| CPC H04L 63/108 (2013.01) [H04L 63/083 (2013.01); H04L 63/1416 (2013.01)] | 19 Claims |

|
1. A computer implemented method for improving network security by dynamically adjusting access to digital resources, the computer implemented method comprising:
obtaining a request from a first user device, the request comprising a request to dynamically adjust access criteria associated with a second user a fully qualified domain name and/or a host name, the request specifying an address identifier associated with the second user, fully qualified domain name and/or host name and a first access criteria, wherein the dynamically adjusted access criteria comprises a username, fully qualified domain name, and/or host name;
storing the address identifier within a table in a database, wherein the table associated with the address identifier comprises user contact data and at least one former access criteria associated with the address identifier, wherein the former access criteria is expired;
receiving a set of dynamic modification rules, the dynamic modification rules based on the obtained request, the dynamic modification rules indicating the frequency at which access criteria are to be dynamically adjusted;
defining an access criteria modification schedule by applying the set of dynamic modification rules, wherein the access modification schedule comprises at least one modification timestamp indicating when access criteria are to be modified;
generating a first access token via at least one platform-based authentication and the first access criteria;
automatically generate a second access criteria at a time associated with a modification timestamp, wherein the second access criteria is different than former access criteria associated with the second user, wherein the second access criteria is generated using a random access criteria generation protocol, wherein the random access criteria generation protocol comprises confirming the second access criteria does not match a former access criteria stored in the database;
updating access to at least one platform by providing the second access criteria to at least one platform via an Application Programming Interface;
storing the second access criteria in the table in the database, and associating the second access criteria with the second user in the database;
invalidating the first access token and establishing the first access criteria as expired;
providing the second user with the second access criteria through the stored contact data;
monitoring access criteria usage attempts by observing usage of the access criteria associated with at least one platform, wherein monitoring gathers metadata associated with the usage of the access criteria;
identifying a threat by comparing access criteria usage attempts to the table of expired access criteria;
automatically triggering automated responses to a detected threat, wherein the automated responses comprise IP blocking and/or user account lockouts in real time; and
automatically alerting the first and/or second user with the metadata and access criteria and activities taken associated with the identified threat.
|