-
公开(公告)号:US12131388B2
公开(公告)日:2024-10-29
申请号:US17117694
申请日:2020-12-10
IPC分类号: G06Q40/12
CPC分类号: G06Q40/12 , G06Q2220/00
摘要: The systems and methods described include the ability to store such information in an immutable and distributed, verifiable fashion. Furthermore, the system includes enhanced means for retrieving, interacting with, and visualizing such information via user interface on a variety of user device types. The system is further configured to intelligently determine data forwarding decisions based on one or more configurable data guidelines as determined by one or more entities or third party systems, and provide access to verified data to these entities and systems.
-
公开(公告)号:US12130473B2
公开(公告)日:2024-10-29
申请号:US17421004
申请日:2020-01-02
CPC分类号: G02B6/1228 , G02B6/30 , G02F1/0157 , G02B2006/12121 , G02B2006/12142 , G02B2006/12147
摘要: An optical interconnect device and the method of fabricating it are described. The device includes an in-plane laser cavity transmitting a light beam along a first direction, a Franz Keldysh (FK) optical modulator transmitting the light beam along the first direction, a mode-transfer module including a tapered structure disposed after the FK optical modulator along the first direction to enlarge the spot size of the light beam to match an external optical fiber and a universal coupler controlling the light direction. The tapered structure can be made linear or non-linear along the first direction. The universal coupler passes the laser light to an in-plane external optical fiber if the fiber is placed along the first direction, or it is a vertical coupler in the case that the external optical fiber is placed perpendicularly to the substrate surface. The coupler is coated with highly reflective material.
-
3.
公开(公告)号:US12124875B2
公开(公告)日:2024-10-22
申请号:US17375617
申请日:2021-07-14
CPC分类号: G06F9/5005 , G06F9/451
摘要: Embodiments of the present invention provide a system for facilitating creation, verification, and management of digital resources. The system is configured for receiving a digital content for upload to a distributed register from a user, via a user interface, receiving one or more instructions associated with distribution of the digital content from the user, via the user interface, creating one or more digital resources from the digital content via the user interface based on the one or more instructions received from the user, and storing the one or more digital resources on the distributed register.
-
公开(公告)号:US12112356B2
公开(公告)日:2024-10-08
申请号:US17546156
申请日:2021-12-09
发明人: Cameron Darnell Wadley , Katherine Kei-Zen Dintenfass , Robert Nyeland Huggins , Jinna Zevulun Kim
CPC分类号: G06Q30/0278 , G06N20/00 , G06Q2220/00
摘要: Systems, computer program products, and methods are described herein for intelligent assessment models for non-fungible electronic resources. The present invention is configured to receive, from a user input device, a request to value a non-fungible token (NFT) of a resource, wherein the NFT is recorded in a distributed ledger; retrieve, using a valuation engine, one or more attributes associated with the NFT from one or more metadata layers of the NFT; initiate a machine learning model on the one or more attributes associated with the NFT; predict, using the machine learning model, a value of the NFT; and transmit control signals configured to cause the user input device to display the value of the NFT.
-
公开(公告)号:US12111920B2
公开(公告)日:2024-10-08
申请号:US17474862
申请日:2021-09-14
IPC分类号: G06F21/55
CPC分类号: G06F21/552 , G06F2221/034
摘要: Systems, methods, and computer program products are provided for detecting a synthetic identity. The method includes receiving an identity verification request relating to an individual. The identity verification request includes one or more individual identifiers of the individual. The method also includes comparing at least one of the one or more individual identifiers to one or more known synthetic indicators. The one or more known synthetic indicators including at least one of a synthetic identifier type or a synthetic identifier value that correspond to one or more known synthetic identities. The method further includes determining a synthetic identity determination based on the comparison of the at least one of the one or more individual identifiers to the one or more known synthetic indicators. The synthetic identity determination indicates whether an identity verification request is a potential synthetic identity.
-
公开(公告)号:US12106305B2
公开(公告)日:2024-10-01
申请号:US17568090
申请日:2022-01-04
发明人: Durga Prasad Kutthumolu , Laxma Reddy Gavinolla , Mukesh Singh , Venkata Karthik Ryali , Sachin S. Nagvekar
CPC分类号: G06Q20/40145 , G06Q20/38215 , G06Q20/3825 , G06Q20/3827
摘要: Systems, computer program products, and methods are described herein for enhanced authentication using voice modulation matching. The present invention is configured to capture, via a first user input device, a digital audio stream of speech data of a first user; receive one or more identification credentials associated with the first user; encode the speech data to generate encoded speech data; query one or more data repositories using the encoded speech data; in response, retrieve, encoded speech data associated with a second user that matches the encoded speech data of the first user; determine that the first user has a familial relationship with the second user; generate an authentication token for the first user based on at least determining that the first user has a familial relationship with the second user; and record the authentication token for the first user in a distributed ledger associated with the second user.
-
公开(公告)号:US12105812B2
公开(公告)日:2024-10-01
申请号:US17723884
申请日:2022-04-19
发明人: Brandon Sloane , Sophie Morgan Danielpour , Serge Alejandro Neri , Lauren Jenae Alibey , James Thomas MacAulay , Jinyoung Nathan Kim
CPC分类号: G06F21/602 , G06F21/31 , G06F21/577
摘要: Various systems, methods, and computer program products are provided for complex data encryption. The method includes receiving a user input code from a computing device associated with a user. The user input code is one or more plaintext characters. The method also includes generating a first encrypted value using a first encryption algorithm based on the user input code. The method further includes decrypting the first encrypted value using one or more additional encryption algorithms. The one or more synthetic user input codes are generated by the decryption of the first encrypted value using each of the one or more additional encryption algorithms. The method still further includes determining a first encryption vulnerability score based on the value of the one or more synthetic user input codes. The method also includes causing a transmission of a user input code notification based on the first encryption vulnerability score.
-
公开(公告)号:US12099640B2
公开(公告)日:2024-09-24
申请号:US17560047
申请日:2021-12-22
CPC分类号: G06F21/84 , G06F3/013 , G06F21/602 , G06F21/6245 , H04L9/3228
摘要: A system for real-time authenticated obfuscation of electronic data provides real-time visual obfuscation of the data by transforming displayed data into undecipherable data when viewed by an unauthorized user while maintaining access for an authorized user. The system may further provide application-level obfuscation of electronic data via cryptographic keys such that only authorized applications may decrypt the encrypted data. In this way, the system provides secure access control of electronic data within a networked environment.
-
公开(公告)号:US12099523B2
公开(公告)日:2024-09-24
申请号:US18380604
申请日:2023-10-16
发明人: Jose Alejandro Perez
CPC分类号: G06F16/27 , G06F9/5088
摘要: Systems, computer program products, and methods are described herein for synchronizing dataflow migration between technical environments. The present invention is configured to identify one or more resources in a source environment for migration from the source environment to a target environment; capture, using a resource assessment engine, one or more dependencies associated with the one or more resources; generate a migration load based on at least the one or more resources identified in the source environment and the one or more dependencies associated with the one or more resources; generate a snapshot of the source environment based on at least the migration load, wherein the snapshot comprises at least the one or more resources and the one or more dependencies; and store the snapshot of the source environment in a snapshot database repository.
-
公开(公告)号:US12095930B2
公开(公告)日:2024-09-17
申请号:US17567213
申请日:2022-01-03
发明人: Saurabh Gupta
CPC分类号: H04L9/3263 , H04L9/3236 , H04L9/3247 , H04L63/0236 , H04L67/06
摘要: Systems, computer program products, and methods are described herein for secure file-sharing. The present invention may be configured to receive a request to store data on a network, process the request through a firewall. Processing the request includes: generating a first electronic digital certificate, storing the first electronic digital certificate on a distributed ledger, encrypting the data using the first electronic digital certificate, storing the encrypted data on at least one of the plurality of data server nodes, and recording the request on the distributed ledger. The present invention is further configured to receive and process a second request. Processing the second request includes: decrypting the data using the second electronic digital certificate, providing the decrypted data to the second requestor, and recording the second request on the distributed ledger.
-
-
-
-
-
-
-
-
-