SYSTEM AND METHOD FOR VERIFYING A RESOURCE DISTRIBUTION DEVICE FROM A PLURALITY VIA SCANNING DYNAMIC DEVICE-SPECIFIC COMPUTER-READABLE INDICIA

    公开(公告)号:US20240236114A1

    公开(公告)日:2024-07-11

    申请号:US18093557

    申请日:2023-01-05

    IPC分类号: H04L9/40

    摘要: Systems, computer program products, and methods are described herein for verifying a resource distribution device from a plurality via scanning dynamic device-specific computer-readable indicia. The method includes receiving an executed action request specific to the resource distribution device. The executed action request may comprise a unique identifier associated with the resource distribution device. The method further includes verifying the resource distribution device based on at least the unique identifier. Verification may be further comprised of identifying a match between the unique identifier and one or more identifiers stored in a database. The one or more identifiers stored in the database may be associated with one or more resource distribution devices. The method further includes triggering the resource distribution device to execute the executed action request in response to verification of the resource distribution device.

    SYSTEM AND METHOD FOR GENERATING A DIGITAL RENDITION OF A LOCATION TO RECREATE A USER INTERACTION IN A DIGITAL ECOSYSTEM

    公开(公告)号:US20240185533A1

    公开(公告)日:2024-06-06

    申请号:US18073997

    申请日:2022-12-02

    IPC分类号: G06T19/00

    CPC分类号: G06T19/003

    摘要: Embodiments of the present invention provide a system for generating digital rendition of a location to recreate a user interaction in a digital ecosystem. The system is configured for receiving an input associated with a resource interaction from a user, determining a third party entity and a third party entity location associated with the resource interaction, extracting one or more audio files associated with the third party entity and the third party entity location, extracting one or more video files associated with the third party entity and the third party entity location, instantaneously generating a digital rendition of the third party entity location based on the one or more audio files and the one or more video files in a digital ecosystem, and allowing the user to recreate a user interaction associated with the resource interaction in the digital ecosystem.

    ELECTRONIC SYSTEM FOR GENERATION OF AUTHENTICATION TOKENS USING BIOMETRIC DATA

    公开(公告)号:US20230379163A1

    公开(公告)日:2023-11-23

    申请号:US18229687

    申请日:2023-08-03

    IPC分类号: H04L9/32 H04L9/14

    摘要: Embodiments of the invention are directed to systems, methods, and computer program products for generation of dynamic authentication tokens for use in system-to-system transaction authorization and user identity verification. The system utilizes user biometric data to generate unique authentication tokens which are customized to a particular user. Furthermore, the system rotates not only the encryption algorithms used, but also the datasets being encrypted in order to provide a high level of security such that even if a user's biometric data was compromised, it would be highly unlikely that an attacker would be able to recreate the authentication token stemming from said biometric data at any given point in time. The system eliminates the need for user-provided authentication credentials and provides a more secure and more efficient method of authenticating data exchange between multiple systems or applications.

    Distractional variable identification for authentication of resource distribution

    公开(公告)号:US11288366B2

    公开(公告)日:2022-03-29

    申请号:US16594477

    申请日:2019-10-07

    IPC分类号: G10L25/63 G06F21/55 G06N10/00

    摘要: A system for capturing communication variables associated with a communication between two or more parties and implementing a quantum optimizer to analyze the communication variables to determine the actual context of a communication held by one or more parties to the communication. Once the actual context is determined, a further determination is made as to whether the actual context poses or potentially poses a security threat to one or more parties to the communication or a third-party and, if so, notifies the party of the security threat. In this regard, parties to a communication that are unaware of the actual context of the communication held by another party are made aware of that actual context poses a security threat and, in some embodiments, notifies the parties while the communication is still occurring.