Processing system for providing enhanced reality interfaces at an automated teller machine (ATM) terminal platform

    公开(公告)号:US10916105B2

    公开(公告)日:2021-02-09

    申请号:US16123455

    申请日:2018-09-06

    Abstract: Aspects of the disclosure relate to processing systems that implement an enhanced reality device to facilitate transactions at a screen-less automated teller machine (ATM). A computing platform may receive a request to initiate a transaction with a screen-less automated ATM. Based on the request to initiate the transaction, the computing platform may send pre-transaction interface information and commands directing the enhanced reality device to generate a pre-transaction interface. The computing platform may receive an authentication request from the screen-less ATM indicating its availability and requesting authentication information. In response to validating the authentication information, the computing platform may generate transaction interface information. The computing platform may send the transaction interface information to the enhanced reality device. The computing platform may receive a transaction completion indication from the screen-less ATM. After receiving the transaction completion indication, the computing platform may send haptic feedback indicating that the transaction is complete.

    Cybersecurity threat detection and mitigation system

    公开(公告)号:US10862926B2

    公开(公告)日:2020-12-08

    申请号:US16781118

    申请日:2020-02-04

    Abstract: Apparatus and methods are provided for graphically defining a real-world cybersecurity protocol of an entity. The graphical platform includes searchable, manipulatable, graphs mapping cybersecurity threats. Manipulating nodes and relationships within the graphs translates into real-time modification of a cybersecurity protocol in effect for the entity. An ability to map known cybersecurity threats and analyze them (even according to known frameworks) may streamline and integrate efforts of cybersecurity defense teams. Graphical representation of a security protocol facilitates proactive threat hunting as well as expediting incident response activities by providing evidence-based pathways to inform impact analysis and source event analysis.

    AUGMENTED REALITY DYNAMIC AUTHENTICATION FOR ELECTRONIC TRANSACTIONS

    公开(公告)号:US20200226599A1

    公开(公告)日:2020-07-16

    申请号:US16783607

    申请日:2020-02-06

    Abstract: A system for authorizing an electronic transaction in an augmented reality environment comprises an augmented reality user device and an authentication server. The augmented reality user device includes a display that overlays virtual objects onto a field of view of the user. The user device receives a request to verify information about a payment card used in an electronic transaction. The request includes a virtual authentication object, which is a virtual representation of an object capable of being manipulated by the user in a particular sequence to enter an authentication code. The user device displays the virtual authentication object to the user and detects gestures performed on the virtual authentication object. The user device sends the detected gestures to the authentication server. The authentication server determines the authentication code using the virtual authentication object and the detected gestures, and uses it to authorize the transaction.

    CYBERSECURITY THREAT DETECTION AND MITIGATION SYSTEM

    公开(公告)号:US20200177636A1

    公开(公告)日:2020-06-04

    申请号:US16781118

    申请日:2020-02-04

    Abstract: Apparatus and methods are provided for graphically defining a real-world cybersecurity protocol of an entity. The graphical platform includes searchable, manipulatable, graphs mapping cybersecurity threats. Manipulating nodes and relationships within the graphs translates into real-time modification of a cybersecurity protocol in effect for the entity. An ability to map known cybersecurity threats and analyze them (even according to known frameworks) may streamline and integrate efforts of cybersecurity defense teams. Graphical representation of a security protocol facilitates proactive threat hunting as well as expediting incident response activities by providing evidence-based pathways to inform impact analysis and source event analysis.

    HYBRID GRAPH AND RELATIONAL DATABASE ARCHITECTURE

    公开(公告)号:US20200175071A1

    公开(公告)日:2020-06-04

    申请号:US16203861

    申请日:2018-11-29

    Abstract: Aspects of the disclosure relate to searching a dual database graph. The dual database graph is resident on a dual database graph platform. The platform includes two or more nodes interconnected by one or more edges. The graph database stores graph data corresponding to the graph(s) and a relational database for storing metadata corresponding to the graph(s). The method includes receiving as input a search criterion. The search criterion may include a plurality of data points corresponding to a relational database node profile or a relational database subgraph profile. The platform may search the relational database for a subset of graphs that each includes a relational database node or a relational database subgraph that matches the node profile or subgraph profile of the search criterion. The platform may then retrieve a relational database node or a relational database subgraph that matches the node profile or subgraph profile.

    Reflexive benign service attack on IoT device(s)

    公开(公告)号:US10609069B2

    公开(公告)日:2020-03-31

    申请号:US15903154

    申请日:2018-02-23

    Abstract: A method is provided for preventing an IoT device within a trusted system from being harnessed in a malicious DDOS attack. The method may include bombarding the IoT device. The bombardment may originate from within the system, and may inundate the IoT device with harmless packets in a manner mimicking a traditional DOS attack. The inundating may utilize the resources of the IoT device to respond to the bombardment, and may thereby render the IoT device unavailable for fraudulent uses.

    Processing System for Providing Enhanced Reality Interfaces at an Automated Teller Machine (ATM) Terminal Platform

    公开(公告)号:US20200082676A1

    公开(公告)日:2020-03-12

    申请号:US16123455

    申请日:2018-09-06

    Abstract: Aspects of the disclosure relate to processing systems that implement an enhanced reality device to facilitate transactions at a screen-less automated teller machine (ATM). A computing platform may receive a request to initiate a transaction with a screen-less automated ATM. Based on the request to initiate the transaction, the computing platform may send pre-transaction interface information and commands directing the enhanced reality device to generate a pre-transaction interface. The computing platform may receive an authentication request from the screen-less ATM indicating its availability and requesting authentication information. In response to validating the authentication information, the computing platform may generate transaction interface information. The computing platform may send the transaction interface information to the enhanced reality device. The computing platform may receive a transaction completion indication from the screen-less ATM. After receiving the transaction completion indication, the computing platform may send haptic feedback indicating that the transaction is complete.

    Virtual Reality Dynamic Authentication
    70.
    发明申请

    公开(公告)号:US20180157820A1

    公开(公告)日:2018-06-07

    申请号:US15367590

    申请日:2016-12-02

    Abstract: A system for performing authorization of a user in a virtual reality environment includes a virtual reality user device. The virtual reality user device includes a display configured to display a virtual environment. The user device receives a virtual authentication object comprising a virtual representation of an object that the user can manipulate to enter an authentication code. The user device detects gestures performed by the user on the displayed virtual authentication object and forms an authentication request, which includes the virtual authentication object, the detected gestures; and an identifier of the user. The user device sends the authentication request to an authentication server. The authentication server determines an authentication code using the virtual authentication object and the detected gestures. The authentication server authenticates the user by comparing the determined authentication code with an authentication code stored in a database and sends an authentication response to the user device.

Patent Agency Ranking