Green Mining System for Distributed and Centralized Operations

    公开(公告)号:US20250148435A1

    公开(公告)日:2025-05-08

    申请号:US18387307

    申请日:2023-11-06

    Abstract: Systems and methods to enable green mining for centralized and/or decentralized financial systems are discussed. In some cases, the green mining methodologies are incorporated in distributed quantum ledger-based decentralized finance ecosystems, in decentralized financial systems and/or centralized financial systems. A proof of influence algorithm enables miners to accumulate and use reputation points to reduce computational power requirements on their systems and/or reduce energy consumptionInfluence points is an indicator of trustworthiness of the miner established based utilizing a predictive algorithm that analyzes the past mining behavior. Higher reputational scores result in lesser computationally intensive activities, which reduce energy consumption. The proof of influence algorithm rewards miners to encourage participation as validators of new blocks and/or other activities on the decentralized or centralized ledger-based systems.

    SYSTEM AND METHOD FOR DETERMINING OPTIMAL RESOURCE TRANSFER ROUTING USING QUANTUM GATEWAY OPTIMIZATION

    公开(公告)号:US20250117846A1

    公开(公告)日:2025-04-10

    申请号:US18376533

    申请日:2023-10-04

    Abstract: Systems, computer program products, and methods are described herein for determining optimal resource transfer routing using quantum gateway optimization. The present disclosure is configured to receive a resource transfer request associated with transferring a resource from a submitting device to a receiving device, wherein the resource transfer request comprises resource transfer instructions and resource transfer metadata; determine, in response to the resource transfer request, an optimized gateway route, wherein the optimized gateway route defines a series of gateways that the resource to be transferred may be processed, and wherein determining the optimized gateway route comprises analyzing the resource transfer instructions, resource transfer metadata, and one or more gateway route characteristics; and complete the resource transfer request, wherein completing the resource transfer request, wherein completing the resource transfer request comprises transferring the resource from the submitting device to the receiving device via the optimized gateway route.

    MULTI-DIMENSIONAL EXTRASENSORY DECIPHERING OF HUMAN GESTURES FOR DIGITAL AUTHENTICATION AND RELATED EVENTS

    公开(公告)号:US20250085784A1

    公开(公告)日:2025-03-13

    申请号:US18755536

    申请日:2024-06-26

    Abstract: Virtual assistant devices and related methods are described that allow users having special needs to communicate with the virtual assistant device. The virtual assistant devices are augmented with additional intelligent sensors, including, but not limited to, three-dimensional optical sensors that are used to capture optical signals of user's non-verbal communication (e.g., sign language, lip movements, gestures or the like). Additionally, the virtual assistant device includes an Artificial Intelligence (AI)-based engine that includes one or more Machine Learning (ML) models trained on user-specific data and used to determine the non-verbal communication of the user (i.e., sign language, lip movements or other gestures) based on inputs derived from the sensors. Moreover, the virtual assistant devices may be configured to generate and display visual information, such as three-dimensional floating avatars of the user and/or the virtual assistant.

    Secure data interactions performed by an internet of things (IoT) device

    公开(公告)号:US11941053B1

    公开(公告)日:2024-03-26

    申请号:US18181221

    申请日:2023-03-09

    CPC classification number: G06F16/9014 G06F21/44

    Abstract: In response to receiving a tagging request to map a first non-fungible token (NFT) to a first user device, a processor transmits an authorization request to a second user device to map the first NFT to the first user device. In response to receiving an approval of the request, the processor transmits a request to a minting server of an NFT blockchain network to generate the first NFT for the first user device. The processor stores a token ID of the generated first NFT in a memory. In response to receiving a second authorization from the first user device to perform a data interaction, the processor requests the NFT blockchain network based on the token ID, verification of the first user device. In response to receiving an indication that the first user device is verified, the processor processes the data interaction.

    System and Method for Generating and Securing a User-Specific Application in an Extended Reality Environment

    公开(公告)号:US20250104342A1

    公开(公告)日:2025-03-27

    申请号:US18474847

    申请日:2023-09-26

    Abstract: A method includes rendering, on displays of an extended reality (XR) device, an XR environment, and detecting, based on sensor data obtained from sensors of the XR device, a device capability associated with the XR device and one or more environmental conditions associated with the XR environment. The method further includes receiving a request corresponding to one or more user interactions with an XR application. In response to receiving the request, the method includes generating, based the device capability and the environmental conditions, a dynamic digital profile to be associated with the user, in which the dynamic digital profile is dynamically generated to be responsive to one or more input modalities associated with the request, and render, on the displays, the dynamic digital profile. The rendered dynamic digital profile includes a set of elements responsive to the one or more input modalities of the request.

    PROVIDING NEAR-FIELD COMMUNICATION SECURITY USING SMART CYBER CONTRACT GENERATION FOR A ZERO-TRUST NETWORK ARCHITECTURE

    公开(公告)号:US20250055856A1

    公开(公告)日:2025-02-13

    申请号:US18230786

    申请日:2023-08-07

    Abstract: Arrangements for providing near-field communication (NFC) security using smart cyber contract generation (SCC) are provided. A platform may train an anomaly detection engine based on historical user information and an SCC generation engine based further on historical event processing rules. The platform may generate a certificate for a user device based on intercepting a request via NFC. The platform may validate the certificate based on a maintained profile. The platform may generate a suspicion indication for the request using the anomaly detection engine. The platform may generate an SCC, using the SCC generation engine, based on identifying the request is suspicious. The platform may apply rules included in the SCC to information included in the request. Based on determining that less than all of the rules in the SCC are satisfied, the platform may initiate a security action. The platform may update the engines based on updated event processing permissions.

Patent Agency Ranking