TRACKING OF DIGITAL RESOURCES ACROSS MULTIPLE VIRTUAL REALITY COMPUTING ENVIRONMENTS

    公开(公告)号:US20240370304A1

    公开(公告)日:2024-11-07

    申请号:US18141831

    申请日:2023-05-01

    Abstract: Tracking digital resources used in resource exchange events conducted in virtual reality computing environments. Digital resources used in resource exchange events conducted in virtual reality computing environments are tagged with data that at least identifies the location of the resource exchange event in terms of virtual reality computing environment and/or sub-environments. In response, machine-learning algorithm(s) are implemented that analyze the tags to determine resource exchange event movement patterns for specific digital resources. The resource exchange event movement patterns may include digital resource movement across multiple different virtual computing environments.

    REVERSE AUTHENTICATOR OF VIRTUAL OBJECTS AND ENTITIES IN VIRTUAL REALITY COMPUTING ENVIRONMENTS

    公开(公告)号:US20240364673A1

    公开(公告)日:2024-10-31

    申请号:US18138798

    申请日:2023-04-25

    CPC classification number: H04L63/08 H04L67/131

    Abstract: Reverse authentication of (i) virtual objects (e.g., avatars or the like) located in or proximate to sub-environments of virtual reality computing environments and, in some embodiments, (ii) the sub-environments themselves. The virtual object is authenticated as being associated with an individual/associate of the entity in control of the sub-environment and/or the sub-environment is authenticated as being associated with/controlled by the entity and, in response, a sensory-perceptible indicator (e.g., audible, visual, haptic indicator) is obtained/generated, which is communicated to a user device that outputs the sensory-perceptible indicator to notify the virtual reality user that the virtual object and/or sub-environment has been authenticated. Communication of the sensory-perceptible indicator and/or output of the sensory-perceptible indicator on the user device may be external to the virtual reality computing environment and, as such, may be communicated to and/or outputted on a user device different than the user device on which the virtual reality experience occurs.

    MULTIFACTOR AUTHENTICATION VIA BIFURCATED PASSCODE AND NON-FUNGIBLE TOKEN

    公开(公告)号:US20240106649A1

    公开(公告)日:2024-03-28

    申请号:US17953028

    申请日:2022-09-26

    CPC classification number: H04L9/3213 H04L9/3226 H04L9/3236

    Abstract: Multifactor user authentication leveraging secure tokenization, such as a Non-Fungible Token (NFT) and multiple passkeys (e.g., bifurcated passkey). One or more authentication NFTs are generated that use some form of a user's authentication credentials as the seed input for the NFT encryption/hash algorithm(s). In addition, passkeys are distributed to and/or made accessible to multiple passkey holders. In response to an event that requests multifactor authentication of the user, a plurality passkeys are requested, received and verified. Each of the passkeys being requested and received from, or at the directive of, one of the multiple passkey holders. In response to verifying the plurality of passkeys, at least one of the authentication NFTs is accessed and the cryptographic hash algorithm(s) is implemented to decrypt the authentication NFT(s) and identify the one or more user credentials. In response, the user is authenticated based at least on the user credentials that formed the basis for the authentication NFT(s).

    Information security system based on multidimensional disparate user data

    公开(公告)号:US11381591B2

    公开(公告)日:2022-07-05

    申请号:US16775526

    申请日:2020-01-29

    Abstract: Aspects of the disclosure relate to information security by identifying unique or related factors in common between individuals subject to a common threat vector. Data mining and data acquisition of public and non-public user information is performed to prevent, disrupt, and/or address criminal, cyber, and fraudulent threats. The information can be normalized into template(s) to align information across disparate datasets and enable efficient storage of the big data into appropriate fields to be tracked. The information can be stored in data warehouse(s) or in multidimensional data structure(s) for investigation if a threat vector against a group of individuals is detected. The multidimensional data can be analyzed to identify direct connections, common connecting entities, and/or connectivity clusters between individuals who were attacked or who may be attacked in the future. Remediation, machine learning, enhanced security, and/or vulnerability assessments may be implemented based on the results of the analysis.

    SYSTEMS AND METHODS FOR CONTINUAL DEVICE AUTHENTICATION IN VIRTUAL ENVIRONMENTS

    公开(公告)号:US20240378280A1

    公开(公告)日:2024-11-14

    申请号:US18195707

    申请日:2023-05-10

    Abstract: Systems, methods, and computer program products are provided herein for continual device authentication in virtual environments. An example method includes receiving a request for authentication of a first user device associated with a first user where the first user device is associated with a virtual reality environment for the first user. The method further includes receiving authentication credentials associated with the first user and authenticating the first user device for accessing the virtual reality environment based on the authentication credentials. The received authentication credentials may include one or more unique device identifiers associated with the first user device. The method may further include causing presentation of a plurality of virtual input objects in the virtual reality environment and receiving one or more user inputs via the plurality of virtual input objects in the virtual reality environment for determining the authentication credentials associated with the first user.

Patent Agency Ranking