Secure interactions in a virtual environment using electronic voice

    公开(公告)号:US12020692B1

    公开(公告)日:2024-06-25

    申请号:US18318895

    申请日:2023-05-17

    CPC classification number: G10L15/08 G06F21/32 G06T15/00 G10L13/02 G10L2015/088

    Abstract: A system includes a memory and a processor coupled to the memory. The processor receives a voice command from a first user to transfer a first amount of data objects from a first data file of the first user to a second data file of a second user. The processor generates a voice signature of the first user and further generates a virtual device in the virtual environment, wherein the virtual device comprises metadata relating to the transfer of the data objects. The processor presents the virtual device and the voice signature to the second user in the virtual environment. The processor receives a selection from the second user of the voice signature and plays the voice signature on a second user device of the second user. The processor receives an acknowledgement from the second user and initiates the requested transfer of data objects to the second user.

    System for Predicting Memory Resources and Scheduling Jobs in Service-Oriented Architectures

    公开(公告)号:US20230281043A1

    公开(公告)日:2023-09-07

    申请号:US17686162

    申请日:2022-03-03

    CPC classification number: G06F9/5016 G06F9/5022 G06F11/3037 G06N20/00

    Abstract: A system receives job requests comprising associated job names and associated job parameters. The system performs a comparison of a job name and parameters for a first, second, and third job request with information of previously performed jobs and determines a first, second, and third amount of memory to perform the job requests. The system evaluates the first, second, and third amounts of memory with predetermined memory sizes to determine if the memory amounts exceed the predetermined memory sizes. The system negotiates with schedulers from one or more service provider networks to allocate memory from temporary memories for each amount of memory that exceeds the predetermined memory sizes. The system creates a prioritized queue comprising the first, second, and third received job requests for scheduler processing based upon the amounts of memory. The system can use a trained algorithmic model to predict the first, second, and third amounts of memories.

    Decentralized Dynamic Policy Learning and Implementation System

    公开(公告)号:US20240037463A1

    公开(公告)日:2024-02-01

    申请号:US17875123

    申请日:2022-07-27

    CPC classification number: G06Q10/06311

    Abstract: A decentralized dynamic policy learning and implementation system automatically processes incoming report and generates real-time data based on pre-configured rules and uses a graph-based transformer to generate new policies. The generation of the new polices is based on new alerts or notifications indicating an error with existing policies. An intelligent auto-router detects new security issues and re-routes information to generate the new policy and initiate analysis via a digital twin based on decisioning data points. The digital twin system qualifies the new policy to determine effectiveness in overcoming the security issue. An extended reality environment automatically generates an extended reality environment to based on a graph node structure of the policy.

    SYSTEM FOR ENHANCED AUTHENTICATION USING VOICE MODULATION MATCHING

    公开(公告)号:US20230214839A1

    公开(公告)日:2023-07-06

    申请号:US17568090

    申请日:2022-01-04

    CPC classification number: G06Q20/40145 G06Q20/38215 G06Q20/3827 G06Q20/3825

    Abstract: Systems, computer program products, and methods are described herein for enhanced authentication using voice modulation matching. The present invention is configured to capture, via a first user input device, a digital audio stream of speech data of a first user; receive one or more identification credentials associated with the first user; encode the speech data to generate encoded speech data; query one or more data repositories using the encoded speech data; in response, retrieve, encoded speech data associated with a second user that matches the encoded speech data of the first user; determine that the first user has a familial relationship with the second user; generate an authentication token for the first user based on at least determining that the first user has a familial relationship with the second user; and record the authentication token for the first user in a distributed ledger associated with the second user.

    System and method for secure database management

    公开(公告)号:US12287900B2

    公开(公告)日:2025-04-29

    申请号:US18448865

    申请日:2023-08-11

    Abstract: A method includes encrypting a request received from a user device to generate an encrypted request. Encrypted data items are searched based on the encrypted request to identify desired encrypted data items. In response to determining that two or more encrypted data items of the desired encrypted data items have a same interaction identification, the two or more encrypted data items are locked and masked, and the masked two or more encrypted data items are removed. Algebraic operations are determined based on the encrypted request. An encrypted response is determined by performing the algebraic operations on the desired encrypted data items. The encrypted response is decrypted to obtain a decrypted response. An error is determined due to the algebraic operations performed on the desired encrypted data items. In response to determining that the error is less than an error threshold, the decrypted response is sent to the user device.

    System and method for secure database management

    公开(公告)号:US20250053678A1

    公开(公告)日:2025-02-13

    申请号:US18448865

    申请日:2023-08-11

    Abstract: A method includes encrypting a request received from a user device to generate an encrypted request. Encrypted data items are searched based on the encrypted request to identify desired encrypted data items. In response to determining that two or more encrypted data items of the desired encrypted data items have a same interaction identification, the two or more encrypted data items are locked and masked, and the masked two or more encrypted data items are removed. Algebraic operations are determined based on the encrypted request. An encrypted response is determined by performing the algebraic operations on the desired encrypted data items. The encrypted response is decrypted to obtain a decrypted response. An error is determined due to the algebraic operations performed on the desired encrypted data items. In response to determining that the error is less than an error threshold, the decrypted response is sent to the user device.

    SYSTEM FOR AUTOMATED AND INTELLIGENT IMPLEMENTATION OF COMPUTING SOFTWARE UPGRADES

    公开(公告)号:US20240345819A1

    公开(公告)日:2024-10-17

    申请号:US18133207

    申请日:2023-04-11

    CPC classification number: G06F8/65

    Abstract: A system is provided for automated and intelligent implementation of computing software upgrades. In particular, the system may continuously monitor computing application log files from one or more applications within a network environment and analyze the logs using one or more artificial intelligence-based algorithms recommended pathways for automatically upgrading the applications. Based on the upgrade pathways, the system may initiate a two-step application check to determine which applications may be impacted by the software upgrade and/or a software compatibility issue and which ones are not impacted. Applications that are impacted by the software upgrade and/or software compatibility issue may be instantiated in a cloud environment using an auto-configuration script, where the cloud environment may spool up containers as necessary to accommodate the deployed applications. In this way, the system provides an intelligent way to perform application upgrades and distribute computing load across multiple different computing environments.

    System for enhanced authentication using voice modulation matching

    公开(公告)号:US12106305B2

    公开(公告)日:2024-10-01

    申请号:US17568090

    申请日:2022-01-04

    CPC classification number: G06Q20/40145 G06Q20/38215 G06Q20/3825 G06Q20/3827

    Abstract: Systems, computer program products, and methods are described herein for enhanced authentication using voice modulation matching. The present invention is configured to capture, via a first user input device, a digital audio stream of speech data of a first user; receive one or more identification credentials associated with the first user; encode the speech data to generate encoded speech data; query one or more data repositories using the encoded speech data; in response, retrieve, encoded speech data associated with a second user that matches the encoded speech data of the first user; determine that the first user has a familial relationship with the second user; generate an authentication token for the first user based on at least determining that the first user has a familial relationship with the second user; and record the authentication token for the first user in a distributed ledger associated with the second user.

Patent Agency Ranking