System and method to reduce interruptions in a network

    公开(公告)号:US20250016163A1

    公开(公告)日:2025-01-09

    申请号:US18349035

    申请日:2023-07-07

    Abstract: An apparatus comprises a memory communicatively coupled to a processor. The memory is configured to store network interchange parameters and user profiles. The processor is configured to receive a data exchange request triggered by a user device. Further, the processor is configured to request, to a decentralized network, a token indicating that a user profile associated with the user device is entitled to access an entitlement, determine whether a data exchange network is available to exchange data in accordance with the network interchange parameters, identify a second data exchange network that is available in accordance with second network interchange parameters in response to determine that the data exchange network is unavailable, and request a data exchange output from the second data exchange network via the token. The processor is configured to receive the data exchange output from the second data exchange network.

    System and method to identify and reverse tampering of virtual images

    公开(公告)号:US20240348618A1

    公开(公告)日:2024-10-17

    申请号:US18301409

    申请日:2023-04-17

    Abstract: An apparatus may comprise a memory communicatively coupled to a processor. The memory may be configured to store a plurality of rendering commands to render one or more simulated objects in a simulated environment. The processor may be configured to render a simulated object of the one or more simulated objects in the simulated environment based at least in part upon a rendering command of the plurality of rendering commands; display the simulated environment comprising the simulated object; retrieve, from the registry, a baseline rendering command to render a baseline version of the simulated object; and perform a hyperspectral imaging analysis of the simulated object in the simulated environment. Further, the processor may be configured to determine whether the simulated object is tampered or untampered based at least in part upon a result of the hyperspectral imaging analysis indicating whether the simulated object is different from the baseline version.

    SYSTEMS AND METHODS FOR DYNAMIC MANAGEMENT OF STORED CACHE DATA BASED ON USAGE INFORMATION

    公开(公告)号:US20230418747A1

    公开(公告)日:2023-12-28

    申请号:US17849634

    申请日:2022-06-25

    CPC classification number: G06F16/2358 G06F16/2365 G06F16/2228

    Abstract: Embodiments of the invention are directed to systems, methods and computer program products structured for dynamic management of stored cache data based on usage information. The invention is structured for light-weight granular data caching based on construction of adapted hierarchical data objects with improved indexing, for reducing memory and processing burdens on data caching servers and reducing turnaround time for activity execution. Specifically, the invention is configured to trigger, via the proactive processor, retrieval of truncated technology data for caching from a usage database based on the adapted truncated cache data retrieval command; and construct a plurality of adapted hierarchical cache data objects, for each of the plurality of users, and cache the constructed plurality of adapted hierarchical cache data objects, for each of the plurality of users, in the distributed cache layer in a distributed cache layer.

    System and Method for Interaction Resiliency in the Metaverse

    公开(公告)号:US20250077273A1

    公开(公告)日:2025-03-06

    申请号:US18459146

    申请日:2023-08-31

    Abstract: A metaverse server comprises an edge node processor and a remote node processor. The edge node processor receives a request to perform a task comprising a first set of one or more operations and a second set of one or more operations from a client device associated with a metaverse user, executes the first set of one or more operations, sends a first notification indicating that the task is being performed to the client device, and forwards the second set of one or more operations to the remote node processor. The remote node processor receives the second set of one or more operations, executes each of the second set of one or more operations when conditions for executing the operation are satisfied, and sends a second notification indicating that the task has been completed to the client device upon completion of the second set of one or more operations.

    System and method for managing metaverse instances

    公开(公告)号:US20240364697A1

    公开(公告)日:2024-10-31

    申请号:US18306962

    申请日:2023-04-25

    Abstract: A method for managing metaverse instances includes registering a physical control level for a user. The physical control level includes information about physical locations and data items that the user is allowed to access within an entity. A digital identity is generated for the user. The digital identity includes a virtual control level for an avatar of the user and allows the avatar to access a metaverse instance of a metaverse of the entity. The virtual control level is synchronized with the physical control level. Computing resources to be allocated to the metaverse instance are determined. A first instruction is sent to a metaverse server to open the metaverse instance. A second instruction is sent to the metaverse server to allocate the computing resources to the metaverse instance. A third instruction is sent to the metaverse server to generate the avatar. The avatar is allowed access to the metaverse instance.

    SYSTEM AND METHOD FOR DISTRIBUTED AND AUTHENTICATED PROVISIONING OF ENCRYPTED ELECTRONIC DATA

    公开(公告)号:US20240171397A1

    公开(公告)日:2024-05-23

    申请号:US17989751

    申请日:2022-11-18

    CPC classification number: H04L9/321 H04L9/3297

    Abstract: A system is provided for distributed and authenticated provisioning of encrypted electronic data. In particular, the system may comprise an intelligent monitoring engine that may continuously monitor and log actions and/or requests executed by an endpoint device to identify one or more data request patterns associated with the endpoint device. Based on identifying the data request patterns, the system may transfer encrypted electronic data to the endpoint device for storage, where the encrypted electronic data may be configured with a time to live on the endpoint device. The system may further comprise an unauthorized activity monitor that may monitor the actions taken by the endpoint device to detect potentially unauthorized activity involving the endpoint device. If no unauthorized activity is detected, the system may permit the endpoint device to decrypt the encrypted electronic data to be presented to a user.

Patent Agency Ranking