Defensive deepfake for detecting spoofed accounts

    公开(公告)号:US12284212B2

    公开(公告)日:2025-04-22

    申请号:US18665672

    申请日:2024-05-16

    Abstract: Apparatus and methods for using deepfakes defensively to detect fake, spoofed, and hoax accounts and posts on social media and elsewhere are provided. A program may gather verified images or writings of a target individual. The program may analyze the verified images and writings to create a baseline. The program may use deepfake algorithms to create exemplar deepfake images or writings. The program may store the data in a database. The program may search a network for social media accounts or posts that may meet the baseline and determine whether they are legitimate or illegitimate by comparing the contents of the accounts or posts with the exemplar deepfakes. When the program determines the accounts or posts are illegitimate, the program may initiate a takedown of those accounts or posts. The program may use machine learning algorithms to refine itself and become more accurate.

    VERIFYING HUMAN INTERACTION THROUGH AN ENCRYPTED CHANNEL

    公开(公告)号:US20250039170A1

    公开(公告)日:2025-01-30

    申请号:US18225200

    申请日:2023-07-24

    Abstract: Apparatus and methods to verify human interaction through an encrypted channel are provided. A human verification program may create an encrypted channel between two or more devices when a communication between users of the devices is started. Data may be transferred over the encrypted channel when a user performs a verifiably human action. The data may be analyzed to determine whether the user is more likely than not a bot. The channel may be collapsed when a pre-determined condition is satisfied.

    QUANTUM REFLECTION ACCESS CREDENTIALING (QRAC)

    公开(公告)号:US20240362306A1

    公开(公告)日:2024-10-31

    申请号:US18139105

    申请日:2023-04-25

    CPC classification number: G06F21/32

    Abstract: A method for providing a quantum reflection access credentialing (QRAC) system. The method includes receiving a user login. The user login may include a username and password. The user login may be associated with a known user. The system may include a memory for storing information corresponding to light reflected from the face of the user. The method may further include selecting, or receiving a selection of, a light source from among an array of light sources. The method may also include shining light generated by the selected light source on the user's face. The method may also include scanning the user face to capture a reflection of the light generated by the light source. The method may then include confirming that the information stored in the memory corresponds to the reflection of the light generated by the light source. In response to confirming that the information stored in the memory corresponds to the reflection of the light generated by the light source, the method may credential user access.

    TRANSACTING OF DIGITAL ASSETS / CRYPTOCURRENCY BY COMBINING FUNDAMENTALS ANALYSIS AND TECHNICAL ANALYSIS

    公开(公告)号:US20240233027A1

    公开(公告)日:2024-07-11

    申请号:US18093852

    申请日:2023-01-06

    CPC classification number: G06Q40/06 G06Q2220/00

    Abstract: A computer program product, system, and method for generating a combined score or scores for digital assets or cryptocurrency or stocks, each score based on a combination of fundamentals and technical data, for trading decisions, such as buying, selling, holding, or shorting the asset. The score(s) may relate to long-term, medium-term, and short-term decisions. The scores(s) may be generated using machine learning, artificial intelligence, or behavioral analytics to determine which of the available fundamentals data and technical data to use in the scoring and how much significance and weight to give to each data. The scores(s) may be provided to an automated trading system for generating trades based on the score(s).

    Storage locations for anti-phish, personalized, security tokens for use with electronic communications

    公开(公告)号:US12003646B2

    公开(公告)日:2024-06-04

    申请号:US17722773

    申请日:2022-04-18

    Abstract: Methods for securing an electronic communication is provided. Methods may, in a registration process, create and/or select an anti-phish, personalized, security token for a predetermined account on a computing device. Methods may generate a hash of the token, store the token and the hash in a secure storage location within the computing device. Methods may, in an in-use process, generate an electronic communication at a channel. The database may be interposed along the channel. Methods may forward the communication to a recipient associated with the account. Methods may intercept the communication at the database. Methods may select the hash from the database. Methods may generate an injected hash by injecting the hash into the communication. Methods may transmit the communication with the hash to the recipient. Methods may receive the electronic communication with the injected hash at the recipient. Methods may compare the injected hash to the stored hash. Methods may release and display the anti-phish token when the injected hash is equivalent to the stored hash.

    Anti-phish, personalized, security token for use with electronic communications

    公开(公告)号:US11991207B2

    公开(公告)日:2024-05-21

    申请号:US17693506

    申请日:2022-03-14

    CPC classification number: H04L63/1483

    Abstract: Methods for securing an electronic communication is provided. Methods may include, in a registration process, creating and/or selecting an anti-phish, personalized, security token for a predetermined account. Methods may include, in the registration process, storing the token in a database. Methods may include, in an in-use process, generating an electronic communication at a channel. The database may be interposed along the channel. Methods may include, in the in-use process, forwarding the communication to a recipient. The recipient may be associated with the account. Methods may include, in the in-use process, intercepting the communication at the database. Methods may include, in the in-use process, selecting, from the database, the anti-phish, personalized, security token that is associated with the account. Methods may include, in the in-use process, injecting the selected token into the communication. Methods may include, in the in-use process, transmitting the communication with the token to the recipient.

    Double anti-phish, personalized, security token for use with electronic communications

    公开(公告)号:US11991172B2

    公开(公告)日:2024-05-21

    申请号:US17707097

    申请日:2022-03-29

    CPC classification number: H04L63/0853 H04L63/1483

    Abstract: A double anti-phish, personalized, security token for use with electronic communications is provided. The security token may be embedded in each electronic communication transmitted from an entity to a recipient. A first part of the token may be embedded in a body of the communication. A second part of the token may be embedded in a header of the communication. The second part of the security token may validate that the electronic communication is indeed from the entity. Upon validation, the second part may instruct the first part to display a validation symbol. Upon failure to validate, the second part may instruct the first part to display an alert symbol. The recipient receiving the electronic communication may use the first part of the validation symbol as a visual aid to determine a level of confidence of whether the electronic communication has been validated as being transmitted by the entity.

    VOICE SURVEILLANCE SYSTEM USING ENHANCED METADATA AND GEOTAGGING CAPABILITIES

    公开(公告)号:US20240163648A1

    公开(公告)日:2024-05-16

    申请号:US17984319

    申请日:2022-11-10

    CPC classification number: H04W4/50 G06K19/0719 H04W4/80

    Abstract: Apparatus, methods and systems for voice surveillance using enhanced metadata and geotagging capabilities are provided. Systems may monitor communications being transmitted from, and being received at, entity devices. The communications may be monitored for anomalies. The anomalies may be identified as communications outside of a regular pattern of communications. Various factors may be used to identify the anomalous communications. The factors may include a number of communications per predetermined time period, a geolocation of the communication, identification of a second communicative party of the communication and any other suitable factors. Stakeholders may be alerted regarding any anomalous communications. Additionally, once the communications have been labeled as anomalous or non-anomalous, the labeled communications may be used to create and/or update a set of labeled training data. The created and/or updated set of labeled training data may be used in an artificial intelligence engine that labels communications as anomalous or non-anomalous.

    IoT BASED AUTHENTICATION
    9.
    发明公开

    公开(公告)号:US20240062202A1

    公开(公告)日:2024-02-22

    申请号:US17892731

    申请日:2022-08-22

    CPC classification number: G06Q20/401 G06Q20/308 G16Y30/10

    Abstract: Aspects of the disclosure relate an IoT authentication system to strengthen and streamline authentication for transaction processing for users. A transaction computing platform may receive from a plurality of IoT devices information regarding interactions with a user. In some arrangements, transaction computing platform may generate constellations based on the received information. A trust status may be determined based on the generated constellations. Transaction authentication may be based at least in part on the determined trust status. In some embodiments, real-time updates of trust status along with transaction alerts may be provided to IoT devices.

    LOGOS AS VISUAL INDICATORS OF TRUST IN APPLICATIONS

    公开(公告)号:US20240054219A1

    公开(公告)日:2024-02-15

    申请号:US17885711

    申请日:2022-08-11

    CPC classification number: G06F21/57 G06F21/645 G06F2221/033

    Abstract: Apparatus and methods for providing an indicator of trustworthiness of a software application are provided. A program may receive information regarding the software application from a developer of the application. The program may analyze the application and determine that the application is trustworthy and secure. The program may then create a unique logo that may include various information to indicate to a user that the program has determined the application is trustworthy. The program may transmit the logo to the developer so the developer may incorporate the logo into the application. In an embodiment, the program may transmit the logo to a third-party application store for display on a page where the application is available.

Patent Agency Ranking