-
1.
公开(公告)号:US11636203B2
公开(公告)日:2023-04-25
申请号:US16907994
申请日:2020-06-22
Applicant: BANK OF AMERICA CORPORATION
Inventor: Kyle Mayers , George Albero , Jon Codispoti , Jinna Zevulun Kim , Dustin Paul Stocks
Abstract: Providing an isolation system that allows analysts to analyze suspicious information in a way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The analyst may set the virtual environment configurations (e.g., applications, programs, settings, etc.) of the virtual container. The analyst may determine how the suspicious information effects the virtual environment configuration and/or use tools to analyze the suspicious information. When harmful information is identified the virtual container may be discarded (e.g., folded up and deleted), and a new virtual container may be provided to the analyst to continue to analyze the suspicious information and/or new suspicious information.
-
公开(公告)号:US11880461B2
公开(公告)日:2024-01-23
申请号:US16907995
申请日:2020-06-22
Applicant: BANK OF AMERICA CORPORATION
Inventor: Dustin Paul Stocks , Jon Codispoti
CPC classification number: G06F21/566 , G06F9/547 , G06F21/552 , G06F2221/2149
Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze the suspicious information. The analyst may utilize a non-native application to analyze the suspicious information within the virtual container. The non-native application may be used to analyze the suspicious information in an analysis format instead of an original format for which the suspicious information, and any harmful information therein, were intended to be accessed. Additionally, the virtual containers may be accessed through the use of an API that allows an analyst to analyze the suspicious information in the virtual container without transferring information from the virtual container back to the analyst user computer system.
-
公开(公告)号:US11797669B2
公开(公告)日:2023-10-24
申请号:US16907993
申请日:2020-06-22
Applicant: BANK OF AMERICA CORPORATION
Inventor: Dustin Paul Stocks , Jon Codispoti , Kyle Mayers
CPC classification number: G06F21/554 , G06F9/455 , G06F21/53 , G06F2221/033
Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing any harmful information from spreading to other applications and systems on a network. The isolation systems are physically and/or logically separated from other systems on the network. A plurality of virtual containers, which may be disposable and specific to each analyst, may be utilized to analyze the suspicious information within the isolation systems. Should a virtual container be infected with harmful information it may be discarded a new virtual container may be used to review the suspicious information. A non-native application may be used to transform the format of the suspicious information into a non-native format in order to aid preventing the harmful information from infecting the other systems on the network.
-
公开(公告)号:US20210397706A1
公开(公告)日:2021-12-23
申请号:US16907995
申请日:2020-06-22
Applicant: BANK OF AMERICA CORPORATION
Inventor: Dustin Paul Stocks , Jon Codispoti
Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze the suspicious information. The analyst may utilize a non-native application to analyze the suspicious information within the virtual container. The non-native application may be used to analyze the suspicious information in an analysis format instead of an original format for which the suspicious information, and any harmful information therein, were intended to be accessed. Additionally, the virtual containers may be accessed through the use of an API that allows an analyst to analyze the suspicious information in the virtual container without transferring information from the virtual container back to the analyst user computer system.
-
5.
公开(公告)号:US20210397704A1
公开(公告)日:2021-12-23
申请号:US16907994
申请日:2020-06-22
Applicant: BANK OF AMERICA CORPORATION
Inventor: Kyle Mayers , George Albero , Jon Codispoti , Jinna Zevulun Kim , Dustin Paul Stocks
Abstract: Providing an isolation system that allows analysts to analyze suspicious information in a way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The analyst may set the virtual environment configurations (e.g., applications, programs, settings, etc.) of the virtual container. The analyst may determine how the suspicious information effects the virtual environment configuration and/or use tools to analyze the suspicious information. When harmful information is identified the virtual container may be discarded (e.g., folded up and deleted), and a new virtual container may be provided to the analyst to continue to analyze the suspicious information and/or new suspicious information.
-
公开(公告)号:US20210397703A1
公开(公告)日:2021-12-23
申请号:US16907993
申请日:2020-06-22
Applicant: BANK OF AMERICA CORPORATION
Inventor: Dustin Paul Stocks , Jon Codispoti , Kyle Mayers
Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing any harmful information from spreading to other applications and systems on a network. The isolation systems are physically and/or logically separated from other systems on the network. A plurality of virtual containers, which may be disposable and specific to each analyst, may be utilized to analyze the suspicious information within the isolation systems. Should a virtual container be infected with harmful information it may be discarded a new virtual container may be used to review the suspicious information. A non-native application may be used to transform the format of the suspicious information into a non-native format in order to aid preventing the harmful information from infecting the other systems on the network.
-
-
-
-
-