The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jul. 30, 2019

Filed:

Dec. 04, 2015
Applicant:

Bank of America Corporation, Charlotte, NC (US);

Inventors:

Candace R. Gordon, Jacksonville, FL (US);

Alys Lisella, Jacksonville, FL (US);

Iptisha Raote, Charlotte, NC (US);

Haresh Kurani, Charlotte, NC (US);

Parash Sharma, Moorpark, CA (US);

Steven K. Bickmore, Evergreen, CO (US);

Ravi Kiran Sonthi, Jacksonville, FL (US);

Lauren Fields Doran, Jacksonville, FL (US);

Deborah J. Bessent, Fleming Island, FL (US);

Assignee:

Bank of America Corporation, Charlotte, NC (US);

Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 11/00 (2006.01); G06F 12/14 (2006.01); G06F 12/16 (2006.01); G08B 23/00 (2006.01); G06F 16/9535 (2019.01); G06F 16/23 (2019.01); G06F 16/2457 (2019.01); H04L 29/06 (2006.01);
U.S. Cl.
CPC ...
G06F 16/9535 (2019.01); G06F 16/2365 (2019.01); G06F 16/24578 (2019.01); H04L 63/1408 (2013.01);
Abstract

A data security threat control and monitoring system and method described herein may provide visibility into users' activities and their access to sensitive information (e.g., social security number, addresses, fingerprints, and the like) in order to evaluate and mitigate, for example, insider data security threats. The system may monitor various types of activities, such as end users' behavior on applications and/or end users' access, downloads, and copies of sensitive data. The system may monitor for suspected or detected violations and incidents for applications, such as suspicious, disruptive, or policy-violating (actual or attempted) activities. A distributed file system may be used to extract data from one or more databases and to transform the data. The data may be processed, such as to generate distribution fact and dimension files. Servers, such as web servers, may generate reports indicating insider threat activity using the processed files. Exemplary benefits of the system described herein include savings in processing (e.g., CPU) speed and performance and savings in data storage.


Find Patent Forward Citations

Loading…