Robotic process automation resource insulation system
First Claim
1. A system for monitoring an unauthorized network intrusion, the system comprising:
- a computing platform including a memory and at least one processor in communication with the first memory;
a first robotic process module stored in the memory, executable by the at least one processor and configured to generate a plurality of modified versions of a dataset, wherein each of the plurality of modified versions of the dataset are associated with a different level of severity of an attempt to access the dataset, wherein the different level of security are associated with a type of attempt to access the dataset and a type of unauthorized entity; and
a second robotic process module stored in the memory, executable by the at least one processor, wherein the second robotic module is in distributed network communication with the first robotic process module and configured to;
detect a computer network-based attempt by an unauthorized entity to access the dataset stored at a first storage location,determine a level of the severity of the attempt to access the dataset, wherein determining a level severity of the attempt to access the dataset includes determining a type of the attempt and a type of unauthorized entity,in response to detecting the computer network-based attempt to access the dataset and determining the level of severity of the attempt to access the dataset, create a tunnel connection that provides the unauthorized entity access to a shared storage location that stores one of the plurality of modified versions of the dataset corresponding to the determined level of severity of the attempt to access the dataset, wherein the shared storage location (i) has a same Internet Protocol (IP) address as the first storage location, and (ii) is accessible to one or more authorized third-party entities, wherein the authorized third-party entities access the shared storage to track and record the unauthorized entities accessing of the one of the plurality of modified versions of the dataset,wherein the unauthorized entity is prevented from accessing the dataset.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for implementing robotic process automation (RPA) to enhance computer network security. Specifically, RPA is used to detect an unauthorized attempt to access a dataset and, in response, the unauthorized entity is provided access to a bot-generated modified dataset that includes modified data elements that are reasonable facsimiles of the actual data elements and do not expose confidential data. Once access to the modified data set is provided, RPA is implemented to track actions by the unauthorized entity accessing the modified data set and, once copied, RPA is implemented to track usage of the data by the unauthorized entity. Additionally, RPA may be implemented to mitigate damages caused by attempts or actual accessing of the actual datasets by performing actions that prevent further damages, such as deactivating/activating resource storage and authorizing previously configured resource events.
-
Citations
16 Claims
-
1. A system for monitoring an unauthorized network intrusion, the system comprising:
-
a computing platform including a memory and at least one processor in communication with the first memory; a first robotic process module stored in the memory, executable by the at least one processor and configured to generate a plurality of modified versions of a dataset, wherein each of the plurality of modified versions of the dataset are associated with a different level of severity of an attempt to access the dataset, wherein the different level of security are associated with a type of attempt to access the dataset and a type of unauthorized entity; and a second robotic process module stored in the memory, executable by the at least one processor, wherein the second robotic module is in distributed network communication with the first robotic process module and configured to; detect a computer network-based attempt by an unauthorized entity to access the dataset stored at a first storage location, determine a level of the severity of the attempt to access the dataset, wherein determining a level severity of the attempt to access the dataset includes determining a type of the attempt and a type of unauthorized entity, in response to detecting the computer network-based attempt to access the dataset and determining the level of severity of the attempt to access the dataset, create a tunnel connection that provides the unauthorized entity access to a shared storage location that stores one of the plurality of modified versions of the dataset corresponding to the determined level of severity of the attempt to access the dataset, wherein the shared storage location (i) has a same Internet Protocol (IP) address as the first storage location, and (ii) is accessible to one or more authorized third-party entities, wherein the authorized third-party entities access the shared storage to track and record the unauthorized entities accessing of the one of the plurality of modified versions of the dataset, wherein the unauthorized entity is prevented from accessing the dataset. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method for protecting against unauthorized access of a dataset, wherein the computer-implemented method comprising the following steps executed by at least one computer processing device:
-
implementing a first robotic process automation to generate a plurality of modified versions of a dataset, wherein each of the plurality of modified versions of the dataset are associated with a different level of severity of an attempt to access the dataset, wherein the different level of security are associated with a type of attempt to access the dataset and a type of unauthorized entity; and implementing a second robotic process automation to; detect a computer network-based attempt by an unauthorized entity to access the dataset stored at a first storage location, determine a level of the severity of the attempt to access the dataset wherein determining a level severity of the attempt to access the dataset includes determining a type of the attempt and a type of unauthorized entity, and in response to detecting the computer network-based attempt to access the dataset and determining the level of severity of the attempt to access the dataset, create a tunnel connection that provides the unauthorized entity access to a shared storage location that stores one of the plurality of modified versions of the dataset corresponding to the determined level of severity of the attempt to access the dataset, wherein the shared storage location (i) has a same Internet Protocol (IP) address as the first storage location, and (ii) is accessible to one or more authorized third-party entities, wherein the authorized third-party entities access the shared storage to track and record the unauthorized entities accessing of the one of the plurality of modified versions of the dataset, wherein the unauthorized entity is prevented from accessing the dataset.
-
-
16. A computer program product including a non-transitory computer-readable medium, the computer-readable medium comprising:
-
a first set of codes for causing a computer to implement a first robotic process automation to generate a plurality of modified versions of a dataset, wherein each of the plurality of modified versions of the dataset are associated with a different level of severity of an attempt to access the dataset, wherein the different level of security are associated with a type of attempt to access the dataset and a type of unauthorized entity; a second set of codes for causing a computer to implement a second robotic process automation to detect a computer network-based attempt by an unauthorized entity to access the dataset stored at a first storage location; a third set of codes for causing a computer to implement the second robotic process automation to determine a level of the severity of the attempt to access the dataset, wherein determining a level severity of the attempt to access the dataset includes determining a type of the attempt and a type of unauthorized entity; and a fourth set of codes for causing a computer to implement the second robotic process automation to, in response to detecting the computer network-based attempt to access the dataset and determining the level of severity of the attempt to access the dataset, create a tunnel connection that provides the unauthorized entity access to a shared storage location that stores one of the plurality of modified versions of the dataset corresponding to the determined level of severity of the attempt to access the dataset, wherein the shared storage location (i) has a same Internet Protocol (IP) address as the first storage location, and (ii) is accessible to one or more authorized third-party entities, wherein the authorized third-party entities access the shared storage to track and record the unauthorized entities accessing of the one of the plurality of modified versions of the dataset.
-
Specification