PREVENTING UNAUTHORIZED EXPOSURE OF SENSITIVE DATA

    公开(公告)号:US20240388436A1

    公开(公告)日:2024-11-21

    申请号:US18198866

    申请日:2023-05-18

    Abstract: A method for determining whether an existing customer is eligible for a zero-knowledge proof (“ZKP”) application is provided. The method may include determining that the existing customer possesses a private key linked to an account profile associated with the existing customer absent provision of the private key. The determining may also include executing a behavior-scan on the account profile to confirm that a score of the behavior-scan is equal to or greater than a pre-determined score. In response to the determining that the existing customer is eligible for the ZKP application, the method may include generating the ZKP application by executing an encryption algorithm on the sensitive data of the account profile to output a digital zero-knowledge token for each of the sensitive data and auto-filling each input field in the ZKP application that is associated with sensitive data with the digital zero-knowledge token.

    Financial Health Smartwatch
    72.
    发明申请

    公开(公告)号:US20240386482A1

    公开(公告)日:2024-11-21

    申请号:US18669974

    申请日:2024-05-21

    Abstract: Computer implemented systems and methods are disclosed involving technological advancements in the processing of electronic transaction processing. A system may comprise a networked environment including heterogeneous or homogenous payment processing systems. A centrally accessible server machine storing an automatic savings program module and rules controls the generation and dissemination of new transactions derived from incoming transactions. Moreover, the networked system may be used to control authorization of electronic transactions in a near real-time manner. The networked system may be used to distribute a financial health of a user in a user-friendly, mobile form factor.

    ITERATIVE PROCESSING SYSTEM FOR SMALL AMOUNTS OF TRAINING DATA

    公开(公告)号:US20240386310A1

    公开(公告)日:2024-11-21

    申请号:US18199073

    申请日:2023-05-18

    Abstract: A method for training a model is provided. Methods may, at a first pre-step, receive a base model. Methods may, at a first step, create a label using the base model to be applied to unlabeled data, label a first set of unlabeled data with the label and generate a first set of labeled data from the first set of unlabeled data. Methods may, at a second step, receive a second set of labeled data, separate the second set into a first group and a second group, classify the first group and the first set as training data. Methods may, at a third step, train a deep learning model using the training data, validate the deep learning model using the second group and generate a set of model parameters. Methods may, at a fourth step, save the model parameters. Methods may, at a fifth step, train the deep learning, initialized from the parameters, using the first group. Methods may, at a sixth step, replace the base model with the deep learning model and repeat steps one through six.

    Intelligent Distributed Ledger Based Smart Contract Orchestration for Preserving and Self-Healing of Configuration Fraud with Smart Device

    公开(公告)号:US20240386106A1

    公开(公告)日:2024-11-21

    申请号:US18197164

    申请日:2023-05-15

    Abstract: Aspects of this disclosure relate to systems and methods to determine whether an application is misconfigured or malicious using smart contracts stored on a distributed ledger and a transferred deep learning system. A smart contract is generated and assigned rules for monitoring an application session on a user computing device when an application session associated with the application is initiated. The smart contract denies or grants the application session permission to access user data and shuts down the application session when a malicious indication is detected in configuration data associated with the application based on rules assigned to the smart contract. The malicious indication is output by a deep learning module trained on historical configuration data associated with the application. The deep learning module transfers layers to an enterprise deep learning module on an enterprise platform to determine a misconfiguration indication indicating the configuration data is misconfigured.

    Real-time data modeling for data warehouse using quantum computing

    公开(公告)号:US20240386031A1

    公开(公告)日:2024-11-21

    申请号:US18319099

    申请日:2023-05-17

    Abstract: A method includes receiving production data items from a data warehouse. New data items are received and converted to structured new data items. The production data items are converted from classical to quantum bits to determine converted production data items. The structured new data items are converted from classical to quantum bits to determine converted structured new data items. The converted production data items are entangled with the converted structured new data items one or more times until a correlation score is greater than a correlation threshold to obtain correlated data items. The correlated data items are converted from quantum to classical bits to determine converted correlated data items. Data dictionary is created for the structured new data items based on the converted correlated data items. Data objects are created for the structured new data items based on the data dictionary. The data objects are deployed to the data warehouse.

    System and method for pre-authenticating user devices within a metaverse

    公开(公告)号:US12149624B2

    公开(公告)日:2024-11-19

    申请号:US17929353

    申请日:2022-09-02

    Abstract: A system for pre-authenticating a user device to navigate through virtual operation areas comprises a processor associated with a server. The processor accesses a virtual environment and receives an interaction request from the user device for an interaction session. The processor determines a set of virtual operation areas in a virtual environment based on the interaction request. The processor generates a corresponding meta-profile associated with a user profile by mapping each pre-authentication token associated with the user device from a corresponding physical location to a corresponding virtual operation area. The processor generates an avatar associated with the user device and associates the avatar to the meta-profile and a set of pre-authentication tokens for the avatar to access the virtual operation areas. The processor identifies a first pre-authentication token associated with the user device and a first level virtual operation area and dynamically grants a first level authentication to the avatar.

    Dynamic NFT-based frictionless transaction system

    公开(公告)号:US12147967B2

    公开(公告)日:2024-11-19

    申请号:US17875166

    申请日:2022-07-27

    Inventor: Maneesh Sethia

    Abstract: A wearable computing device, such as a smart glass device, may be used to facilitate touchless and/or frictionless transactions at computing devices in the vicinity of the wearable computing device based on a dynamic non-fungible token (NFT). The smart glass device captures biometric information of a user, such as an iris image, and generates the NFT based on the biometric information, a geographic location and a time. The NFT is authenticated via a blockchain by an authentication system at a remote network. Upon validation, the smart glass device presents user interface screens to initiate the transaction. A computing device receives a request message to complete the transaction based on the NFT.

    System and method for automatically generating and deploying graphical user interface components based on real-time sketches

    公开(公告)号:US12147790B2

    公开(公告)日:2024-11-19

    申请号:US18135271

    申请日:2023-04-17

    Inventor: Shailendra Singh

    Abstract: Embodiments of the present invention provide a system for automatically generating and deploying graphical user interface components based on real-time sketches. The system is configured for determining that a user has accessed a sketch application via a user computing device, allowing the user to create one or more sketches in real-time via a user interface of the sketch application, determining that the user has created at least a first sketch, wherein the first sketch is associated with an application, extracting data from the first sketch, mapping the first sketch with a first user interface component based on the data extracted from the first sketch, generating the first user interface component, integrating a first source code of the first user interface component, testing the first user interface component, determining that testing of the first user interface component is successful, and deploying the first user interface component to a real-time environment.

    Steganographic modification detection and mitigation for enhanced enterprise security

    公开(公告)号:US12147538B2

    公开(公告)日:2024-11-19

    申请号:US17872354

    申请日:2022-07-25

    Abstract: Aspects of the disclosure relate to mitigation and detection of steganographic modifications embedded in images. A computing platform may receive an image embedded with steganographic modifications. The computing platform may change or modify any number of bits of one or more color components of one or more pixels of an image, rendering the steganographic modifications ineffective. The computing platform may cause at an isolation zone system, execution of an image, including steganographic modifications, to identify images embedded with steganographic modifications. The computing platform may also compare an image with image stored in an image storage module. The computing platform may store an image from the image storage module with a highest visual comparison score rather than the image.

Patent Agency Ranking