Generating Smart Contracts for Electronic Notarization Using Synthetically Generated Invisible Fingerprint Metadata

    公开(公告)号:US20240029034A1

    公开(公告)日:2024-01-25

    申请号:US17869247

    申请日:2022-07-20

    CPC classification number: G06Q20/02 G06Q20/389

    Abstract: Aspects of the disclosure relate to generating smart contracts for electronic notarization using synthetically generated invisible fingerprint metadata. An apparatus may receive synthetic fingerprint information. In addition, the synthetic fingerprint information may be generated based on one or more physical fingerprint images of a user and using a generative artificial intelligence algorithm. The apparatus may receive one or more digital documents associated with an electronic notarization. The apparatus may receive rule information corresponding to location specific protocols associated with the electronic notarization. The apparatus may generate a smart contract on a blockchain based on the synthetic fingerprint information, the one or more digital documents, and the rule information.

    Intelligent Coordination of Log Analysis and Repair Processes in a Multi-Cloud System

    公开(公告)号:US20230342270A1

    公开(公告)日:2023-10-26

    申请号:US17726658

    申请日:2022-04-22

    CPC classification number: G06F11/2025 G06F11/2094

    Abstract: Data server and client device logs may be transmitted over a network for analysis to identify potential issues such as errors. Because the logs may include significant amounts of data, the logs may be transmitted through a quantum smart grid network that leverages Li-Fi technology for increased bandwidth and improved latency. Analysis and resolution identification may be performed by an analysis server that is supported by multiple cloud systems. Each cloud system may be independent operated from other cloud systems, and may include one or more cloud servers configured to analyze log feeds and/or identify resolutions for detected issues. The analysis server may be configured to distribute tasks to the cloud systems based on a variety of factors, and further provide switchover and failover functionality between different cloud systems depending on communication or processing conditions.

    Intelligent coordination of log analysis and repair processes in a multi-cloud system

    公开(公告)号:US11775401B1

    公开(公告)日:2023-10-03

    申请号:US17726658

    申请日:2022-04-22

    CPC classification number: G06F11/2025 G06F11/2094

    Abstract: Data server and client device logs may be transmitted over a network for analysis to identify potential issues such as errors. Because the logs may include significant amounts of data, the logs may be transmitted through a quantum smart grid network that leverages Li-Fi technology for increased bandwidth and improved latency. Analysis and resolution identification may be performed by an analysis server that is supported by multiple cloud systems. Each cloud system may be independent operated from other cloud systems, and may include one or more cloud servers configured to analyze log feeds and/or identify resolutions for detected issues. The analysis server may be configured to distribute tasks to the cloud systems based on a variety of factors, and further provide switchover and failover functionality between different cloud systems depending on communication or processing conditions.

    Securing data in a metaverse environment using simulated data interactions

    公开(公告)号:US20250150473A1

    公开(公告)日:2025-05-08

    申请号:US19017179

    申请日:2025-01-10

    Abstract: A system includes a plurality of computing nodes that form a blockchain network, wherein one or more of the computing nodes is a metaverse computing node configured to generate a mixed reality environment. A processor of at least one computing node is configured to receive information relating to a suspicious data interaction associated with a data file of a user, simulate, based on the received information, the suspicious data interaction in a synthetic mixed reality environment that is substantially identical to the mixed reality environment, verify the suspicious data interaction while the simulated data interaction is being performed. When the suspicious data interaction cannot be verified, the processor disables one or more future data interactions processed using the same smart contract used to process the suspicious data interaction, and when the suspicious data interaction is successfully verified, terminates the simulated data interaction and process the suspicious data interaction.

    PROVIDING NEAR-FIELD COMMUNICATION SECURITY USING SMART CYBER CONTRACT GENERATION FOR A ZERO-TRUST NETWORK ARCHITECTURE

    公开(公告)号:US20250055856A1

    公开(公告)日:2025-02-13

    申请号:US18230786

    申请日:2023-08-07

    Abstract: Arrangements for providing near-field communication (NFC) security using smart cyber contract generation (SCC) are provided. A platform may train an anomaly detection engine based on historical user information and an SCC generation engine based further on historical event processing rules. The platform may generate a certificate for a user device based on intercepting a request via NFC. The platform may validate the certificate based on a maintained profile. The platform may generate a suspicion indication for the request using the anomaly detection engine. The platform may generate an SCC, using the SCC generation engine, based on identifying the request is suspicious. The platform may apply rules included in the SCC to information included in the request. Based on determining that less than all of the rules in the SCC are satisfied, the platform may initiate a security action. The platform may update the engines based on updated event processing permissions.

    Generating synthetic invisible fingerprints for metadata security and document verification using generative artificial intelligence

    公开(公告)号:US12225136B2

    公开(公告)日:2025-02-11

    申请号:US17869190

    申请日:2022-07-20

    Abstract: Aspects of the disclosure relate to generating synthetic invisible fingerprints for metadata security and document verification using generative artificial intelligence (AI). A computing platform may capture first fingerprint information via a computing device. The first fingerprint information may include one or more physical fingerprint images of a user. The computing platform may encode the first fingerprint information in accordance with a quantum key distribution scheme. The computing platform may store the encoded first fingerprint information in a data store. Based on the encoded first fingerprint information and using a generative artificial intelligence algorithm, the computing platform may generate second fingerprint information. The second fingerprint information may include one or more synthetic fingerprint images associated with the one or more physical fingerprint images of a user. The computing platform may transmit the second fingerprint information for smart contract generation.

    SYSTEM FOR AUTOMATED AND INTELLIGENT IMPLEMENTATION OF COMPUTING SOFTWARE UPGRADES

    公开(公告)号:US20240345819A1

    公开(公告)日:2024-10-17

    申请号:US18133207

    申请日:2023-04-11

    CPC classification number: G06F8/65

    Abstract: A system is provided for automated and intelligent implementation of computing software upgrades. In particular, the system may continuously monitor computing application log files from one or more applications within a network environment and analyze the logs using one or more artificial intelligence-based algorithms recommended pathways for automatically upgrading the applications. Based on the upgrade pathways, the system may initiate a two-step application check to determine which applications may be impacted by the software upgrade and/or a software compatibility issue and which ones are not impacted. Applications that are impacted by the software upgrade and/or software compatibility issue may be instantiated in a cloud environment using an auto-configuration script, where the cloud environment may spool up containers as necessary to accommodate the deployed applications. In this way, the system provides an intelligent way to perform application upgrades and distribute computing load across multiple different computing environments.

Patent Agency Ranking