SYSTEM FOR ENHANCED AUTHENTICATION USING VOICE MODULATION MATCHING

    公开(公告)号:US20230214839A1

    公开(公告)日:2023-07-06

    申请号:US17568090

    申请日:2022-01-04

    CPC classification number: G06Q20/40145 G06Q20/38215 G06Q20/3827 G06Q20/3825

    Abstract: Systems, computer program products, and methods are described herein for enhanced authentication using voice modulation matching. The present invention is configured to capture, via a first user input device, a digital audio stream of speech data of a first user; receive one or more identification credentials associated with the first user; encode the speech data to generate encoded speech data; query one or more data repositories using the encoded speech data; in response, retrieve, encoded speech data associated with a second user that matches the encoded speech data of the first user; determine that the first user has a familial relationship with the second user; generate an authentication token for the first user based on at least determining that the first user has a familial relationship with the second user; and record the authentication token for the first user in a distributed ledger associated with the second user.

    System and method for distributed learning using dynamically encrypted data items

    公开(公告)号:US20250156748A1

    公开(公告)日:2025-05-15

    申请号:US18508472

    申请日:2023-11-14

    Abstract: A method includes receiving and analyzing data items to generate a weight for each data item. In response to determining that a first weight of a first data item is within a first weight range, the method determines that the first data item has a high security level. In response to determining that a second weight of a second data item is within a second weight range, the method determines that the second data item has a medium security level. A first subset of the data items having the high security level are encrypted with a first cryptography algorithm to generate first encrypted data items. A second subset of the data items having the medium security level are encrypted with a second cryptography algorithm to generate second encrypted data items. An artificial intelligence/machine learning model is trained using the first and second encrypted data items as a training data set.

    SYSTEM AND METHOD TO DETECT MANIPULATION OF TRAINING DATA USED FOR MACHINE LEARNING MODELS

    公开(公告)号:US20250148347A1

    公开(公告)日:2025-05-08

    申请号:US18387134

    申请日:2023-11-06

    Abstract: Systems, computer program products, and methods are described herein for detecting manipulation of training data used for machine learning models. The present disclosure is configured to receive an interaction originating from an end-point device; validate the interaction via a primary model; identify a set of triggers within a backdoor model, where the backdoor model is modeled off the primary model capable of undergoing stress testing associated with a set of triggers; pause the interaction upon identification of the set of triggers within the backdoor model; transmit the identified set of triggers to an autonomous artificial general intelligence (AGI) agent, generate a set of synthetic data via the autonomous AGI agent, where the set of synthetic data removes the set of triggers from the primary model; and distribute the set of synthetic data to the primary model to correct the set of triggers within the primary model.

    Intelligence Systems for Quantum-Infused Grading and Optimization Methods for Software Programs

    公开(公告)号:US20250124324A1

    公开(公告)日:2025-04-17

    申请号:US18379311

    申请日:2023-10-12

    Abstract: An automated solution is provided through quantum computing, AI/ML algorithms, neural networking, and hybrid computing integration in order to provide end-to-end optimization software programs. The system may be implemented by generating unique grade(s) for software program(s) against disparate behavior using quantum computing. Quantum entanglement and superposition will ensure fast calculation and analysis of every code snippet. The grade can be further utilized by classical computing engines, which can operate in layers to generate an intelligent report highlighting granular deviation and select an optimized version of program through decision making algorithms, which can then be integrated to original version after passing validity/compatibility checks and automatically employed.

    Cloud infrastructure using machine learning and non-fungible tokens (NFT) for enhanced security

    公开(公告)号:US12271509B2

    公开(公告)日:2025-04-08

    申请号:US18140828

    申请日:2023-04-28

    Abstract: A computing platform may train, using historical information classification information, an information classification model, which may configure the information classification model to classify information and identify, based on the classification, a storage location. The computing platform may receive, from a user device, a request to store information. The computing platform may identify, using the information classification model, a cloud based storage location for the information. The computing platform may generate an NFT representative of the first cloud based storage location. The computing platform may direct a cloud based storage system to store the information at the cloud based storage location. The computing platform may send, to the user device, the NFT. The computing platform may receive, from the user device, the NFT and a request to access the information. Based on validating the NFT, the computing platform may grant the user device access to the information.

    System and method for generating and transmitting visualized software code release and deployment functions to a mixed reality environment

    公开(公告)号:US12175227B2

    公开(公告)日:2024-12-24

    申请号:US18123124

    申请日:2023-03-17

    Abstract: Embodiments of the present invention provide a system for generating and transmitting visualized software code release and deployment functions to a mixed reality environment. The system is configured for determining that a user has submitted a software code associated with a software code release of a software application, identifying, one or more components in the software code, generating a release file comprising at least information associated with the one or more components, generating a summary file comprising a summary of the release file, transmitting the summary file to a distributed computing environment, converting the summary file to an immersive visualized file in the distributed computing environment, and displaying the immersive visualized file to one or more users comprising the user in the distributed computing environment, wherein the distributed computing environment is integrated with a mixed reality environment for displaying the immersive visualized file to the one or more users.

    Secure interactions in a virtual environment using electronic voice

    公开(公告)号:US12020692B1

    公开(公告)日:2024-06-25

    申请号:US18318895

    申请日:2023-05-17

    CPC classification number: G10L15/08 G06F21/32 G06T15/00 G10L13/02 G10L2015/088

    Abstract: A system includes a memory and a processor coupled to the memory. The processor receives a voice command from a first user to transfer a first amount of data objects from a first data file of the first user to a second data file of a second user. The processor generates a voice signature of the first user and further generates a virtual device in the virtual environment, wherein the virtual device comprises metadata relating to the transfer of the data objects. The processor presents the virtual device and the voice signature to the second user in the virtual environment. The processor receives a selection from the second user of the voice signature and plays the voice signature on a second user device of the second user. The processor receives an acknowledgement from the second user and initiates the requested transfer of data objects to the second user.

    Automatic Tagging of Smart Contracts for Electronic Notarization in a Decentralized Finance System

    公开(公告)号:US20240029183A1

    公开(公告)日:2024-01-25

    申请号:US17869316

    申请日:2022-07-20

    CPC classification number: G06Q50/18 H04L9/50 G06F21/10 H04L2209/56

    Abstract: Aspects of the disclosure relate to automatic tagging of smart contracts for electronic notarization in a decentralized finance system. A computing platform may retrieve, from a node in a decentralized distributed ledger system, a smart contract associated with a document for remote online notarization. The computing platform may extract one or more metadata attributes from the document. The computing platform may tag the smart contract based on the extracted one or more metadata attributes. The computing platform may request and receive approval of the tagging from one or more individuals associated with the document for remote online notarization. The computing platform may digitally notarize the document. The computing platform may transmit the tagged smart contract to the node in the decentralized distributed ledger system and cause the tagged smart contract to be saved in the node.

    SECURING DATA IN A METAVERSE ENVIRONMENT USING SIMULATED DATA INTERACTIONS

    公开(公告)号:US20230403288A1

    公开(公告)日:2023-12-14

    申请号:US17837908

    申请日:2022-06-10

    CPC classification number: H04L63/1416 G06F9/455

    Abstract: A system includes a plurality of computing nodes that form a blockchain network, wherein one or more of the computing nodes is a metaverse computing node configured to generate a mixed reality environment. A processor of at least one computing node is configured to receive information relating to a suspicious data interaction associated with a data file of a user, simulate, based on the received information, the suspicious data interaction in a synthetic mixed reality environment that is substantially identical to the mixed reality environment, verify the suspicious data interaction while the simulated data interaction is being performed, when the suspicious data interaction cannot be verified, disable one or more future data interactions processed using the same smart contract used to process the suspicious data interaction, and when the suspicious data interaction is successfully verified, terminate the simulated data interaction and process the suspicious data interaction.

Patent Agency Ranking