Multicomputer processing of user data with centralized event control

    公开(公告)号:US10484490B2

    公开(公告)日:2019-11-19

    申请号:US15725553

    申请日:2017-10-05

    摘要: Aspects of the disclosure relate to multicomputer processing of data from social media service computing platforms and other sources with centralized event control. An event control computing platform may receive information from one or more social media service computing platforms. Subsequently, the event control computing platform may identify, based on the received information, whether a change should be made to user data associated with a user identifiable by the received information. If the information indicates that a change should be made to the user data, then the event control computing platform may extract metadata from the received information to verify the accuracy of the received information. When the metadata verifies the accuracy of the received information, the event control computing platform may generate a command configured to cause a change to the user data and then may transmit the generated command to an event validation computing platform.

    Enhanced detection of polymorphic malicious content within an entity

    公开(公告)号:US10440051B2

    公开(公告)日:2019-10-08

    申请号:US15448888

    申请日:2017-03-03

    IPC分类号: H04L29/06 G06F16/22

    摘要: Embodiments of the invention are directed to systems, methods and computer program products for enhanced detection of polymorphic malicious content within an entity. In this regard, the present invention receives information associated with an incidence of an electronic file; receives an first hash value of the electronic file from a first network device and a second hash value of the electronic file from a second network device; compares the first hash value with the second hash value; determines that the electronic file is polymorphic based on at least the match; initiates an execution of a quantum optimization algorithm using a quantum optimizer to determine one or more hash value states associated with the electronic file for a third network device; and initiates a control signal configured to store the one or more hash value states in a database associated with the third network device.

    Distractional variable identification for authentication of resource distribution

    公开(公告)号:US10437991B2

    公开(公告)日:2019-10-08

    申请号:US15450729

    申请日:2017-03-06

    摘要: A system for capturing communication variables associated with a communication between two or more parties and implementing a quantum optimizer to analyze the communication variables to determine the actual context of a communication held by one or more parties to the communication. Once the actual context is determined, a further determination is made as to whether the actual context poses or potentially poses a security threat to one or more parties to the communication or a third-party and, if so, notifies the party of the security threat. In this regard, parties to a communication that are unaware of the actual context of the communication held by another party are made aware of that actual context poses a security threat and, in some embodiments, notifies the parties while the communication is still occurring.

    DISTRACTIONAL VARIABLE IDENTIFICATION FOR AUTHENTICATION OF RESOURCE DISTRIBUTION

    公开(公告)号:US20180253552A1

    公开(公告)日:2018-09-06

    申请号:US15450729

    申请日:2017-03-06

    IPC分类号: G06F21/55 G06N99/00 G10L17/26

    摘要: A system for capturing communication variables associated with a communication between two or more parties and implementing a quantum optimizer to analyze the communication variables to determine the actual context of a communication held by one or more parties to the communication. Once the actual context is determined, a further determination is made as to whether the actual context poses or potentially poses a security threat to one or more parties to the communication or a third-party and, if so, notifies the party of the security threat. In this regard, parties to a communication that are unaware of the actual context of the communication held by another party are made aware of that actual context poses a security threat and, in some embodiments, notifies the parties while the communication is still occurring.

    Pro-active digital watch center
    46.
    发明授权

    公开(公告)号:US12034586B2

    公开(公告)日:2024-07-09

    申请号:US17851151

    申请日:2022-06-28

    摘要: A computer system for optimizing an application for monitoring operation of a network is provided. The application may utilize Artificial Intelligence (AI). The computer system may be configured to detect a network transaction volume level that exceeds a first threshold level. In response to a detection of the network transaction volume level that exceeds a first threshold level, the system may utilize the AI to determine whether to implement one or more over-threshold-level mitigation techniques. When the AI instructs the processor to implement the one or more over-threshold-level mitigation techniques, the system may query the AI for an instruction directing an implementation of the over-threshold-level mitigation techniques.

    HASH-BASED TRANSACTION TAGGING
    47.
    发明公开

    公开(公告)号:US20240013208A1

    公开(公告)日:2024-01-11

    申请号:US17860204

    申请日:2022-07-08

    IPC分类号: G06Q20/38 G06Q20/40 G06Q20/02

    摘要: Apparatus and methods for determining transaction transmission fidelity are provided. A sender may receive a transaction log including multiple transactions in two or more rows and two or more columns. The transaction log may be encrypted. Each of the transactions may be tagged. Each row and column of the transaction log may be hashed. The encrypted transaction log and the hash values may be transmitted to a recipient. The recipient may decrypt the transaction log and hash each row and column of the decrypted transaction log. The hash values may be compared and if there is a difference, a report or alert may be generated.