison, TX (US); Son Huynh, Charlotte, NC (US); Tyler Keith Prothro, Waxahachie, TX (US); Shannon Sabina Rolinger, Pineville, NC (US); Amado Jose Martinez Suarez, Addison, TX (US); and Stephen Jack Williams, Charlotte, NC (US)
Assigned to BANK OF AMERICA CORPORATION, Charlotte, NC (US)
Filed by BANK OF AMERICA CORPORATION, Charlotte, NC (US)
Filed on Nov. 10, 2022, as Appl. No. 17/984,921.
Prior Publication US 2024/0160722 A1, May 16, 2024
Int. Cl. H04L 29/06 (2006.01); G06F 21/45 (2013.01); G06F 21/53 (2013.01)
CPC G06F 21/53 (2013.01) [G06F 21/45 (2013.01); G06F 2221/034 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system for identifying and redirecting incoming unauthorized data access requests, the system comprising:
at least one network communication interface;
at least one non-transitory storage device; and
at least one processing device coupled to the at least one non-transitory storage device and the at least one network communication interface, wherein the at least one processing device is configured to:
continuously monitor one or more incoming data access requests from one or more sources;
identify that a data access request of the one or more incoming data access requests is an unauthorized request, wherein the data access request is associated with accessing data in a real-time environment;
in response to identifying that the data access request is unauthorized, instantaneously generate a controlled environment that has same operational functionalities and visual functionalities as that of the real-time environment;
redirect the data access request to the controlled environment;
perform one or more actions in the controlled environment to capture one or more interactions associated with the data access request within the controlled environment; and
automatically generate one or more controls to secure the real-time environment based on the one or more interactions captured within the controlled environment.