Steganography for Customized Information Access and Change Log Management

    公开(公告)号:US20250086294A1

    公开(公告)日:2025-03-13

    申请号:US18243790

    申请日:2023-09-08

    Abstract: A computing platform may generate a graphical user interface. The computing platform may embed, into the graphical user interface, steganography, which may include information corresponding to the graphical user interface that is not displayed on the graphical user interface. The computing platform may receive, from a user device of a user, an interface access request and user access credentials. The computing platform may identify, based on the user access credentials, access permissions of the user, which may define portions of the steganography to which the user has access. The computing platform may record, in a change log, interactions of the user with the graphical user interface. The computing platform may compare the interactions in the change log with the access permissions to identify whether or not unauthorized access is detected. Based on detecting the unauthorized access, the computing platform may initiate security actions for the graphical user interface.

    Countermeasure Implementation Platform For Preventing Information Misuse

    公开(公告)号:US20250047708A1

    公开(公告)日:2025-02-06

    申请号:US18228137

    申请日:2023-07-31

    Abstract: A computing platform may train, using historical information access pattern information, a machine learning model to identify unauthorized information access patterns. The computing platform may obscure internal traffic pattern information, and monitor access of the obscured internal traffic pattern information. The computing platform may generate, by inputting information of the access into the machine learning model, a user evaluation output, and may compare the user evaluation output to a first user evaluation threshold. Based on identifying that the user evaluation output meets or exceeds the first user evaluation threshold, the computing platform may modify traffic routing rules corresponding to the user, which may cause activity by the user to be routed to a secure sandbox for further analysis.

    SYSTEM FOR REMOTE RETRIEVAL AND INSERTION OF CONTENTS WITHIN INDIVIDUALLY SECURED CONTAINERS

    公开(公告)号:US20250104498A1

    公开(公告)日:2025-03-27

    申请号:US18373473

    申请日:2023-09-27

    Abstract: Remote access to secured containers is provided by a user interface apparatus having an associated receptacle for receiving physical items delivered from and to the remote secured container. Delivery of the physical items to and from the user interface device's receptacle and the secure container may be accomplished by a robotic mechanism or the like. The user of the remote secured container access system pre-registers, such that presentation of the user credentials at the user interface apparatus provides the user options for receiving items for the secured container and delivering items. Moreover, the user credentials are associated with a secure container identifier and access credentials for gaining access to the secured area and/or the secured container, such that presentation of the user credentials provides identification of the secure container and access to the secured area and/or the secured container.

    Universal Self-Service Kiosk Fraud Detection Platform

    公开(公告)号:US20250045759A1

    公开(公告)日:2025-02-06

    申请号:US18229776

    申请日:2023-08-03

    Abstract: Arrangements for universal self-service kiosk fraud detection are provided. A request for a transaction may be received via a self-service kiosk. The financial institution associated with the transaction may be identified as part of a consortium of financial institutions. Accordingly, a machine learning model particular to the consortium may be used to analyze the transaction. The model may output a determination of whether fraud or potential fraud exists in the transaction. In some examples, the machine learning model may be trained using historical transaction data from one or more financial institutions that are part of the consortium. If fraud is detected, one or more security actions associated with the transaction may be identified and executed. Further, one or more additional self-service kiosks that may be impacted by the fraud may be identified and security actions may be identified and transmitted to the one or more additional self-service kiosks for execution.

    UNIVERSAL SELF-SERVICE KIOSK PLATFORM
    5.
    发明公开

    公开(公告)号:US20240354729A1

    公开(公告)日:2024-10-24

    申请号:US18135834

    申请日:2023-04-18

    CPC classification number: G06Q20/18 G06Q20/108

    Abstract: Arrangements for a universal self-service kiosk platform are provided. In some aspects, registration data may be received from a plurality of enterprise organizations and may include self-service kiosk configuration data for each enterprise organization. A request to associate a self-service kiosk with a first enterprise organization may be received and may include identification of the first enterprise organization and the self-service kiosk. In response, a self-service kiosk configuration associated with the first enterprise organization may be retrieved and an instruction causing the self-service kiosk to implement the self-service kiosk configuration associated with the first enterprise organization may be generated. The instruction may be transmitted to the self-service kiosk. Transmitting the instruction to the self-service kiosk may cause the self-service kiosk to modify a current configuration including, for instance, modifying a display, modifying functionality provided, and the like, based on the self-service kiosk configuration associated with the first enterprise organization.

    SYSTEM FOR CONTAINERIZATION-BASED COUNTERMEASURES TO CYBERSECURITY VULNERABILITIES

    公开(公告)号:US20240305660A1

    公开(公告)日:2024-09-12

    申请号:US18119109

    申请日:2023-03-08

    CPC classification number: H04L63/1433 H04L63/1416

    Abstract: A system is provided for containerization-based countermeasures to cybersecurity vulnerabilities. In particular, the system may generate one or more containers (e.g., virtual environments), where each container may be configured to execute one or more tasks. At least a portion of the containers may be decoy containers that may be executing one or more decoy tasks. The system may then use a randomized process to change which containers are decoy and/or which tasks or jobs are executed within each container. Each container may be associated with a cryptographic key such that each container may be hashed by the system and compared against a reference hash associated with the container. If the hash has changed, the system may determine that the container has been modified and subsequently implement one or more intelligent remediation processes.

    AMALGAMATION PLATFORM PROVIDING CONCEALED DETECTION OF CODE-PASSING USING STEGANOGRAPHY

    公开(公告)号:US20250111050A1

    公开(公告)日:2025-04-03

    申请号:US18375845

    申请日:2023-10-02

    Abstract: Aspects related to an amalgamation platform providing concealed detection of code-passing using steganography are provided. An amalgamation platform may train a scoring engine to generate suspicion scores for code snippets and an amalgamation engine to generate execution scenarios for the code snippets. The platform may embed code in base code of a network using steganography. The platform may use the steganographic code to detect transmission of a code snippet. The platform may generate a suspicion score for the code snippet. The platform may update the scoring engine based on identifying the suspicion score satisfies a threshold. The platform may generate execution scenarios for the code snippet. The platform may determine a match between an execution scenario and a malicious code scenario. The platform may identify the code snippet as malicious and update the amalgamation engine based on the match. The platform may initiate security actions based on the match.

    Predictive load modeling using a digital twin of a computing infrastructure

    公开(公告)号:US20240256361A1

    公开(公告)日:2024-08-01

    申请号:US18162772

    申请日:2023-02-01

    CPC classification number: G06F9/5077 G06F9/5083

    Abstract: A system includes a computing infrastructure, a memory that stores a digital twin of the computing infrastructure, and at least one processor configured to generate simulated containers relating to a job flow, wherein each simulated container simulates a corresponding actual container relating to the job flow that is to run on the computing infrastructure. The digital twin is configured based on configuration parameters to mimic a particular state of the computing infrastructure. A simulation of the job flow is iteratively run on the configured digital twin to determine an allocation of the simulated containers to simulated hardware components that resulted in one or more performance parameters satisfying the respective thresholds.

    System and method for remote authentication based on computer-vision technologies

    公开(公告)号:US12014096B1

    公开(公告)日:2024-06-18

    申请号:US18467216

    申请日:2023-09-14

    CPC classification number: G06F3/1238 G06F3/1222 G06F3/1288

    Abstract: A system for remote authentication accesses a scanned copy of a first document, images, and signatures associated with a requesting user, converts the scanned copy to a digital document, determines a subject matter associated with the first document based on an analysis of the digital document by natural language processing and machine-learning models, selects a first authenticator from multiple authenticators based on the subject matter, a timestamp of the authentication session, and an authenticator profile of the first authenticator, establishes a video communication session between the first authenticator and the requesting user via a display screen via networks, and instructs a printer to generate a physical copy of an authenticated first document including a first authentication certificate of the first authenticator upon determining the first document is authenticated by the first authenticator.

Patent Agency Ranking