SYSTEM FOR DETECTION AND MITIGATION OF UNAUTHORIZED REPRODUCTION OF SENSITIVE ELECTRONIC DATA

    公开(公告)号:US20250053684A1

    公开(公告)日:2025-02-13

    申请号:US18232563

    申请日:2023-08-10

    Abstract: A system is provided for detection and mitigation of unauthorized reproduction of sensitive electronic data. In particular, the system may comprise a networked environment with various computing devices that may be used to store, process, and/or transfer sensitive electronic data. When a user accesses the sensitive data, the contents of the data may be presented as a series of micro dots or pixels. The system may be configured to display rapidly change at least a portion of the micro dots or pixels at a high frequency, such that a snapshot of the sensitive data taken at a singular point in time will not be able to capture all of the data needed to make the data readable to the user. In this way, the system may be able to prevent the unauthorized reproduction of sensitive data within the network environment.

    SYSTEM FOR HIGH INTEGRITY REAL TIME PROCESSING OF DIGITAL FORENSICS DATA

    公开(公告)号:US20240412315A1

    公开(公告)日:2024-12-12

    申请号:US18207394

    申请日:2023-06-08

    Abstract: A system is provided for high integrity real time processing of digital forensics data. In particular, the system may comprise a distributed electronic data register that may be hosted on a plurality of distributed servers. The distributed register may store digital forensics data within a secure data record within the distributed register. In this regard, entities or individuals who are authorized to access and/or receive the evidence may submit a digital signature to the distributed register. The system may further comprise an artificial intelligence engine that may use machine learning to identify potential anomalies in real time within the chain of evidence and trigger an alert service to transmit real time alerts to one or more systems and/or users. In this way, the system provides a more secure and efficient way to store, process, and manage digital forensics data.

    Using machine-learning models to determine graduated levels of access to secured data for remote devices

    公开(公告)号:US12158963B2

    公开(公告)日:2024-12-03

    申请号:US18376993

    申请日:2023-10-05

    Abstract: Aspects of the disclosure relate to using machine-learning models to determine graduated levels of access to secured data for remote devices. In some embodiments, a computing platform may establish a connection with a mobile device. Subsequently, based on establishing the connection, the platform may identify initial device information, device features, and user information. The platform may input the identified information into an authentication model to compute a baseline authentication score and then may identify an initial level of access to secured resources for the mobile device. Thereafter, the platform may receive from the mobile device, AR/VR device information captured by the mobile device. The platform may input the AR/VR device information into the authentication model to compute an augmented authentication score. Based on the augmented score, the platform may identify an augmented level of access to secured resources for the mobile device.

    SYSTEM AND METHOD FOR DATA PROTECTION IN A DISTRIBUTED NETWORK VIA RECONSTRUCTION AND ANALYSIS OF DATA SEGMENTS

    公开(公告)号:US20240396947A1

    公开(公告)日:2024-11-28

    申请号:US18200821

    申请日:2023-05-23

    Abstract: Systems, computer program products, and methods are described herein for data protection in a distributed network via reconstruction and analysis of data segments. The present invention is configured to initiate a network flow analysis to assign indicators to specialized access nodes of a network diagram, execute a first cut to remove predetermined nodes, store the corresponding discrete data segments for each of the first plurality of electronic communications at the nodes, construct a first arrangement of a selected group of the corresponding discrete data segments, determine a presence of sensitive information, and construct additional arrangements of the selected group of the corresponding discrete data segments to determine a presence of sensitive information.

    SYSTEM AND METHOD FOR IMPLICIT ITEM EMBEDDING WITHIN A SIMULATED ELECTRONIC ENVIRONMENT

    公开(公告)号:US20240364977A1

    公开(公告)日:2024-10-31

    申请号:US18138919

    申请日:2023-04-25

    CPC classification number: H04N21/812 H04N21/251 H04N21/25891 H04N21/4756

    Abstract: Systems, computer program products, and methods are described herein for implicit item embedding within a simulated electronic environment. In various embodiments, the invention includes utilizing a hybrid recommendation engine, the invention suggests product placements based on user data and preferences of a specific user. During the initial warm-up period, either user-based or product-based collaborative filtering is applied to assign the user to a collaborative user group until more information about the user becomes available. The hybrid recommendation engine is enhanced through a collaborative clustering component, which involves assigning the user to the collaborative user group via user-based collaborative filtering based on their similar user characteristics, product interests, or product preferences. The invention dynamically alters digital content streamed to the user's device. An implicit product placement module integrates recommended products within the entertainment content, providing a seamless and personalized experience for the user.

    REAL-TIME ADJUSTMENT OF THE VOLUME OF PASSCODE ENTRY AUTHENTICATION ATTEMPTS

    公开(公告)号:US20240330423A1

    公开(公告)日:2024-10-03

    申请号:US18127472

    申请日:2023-03-28

    CPC classification number: G06F21/316 G06F9/453 G06F2221/2113

    Abstract: Real-time adjustment of the volume of passcode entry authentication attempts is performed based on systematic determinations of the likelihood that the passcode entrant is the rightful holder/user of the active passcode. Specifically, after an entered passcode has been determined to be incorrect, a determination is made as to the likelihood that the passcode entrant is the rightful holder of the active passcode and, based on such a determination, the number of authentication attempts afforded the passcode entrant is either increased, decreased or exhausted. Systematic determination of the likelihood that the passcode entrant is the rightful holder/user of the active passcode is accomplished by applying predetermined mismatched passcode rules and comparing machine learning (ML)-based user authentication behavior patterns to characteristics of the current authentication attempt.

    SYSTEM FOR CONTAINERIZATION-BASED COUNTERMEASURES TO CYBERSECURITY VULNERABILITIES

    公开(公告)号:US20240305660A1

    公开(公告)日:2024-09-12

    申请号:US18119109

    申请日:2023-03-08

    CPC classification number: H04L63/1433 H04L63/1416

    Abstract: A system is provided for containerization-based countermeasures to cybersecurity vulnerabilities. In particular, the system may generate one or more containers (e.g., virtual environments), where each container may be configured to execute one or more tasks. At least a portion of the containers may be decoy containers that may be executing one or more decoy tasks. The system may then use a randomized process to change which containers are decoy and/or which tasks or jobs are executed within each container. Each container may be associated with a cryptographic key such that each container may be hashed by the system and compared against a reference hash associated with the container. If the hash has changed, the system may determine that the container has been modified and subsequently implement one or more intelligent remediation processes.

    SYSTEM FOR VALIDATION AND AUTHENTICATION OF RESOURCES IN A VIRTUAL ENVIRONMENT

    公开(公告)号:US20240303316A1

    公开(公告)日:2024-09-12

    申请号:US18119168

    申请日:2023-03-08

    CPC classification number: G06F21/44 G06F9/5077

    Abstract: A system is provided for validation and authentication of resources in a virtual environment. In particular, the system may embed a digital source identifier into a digital or virtual resource within the virtual environment. For instance, in some embodiments, the digital source identifier may be an image file that may be stored within one or more pre-defined areas or regions of the virtual resource, where the image file serves as an indicator of authenticity and validity of the virtual resource. Accordingly, the system may comprise a scanner that may be configured to scan the one or more pre-defined areas or regions to detect the presence of the digital source identifier. If the digital source identifier is found, the system may determine that the virtual resource has been validated and authenticated.

Patent Agency Ranking