US 12,177,224 B2
Alerting on anomalous authorization requests derived with proximity graph
Arjun Thimmareddy, Charlotte, NC (US); and Aarron Gull, East Northport, NY (US)
Assigned to Bank of America Corporation, Charlotte, NC (US)
Filed by Bank of America Corporation, Charlotte, NC (US)
Filed on Oct. 27, 2022, as Appl. No. 18/050,250.
Prior Publication US 2024/0146738 A1, May 2, 2024
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/104 (2013.01) [H04L 63/102 (2013.01)] 20 Claims
OG exemplary drawing
 
1. An information-security automated process for authorizing requests by a user to a module from an authorization request tool, the process implemented on a computer machine with a processor that executes computer-executable instructions stored on a computer-readable medium, the module, the authorization request tool, and the computer machine coupled together over a computer network, the process comprising the steps of:
receiving, by the computer machine from the authorization request tool, a user request for access to the module;
storing, by the processor into a first sector of the computer-readable medium, the user request;
generating, by the processor, a peer group dataset;
storing, by the processor into a second sector of the computer-readable medium, the peer group data set for the user request;
generating, by the processor, a user dataset for the user request;
loading, from the computer-readable medium by the processor into a third sector of the computer-readable medium, the user dataset for the user request;
calculating, by the processor, a critical score for the user request;
loading, from the computer-readable medium by the processor into a fourth sector of the computer-readable medium, the critical score for the user request;
determining, by the processor, if the critical score for the user request is less than an enterprise threshold;
generating, by the processor, an approval of the user request for access to the module if the critical score for the user request is less than an enterprise threshold; or
generating, by the processor, a denial of the user request if the critical score for the user request is more than an enterprise threshold;
transmitting, by the processor, the approval or the denial of the user request; and
storing, by the computer machine from the authorization request tool, the approval or the denial of the user request for access to the module.