Resource transfer validation within a metaverse

    公开(公告)号:US12277551B2

    公开(公告)日:2025-04-15

    申请号:US17729982

    申请日:2022-04-26

    Abstract: A device is configured to receive an interaction request from the first user that identifies an address for a contract that is stored in a blockchain and to access machine-executable instructions associated with the contract. The device is further configured to determine a projected number of virtual resources and real-world resources for the first user based on a number of available resources for the first user and the machine-executable instructions for transferring resources between the first user and the second user in the contract. The device is further configured to output the projected number of virtual resources to the first user and to output the projected number of real-world resources to the first user. The device is further configured to initiate a transfer of resources between the first user and the second user.

    System and method for navigating through a dynamic virtual lounge within a metaverse

    公开(公告)号:US12251638B2

    公开(公告)日:2025-03-18

    申请号:US17811171

    申请日:2022-07-07

    Abstract: A system for navigating through dynamic virtual lounges comprises a processor associated with a server. The processor is configured to access a virtual environment comprising a virtual lounge and a plurality of associated virtual sub-lounges. The processor is configured to authorize an interaction session between an avatar and the virtual lounge in response to an interaction request from a user device. The processor is configured to automatically detect and authorize the avatar to enter and interact with each virtual sub-lounge of the virtual lounge. The processor is configured to conduct multiple interactions between the avatar and the virtual sub-lounges. The processor is further configured to generate corresponding interaction datasets and interaction tokens for the avatar. The processor is further configured to generate a user interaction session dataset for the avatar based on the interaction datasets and interaction tokens.

    Digital and physical asset transfers based on authentication

    公开(公告)号:US12026684B2

    公开(公告)日:2024-07-02

    申请号:US17739026

    申请日:2022-05-06

    Abstract: An apparatus for transferring virtual resources comprises a processor associated with a server. The processor is configured to conduct an interaction between a first user and an entity to transfer a physical object and a non-fungible token (NFT) to the first user, wherein the NFT is associated with the physical object. The processor is further configured to receive the NFT for storage in a first digital folder and to receive a request to establish an interaction session between a first avatar in a virtual environment and a second avatar associated with a second user. The processor is further configured to authorize the interaction session in response to authenticating the NFT and to conduct the interaction. The interaction includes initiating a transfer of the physical object from the first user to the second user and transmitting the NFT to a second digital folder associated with the second user.

    Data access control using data block level encryption

    公开(公告)号:US11741248B2

    公开(公告)日:2023-08-29

    申请号:US16545169

    申请日:2019-08-20

    CPC classification number: G06F21/6209 G06F21/602 G06F21/6227 G06F2221/2107

    Abstract: An information security system that includes a data control engine configured to receive a data file and to segment the data file into a set of data blocks that each contain a portion of data from the data file. The data control engine is further configured to associate the set of data blocks with a reference tag and to store an association between the set of data blocks and the reference tag. The data control engine is further configured to identify an access key for encrypting each data block, to encrypt each data block with a corresponding access key, and to store an association between each data block and each corresponding access key. The data control engine is further configured to store each data block in a memory and to store location information identifying the location of each data block in the memory.

    Intelligent encryption based on user and data properties

    公开(公告)号:US11483147B2

    公开(公告)日:2022-10-25

    申请号:US16750545

    申请日:2020-01-23

    Abstract: A system includes a data store, memory, and hardware processor. The data store includes a dataset with first and second blocks of data. The memory stores first and second encryption algorithms. The processor receives a request to transmit the dataset to a first user's device. The processor encrypts the dataset by applying the first encryption algorithm to the first block and the second encryption algorithm to the second block, in response to determining a first level of security for the first block and a second level of security for the second block. The processor also applies an access control to the encrypted dataset, based on a characteristic of the first user, and transmits the encrypted dataset to the first user. The access control prevents a second user with a characteristic incompatible with the characteristic of the first user from accessing the encrypted dataset.

    Intelligent decryption based on user and data profiling

    公开(公告)号:US11102005B2

    公开(公告)日:2021-08-24

    申请号:US16750666

    申请日:2020-01-23

    Abstract: A non-transitory computer-readable medium includes an encrypted dataset, a first access control measure, and instructions. The encrypted dataset includes a first encrypted block of data, encrypted using a first encryption algorithm, and a second encrypted block of data, encrypted using a second encryption algorithm stronger than the first. The first access control measure is associated with a first access control characteristic and is configured to selectively prevent access to the encrypted dataset. The instructions are configured, when executed by a processor of a device of a first user, to determine that a first characteristic of the first user matches the first access control characteristic. In response, the instructions are configured to decrypt the encrypted dataset to form a plain text dataset and provide the device of the first user access to the plain text dataset. Decrypting the encrypted dataset includes decrypting the first and second blocks of data.

    SLEEPER KEYS
    7.
    发明申请

    公开(公告)号:US20210234868A1

    公开(公告)日:2021-07-29

    申请号:US16750508

    申请日:2020-01-23

    Abstract: A system includes an authorization token with a memory configured to store user attributes including a record of previous usage of the data store by the user, pre-authorization data for the user, and an access signature for accessing contents of a data store. The authorization token receives an authorization request. Session attributes are collected associated with a file path used by the user to request access to a file. A consistency measure is determined associated with whether the file path used by the user to request access to the file is consistent with a previous file path stored in a record of previous usage of the data store by the user. In response to determining that the consistency measure is greater than a threshold value, the access signature is provided to the data store, thereby granting the user access to the file.

    INTELLIGENT DECRYPTION BASED ON USER AND DATA PROFILING

    公开(公告)号:US20210234693A1

    公开(公告)日:2021-07-29

    申请号:US16750666

    申请日:2020-01-23

    Abstract: A non-transitory computer-readable medium includes an encrypted dataset, a first access control measure, and instructions. The encrypted dataset includes a first encrypted block of data, encrypted using a first encryption algorithm, and a second encrypted block of data, encrypted using a second encryption algorithm stronger than the first. The first access control measure is associated with a first access control characteristic and is configured to selectively prevent access to the encrypted dataset. The instructions are configured, when executed by a processor of a device of a first user, to determine that a first characteristic of the first user matches the first access control characteristic. In response, the instructions are configured to decrypt the encrypted dataset to form a plain text dataset and provide the device of the first user access to the plain text dataset. Decrypting the encrypted dataset includes decrypting the first and second blocks of data.

    REPORTING AND KNOWLEDGE DISCOVERY FOR DATABASES

    公开(公告)号:US20210157804A1

    公开(公告)日:2021-05-27

    申请号:US16690374

    申请日:2019-11-21

    Abstract: A database reporting device that includes a network interface in signal communication with a database. The network device further includes a processor configured to receive a report request comprising a project key and to identify data records associated with the project key. The processor is further configured to identify a report template for a user associated with the report request and to identify data record element types corresponding with sections of the identified report template. The processor is further configured to generate a search query for data record elements corresponding with the identified data record element types and to send the search query to the database. The network device is further configured to receive a plurality of data record elements, to populate the report template with data record elements that correspond with data record element types for each section, and to output a report based on the populated report template.

    Data transfer path selection
    10.
    发明授权

    公开(公告)号:US10931757B2

    公开(公告)日:2021-02-23

    申请号:US16572191

    申请日:2019-09-16

    Inventor: Manu J. Kurian

    Abstract: A system contains a network testing engine that sends test data along different paths of a network between a source and a destination, wherein each path contains a plurality of network nodes, and receives, in response to sending the test data, response data about the paths. The system further contains a network path characteristics engine that determines characteristics of each path based on the response data, and a delivery parameters engine that receives a request for delivery of a data load from the source to the destination and determines, based on the request, delivery parameters. Furthermore, the system contains the source and a path selection engine that determines a selected path of the different paths based on the characteristics of the paths and the delivery parameters, and sends the selected data path to the source, which sends the data load along the selected path to the destination.

Patent Agency Ranking