SYSTEM AND METHOD FOR CRYPTOGRAPHIC DATA TRANSFER AND AUTHENTICATION IN A DISTRIBUTED NETWORK

    公开(公告)号:US20250080359A1

    公开(公告)日:2025-03-06

    申请号:US18241306

    申请日:2023-09-01

    Abstract: Systems, computer program products, and methods are described herein for cryptographic data transfer and authentication in a distributed network. The present invention is configured to receive credentials on an interface of an endpoint device, receive a request from the endpoint device to access a portal, authenticate the credentials via an authentication engine, receive specifications, wherein the specifications are input into the interface of the endpoint device, select, via a configuration engine comprising pre-existing configurations in a configuration database of a first storage device, a selected pre-existing configuration, determine a verification of the selected pre-existing configuration, and access the portal.

    MONITORING AND PREVENTING SPOOFING, TAMPERING, AND DENIAL OF SERVICE ATTACKS ON CLOUD CONTAINERS

    公开(公告)号:US20250055877A1

    公开(公告)日:2025-02-13

    申请号:US18230897

    申请日:2023-08-07

    Abstract: A computing platform may train, using historical threat detection information, a threat detection model, which may configure the threat detection model to detect container threats for a plurality of containers deployed at a plurality of nodes on a cloud network. The computing platform may obtain, from a node monitoring system, operating conditions of the plurality of nodes. The computing platform may input, into the threat detection model, the operating conditions of the plurality of nodes, which may cause the threat detection model to identify a threat to at least one container deployed at the plurality of nodes. The computing platform may execute, based on identification of the threat, a security action to protect the at least one container. The computing platform may update, based on the operating conditions of the plurality of nodes and the threat, the threat detection model.

    INTELLIGENT SYSTEM FOR DYNAMIC DETECTION OF APPLICATION SUBMISSIONS CREATED BY AUTONOMOUS SOFTWARE PROGRAMS

    公开(公告)号:US20240419789A1

    公开(公告)日:2024-12-19

    申请号:US18210312

    申请日:2023-06-15

    Abstract: Artificial intelligence, in the form of machine-learning models, are implemented to dynamically detect when an online or mobile app application is being filled-out/submitted by an autonomous software program/bot (e.g., an invalid application submission), as opposed to a human (i.e., a valid application submission). Telemetry data is captured from the mobile application or web/online application that is indicative as to whether the application forms are being filled-out by a human or an autonomous software program. The telemetry data is applied to machine learning models to determine if the telemetry data results in a recognized pattern that indicates autonomous software program data entry or, conversely, human data entry. In the event that an application submission is determined to be filled-out by an autonomous software program/bot, subsequent submission and/or further processing of the application is denied.

    Dynamic NFT-based frictionless transaction system

    公开(公告)号:US12147967B2

    公开(公告)日:2024-11-19

    申请号:US17875166

    申请日:2022-07-27

    Inventor: Maneesh Sethia

    Abstract: A wearable computing device, such as a smart glass device, may be used to facilitate touchless and/or frictionless transactions at computing devices in the vicinity of the wearable computing device based on a dynamic non-fungible token (NFT). The smart glass device captures biometric information of a user, such as an iris image, and generates the NFT based on the biometric information, a geographic location and a time. The NFT is authenticated via a blockchain by an authentication system at a remote network. Upon validation, the smart glass device presents user interface screens to initiate the transaction. A computing device receives a request message to complete the transaction based on the NFT.

    Artificial Intelligence (AI) Based Cloud Architecture Segmentation Leveraging Homomorphic Encryption

    公开(公告)号:US20250112758A1

    公开(公告)日:2025-04-03

    申请号:US18376138

    申请日:2023-10-03

    Abstract: A computing platform may train, using smart contract and file type information, a homomorphic encryption model, which may configure the homomorphic encryption model to identify, for a given input file, a corresponding smart contract defining a corresponding set of parameters, included in the given input file, for display. The computing platform may receive an unencrypted file, and may identify, by inputting the unencrypted file into the homomorphic encryption model, a smart contract defining one or more parameters for display. The computing platform may encrypt, using homomorphic encryption, the unencrypted file to produce an encrypted file, and may store the encrypted file. The computing platform may receive, via an application programming interface (API) at a user device, a request to access the encrypted file. The computing platform may send, based on the smart contract and for display at the user device via the API, the parameters for display.

    Deep Fake Attack Prevention for Voice Based Authentication Leveraging Generative Artificial Intelligence (AI) and Distributed Ledger Technology

    公开(公告)号:US20250077635A1

    公开(公告)日:2025-03-06

    申请号:US18240491

    申请日:2023-08-31

    Abstract: A computing platform may generate, using a generative AI model, voice based authentication prompts corresponding to a user. Upon receiving a registration request from the user, the computing platform may identify the voice based authentication prompts for the user. The computing platform may send, to a first computing device of the user, the voice based authentication prompts and may receive/store voice based authentication information corresponding to the voice based audio inputs. Based on receiving an access request, the computing platform may send the plurality of voice based authentication prompts, and may receive, from a second computing device, additional voice based audio inputs. The computing platform may score, based on the voice based authentication information, the additional voice based audio inputs. The computing platform may compare the score to a threshold. Based on identifying that the score fails to meet the threshold, the computing platform may initiate security actions.

    Intelligent apparatus to auto-generate spine-leaf network topography for datacenter leveraging quantum photonic generative artificial intelligence

    公开(公告)号:US12058005B1

    公开(公告)日:2024-08-06

    申请号:US18243901

    申请日:2023-09-08

    CPC classification number: H04L41/12 H04L9/50 H04L41/16

    Abstract: Aspects of the disclosure relate to using machine learning models to automatically generate spine-leaf network topologies. A computing system may receive one or more prompts to generate a spine-leaf network topology based on a non-spine-leaf network topology of a non-spine-leaf network. Based on inputting the prompts into a natural language processing model, network criteria for generating the spine-leaf network topology may be generated. Non-spine-leaf network topology data comprising network metadata, network dependency parameters, and network constraint parameters, may be retrieved. Based on inputting the network criteria and the non-spine-leaf network data into a generative adversarial network implemented on a quantum computing device, candidate spine-leaf topologies comprising a qualified candidate spine-leaf network topology that meets the network criteria may be generated. A block of a blockchain may be generated and may comprise the qualified candidate spine-leaf network topology that meets the network criteria.

    SYSTEM FOR EXECUTING WIRELESS RESOURCE TRANSFERS ON A PORTABLE COMPUTING DEVICE USING A SECURE DIGITAL TOKEN

    公开(公告)号:US20240062184A1

    公开(公告)日:2024-02-22

    申请号:US17892456

    申请日:2022-08-22

    Inventor: Maneesh Sethia

    CPC classification number: G06Q20/3278 G06Q20/065 G06Q20/4014

    Abstract: A system is provided for executing wireless resource transfers on a portable computing device using a secure digital token. In particular, in response to receiving a resource transfer request from a user, the system may dynamically generate a customized digital token in real-time based on information such as authentication credentials of the user, geolocation data, timestamps, and the like. The digital token may be validated and stored on a distributed register that may be accessible by an entity associated with the user. Upon validating the digital token, the entity's server may transmit the data needed to execute the resource transfer. In this way, the system may provide a secure and efficient way to execute resource transfers.

    SECURE APPARATUS TO SHARE AND DEPLOY MACHINE BUILD PROGRAMS UTILIZING UNIQUE HASH TOKENS

    公开(公告)号:US20240413997A1

    公开(公告)日:2024-12-12

    申请号:US18207332

    申请日:2023-06-08

    Abstract: Systems, computer program products, and methods are described herein for secure apparatuses to share and deploy machine build programs utilizing unique hash tokens. The invention includes the steps of transforming a resource machine build-program into a first non-fungible token (NFT1) via a resource machine build orchestration module, embedding NFT1 into a flash drive using a flash drive preparation module, generating a second non-fungible token (NFT2) during an interaction of a resource machine with the USB flash drive via a dynamic NFT generator module, wherein NFT2 includes data representing an ownership certificate for the resource machine build owned by a vendor, generating a resultant integrated non-fungible token (NFT3) via a dynamic smart contract module, wherein NFT3 is generated by combining NFT1 and NFT2, and activating and deploying the resource machine build-program on the resource machine via a build activation module, wherein the activation is triggered by the generation of NFT3.

Patent Agency Ranking