-
公开(公告)号:US10965675B2
公开(公告)日:2021-03-30
申请号:US15920549
申请日:2018-03-14
Applicant: Bank of America Corporation
Inventor: Xianhong Zhang , Kalyan V. Pasumarthi , Jeffrey Jacoby , Hitesh Shah , Archie Agrawal , Michael E. Toth , Yu Fu
IPC: H04L29/06
Abstract: Aspects of the disclosure relate to preventing unauthorized access to secured information systems using advanced pre-authentication techniques. A computing platform may receive, from a local traffic manager, a first enriched access request associated with a first remote computing device. Then, the computing platform may apply a pre-authentication classification model to the first enriched access request associated with the first remote computing device. Thereafter, the computing platform may determine that the first enriched access request associated with the first remote computing device is likely malicious. Then, the computing platform may generate one or more first pre-authentication response commands directing client portal server infrastructure to process the first enriched access request associated with the first remote computing device as a malicious request. Subsequently, the computing platform may send the one or more first pre-authentication response commands to the client portal server infrastructure.
-
2.
公开(公告)号:US20190289007A1
公开(公告)日:2019-09-19
申请号:US15920549
申请日:2018-03-14
Applicant: Bank of America Corporation
Inventor: Xianhong Zhang , Kalyan V. Pasumarthi , Jeffrey Jacoby , Hitesh Shah , Archie Agrawal , Michael E. Toth , Yu Fu
IPC: H04L29/06
Abstract: Aspects of the disclosure relate to preventing unauthorized access to secured information systems using advanced pre-authentication techniques. A computing platform may receive, from a local traffic manager, a first enriched access request associated with a first remote computing device. Then, the computing platform may apply a pre-authentication classification model to the first enriched access request associated with the first remote computing device. Thereafter, the computing platform may determine that the first enriched access request associated with the first remote computing device is likely malicious. Then, the computing platform may generate one or more first pre-authentication response commands directing client portal server infrastructure to process the first enriched access request associated with the first remote computing device as a malicious request. Subsequently, the computing platform may send the one or more first pre-authentication response commands to the client portal server infrastructure.
-