The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 13, 2023

Filed:

Apr. 22, 2021
Applicant:

Bank of America Corporation, Charlotte, NC (US);

Inventors:

Hitendra Kumar, Uttar Pradesh, IN;

Devulapalli Venkata Lakshmi Sai Siva Kumar, Telangana, IN;

Assignee:

BANK OF AMERICA CORPORATION, Charlotte, NC (US);

Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06N 20/20 (2019.01); G06F 21/62 (2013.01); G06F 21/31 (2013.01); G06F 21/45 (2013.01); G06F 21/60 (2013.01); G06F 9/50 (2006.01); G06N 20/00 (2019.01); G06F 9/445 (2018.01);
U.S. Cl.
CPC ...
G06F 21/62 (2013.01); G06F 9/44505 (2013.01); G06F 9/5005 (2013.01); G06F 21/31 (2013.01); G06F 21/45 (2013.01); G06F 21/602 (2013.01); G06N 20/00 (2019.01); G06F 2221/2107 (2013.01); G06F 2221/2141 (2013.01);
Abstract

Systems, computer program products, and methods are described herein for dynamically permitting and restricting access to and modification of computer resources. The present invention may be configured to receive a change request identifying computer resources to be modified, determine whether privileged access is required to modify the computer resources, and receive credentials from a user device. The present invention may be further configured to generate an encrypted configuration file, determine whether the change request is valid, and further encrypt the encrypted configuration file based on determining that the change request is valid. The present invention may be further configured to determine whether the credentials authorize access to the computer resources, further encrypt the encrypted configuration file based on determining that the credentials authorize access to the computer resources, and permit and restrict access of the user device to computer resources based on the encrypted configuration file.


Find Patent Forward Citations

Loading…