Device manipulation system for counteracting facial recognition authentication security malfeasance

    公开(公告)号:US12160422B2

    公开(公告)日:2024-12-03

    申请号:US17712360

    申请日:2022-04-04

    Abstract: Systems, computer program products, and methods are described herein for implementing device manipulation for counteracting facial recognition authentication security malfeasance. The present invention is configured to receive a request from a user via a client device to access an authentication subsystem to execute a facial recognition authentication for access to an application; initiate the facial recognition authentication on the client device in response to receiving the request; receive, from the client device, one or more external inputs in response to one or more authentication prompts; determine, using a machine learning subsystem, that at least one of the one or more external inputs is associated with a first preconfigured duress code; trigger, using a breach detection subsystem, a first set of security protocols; and execute, using the breach detection subsystem, a first set of predefined actions associated with the first set of security protocols.

    TRACKING OF DIGITAL RESOURCES ACROSS MULTIPLE VIRTUAL REALITY COMPUTING ENVIRONMENTS

    公开(公告)号:US20240370304A1

    公开(公告)日:2024-11-07

    申请号:US18141831

    申请日:2023-05-01

    Abstract: Tracking digital resources used in resource exchange events conducted in virtual reality computing environments. Digital resources used in resource exchange events conducted in virtual reality computing environments are tagged with data that at least identifies the location of the resource exchange event in terms of virtual reality computing environment and/or sub-environments. In response, machine-learning algorithm(s) are implemented that analyze the tags to determine resource exchange event movement patterns for specific digital resources. The resource exchange event movement patterns may include digital resource movement across multiple different virtual computing environments.

    Prevention of unauthorized access to information

    公开(公告)号:US12118120B2

    公开(公告)日:2024-10-15

    申请号:US17321899

    申请日:2021-05-17

    CPC classification number: G06F21/6245 G06F21/32 G06F21/36 G06F21/54

    Abstract: A system is provided for encoding user information. The system is configured to generate a random code pattern, assign the random code pattern to a user, assign a personal identifier of the user to the random code pattern, map a combination of the random code pattern and the personal identifier to user information associated with the user, and store an association of the random code pattern and the personal identifier to the user information in a mapping table. The system is further configured to receive from a decoder a query comprising the random code pattern and the personal identifier of the user, wherein the decoder is configured to decode the random code pattern. The system determines based on the mapping table, the user information mapped to the combination of the random code pattern and the personal identifier and transmits the user information to the decoder.

    Hybrid machine learning and knowledge graph approach for estimating and mitigating the spread of malicious software

    公开(公告)号:US11914709B2

    公开(公告)日:2024-02-27

    申请号:US17380450

    申请日:2021-07-20

    CPC classification number: G06F21/566 G06N5/04 G06N20/00 G06F2221/033

    Abstract: Aspects of the disclosure relate to predicting the spread of malicious software. The computing platform may identify malicious software at a computing device and may input characteristics of the malicious software into a machine learning model to produce time horizons for the malicious software. The computing platform may identify, using a knowledge graph and based on the time horizons, subsets of computing devices, each corresponding to a particular time horizon. The computing platform may perform, at a time within a first time horizon, a first security action for a first subset of computing devices within the first time horizon and a second security action for a second subset of computing devices located within a second time horizon, where the first time horizon and the second time horizon indicate that the first subset will be affected by the malicious software prior to the second subset.

    SYSTEM FOR CRYPTOGRAPHIC HASH-BASED RECONSTRUCTION OF ELECTRONIC DATA FILES

    公开(公告)号:US20240007285A1

    公开(公告)日:2024-01-04

    申请号:US17854511

    申请日:2022-06-30

    CPC classification number: H04L9/088

    Abstract: A system is provided for cryptographic hash-based reconstruction of electronic data files. In particular, the system may comprise a data reconstruction database containing entries for elements of electronic data files. Each element and/or entry within the data reconstruction database may be associated with a unique tag or identifier. Accordingly, when data files are generated and/or stored by the system, the data files may comprise an ordered list of one or more identifiers. Based on the identifiers with the data files, the system may dynamically reconstruct the contents of the data files. The system may further use cryptographic keys or hash values to provide secured access control to the data files. In this way, the system may provide an efficient and secure way to store and generate electronic data files and provide secured access thereto.

    Automatically Executing Responsive Actions Upon Detecting an Incomplete Account Lineage Chain

    公开(公告)号:US20230362263A1

    公开(公告)日:2023-11-09

    申请号:US18223286

    申请日:2023-07-18

    CPC classification number: H04L67/306 G06F16/235 G06Q40/02

    Abstract: Aspects of the disclosure relate to account lineage tracking and automatically executing responsive actions upon detecting an incomplete lineage chain. A computing platform may receive an account-change message from a database-level interceptor. The account-change message may include information identifying a first target account as a database-level source account and identifying a second target account associated with one or more target databases. The first target account may be associated with a target application configured to access the target database. After receiving the account-change message, the computing platform may determine, based on a failure to detect a source account associated with the first target account, that an account lineage chain associated with the account-change message is incomplete. In response to determining that the account lineage chain is incomplete, the computing platform may generate and send one or more commands to limit access of the first target account to the target database.

    SYSTEM FOR PREDICTIVE VIRTUAL SCENARIO PRESENTATION

    公开(公告)号:US20230057371A1

    公开(公告)日:2023-02-23

    申请号:US17405624

    申请日:2021-08-18

    Abstract: A scenario presentation device presents, in an electronic display, selectable for possible activities. The device receives a selection of a first scenario option. The selected first scenario option corresponds to a selected activity that includes an action involving an item to be performed over a period of time. The device determines anticipated changes to the environment over the period of time. Using the anticipated changes to the environment over the period of time, a projected environment representation is determined for the selected activity. The projected environment representation includes one or more images depicting changes to the environment. The projected environment representation is presented in the electronic display.

Patent Agency Ranking