-
1.
公开(公告)号:US20190253427A1
公开(公告)日:2019-08-15
申请号:US15895763
申请日:2018-02-13
Applicant: Bank of America Corporation
Inventor: John Howard Kling , Brandon Sloane , Regina Yee Cadavid , Rachel Yun Kim Bierner , Ronald James Kuhlmeier
CPC classification number: H04L63/102 , G06F3/0622 , G06F21/604 , H04L63/101 , H04L63/104
Abstract: A vertically integrated access control system may store in a database data records corresponding to the interfaces, access control rules, and computing resources of an information system, as well as data records for entity capabilities. Data records for related interfaces, access control rules, computing resources, and entity capabilities may be linked. Using the database, the system may determine the entity capabilities that can be performed based on an existing user entitlement. If the entity capabilities include a flagged combination of entity capabilities, the system may perform an information security action to remediate the flagged combination. The system may use the database to form vertically integrated access units. The vertically integrated access units may be used to form user entitlements. The system may continuously monitor whether any proposed configurations would create a flagged combination of entity capabilities, and if so take an action to prevent such flagged combination.
-
公开(公告)号:US20190114369A1
公开(公告)日:2019-04-18
申请号:US15786153
申请日:2017-10-17
Applicant: Bank of America Corporation
Inventor: Brandon Sloane , John Howard Kling , Ronald James Kuhlmeier
Abstract: The invention provides a multidimensional graph database with property and relationship subclasses. In comparison to current graph database technology, which only allows for the creation of nodes, relationships, and properties for the nodes and relationships, the new multidimensional graph database treats properties as a separate object class. In this way, each property may in turn have one or more of its own properties and/or relationships to other nodes, relationships, or properties. The system is able to add as many layers of properties and relationships as needed to precisely represent the data as well as the relationships between and/or amongst the data. By extending the graph database schema beyond the conventional bounds, the multidimensional graph database increases the efficiency of database queries while simultaneously increasing the depth and quality of the data produced by the search queries.
-
公开(公告)号:US20200167495A1
公开(公告)日:2020-05-28
申请号:US16777466
申请日:2020-01-30
Applicant: Bank of America Corporation
Inventor: John Howard Kling , Brandon Sloane , Regina Yee Cadavid , Rachel Yun Kim Bierner , Ronald James Kuhlmeier
IPC: G06F21/62 , G06F16/335 , G06F16/28 , G06F21/60 , H04L29/06
Abstract: A vertically integrated access control system may store in a database data records corresponding to the interfaces, access control rules, and computing resources of an information system, as well as data records for entity capabilities. Data records for related interfaces, access control rules, computing resources, and entity capabilities may be linked. Using the database, the system may determine the entity capabilities that can be performed based on an existing user entitlement. If the entity capabilities include a flagged combination of entity capabilities, the system may perform an information security action to remediate the flagged combination. The system may use the database to form vertically integrated access units. The vertically integrated access units may be used to form user entitlements. The system may continuously monitor whether any proposed configurations would create a flagged combination of entity capabilities, and if so take an action to prevent such flagged combination.
-
公开(公告)号:US20170302668A1
公开(公告)日:2017-10-19
申请号:US15099654
申请日:2016-04-15
Applicant: BANK OF AMERICA CORPORATION
Inventor: John Howard Kling , Mark Earl Brubaker , Cora Yan Quon , Rachel Yun Kim Bierner , Armen Moloian , Ronald James Kuhlmeier
IPC: H04L29/06
CPC classification number: H04L63/10 , H04L63/1416
Abstract: Systems, computer program products, and methods are described herein for a model framework and system for cyber security services. The present invention is configured to determine one or more access paths to the internal computing device from an external computing device; determine one or more controls associated with each access path; determine one or more types of access that may be made via one or more of the access paths by the external computing device to access the internal computing device; determine whether the one or more controls associated with the at least one of the one or more access paths is capable of detecting the access; determine one or more tools configured to regulate the one or more controls; and incorporate the one or more tools within the network to regulate the one or more controls to detect and monitor the access.
-
公开(公告)号:US10607022B2
公开(公告)日:2020-03-31
申请号:US15895720
申请日:2018-02-13
Applicant: Bank of America Corporation
Inventor: John Howard Kling , Brandon Sloane , Regina Yee Cadavid , Rachel Yun Kim Bierner , Ronald James Kuhlmeier
Abstract: A vertically integrated access control system may store in a database data records corresponding to the interfaces, access control rules, and computing resources of an information system, as well as data records for entity capabilities. Data records for related interfaces, access control rules, computing resources, and entity capabilities may be linked. Using the database, the system may determine the entity capabilities that can be performed based on an existing user entitlement. If the entity capabilities include a flagged combination of entity capabilities, the system may perform an information security action to remediate the flagged combination. The system may use the database to form vertically integrated access units. The vertically integrated access units may be used to form user entitlements. The system may continuously monitor whether any proposed configurations would create a flagged combination of entity capabilities, and if so take an action to prevent such flagged combination.
-
公开(公告)号:US20190251276A1
公开(公告)日:2019-08-15
申请号:US15895720
申请日:2018-02-13
Applicant: Bank of America Corporation
Inventor: John Howard Kling , Brandon Sloane , Regina Yee Cadavid , Rachel Yun Kim Bierner , Ronald James Kuhlmeier
CPC classification number: G06F21/6218 , G06F16/288 , G06F16/335 , G06F21/604 , G06F2221/2141 , H04L63/102
Abstract: A vertically integrated access control system may store in a database data records corresponding to the interfaces, access control rules, and computing resources of an information system, as well as data records for entity capabilities. Data records for related interfaces, access control rules, computing resources, and entity capabilities may be linked. Using the database, the system may determine the entity capabilities that can be performed based on an existing user entitlement. If the entity capabilities include a flagged combination of entity capabilities, the system may perform an information security action to remediate the flagged combination. The system may use the database to form vertically integrated access units. The vertically integrated access units may be used to form user entitlements. The system may continuously monitor whether any proposed configurations would create a flagged combination of entity capabilities, and if so take an action to prevent such flagged combination.
-
公开(公告)号:US10003598B2
公开(公告)日:2018-06-19
申请号:US15099654
申请日:2016-04-15
Applicant: BANK OF AMERICA CORPORATION
Inventor: John Howard Kling , Mark Earl Brubaker , Cora Yan Quon , Rachel Yun Kim Bierner , Armen Moloian , Ronald James Kuhlmeier
IPC: H04L29/06
CPC classification number: H04L63/10 , H04L63/1416
Abstract: Systems, computer program products, and methods are described herein for a model framework and system for cyber security services. The present invention is configured to determine one or more access paths to the internal computing device from an external computing device; determine one or more controls associated with each access path; determine one or more types of access that may be made via one or more of the access paths by the external computing device to access the internal computing device; determine whether the one or more controls associated with the at least one of the one or more access paths is capable of detecting the access; determine one or more tools configured to regulate the one or more controls; and incorporate the one or more tools within the network to regulate the one or more controls to detect and monitor the access.
-
公开(公告)号:US10824754B2
公开(公告)日:2020-11-03
申请号:US16777466
申请日:2020-01-30
Applicant: Bank of America Corporation
Inventor: John Howard Kling , Brandon Sloane , Regina Yee Cadavid , Rachel Yun Kim Bierner , Ronald James Kuhlmeier
Abstract: A vertically integrated access control system may store in a database data records corresponding to the interfaces, access control rules, and computing resources of an information system, as well as data records for entity capabilities. Data records for related interfaces, access control rules, computing resources, and entity capabilities may be linked. Using the database, the system may determine the entity capabilities that can be performed based on an existing user entitlement. If the entity capabilities include a flagged combination of entity capabilities, the system may perform an information security action to remediate the flagged combination. The system may use the database to form vertically integrated access units. The vertically integrated access units may be used to form user entitlements. The system may continuously monitor whether any proposed configurations would create a flagged combination of entity capabilities, and if so take an action to prevent such flagged combination.
-
9.
公开(公告)号:US10659469B2
公开(公告)日:2020-05-19
申请号:US15895763
申请日:2018-02-13
Applicant: Bank of America Corporation
Inventor: John Howard Kling , Brandon Sloane , Regina Yee Cadavid , Rachel Yun Kim Bierner , Ronald James Kuhlmeier
Abstract: A vertically integrated access control system may store in a database data records corresponding to the interfaces, access control rules, and computing resources of an information system, as well as data records for entity capabilities. Data records for related interfaces, access control rules, computing resources, and entity capabilities may be linked. Using the database, the system may determine the entity capabilities that can be performed based on an existing user entitlement. If the entity capabilities include a flagged combination of entity capabilities, the system may perform an information security action to remediate the flagged combination. The system may use the database to form vertically integrated access units. The vertically integrated access units may be used to form user entitlements. The system may continuously monitor whether any proposed configurations would create a flagged combination of entity capabilities, and if so take an action to prevent such flagged combination.
-
公开(公告)号:US10339309B1
公开(公告)日:2019-07-02
申请号:US15618893
申请日:2017-06-09
Applicant: Bank of America Corporation
Inventor: John Howard Kling , Mark Earl Brubaker , Ronald James Kuhlmeier , Brian D. Diederich , Brandon Matthew Sloane , Rachel Yun Kim Bierner , Cora Yan Quon
IPC: G06F21/00 , G06F21/55 , G06F16/28 , G06F16/901
Abstract: A system for identifying anomalies in an information system is typically configured for: collecting information regarding a hierarchy of capabilities, a hierarchy of resources, capability instances, and resource instances of the information system; storing, in a graph database, nodes corresponding to the hierarchy of capabilities, hierarchy of resources, capability instances, and resource instances; collecting information regarding relationships among the hierarchy of capabilities, hierarchy of resources, capability instances, and resource instances; defining, in the graph database, edges corresponding to the relationships among the hierarchy of capabilities, hierarchy of resources, capability instances, and resource instances; collecting event and/or state data for the information system; comparing the event and/or state data to the graph database and determining that an event and/or state is anomalous; and, in response to determining that the event and/or state is anomalous, taking an information security action.
-
-
-
-
-
-
-
-
-