BIOMETRIC DATA-BASED HOLOGRAPHIC AUTHENTICATION

    公开(公告)号:US20250119424A1

    公开(公告)日:2025-04-10

    申请号:US18378269

    申请日:2023-10-10

    Abstract: Arrangements for biometric data-based holographic authentication are provided. In some examples, biometric data for a plurality of users may be received. A computing platform may receive a request to process an event. In response to receiving the request to process the event, the computing platform may retrieve biometric data of a requesting user and generate, based on the biometric data, a hologram of the biometric data of the user. In some examples, the hologram may be displayed on a device and provided to an authentication reader device as authentication data. The authentication reader device may capture an image of the hologram and the computing platform may receive the image. The computing platform may compare the captured image of the hologram to the generated hologram to determine whether there is a match. If not, the requested event may be denied. If so, the event may be processed.

    Managing enterprise security by utilizing a smart keyboard and a smart mouse device

    公开(公告)号:US11163914B2

    公开(公告)日:2021-11-02

    申请号:US16529334

    申请日:2019-08-01

    Abstract: Aspects of the disclosure relate to managing enterprise security by utilizing a smart keyboard and a smart mouse. The smart keyboard may include pressure sensitive keys, a physical sensor configurable to detect a user characteristic associated with a user of the smart keyboard, an image capturing device configurable to capture an image of an activity in a vicinity of the smart keyboard, and a switch, communicatively coupled to the pressure sensitive keys, the physical sensor, and the image capturing device, where the switch is configurable to activate or deactivate the pressure sensitive keys, the physical sensor, and the image capturing device. The smart mouse may include a wheel, one or more pressure sensitive clickable components, and at least one physical sensor configurable to detect a user characteristic associated with a user of the smart mouse. Systems and methods for utilizing a smart keyboard and a smart mouse are also disclosed.

    Managing Enterprise Security By Utilizing a Smart Keyboard and a Smart Mouse Device

    公开(公告)号:US20210034792A1

    公开(公告)日:2021-02-04

    申请号:US16529334

    申请日:2019-08-01

    Abstract: Aspects of the disclosure relate to managing enterprise security by utilizing a smart keyboard and a smart mouse. The smart keyboard may include pressure sensitive keys, a physical sensor configurable to detect a user characteristic associated with a user of the smart keyboard, an image capturing device configurable to capture an image of an activity in a vicinity of the smart keyboard, and a switch, communicatively coupled to the pressure sensitive keys, the physical sensor, and the image capturing device, where the switch is configurable to activate or deactivate the pressure sensitive keys, the physical sensor, and the image capturing device. The smart mouse may include a wheel, one or more pressure sensitive clickable components, and at least one physical sensor configurable to detect a user characteristic associated with a user of the smart mouse. Systems and methods for utilizing a smart keyboard and a smart mouse are also disclosed.

    Using Tonal Bits for Secure Messaging

    公开(公告)号:US20250112899A1

    公开(公告)日:2025-04-03

    申请号:US18374761

    申请日:2023-09-29

    Abstract: A computing platform may receive an event processing request. The computing platform may identify, by inputting first communication parameters of the event processing request into a secure communication model, communication validation information for the event processing request. The computing platform may embed, using one or more tonal bits of an audio communication corresponding to the event processing request, the first communication validation information, wherein embedding the first communication validation information generates a secure event communication. The computing platform may send the secure event communication to a recipient user device, where the recipient user device may be configured to verify the secure event communication based on the first communication validation information.

    Real-time detection of anomalous content in transmission of textual data

    公开(公告)号:US12107877B2

    公开(公告)日:2024-10-01

    申请号:US18206318

    申请日:2023-06-06

    Abstract: Aspects of the disclosure relate to real-time detection of anomalous content in a transmission of textual data. A computing platform may monitor, in real-time and via a computing device, a transmission of textual data from a user device. Then, the computing platform may scan, via the computing device, a content of the textual data. The computing platform may then perform, via the computing device and based on the scanning, textual analysis of the scanned content. Subsequently, the computing platform may detect, in real-time and based on the textual analysis, an anomalous pattern indicative of secure enterprise information. Then, the computing platform may trigger, via the computing device, one or more security actions to prevent the transmission of the secure enterprise information.

    Multi-source anomaly detection and automated dynamic resolution system

    公开(公告)号:US11948157B2

    公开(公告)日:2024-04-02

    申请号:US17728486

    申请日:2022-04-25

    CPC classification number: G06Q30/0185 G06N20/00

    Abstract: Arrangements for detecting anomalies and dynamically generating a response are presented. In some examples, attribute data including a plurality of source elements may be received. The source element data may be received from a plurality of source computing systems. The attribute data, including the source element data, may be analyzed using machine learning techniques to identify any anomalies in the attribute data. If an anomaly is detected, a notification may be generated including data associated with the anomaly, a user associated with the anomaly and the like. The notification may be transmitted to a computing device for display. In some examples, if an anomaly is detected, data associated with the anomaly may be compared to pre-stored rules to determine whether a pre-stored rule applies to the identified anomaly. If a pre-stored rule applies, an instruction or command may be generated and transmitted to one or more source computing devices or systems.

Patent Agency Ranking