US 12,452,260 B2
Apparatuses, computer-implemented methods, and computer program products for improved remote access cybersecurity based on quarantining remote action data and generating malicious determination data
Atul Bassi, Bengaluru (IN); Tarun Gupta, Bengaluru (IN); and Eli Abramson, Ramat-Gan (IL)
Assigned to HONEYWELL INTERNATIONAL INC., Charlotte, NC (US)
Filed by Honeywell International Inc., Charlotte, NC (US)
Filed on Mar. 21, 2023, as Appl. No. 18/187,126.
Prior Publication US 2024/0323199 A1, Sep. 26, 2024
Int. Cl. H04L 9/40 (2022.01); G06F 21/55 (2013.01); G06F 21/53 (2013.01); G06F 21/56 (2013.01)
CPC H04L 63/1416 (2013.01) [H04L 63/1441 (2013.01); H04L 63/20 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
receiving remote action data from a client device in response to an initiated remote access action of the remote action data from the client device to a remotely accessible device;
quarantining the remote action data from the client device;
generating malicious determination data indicating whether the remote action data is determined as malicious by processing the remote action data;
determining whether to block transfer of the remote action data to the remotely accessible device based at least in part on the malicious determination data; and
causing rendering of a user interface depicting a video of recorded display data across a defined timeseries, wherein the user interface is specially configured to indicate a point in the defined timeseries at which the remote access action was initiated.