Augmented reality dynamic authentication

    公开(公告)号:US10586220B2

    公开(公告)日:2020-03-10

    申请号:US15367502

    申请日:2016-12-02

    Abstract: A system for performing authorization of a user in an augmented reality environment comprises an augmented reality user device, an automatic teller machine, and an authentication server. The automatic teller machine has a keypad with unmarked buttons. The augmented reality user device includes a display configured to overlay virtual objects onto a field of view of a user. The augmented reality user device receives a virtual keypad overlay, which assigns values to the unmarked buttons of the keypad. Using the overlay, the augmented reality user device displays the assigned values on the buttons of the keypad. The automatic teller machine detects an input sequence entered on the keypad and sends the input sequence to the authentication server. The authentication server determines an authentication code by combining the input sequence with the virtual keypad overlay, and compares the determined authentication code with an authentication code stored in a database.

    Virtual reality dynamic authentication

    公开(公告)号:US10311223B2

    公开(公告)日:2019-06-04

    申请号:US15367590

    申请日:2016-12-02

    Abstract: A system for performing authorization of a user in a virtual reality environment includes a virtual reality user device. The virtual reality user device includes a display configured to display a virtual environment. The user device receives a virtual authentication object comprising a virtual representation of an object that the user can manipulate to enter an authentication code. The user device detects gestures performed by the user on the displayed virtual authentication object and forms an authentication request, which includes the virtual authentication object, the detected gestures; and an identifier of the user. The user device sends the authentication request to an authentication server. The authentication server determines an authentication code using the virtual authentication object and the detected gestures. The authentication server authenticates the user by comparing the determined authentication code with an authentication code stored in a database and sends an authentication response to the user device.

    SYSTEM AND METHOD FOR SELF-CLUSTERING EDGE COMPUTING PROTECTION

    公开(公告)号:US20240406219A1

    公开(公告)日:2024-12-05

    申请号:US18802244

    申请日:2024-08-13

    Abstract: Systems, computer program products, and methods are described herein for self-clustering computing protocols. The present invention is configured to detect, using a node analysis engine, a change in a network security protocol associated with a first node or device within a distributed network, and transmit instructions for the first node or device to broadcast the change to nearby nodes or devices such that they can act in concert to protect against identifies security issues.

    System for dynamic node analysis for network security response

    公开(公告)号:US12160435B2

    公开(公告)日:2024-12-03

    申请号:US17542973

    申请日:2021-12-06

    Abstract: Systems, computer program products, and methods are described herein for dynamic node analysis for network security response. The present invention is configured to detect, using a node analysis engine, a change in a network security protocol associated with a first node within a distributed network; extract information associated with the change in the network security protocol associated with the first node; identify one or more adjacent nodes with a first degree of separation from the first node in response to detecting the change; determine a first set of changes to the network security protocols for the one or more adjacent nodes based on at least the information associated with the change in the network security protocol of the first node; and automatically implement the first set of changes to the network security protocols of the one or more adjacent nodes with the first degree of separation from the first node.

    SYSTEM AND METHOD FOR SELF-CLUSTERING EDGE COMPUTING PROTECTION

    公开(公告)号:US20230188573A1

    公开(公告)日:2023-06-15

    申请号:US17547566

    申请日:2021-12-10

    CPC classification number: H04L63/205 H04L63/1425 H04L63/1416

    Abstract: Systems, computer program products, and methods are described herein for self-clustering computing protocols. The present invention is configured to detect, using a node analysis engine, a change in a network security protocol associated with a first node or device within a distributed network, and transmit instructions for the first node or device to broadcast the chance to nearby nodes or devices such that they can act in concert to protect against identifies security issues.

    Cognitive automation based compliance management system

    公开(公告)号:US11556873B2

    公开(公告)日:2023-01-17

    申请号:US16837204

    申请日:2020-04-01

    Abstract: Aspects of the disclosure relate to a cognitive automation based compliance management system. A computing platform may receive, via a network, an alert notification indicative of a change to a legal framework applicable to an enterprise organization. Subsequently, the computing platform may, in response to the alert notification, detect a task that may be impacted by the change. Then, the computing platform may, upon detecting the task, identify at least one task parameter associated with the task. Then, the computing platform may compare the at least one task parameter with the change to determine whether the task is impacted by the change. Subsequently, the computing platform may, upon a determination that the task is impacted by the change, recommend, via the network, one or more actions associated with the task.

    Engine to propagate data across systems

    公开(公告)号:US11528341B2

    公开(公告)日:2022-12-13

    申请号:US17533351

    申请日:2021-11-23

    Abstract: Aspects of the disclosure relate to cognitive automation-based engine processing to propagate data across multiple systems via a private network to overcome technical system, resource consumption, and architecture limitations. Data to be propagated can be manually input or extracted from a digital file. The data can be parsed by analyzing for correct syntax, normalized into first through sixth normal forms, segmented into packets for efficient data transmission, validated to ensure that the data satisfies defined formats and input criteria, and distributed into a plurality of data stores coupled to the private network, thereby propagating data without repetitive manual entry. The data may also be enriched by, for example, correcting for any errors or linking with other potentially related data. Based on data enrichment, recommendations of additional target(s) for propagation of data can be identified. Reports may also be generated. The cognitive automation may be performed in real-time to expedite processing.

Patent Agency Ranking