System and Method for using artificial intelligence to determine if an action is authorized

    公开(公告)号:US20250068772A1

    公开(公告)日:2025-02-27

    申请号:US18455849

    申请日:2023-08-25

    Abstract: A system that includes a memory and a processor that determines whether to authorize an action. The processor receives a plurality of authorization messages that are requests for authorizing actions. The processor then extracts data from the plurality of authorization messages and analyzes the data with a trained neural network to group the plurality of authorization messages. The resulting plurality of message groupings are then analyzed by a long-short-term-memory algorithm (LSTM) to determine a plurality of patterns that indicate that a particular authorization message may be authorized. The processor then receives one or more new authorization messages from an external device and compares these to the plurality of patterns. If the one or more new authorization messages correspond to any of the patterns, then the external device is notified by the processor that it should deny the action associated with the new authorization messages.

    METHODS AND SYSTEMS FOR SECURING TRANSACTIONS

    公开(公告)号:US20250045748A1

    公开(公告)日:2025-02-06

    申请号:US18229703

    申请日:2023-08-03

    Abstract: An apparatus is provided, including a transaction card, having: a first microprocessor configured to exchange transaction data; a sensor configured to detect movement; and a second microprocessor in communication with the sensor. The second microprocessor may be configured to store arrays of hash values, representing a movement of a user and a card; obtain hash values based on observed movement patterns, and compare them to the stored values. Upon receiving a transaction request, the microprocessor may determine in real time whether the user is in locomotion and whether the card is being intentionally tapped by the user, based on the observed movement patterns. On this basis, the second microprocessor may determine whether to require an augmented authentication for the requested transaction.

    System and Method for Interaction Resiliency in the Metaverse

    公开(公告)号:US20250077273A1

    公开(公告)日:2025-03-06

    申请号:US18459146

    申请日:2023-08-31

    Abstract: A metaverse server comprises an edge node processor and a remote node processor. The edge node processor receives a request to perform a task comprising a first set of one or more operations and a second set of one or more operations from a client device associated with a metaverse user, executes the first set of one or more operations, sends a first notification indicating that the task is being performed to the client device, and forwards the second set of one or more operations to the remote node processor. The remote node processor receives the second set of one or more operations, executes each of the second set of one or more operations when conditions for executing the operation are satisfied, and sends a second notification indicating that the task has been completed to the client device upon completion of the second set of one or more operations.

    System and method for reestablishing network connectivity for particular network equipment in a failed network zone

    公开(公告)号:US12160346B1

    公开(公告)日:2024-12-03

    申请号:US18319897

    申请日:2023-05-18

    Abstract: A system for reestablishing network connectivity for particular network equipment in a failed network zone comprises a processor associated with a server. The processor receives a flag that identifies the failed network zone including particular network equipment that have lost network connectivity in a network. The processor generates a first non-fungible token using the configuration information associated with each of the particular network equipment. The processor determines routing information based at least in part upon the configuration information and a network topology. The processor generates a second non-fungible token based at least in part upon the routing information. The processor aggregates the first non-fungible token and the second non-fungible token to generate a primary non-fungible token. The processor reestablishes network connectivity for at least a portion of the particular network equipment based at least in part upon information associated with the primary non-fungible token.

Patent Agency Ranking