×

Robotic process automation resource insulation system

  • US 10,659,482 B2
  • Filed: 10/25/2017
  • Issued: 05/19/2020
  • Est. Priority Date: 10/25/2017
  • Status: Active Grant
First Claim
Patent Images

1. A system for monitoring an unauthorized network intrusion, the system comprising:

  • a computing platform including a memory and at least one processor in communication with the first memory;

    a first robotic process module stored in the memory, executable by the at least one processor and configured to generate a plurality of modified versions of a dataset, wherein each of the plurality of modified versions of the dataset are associated with a different level of severity of an attempt to access the dataset, wherein the different level of security are associated with a type of attempt to access the dataset and a type of unauthorized entity; and

    a second robotic process module stored in the memory, executable by the at least one processor, wherein the second robotic module is in distributed network communication with the first robotic process module and configured to;

    detect a computer network-based attempt by an unauthorized entity to access the dataset stored at a first storage location,determine a level of the severity of the attempt to access the dataset, wherein determining a level severity of the attempt to access the dataset includes determining a type of the attempt and a type of unauthorized entity,in response to detecting the computer network-based attempt to access the dataset and determining the level of severity of the attempt to access the dataset, create a tunnel connection that provides the unauthorized entity access to a shared storage location that stores one of the plurality of modified versions of the dataset corresponding to the determined level of severity of the attempt to access the dataset, wherein the shared storage location (i) has a same Internet Protocol (IP) address as the first storage location, and (ii) is accessible to one or more authorized third-party entities, wherein the authorized third-party entities access the shared storage to track and record the unauthorized entities accessing of the one of the plurality of modified versions of the dataset,wherein the unauthorized entity is prevented from accessing the dataset.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×