Routing a data processing transaction based on machine learning

    公开(公告)号:US12271831B2

    公开(公告)日:2025-04-08

    申请号:US17339686

    申请日:2021-06-04

    Abstract: According to certain embodiments, a routing system comprises a memory operable to store historical data associated with a plurality of previous data processing transactions and a processor operably coupled to a network interface and the memory. The processor is configured to obtain the historical data associated with the plurality of previous data processing transactions transacted using a first routing between a first computing system and a second computing system and determine a pattern based on the historical data, the pattern determined based on machine learning. The processor is further configured to associate the pattern with a second routing between the first computing system and the second computing system, determine an upcoming data processing transaction corresponding to the pattern, and use the second routing to transact the upcoming data processing transaction.

    System for implementing continuous authentication based on object location recognition

    公开(公告)号:US12158930B2

    公开(公告)日:2024-12-03

    申请号:US18429570

    申请日:2024-02-01

    Abstract: Systems, computer program products, and methods are described herein for implementing continuous authentication based on object location recognition. The present invention is configured to receive, from the computing device of a user, a request for primary authorized access; receive, via the augmented reality application, a real-time visual feed, wherein the real-time visual feed comprises one or more objects; determine one or more positional parameters associated with the one or more objects; determine that the one or more objects and the one or more positional parameters associated with the one or more objects meets one or more requirements for the primary authorized access; and transmit control signals configured to cause the computing device of the user to display a notification indicating that the user has been granted the primary authorized access.

    SYSTEM AND METHOD FOR PROVIDING COMPLEX DATA ENCRYPTION

    公开(公告)号:US20240394385A1

    公开(公告)日:2024-11-28

    申请号:US18795484

    申请日:2024-08-06

    Abstract: Various systems, methods, and computer program products are provided for complex data encryption. The method includes receiving a user input code from a computing device associated with a user. The user input code is one or more plaintext characters. The method also includes generating a first encrypted value using a first encryption algorithm based on the user input code. The method further includes decrypting the first encrypted value using one or more additional encryption algorithms. The one or more synthetic user input codes are generated by the decryption of the first encrypted value using each of the one or more additional encryption algorithms. The method still further includes determining a first encryption vulnerability score based on the value of the one or more synthetic user input codes. The method also includes causing a transmission of a user input code notification based on the first encryption vulnerability score.

    SYSTEM FOR SECURED ELECTRONIC DATA ACCESS THROUGH MACHINE-LEARNING BASED ANALYSIS OF COMBINED ACCESS AUTHORIZATIONS

    公开(公告)号:US20240283787A1

    公开(公告)日:2024-08-22

    申请号:US18648419

    申请日:2024-04-28

    CPC classification number: H04L63/083 H04L41/16 H04L63/0428

    Abstract: A system is provided for secured electronic data access through machine-learning based analysis of combined access authorizations. In particular, the system may maintain an access provisioning database which stores data regarding the data access authorizations that have been granted to one or more third party computing systems or entities. The system may further continuously monitor and aggregate electronic data from one or more electronic data streams and analyze the electronic data to intelligently generate probabilities for future events that create certain combinations of access authorizations that affect the security of the electronic data to which the third party computing systems have authorized access. In this way, the system may provide an effective way to manage access authorizations.

    Secure access control framework using dynamic resource replication

    公开(公告)号:US11983254B2

    公开(公告)日:2024-05-14

    申请号:US18228709

    申请日:2023-08-01

    CPC classification number: G06F21/31 G06F9/5005 G06N20/00 G06F2221/2123

    Abstract: Systems, computer program products, and methods are described herein for secure access control using dynamic resource replication. The present invention is configured to electronically receive, from a computing device of a user, a request to generate a resource access path to access a resource; determine one or more resource requirements associated with the resource; determine an authentication level associated with the user; initiate a resource replication engine on the one or more resource requirements and the authentication level associated with the user; determine, using the resource replication engine, that the one or more requirements and the authentication level associated with the user meets one or more conditions for a replication process; and generate, using the resource replication engine, the resource access path and a plurality of replicate resource access paths.

Patent Agency Ranking