Artificial Intelligence (AI) Based Cloud Architecture Segmentation Leveraging Homomorphic Encryption

    公开(公告)号:US20250112758A1

    公开(公告)日:2025-04-03

    申请号:US18376138

    申请日:2023-10-03

    Abstract: A computing platform may train, using smart contract and file type information, a homomorphic encryption model, which may configure the homomorphic encryption model to identify, for a given input file, a corresponding smart contract defining a corresponding set of parameters, included in the given input file, for display. The computing platform may receive an unencrypted file, and may identify, by inputting the unencrypted file into the homomorphic encryption model, a smart contract defining one or more parameters for display. The computing platform may encrypt, using homomorphic encryption, the unencrypted file to produce an encrypted file, and may store the encrypted file. The computing platform may receive, via an application programming interface (API) at a user device, a request to access the encrypted file. The computing platform may send, based on the smart contract and for display at the user device via the API, the parameters for display.

    System and method for machine-to-machine re-imaging

    公开(公告)号:US20250110823A1

    公开(公告)日:2025-04-03

    申请号:US18479497

    申请日:2023-10-02

    Abstract: An error message is received from a first computing node indicating a malfunction associated with the first computing node. Based on a first error code received in the error message, a first software program is determined that is to be installed at the first computing node to resolve the malfunction. A geographically nearest second computing node to the first computing node is determined that includes the first software program. The second computing node is instructed to transmit the first software program to the first computing node. The second computing node transmits the first software program to the first computing node. The first computing node receives and installs the first software program at the first computing node.

    System and Method for using artificial intelligence to determine if an action is authorized

    公开(公告)号:US20250068772A1

    公开(公告)日:2025-02-27

    申请号:US18455849

    申请日:2023-08-25

    Abstract: A system that includes a memory and a processor that determines whether to authorize an action. The processor receives a plurality of authorization messages that are requests for authorizing actions. The processor then extracts data from the plurality of authorization messages and analyzes the data with a trained neural network to group the plurality of authorization messages. The resulting plurality of message groupings are then analyzed by a long-short-term-memory algorithm (LSTM) to determine a plurality of patterns that indicate that a particular authorization message may be authorized. The processor then receives one or more new authorization messages from an external device and compares these to the plurality of patterns. If the one or more new authorization messages correspond to any of the patterns, then the external device is notified by the processor that it should deny the action associated with the new authorization messages.

    System and method to reduce interruptions in a network

    公开(公告)号:US20250016163A1

    公开(公告)日:2025-01-09

    申请号:US18349035

    申请日:2023-07-07

    Abstract: An apparatus comprises a memory communicatively coupled to a processor. The memory is configured to store network interchange parameters and user profiles. The processor is configured to receive a data exchange request triggered by a user device. Further, the processor is configured to request, to a decentralized network, a token indicating that a user profile associated with the user device is entitled to access an entitlement, determine whether a data exchange network is available to exchange data in accordance with the network interchange parameters, identify a second data exchange network that is available in accordance with second network interchange parameters in response to determine that the data exchange network is unavailable, and request a data exchange output from the second data exchange network via the token. The processor is configured to receive the data exchange output from the second data exchange network.

    Intelligent apparatus to auto-generate spine-leaf network topography for datacenter leveraging quantum photonic generative artificial intelligence

    公开(公告)号:US12058005B1

    公开(公告)日:2024-08-06

    申请号:US18243901

    申请日:2023-09-08

    CPC classification number: H04L41/12 H04L9/50 H04L41/16

    Abstract: Aspects of the disclosure relate to using machine learning models to automatically generate spine-leaf network topologies. A computing system may receive one or more prompts to generate a spine-leaf network topology based on a non-spine-leaf network topology of a non-spine-leaf network. Based on inputting the prompts into a natural language processing model, network criteria for generating the spine-leaf network topology may be generated. Non-spine-leaf network topology data comprising network metadata, network dependency parameters, and network constraint parameters, may be retrieved. Based on inputting the network criteria and the non-spine-leaf network data into a generative adversarial network implemented on a quantum computing device, candidate spine-leaf topologies comprising a qualified candidate spine-leaf network topology that meets the network criteria may be generated. A block of a blockchain may be generated and may comprise the qualified candidate spine-leaf network topology that meets the network criteria.

    INTELLIGENT SYSTEM FOR DYNAMIC DETECTION OF APPLICATION SUBMISSIONS CREATED BY AUTONOMOUS SOFTWARE PROGRAMS

    公开(公告)号:US20240419789A1

    公开(公告)日:2024-12-19

    申请号:US18210312

    申请日:2023-06-15

    Abstract: Artificial intelligence, in the form of machine-learning models, are implemented to dynamically detect when an online or mobile app application is being filled-out/submitted by an autonomous software program/bot (e.g., an invalid application submission), as opposed to a human (i.e., a valid application submission). Telemetry data is captured from the mobile application or web/online application that is indicative as to whether the application forms are being filled-out by a human or an autonomous software program. The telemetry data is applied to machine learning models to determine if the telemetry data results in a recognized pattern that indicates autonomous software program data entry or, conversely, human data entry. In the event that an application submission is determined to be filled-out by an autonomous software program/bot, subsequent submission and/or further processing of the application is denied.

    SYSTEM AND METHOD FOR CRYPTOGRAPHIC DATA TRANSFER AND AUTHENTICATION IN A DISTRIBUTED NETWORK

    公开(公告)号:US20250080359A1

    公开(公告)日:2025-03-06

    申请号:US18241306

    申请日:2023-09-01

    Abstract: Systems, computer program products, and methods are described herein for cryptographic data transfer and authentication in a distributed network. The present invention is configured to receive credentials on an interface of an endpoint device, receive a request from the endpoint device to access a portal, authenticate the credentials via an authentication engine, receive specifications, wherein the specifications are input into the interface of the endpoint device, select, via a configuration engine comprising pre-existing configurations in a configuration database of a first storage device, a selected pre-existing configuration, determine a verification of the selected pre-existing configuration, and access the portal.

    System and method for reestablishing network connectivity for particular network equipment in a failed network zone

    公开(公告)号:US12160346B1

    公开(公告)日:2024-12-03

    申请号:US18319897

    申请日:2023-05-18

    Abstract: A system for reestablishing network connectivity for particular network equipment in a failed network zone comprises a processor associated with a server. The processor receives a flag that identifies the failed network zone including particular network equipment that have lost network connectivity in a network. The processor generates a first non-fungible token using the configuration information associated with each of the particular network equipment. The processor determines routing information based at least in part upon the configuration information and a network topology. The processor generates a second non-fungible token based at least in part upon the routing information. The processor aggregates the first non-fungible token and the second non-fungible token to generate a primary non-fungible token. The processor reestablishes network connectivity for at least a portion of the particular network equipment based at least in part upon information associated with the primary non-fungible token.

    System and method for reversing illegitimate interactions between computing systems

    公开(公告)号:US20250168022A1

    公开(公告)日:2025-05-22

    申请号:US18512404

    申请日:2023-11-17

    Abstract: A method includes analyzing a first block of a blockchain stored in a blockchain network. The first block is associated with an interaction between computing systems. Upon determining that the interaction is illegitimate, a first instruction is sent to the blockchain network to create and add a dispute block associated with a dispute of the interaction to the blockchain. Upon determining that the blockchain includes an intermediate block between the first block and the dispute block that is associated with a subsequent interaction that is performed after the interaction, source and destination computing systems for the interaction and the subsequent interaction are determined. Upon approving reversals of the interaction and the subsequent interaction, a second instruction is sent to each destination computing system to initiate a reversal of a respective interaction. A notification is sent to each source computing system that the reversal of the respective interaction is approved.

Patent Agency Ranking