US 12,457,203 B2
Artificial intelligence (AI) based secure network protocols with dynamic multilayer encryption
Shailendra Singh, Maharashtra (IN); Saurabh Gupta, New Delhi (IN); and Shreya Manocha, Haryana (IN)
Assigned to Bank of America Corporation, Charlotte, NC (US)
Filed by Bank of America Corporation, Charlotte, NC (US)
Filed on Mar. 12, 2024, as Appl. No. 18/602,102.
Prior Publication US 2025/0294013 A1, Sep. 18, 2025
Int. Cl. H04L 29/06 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/0428 (2013.01) [H04L 63/105 (2013.01)] 21 Claims
OG exemplary drawing
 
1. One or more non-transitory computer-readable media storing computer-executable instructions which, when executed by a processor on a computer system, perform a method for AI-based generation of a secure network path and dynamic encryption protocols, the method comprising:
receiving input of a data packet, an origin point for the data packet, and a destination point for the data packet;
using one or more artificial intelligence algorithms:
detecting network nodes configured to transfer the data packet from the origin point to the destination point;
generating a security level for a detected network node, the security level based on at least in part on node history;
generating a regulatory profile for a detected network node, the regulatory profile based at least in part on node geolocation;
outputting a set of network nodes, each node in the set of network nodes selected based at least in part on its security level and regulatory profile;
based on a characteristic of the data packet, outputting an encryption algorithm configured to generate synthetic data from the data packet; and
mapping the encryption algorithm to a node in the set of network nodes, the mapping based at least in part on a security level and regulatory profile associated with the node;
at a first node in the set of network nodes, receiving the data packet and applying a first encryption algorithm mapped to the first node; and
at a second node in the set of network nodes, receiving an encrypted data packet from the first node and applying a second encryption algorithm mapped to the second node.