-
公开(公告)号:US12107925B2
公开(公告)日:2024-10-01
申请号:US17352094
申请日:2021-06-18
发明人: Dustin Paul Stocks , Jinna Zevulun Kim , Robert Nyeland Huggins , Pratap Dande , George Anthony Albero
IPC分类号: H04L67/141 , G06K7/14 , H04L67/146
CPC分类号: H04L67/141 , G06K7/1417 , H04L67/146
摘要: A system is provided including a host processor, a plurality of service processors, a universal processor associated with the host processor and capable of exchanging data with each service processor, a first user device of the first user and a second user device of a second user. The universal processor receives a request from the first user device for a data transaction between the host processor and a service processor, and in response generates a code that can be interpreted by the service processor. Universal processor transmits the code to the first user device, which transmits the code to the second user device. The second user device transmits the code to the service processor. The service processor decodes the code and requests the universal processor to perform the data transaction with the host processor. In response, the universal processor sets up the data transaction.
-
2.
公开(公告)号:US20240275815A1
公开(公告)日:2024-08-15
申请号:US18109431
申请日:2023-02-14
CPC分类号: H04L63/1491 , G06N20/00 , H04L63/102
摘要: Systems, computer program products, and methods are described herein for activating a decoy resource based on duress triggers in an electronic network. The present invention is configured to receive a resource distribution request, wherein the resource distribution request comprises a resource account identifier; determine a verified unique identifier sequence associated with the resource account identifier; receive an unverified unique identifier sequence associated with the resource distribution request; compare the unverified unique identifier sequence with the verified unique identifier sequence; and determine, based on the comparison of the unverified unique identifier sequence with the verified unique identifier sequence, a duress trigger; and activate, in an instance where the duress trigger is positive, a decoy resource container, wherein the decoy resource container comprises at least one decoy resource.
-
公开(公告)号:US20240160704A1
公开(公告)日:2024-05-16
申请号:US17988363
申请日:2022-11-16
摘要: Authentication/verification of sub-environments that represent entities within an augmented/virtual reality computing network and virtual objects present in the sub-environment that represent individuals associated with the entity. In response to authentication, a sensory-perceptible indicator (e.g., visual, audible or haptic indicators) is presented to users of the virtual reality computing environment that notify the user that the entity or virtual objects representing the entity have been authenticated. Authentication may be performed via watermarks embedded in images present within the sub-environment, capturing and comparing physical characteristics of an authorized individual representing the entity, cryptographic frequency hopping and/or electromagnetic signatures.
-
4.
公开(公告)号:US20240073026A1
公开(公告)日:2024-02-29
申请号:US17894779
申请日:2022-08-24
CPC分类号: H04L9/3239 , H04L63/0428
摘要: A system is provided for partitioning digital resources using a networked resource platform. In particular, the system may generate digital resources using a customized set of executable code such that each digital resource may comprise one or more digital resource partitions. Each digital resource share may be associated with a cryptographic address. Upon receiving a request from a user to transfer the digital resource partitions, the system may execute various validation checks on the cryptographic address and the digital resource before executing the transfer. In this way, the system provides an efficient way to partition and transfer digital resources.
-
公开(公告)号:US20240022559A1
公开(公告)日:2024-01-18
申请号:US17866884
申请日:2022-07-18
IPC分类号: H04L9/40
CPC分类号: H04L63/083 , H04L63/0807 , H04L2463/121 , H04L2463/082
摘要: Embodiments of the present invention provide a system for generating a real-time audio token for multi-factor audio authentication. The system is configured for determining that a user is accessing an entity resource, via a user device of the user, causing a cryptographic device associated with the user to generate and emit a dynamically varying continuous audio tone, performing authentication of the user based at least in part on the dynamically varying continuous audio tone, determining that the authentication based at least in part on the dynamically varying continuous audio tone is successful, and allowing the user to access the entity resource based on determining that the authentication based at least in part on the dynamically varying continuous audio tone is successful.
-
6.
公开(公告)号:US20240007482A1
公开(公告)日:2024-01-04
申请号:US17854554
申请日:2022-06-30
IPC分类号: H04L9/40 , H04L41/12 , H04L41/16 , H04L43/026 , H04L43/04
CPC分类号: H04L63/1408 , H04L41/12 , H04L41/16 , H04L63/0428 , H04L43/026 , H04L43/04
摘要: A system is provided for remediating computing system breaches by reversibly distributing data to a plurality of edge points in a distributed network. In particular, the system may intelligently track network data to predict breach vector pathways and may track various types of network traffic data for computing systems within the network. Based on the network traffic data, the system may generate a network topology, mapping the various types of network connections across the computing systems in the network environment as well as the datasets that were transferred across such connections. In the event of a system breach, the system may divide each dataset into a plurality of partial data packets. The system may transmit each partial data packet to a different user device or computing device in the network. After the breach is remediated, the system may recall the individual data packets and reassemble the datasets for future use.
-
7.
公开(公告)号:US20230344930A1
公开(公告)日:2023-10-26
申请号:US17725258
申请日:2022-04-20
IPC分类号: H04M1/72421 , G06V40/16 , G06V40/20 , G08B25/01
CPC分类号: H04M1/72421 , G06V40/176 , G06V40/20 , G08B25/016
摘要: Automatically and covertly activating audio/video mechanisms within a mobile communication device when a user is confronted with a duress-inducing event or a situation based on receipt of a duress indicator. The duress indicator is a subtle user input, such as a personal gesture, personal audible code or device input that triggers the covert activation of audio/video recording mechanisms on a mobile communication device. As a result, audio and/or video data of a duress-inducing event can be captured absent other parties to the duress-inducing event being aware that audio/video data is being captured.
-
公开(公告)号:US12118120B2
公开(公告)日:2024-10-15
申请号:US17321899
申请日:2021-05-17
CPC分类号: G06F21/6245 , G06F21/32 , G06F21/36 , G06F21/54
摘要: A system is provided for encoding user information. The system is configured to generate a random code pattern, assign the random code pattern to a user, assign a personal identifier of the user to the random code pattern, map a combination of the random code pattern and the personal identifier to user information associated with the user, and store an association of the random code pattern and the personal identifier to the user information in a mapping table. The system is further configured to receive from a decoder a query comprising the random code pattern and the personal identifier of the user, wherein the decoder is configured to decode the random code pattern. The system determines based on the mapping table, the user information mapped to the combination of the random code pattern and the personal identifier and transmits the user information to the decoder.
-
公开(公告)号:US11914709B2
公开(公告)日:2024-02-27
申请号:US17380450
申请日:2021-07-20
CPC分类号: G06F21/566 , G06N5/04 , G06N20/00 , G06F2221/033
摘要: Aspects of the disclosure relate to predicting the spread of malicious software. The computing platform may identify malicious software at a computing device and may input characteristics of the malicious software into a machine learning model to produce time horizons for the malicious software. The computing platform may identify, using a knowledge graph and based on the time horizons, subsets of computing devices, each corresponding to a particular time horizon. The computing platform may perform, at a time within a first time horizon, a first security action for a first subset of computing devices within the first time horizon and a second security action for a second subset of computing devices located within a second time horizon, where the first time horizon and the second time horizon indicate that the first subset will be affected by the malicious software prior to the second subset.
-
10.
公开(公告)号:US20240061950A1
公开(公告)日:2024-02-22
申请号:US17889093
申请日:2022-08-16
CPC分类号: G06F21/6245 , G06F40/20 , G06F2221/2111 , G06F2221/2141
摘要: A system is provided for monitoring real-time data inputs across multiple channels, determining potential impacts to a network or entity policy taxonomy, and taking one or more automated, responsive actions based on determined impacts. In this way, the system described herein is able to optimize system processes and system protections on an enterprise-wide scale in response to current events, policy or regulation changes, or predicted measures taken by private or public entities that may necessitate adaptation of one or more workflow processes or technology taxonomies, either upstream or downstream of the system itself.
-
-
-
-
-
-
-
-
-