SYSTEMS, METHODS, AND APPARATUSES FOR ACTIVATING A DECOY RESOURCE BASED ON DURESS TRIGGERS IN AN ELECTRONIC NETWORK

    公开(公告)号:US20240275815A1

    公开(公告)日:2024-08-15

    申请号:US18109431

    申请日:2023-02-14

    IPC分类号: H04L9/40 G06N20/00

    摘要: Systems, computer program products, and methods are described herein for activating a decoy resource based on duress triggers in an electronic network. The present invention is configured to receive a resource distribution request, wherein the resource distribution request comprises a resource account identifier; determine a verified unique identifier sequence associated with the resource account identifier; receive an unverified unique identifier sequence associated with the resource distribution request; compare the unverified unique identifier sequence with the verified unique identifier sequence; and determine, based on the comparison of the unverified unique identifier sequence with the verified unique identifier sequence, a duress trigger; and activate, in an instance where the duress trigger is positive, a decoy resource container, wherein the decoy resource container comprises at least one decoy resource.

    ENTITY AUTHENTICATOR IN AUGMENTED OR VIRTUAL REALITY COMPUTING ENVIRONMENTS

    公开(公告)号:US20240160704A1

    公开(公告)日:2024-05-16

    申请号:US17988363

    申请日:2022-11-16

    IPC分类号: G06F21/16 G06F21/31 G06F21/64

    CPC分类号: G06F21/16 G06F21/31 G06F21/64

    摘要: Authentication/verification of sub-environments that represent entities within an augmented/virtual reality computing network and virtual objects present in the sub-environment that represent individuals associated with the entity. In response to authentication, a sensory-perceptible indicator (e.g., visual, audible or haptic indicators) is presented to users of the virtual reality computing environment that notify the user that the entity or virtual objects representing the entity have been authenticated. Authentication may be performed via watermarks embedded in images present within the sub-environment, capturing and comparing physical characteristics of an authorized individual representing the entity, cryptographic frequency hopping and/or electromagnetic signatures.

    DEVICE FOR GENERATING A REAL-TIME AUDIO TOKEN FOR MULTI-FACTOR AUDIO AUTHENTICATION

    公开(公告)号:US20240022559A1

    公开(公告)日:2024-01-18

    申请号:US17866884

    申请日:2022-07-18

    IPC分类号: H04L9/40

    摘要: Embodiments of the present invention provide a system for generating a real-time audio token for multi-factor audio authentication. The system is configured for determining that a user is accessing an entity resource, via a user device of the user, causing a cryptographic device associated with the user to generate and emit a dynamically varying continuous audio tone, performing authentication of the user based at least in part on the dynamically varying continuous audio tone, determining that the authentication based at least in part on the dynamically varying continuous audio tone is successful, and allowing the user to access the entity resource based on determining that the authentication based at least in part on the dynamically varying continuous audio tone is successful.

    Prevention of unauthorized access to information

    公开(公告)号:US12118120B2

    公开(公告)日:2024-10-15

    申请号:US17321899

    申请日:2021-05-17

    摘要: A system is provided for encoding user information. The system is configured to generate a random code pattern, assign the random code pattern to a user, assign a personal identifier of the user to the random code pattern, map a combination of the random code pattern and the personal identifier to user information associated with the user, and store an association of the random code pattern and the personal identifier to the user information in a mapping table. The system is further configured to receive from a decoder a query comprising the random code pattern and the personal identifier of the user, wherein the decoder is configured to decode the random code pattern. The system determines based on the mapping table, the user information mapped to the combination of the random code pattern and the personal identifier and transmits the user information to the decoder.

    Hybrid machine learning and knowledge graph approach for estimating and mitigating the spread of malicious software

    公开(公告)号:US11914709B2

    公开(公告)日:2024-02-27

    申请号:US17380450

    申请日:2021-07-20

    IPC分类号: G06F21/56 G06N5/04 G06N20/00

    摘要: Aspects of the disclosure relate to predicting the spread of malicious software. The computing platform may identify malicious software at a computing device and may input characteristics of the malicious software into a machine learning model to produce time horizons for the malicious software. The computing platform may identify, using a knowledge graph and based on the time horizons, subsets of computing devices, each corresponding to a particular time horizon. The computing platform may perform, at a time within a first time horizon, a first security action for a first subset of computing devices within the first time horizon and a second security action for a second subset of computing devices located within a second time horizon, where the first time horizon and the second time horizon indicate that the first subset will be affected by the malicious software prior to the second subset.