SYSTEMS, METHODS, AND APPARATUSES FOR IMPROVING CYBERSECURITY BY USING WEBPAGE RENDERING TELEMETRY TO DETECT WEBPAGE ANOMALIES

    公开(公告)号:US20250039137A1

    公开(公告)日:2025-01-30

    申请号:US18225910

    申请日:2023-07-25

    Inventor: Shailendra Singh

    Abstract: Systems, computer program products, and methods are described herein for improving cybersecurity by using webpage rendering telemetry to detect webpage anomalies. The present invention is configured to identify at least one electronic communication, wherein the at least one electronic communication comprises at least one electronic link; route the at least one electronic communication to a cybersecurity analyzer sandbox; construct, by a cybersecurity analyzer sandbox, a webpage rendering based on the at least one electronic link; collect, by the cybersecurity analyzer sandbox, at least one webpage telemetry data; collect, by the cybersecurity analyzer sandbox, at least one webpage rendering type data; identify at least one baseline webpage rendering; apply at least one of the at least one webpage telemetry data or the at least one webpage rendering type data and the at least one baseline webpage rendering to a webpage anomaly detection model; and generate a cybersecurity score.

    COLOR-CHANGING SMART CARD
    2.
    发明申请

    公开(公告)号:US20240403851A1

    公开(公告)日:2024-12-05

    申请号:US18203114

    申请日:2023-05-30

    Abstract: A color-changing smart card may be provided. The smart card may include a first layer encasing at least a front of the smart card. The smart card may include a smart chip on the front of the smart card. The smart chip may be configured for transmitting and receiving electronic communications to and from a point of sale (“POS”) device. The smart card may include microcapsules residing on a second layer of the smart card. When the microcapsules are in a rest state the first layer may have a first color. When the microcapsules are in an active state the first layer may have a second color. The microcapsules may be triggered to change the color in response to the smart chip receiving an electronic communication of a status of a transaction initiated by the smart card at the POS device.

    System and method for automatic identification of unauthorized updates to internet of things devices

    公开(公告)号:US12147539B2

    公开(公告)日:2024-11-19

    申请号:US17696303

    申请日:2022-03-16

    Abstract: A system includes a memory and a processor. The memory stores a plurality of records associated with a device and a machine learning algorithm. The plurality of records includes a first record and a second record. The first record includes a first set of parameters extracted from the device at a first time. The second record includes a second set of parameters extracted from the device at a second time, with a difference between the first set of parameters and the second set of parameters resulting from of an update to the device. The machine learning algorithm is configured to determine a probability that the update was unauthorized. The processor executes the machine learning algorithm, and determines that the probability is greater than a threshold. In response to determining that the probability is greater than the threshold, the processor rejects a request transmitted by the device.

    Secure cross-blockchain asset movement using photonic quantum computing

    公开(公告)号:US12131329B2

    公开(公告)日:2024-10-29

    申请号:US18124063

    申请日:2023-03-21

    Inventor: Shailendra Singh

    CPC classification number: G06Q20/4016 G06Q20/02 G06Q20/389 G06N10/00 G06N20/00

    Abstract: Systems and methods for securing a cryptocurrency asset transfer via a cross-blockchain bridge. Methods may include detecting a request to transfer the asset between blockchains and extracting a set of features such as smart contract bytecode from event logs associated with the blockchains and a blockchain bridge. Methods may include using a photonic quantum processor to use i) a long short-term neural network and ii) a neural network to generate machine learning models based on the extracted features to output i) a security risk threshold and ii) a security risk percentage, respectively. When the security risk percentage is below the security risk threshold, the method may permit the execution of a smart contract to allow transfer of the cryptocurrency asset over the blockchain bridge. When the security risk percentage is above the security risk threshold, the method may involve blocking an execution of a smart contract on the blockchain bridge.

    CONTROLLING ATM SURFACE ATTACKS LEVERAGING DECENTRALIZED SWARM INTELLIGENCE USING ATMS

    公开(公告)号:US20240296453A1

    公开(公告)日:2024-09-05

    申请号:US18115858

    申请日:2023-03-01

    CPC classification number: G06Q20/4016 G06Q20/1085 G06Q20/389

    Abstract: A decentralized swarm intelligence algorithm over a network of paired ATMs to prevent or control surface attacks on ATMs. The ATMs may be seeded with an initial swarm intelligence model to identify suspicious activity. An ATM may relay alerts about suspicious activity at that ATM to other paired ATMs. The ATMs use machine learning to update the model and perform swarm intelligence autonomously at the paired ATMs. A bank may provide the initial swarm intelligence model, receive alerts about and analyze the attacks, and provide updated swarm intelligence models to prevent or limit future attacks. Smart contracts may be used to specify rules for performing swarm intelligence using the paired ATMs. Records regarding swarm intelligence models, attempted suspicious attacks including payment instruments that may have been used, actions taken in response to the attacks, and smart contracts may be recorded on a blockchain distributed ledger.

    OPTIMIZING QUBIT CONSUMPTION OF QUANTUM PROGRAMS

    公开(公告)号:US20240281687A1

    公开(公告)日:2024-08-22

    申请号:US18111644

    申请日:2023-02-20

    Inventor: Shailendra Singh

    CPC classification number: G06N10/20 G06N20/00

    Abstract: Arrangements for optimizing quantum bit consumption of quantum programs are provided. In some aspects, a quantum program of a plurality of quantum programs to be executed on target quantum hardware may be received from a digital computing device. The quantum program may be scanned and metadata associated with the quantum program may be parsed using machine learning. In some examples, the quantum program may be optimized by modifying quantum program code for minimum quantum bit consumption using machine learning. A criticality level of the quantum program may be determined based on contextual logic associated with the quantum program. Based on the determined criticality level, a priority sequence may be determined, indicating an order in which the plurality of quantum programs are to be deployed to the target quantum hardware. The quantum program may be transmitted to the target quantum hardware according to the priority sequence.

    Intelligent apparatus to auto-generate spine-leaf network topography for datacenter leveraging quantum photonic generative artificial intelligence

    公开(公告)号:US12058005B1

    公开(公告)日:2024-08-06

    申请号:US18243901

    申请日:2023-09-08

    CPC classification number: H04L41/12 H04L9/50 H04L41/16

    Abstract: Aspects of the disclosure relate to using machine learning models to automatically generate spine-leaf network topologies. A computing system may receive one or more prompts to generate a spine-leaf network topology based on a non-spine-leaf network topology of a non-spine-leaf network. Based on inputting the prompts into a natural language processing model, network criteria for generating the spine-leaf network topology may be generated. Non-spine-leaf network topology data comprising network metadata, network dependency parameters, and network constraint parameters, may be retrieved. Based on inputting the network criteria and the non-spine-leaf network data into a generative adversarial network implemented on a quantum computing device, candidate spine-leaf topologies comprising a qualified candidate spine-leaf network topology that meets the network criteria may be generated. A block of a blockchain may be generated and may comprise the qualified candidate spine-leaf network topology that meets the network criteria.

    SYSTEM FOR DETECTION AND RECORDATION OF FUNCTIONAL CODE LOGIC COMPONENTS ON A DISTRIBUTED DEVELOPMENT PLATFORM

    公开(公告)号:US20240231818A1

    公开(公告)日:2024-07-11

    申请号:US18611774

    申请日:2024-03-21

    CPC classification number: G06F8/77 G06F16/2379 G06F21/6209 G06Q20/02

    Abstract: Systems, computer program products, and methods are described herein for detection and recordation of functional code logic components on a distributed development platform. The present invention is configured to retrieve, from a source code repository, a source code script, wherein the source code script is associated with a first source; initiate a machine learning model on the source code script; determine, using the machine learning model, at least one functional code logic component from the source code script; initiate an NFT source code mapping engine on the at least one functional code logic component; generate, using the NFT source code mapping engine, a NFT for the at least one functional code logic component, wherein the NFT comprises the at least one functional code logic component and information associated with the first source; and record the NFT in a distributed ledger.

    System and method to manage data exchanges in a decentralized network

    公开(公告)号:US12034807B1

    公开(公告)日:2024-07-09

    申请号:US18477652

    申请日:2023-09-29

    CPC classification number: H04L67/1097 H04L47/6275

    Abstract: An apparatus comprises a memory communicatively coupled to a processor. The memory may be configured to store data exchange requests. The processor may be configured to determine that a data exchange request of the data exchange requests comprises a status indicating that the data exchange request is incomplete, generate a priority value for the data exchange request indicating a batch priority associated with the data exchange request, and assign a weight for the data exchange request indicating that the data exchange request is expected to be completed in one or more batch orders. Further, the processor is configured to generate a batch order comprising a position in a queue corresponding to the batch priority and complete the data exchange request in the decentralized network in accordance with the position in the batch order.

Patent Agency Ranking