System for increasing authentication complexity for access to online systems

    公开(公告)号:US11601418B2

    公开(公告)日:2023-03-07

    申请号:US17070457

    申请日:2020-10-14

    Inventor: Brandon Sloane

    Abstract: A system is provided for increasing authentication complexity for access to online systems. In particular, the system may use a hidden or obscured method for creating and enforcing a multi-factor authentication scheme. In this regard, the system may introduce authentication logic to a particular application in the network environment such that one or more “invalid” login credentials are generated by a local agent using a pre-shared key and/or algorithm. A back-end authentication system may be calculate its own set of “invalid” login credentials based on the same pre-shared key and/or algorithm, then subsequently compare the calculated incorrect credentials with the incorrect login credentials received from the local agent. If a match is detected, the system may permit a valid set of authentication credentials to be provided to authorize access to the target application and/or online system.

    System for electronic data compression by automated time-dependent compression algorithm

    公开(公告)号:US11601136B2

    公开(公告)日:2023-03-07

    申请号:US17363478

    申请日:2021-06-30

    Inventor: Brandon Sloane

    Abstract: A system is provided for electronic data compression by automated time-dependent compression algorithm. In particular, the system may track instances in which a particular dataset is used, copied, or accessed over time. For certain datasets (e.g., datasets that have not been accessed for a threshold amount of time), the system may use a time-based compression algorithm that progressively removes the least significant bits of such datasets as time passes. The compression of the datasets may continue until the system detects that further compression would cause the dataset to be unreadable or unrecoverable. In this way, the system may minimize the computing resources allocated to storing datasets that are not frequently accessed.

    System for implementing multi-dimensional data obfuscation

    公开(公告)号:US11580249B2

    公开(公告)日:2023-02-14

    申请号:US17173027

    申请日:2021-02-10

    Abstract: Systems, computer program products, and methods are described herein for implementing multi-dimensional data obfuscation. The present invention is configured to electronically receive, from a computing device of a user, a request to implement a multi-dimensional data obfuscation on a first database; initiate a data obfuscation engine on the first database based on at least receiving the request, wherein initiating further comprises: determining one or more data types associated with the one or more data artifacts; determining one or more exposure levels of the one or more data artifacts; retrieving, from a data obfuscation repository, one or more data obfuscation algorithms; and implementing the one or more data obfuscation algorithms on the one or more data artifacts based on at least the one or more data types; and generate an obfuscated first database based on at least initiating the data obfuscation engine on the first database.

    System for securing electronic data by aggregation of distributed electronic database entries

    公开(公告)号:US11568065B2

    公开(公告)日:2023-01-31

    申请号:US17149878

    申请日:2021-01-15

    Abstract: A system is provided for securing electronic data by aggregation of distributed electronic database entries. The system may comprise two or more data repositories that may be logically and/or physically separated from one another. Incoming data may be split into multiple parts that may be stored in a distributed manner across the two or more data repositories. Each of the parts of the incoming data may be associated with an identifier and/or a sequence number such that the system, upon receiving a user query for such data, may aggregate the individual parts of the data in the correct sequence. In some embodiments, the system may further use an obfuscation algorithm to apply randomized values to the identifiers and/or sequence numbers and track the operations performed in an obfuscation log. In this way, the system may provide a way to securely store and retrieve data to prevent unauthorized access.

    EXTENDED REALITY INTERFACE FOR REMOTE APPLICATION MONITORING AND REAL-TIME DECISIONING

    公开(公告)号:US20230013760A1

    公开(公告)日:2023-01-19

    申请号:US17377020

    申请日:2021-07-15

    Abstract: Systems, computer program products, and methods are described herein for remote application monitoring and real-time decisioning in an extended reality environment. The present invention allows a user (such as a supervisor, approver, or editor) to remotely monitor changes by another user to a work product or data in real-time using an extended reality (XR) environment. In this regard, the present invention focuses on electronic applications (and the electronic work products/electronic data hosted thereon) and represents a shared view of said applications within an XR environment. A user may then visualize an application via an XR platform (accessible using a virtual/augmented/mixed reality device) and proactively make edits, approvals, or otherwise interact with said application.

    Digital passport with verified data provenance

    公开(公告)号:US11553311B2

    公开(公告)日:2023-01-10

    申请号:US17552387

    申请日:2021-12-16

    Abstract: Systems and methods for accurately and securely assembling, storing, and leveraging travel data are provided. A method may include detecting a travel event of a user. The method may include recording the travel event in a travel map that is stored in a database. The travel map may be a temporal- and spatial-based record of one or more travel events of the user. The travel map may be stored as a blockchain ledger. The method may include tokenizing sensitive information associated with the user in the database, and calculating a hazard vector. The method may include updating, based at least in part on the hazard vector, a status index associated with the user, and providing the user and a system administrator access to the travel map and the status index. Access may be provided via an online portal configured to be viewed via an application running on a mobile device.

    Trusted pair authentication with edge-computing devices

    公开(公告)号:US11544718B2

    公开(公告)日:2023-01-03

    申请号:US17477660

    申请日:2021-09-17

    Abstract: Apparatus and methods are provided for executing a rules-based authentication of an electronic transaction. The method may include receiving first and second payment authorization parameters and second payment authorization parameters. The method may also include receiving from a Point of Sale device a request for payment information and a purchase amount. The method may also include, determining if first or second parameters are satisfied. The first parameters may include a first time range, a pairing of the electronic device to a first apparatus, a first geolocation of the electronic device, and a first maximum transaction value. The second parameters may include a second time range, a pairing of the electronic device to a second apparatus, a second geolocation of the electronic device, and a second maximum transaction value, wherein the second time range does not include the first time range.

    Automatic Machine-to-Machine (M2M) Communications Based on Machine Learning

    公开(公告)号:US20220398673A1

    公开(公告)日:2022-12-15

    申请号:US17346949

    申请日:2021-06-14

    Abstract: A system includes memory operable to store instructions and processing circuitry operable to execute the instructions. The system accesses previous data processing transactions associated with a first account of a user, wherein at least one of the previous data processing transactions are transacted using a first routing between a first computing system and a second computing system. The system further determines, using machine learning, a pattern from the previous data processing transactions and determines an upcoming data processing transaction corresponding to the pattern. The system further compares the upcoming data processing transaction to a data item associated with the first account and determines a second routing between the second computing system and a third computing system. The system further transacts, based on the comparison of the upcoming data processing transaction to the data item, the upcoming data processing transaction using either the first routing or the second routing.

Patent Agency Ranking