MACHINE LEARNING BASED SYSTEM FOR PREDICTIVE GENERATION OF DATA PUDDLES

    公开(公告)号:US20240242093A1

    公开(公告)日:2024-07-18

    申请号:US18098378

    申请日:2023-01-18

    IPC分类号: G06N5/022

    CPC分类号: G06N5/022

    摘要: Systems, computer program products, and methods are described herein for predictive generation of data puddles. The present disclosure is configured to capture data ingestion information associated with an end-point device over a period of time; determine, using a machine learning (ML) subsystem, data ingestion pattern for the end-point device based on at least the data ingestion information; generate a query sequence for predictive extraction of data from a data lake based on at least the data ingestion pattern; trigger the predictive extraction of the data from the data lake based on at least the query sequence; and store the data in a data puddle associated with the end-point device in response to the predictive extraction.

    SYSTEM FOR USER-INITIATED AUTHENTICATION OF AN ELECTRONIC COMMUNICATION CHANNEL USING A SECURE COMPUTING APPLICATION TOKEN

    公开(公告)号:US20240195802A1

    公开(公告)日:2024-06-13

    申请号:US18080292

    申请日:2022-12-13

    IPC分类号: H04L9/40

    CPC分类号: H04L63/083

    摘要: A system is provided for user-initiated authentication of an electronic communication channel using a secure computing application token. In particular, the system may comprise a token generation application installed on an endpoint device of a user, where the application may be configured to perform authentication of communication channels based on receiving user input. Upon receiving a request to establish a secure communication channel from a remote device, the endpoint device may receive a voice sample from the user. Based on the attributes of the voice sample and of the application session, the endpoint device may generate an alphanumeric character string that may serve as a secure token to be verified against a second character string received from the remote device. If a match is detected, the endpoint device may authenticate and generate the communication channel.

    Cognitive auditing of client bound data

    公开(公告)号:US11991188B2

    公开(公告)日:2024-05-21

    申请号:US17345444

    申请日:2021-06-11

    摘要: Aspects of the disclosure relate to cognitive auditing of client bound data. A computing platform may intercept a request from a user device to an application server. The computing platform may identify content requested by the user device and generate predicted response data based on the requested content. The computing platform may transmit the request to the application server. The computing platform may receive, from the application server, actual response data. The computing platform may validate the actual response data by comparing the actual response data with the predicted response data. Based on comparing the actual response data with the predicted response data, the computing platform may identify whether the actual response data matches the predicted response data. Based on identifying that the actual response data matches the predicted response data, the computing platform may send the actual response data to the user device.

    PRUNING A DATABASE USING GENETIC ALGORITHM
    4.
    发明公开

    公开(公告)号:US20230385251A1

    公开(公告)日:2023-11-30

    申请号:US17824015

    申请日:2022-05-25

    IPC分类号: G06F16/215 G06F16/23

    CPC分类号: G06F16/215 G06F16/2365

    摘要: A database manager segments data stored in a database into a plurality of data segments and randomly combines the data segments into a plurality of data chromosomes that form an initial generation of a genetic algorithm. The database manager then runs multiple iterations of the genetic algorithm on the initial generation, wherein each iteration forms a new generation of data chromosomes based on data segments having the highest optimization metrics from a previous generation, wherein the optimization metric of a data segment represents a degree of importance of the data segment. When the genetic algorithm converges a fitness score is calculated for each data segment, wherein the fitness score of a data segment equals a number of iterations of the genetic algorithm the data segment survived before the genetic algorithm was terminated. Data is deleted from the database based on the fitness scores of the data segments.

    Adversarial Machine Learning Attack Detection and Prevention System

    公开(公告)号:US20230269263A1

    公开(公告)日:2023-08-24

    申请号:US17679893

    申请日:2022-02-24

    IPC分类号: H04L9/40 H04L41/16 G06K9/62

    摘要: A machine learning (ML) attack detection and prevention system may monitor operation of an explainable artificial intelligence (AI) model processed by an application server to provide a product or service to a user. The AI model outputs explainable data and/or other outputs used in decision making. The ML attack detection and prevention system derives business rules based on the explainable data produced by the explainable AI model. Additionally, the ML attack detection and prevention system processes rules repositories of simulation failure data, historical failure data and business rules to derive possible fraud rules based on the data collected in above step. Based on a comparison of rules derived from the AI model output and the possible fraud rules, the ML attack detection and prevention system issues an alert if a fraud condition is suspected and causes the application server to revert back to a previous version of the AI model.

    Cognitive Auditing of Client Bound Data

    公开(公告)号:US20220400122A1

    公开(公告)日:2022-12-15

    申请号:US17345444

    申请日:2021-06-11

    IPC分类号: H04L29/06 G06N5/04 G06N20/00

    摘要: Aspects of the disclosure relate to cognitive auditing of client bound data. A computing platform may intercept a request from a user device to an application server. The computing platform may identify content requested by the user device and generate predicted response data based on the requested content. The computing platform may transmit the request to the application server. The computing platform may receive, from the application server, actual response data. The computing platform may validate the actual response data by comparing the actual response data with the predicted response data. Based on comparing the actual response data with the predicted response data, the computing platform may identify whether the actual response data matches the predicted response data. Based on identifying that the actual response data matches the predicted response data, the computing platform may send the actual response data to the user device.

    Spectrum authentication in edge devices

    公开(公告)号:US11487857B2

    公开(公告)日:2022-11-01

    申请号:US16580051

    申请日:2019-09-24

    摘要: A fog/edge server machine for authenticating a user in an edge computing model is disclosed using a data spectrum table and spectrum hash values to improve performance, efficiency, and/or security. The edge computing model may include, in some examples, a secure Internet of Things (IoT) and/or mobile-based authentication system. Illustrative embodiments of a spectrum table stored at fog/edge server, a spectrum data array and spectrum hash value generated and stored in memory at the fog/edge sever, and a large, data table stored at an application server are disclosed herein to show continuous/subsequent authentication of the user with attributes/values/inputs collected by one or more edge devices during post-login activities/interactions to re-authenticate/maintain the authentication.

    Graphical user interface using continuous authentication and encryption for selective display of data

    公开(公告)号:US11356244B2

    公开(公告)日:2022-06-07

    申请号:US16893559

    申请日:2020-06-05

    摘要: Embodiments of the invention are directed to a system, method, or computer program product structured for continuous authentication and encryption. In some embodiments, the system is structured for receiving content from an entity system, displaying the content as masked content, and determining, using cognitive analysis, that a user wearing smart glasses is viewing a first portion of the masked content through the smart glasses, where the first portion of the masked content is associated with a first content hash. The system is also structured for identifying a first decryption key associated with the first content hash and determining a first cognitive hash. The system is also structured for receiving a first wearable hash from the smart glasses, comparing the first cognitive hash to the first wearable hash, and in response to the first cognitive hash matching the first wearable hash, transmitting the first decryption key to the smart glasses.

    DATA SECURITY SYSTEM FOR ANALYZING HISTORICAL AUTHENTICATION ENTRY ATTEMPTS TO IDENTIFY MISAPPROPRIATION OF SECURITY CREDENTIAL AND ENFORCE PASSWORD CHANGE

    公开(公告)号:US20210397696A1

    公开(公告)日:2021-12-23

    申请号:US16903536

    申请日:2020-06-17

    摘要: Embodiments of the invention are directed to a system, method, or computer program product structured for identifying potential misappropriation attempts into a technology resource and enforcing a credential lockout. In some embodiments, a system is structured for receiving a user credential associated with a first log-on attempt to access a technology resource, determining whether the user credential matches a stored valid credential, and, if it does not match, performing a misappropriation assessment. The misappropriation assessment includes evaluating and weighting a plurality of potential misappropriation factors, determining a misappropriation score from the weighted plurality of potential misappropriation factors, and adding the misappropriation score to a cumulative misappropriation score for the technology resource. The system is also structured for determining whether the cumulative misappropriation score has reached or exceeded a threshold and, if it has, enforcing a credential lockout for the technology resource.