System and method for managing metaverse instances

    公开(公告)号:US20240364697A1

    公开(公告)日:2024-10-31

    申请号:US18306962

    申请日:2023-04-25

    Abstract: A method for managing metaverse instances includes registering a physical control level for a user. The physical control level includes information about physical locations and data items that the user is allowed to access within an entity. A digital identity is generated for the user. The digital identity includes a virtual control level for an avatar of the user and allows the avatar to access a metaverse instance of a metaverse of the entity. The virtual control level is synchronized with the physical control level. Computing resources to be allocated to the metaverse instance are determined. A first instruction is sent to a metaverse server to open the metaverse instance. A second instruction is sent to the metaverse server to allocate the computing resources to the metaverse instance. A third instruction is sent to the metaverse server to generate the avatar. The avatar is allowed access to the metaverse instance.

    SYSTEM AND METHOD FOR DISTRIBUTED AND AUTHENTICATED PROVISIONING OF ENCRYPTED ELECTRONIC DATA

    公开(公告)号:US20240171397A1

    公开(公告)日:2024-05-23

    申请号:US17989751

    申请日:2022-11-18

    CPC classification number: H04L9/321 H04L9/3297

    Abstract: A system is provided for distributed and authenticated provisioning of encrypted electronic data. In particular, the system may comprise an intelligent monitoring engine that may continuously monitor and log actions and/or requests executed by an endpoint device to identify one or more data request patterns associated with the endpoint device. Based on identifying the data request patterns, the system may transfer encrypted electronic data to the endpoint device for storage, where the encrypted electronic data may be configured with a time to live on the endpoint device. The system may further comprise an unauthorized activity monitor that may monitor the actions taken by the endpoint device to detect potentially unauthorized activity involving the endpoint device. If no unauthorized activity is detected, the system may permit the endpoint device to decrypt the encrypted electronic data to be presented to a user.

    SYSTEM AND METHOD FOR INTERCONNECTION, TRANSLATION AND TRANSITION BETWEEN DISPARATE DIGITAL ECOSYSTEMS

    公开(公告)号:US20240037196A1

    公开(公告)日:2024-02-01

    申请号:US17873914

    申请日:2022-07-26

    CPC classification number: G06F21/31 G06F11/3438

    Abstract: Embodiments of the present invention provide a system for interconnection, translation, and transition between disparate digital ecosystems. The system is configured for determining that a user is requesting to access a first digital ecosystem, receiving a first authentication credentials of the user from the first digital ecosystem for verification, determining that the verification of the first authentication credentials is successful and provide access to the first digital ecosystem, determining that the user is requesting transition to a second digital ecosystem from the first digital ecosystem, receiving second authentication credentials of the user from the second digital ecosystem for verification, determining that the verification of the second authentication credentials is successful and provide access to the second digital ecosystem, and preparing and transmitting a data payload to the second digital ecosystem.

    Dynamic contactless payment based on facial recognition

    公开(公告)号:US11816668B2

    公开(公告)日:2023-11-14

    申请号:US17567248

    申请日:2022-01-03

    CPC classification number: G06Q20/40145

    Abstract: Arrangements for facial recognition and processing are provided. In some aspects, a request to process a transaction may be received. In response to the request, image data of the user may be captured. The image data may be analyzed using one or more facial recognition techniques. If the user cannot be identified, payment information may be requested from the user. If the user can be identified, the user may be identified and user profile data associated with the user may be retrieved. In some examples, the user profile data may include user contact information, user device identifying information, and the like. User device data may be extracted from the user profile data and a notification including an instruction to initiate payment processing may be generated. The notification may then be transmitted to the user device identified from the extracted data and the instruction may be executed to initiate payment processing.

Patent Agency Ranking