Accessing a virtual sub-environment in a virtual environment

    公开(公告)号:US20240022561A1

    公开(公告)日:2024-01-18

    申请号:US17813231

    申请日:2022-07-18

    CPC classification number: H04L63/0853 H04L63/108

    Abstract: A system includes a memory and a processor coupled to the memory. The processor receives a user credential associated with a user and authorizes an avatar of the user to enter a virtual environment. The processor receives a virtual security token that provides access to a virtual sub-environment in the virtual environment. Based on user data associated with the virtual security token, the processor determines that the virtual security token is associated with the user. The processor verifies that the avatar is associated with the user by authenticating the identity of the user associated with the virtual security token. In response to successfully verifying the identity of the user, the processor authorizes the avatar to enter the virtual sub-environment.

    Electronic system for generation of authentication tokens using biometric data

    公开(公告)号:US11792009B2

    公开(公告)日:2023-10-17

    申请号:US17347159

    申请日:2021-06-14

    CPC classification number: H04L9/3213 H04L9/14 H04L9/3231

    Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for generation of dynamic authentication tokens for use in system-to-system transaction authorization and user identity verification. The system utilizes user biometric data to generate unique authentication tokens which are customized to a particular user. Furthermore, the system rotates not only the encryption algorithms used, but also the datasets being encrypted in order to provide a high level of security such that even if a user's biometric data was compromised, it would be highly unlikely that an attacker would be able to recreate the authentication token stemming from said biometric data at any given point in time. The system eliminates the need for user-provided authentication credentials and provides a more secure and more efficient method of authenticating data exchange between multiple systems or applications.

    SCHEME EVALUATION AUTHENTICATION SYSTEM

    公开(公告)号:US20230045301A1

    公开(公告)日:2023-02-09

    申请号:US17397484

    申请日:2021-08-09

    Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for a scheme evaluation authentication system to evaluate user action and machine learned pattern recognition for misappropriation activity prevention. In this way, bot and token deployment is utilized for identification of user actions to generate a user idiosyncrasy database. Using the database, the system creates a real-time scheme evaluation authentication for user authentication upon user attempted authentications. As such, a user may by authenticate irrespective of user inputs, but instead based on a match of user actions at the authentication location in real-time compared to the idiosyncrasy database.

    BIOMETRIC AUTHENTICATION BASED ON BEHAVIORAL ANALYSIS

    公开(公告)号:US20230033954A1

    公开(公告)日:2023-02-02

    申请号:US17388592

    申请日:2021-07-29

    Abstract: A heightened level of security is provided in a computing platform by monitoring usage of applications and/or services residing on or accessible to a computing platform to determine abnormal usage patterns. In response to determining an abnormal pattern of usage, the user is required to provide biometric data, such as voice data, facial feature data, fingerprint data or the like, as a means of authenticating the user. The abnormal pattern of usage may be determined dynamically by comparing current usage patterns to known user baseline usage patterns. Alternatively, the abnormal pattern of usage is predefined, such as the resetting of passwords in a predefined number of applications and/or services over a predefined period of time.

    SYSTEM FOR IMAGE/VIDEO AUTHENTICITY VERIFICATION

    公开(公告)号:US20220398330A1

    公开(公告)日:2022-12-15

    申请号:US17343103

    申请日:2021-06-09

    Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for intelligent verification of digital files via the analysis of metadata and other file characteristics. The system is adaptive, in that it can be adjusted based on the needs or goals of the user utilizing it, or may intelligently and proactively adapt based on the files or data received for processing. The system may be seamlessly embedded within existing applications or programs that the user may already use to interact with one or more entities.

Patent Agency Ranking