-
公开(公告)号:US20240242093A1
公开(公告)日:2024-07-18
申请号:US18098378
申请日:2023-01-18
IPC分类号: G06N5/022
CPC分类号: G06N5/022
摘要: Systems, computer program products, and methods are described herein for predictive generation of data puddles. The present disclosure is configured to capture data ingestion information associated with an end-point device over a period of time; determine, using a machine learning (ML) subsystem, data ingestion pattern for the end-point device based on at least the data ingestion information; generate a query sequence for predictive extraction of data from a data lake based on at least the data ingestion pattern; trigger the predictive extraction of the data from the data lake based on at least the query sequence; and store the data in a data puddle associated with the end-point device in response to the predictive extraction.
-
2.
公开(公告)号:US20240195802A1
公开(公告)日:2024-06-13
申请号:US18080292
申请日:2022-12-13
IPC分类号: H04L9/40
CPC分类号: H04L63/083
摘要: A system is provided for user-initiated authentication of an electronic communication channel using a secure computing application token. In particular, the system may comprise a token generation application installed on an endpoint device of a user, where the application may be configured to perform authentication of communication channels based on receiving user input. Upon receiving a request to establish a secure communication channel from a remote device, the endpoint device may receive a voice sample from the user. Based on the attributes of the voice sample and of the application session, the endpoint device may generate an alphanumeric character string that may serve as a secure token to be verified against a second character string received from the remote device. If a match is detected, the endpoint device may authenticate and generate the communication channel.
-
公开(公告)号:US11991188B2
公开(公告)日:2024-05-21
申请号:US17345444
申请日:2021-06-11
发明人: Vijay Kumar Yarabolu
CPC分类号: H04L63/1416 , G06N5/04 , G06N20/00
摘要: Aspects of the disclosure relate to cognitive auditing of client bound data. A computing platform may intercept a request from a user device to an application server. The computing platform may identify content requested by the user device and generate predicted response data based on the requested content. The computing platform may transmit the request to the application server. The computing platform may receive, from the application server, actual response data. The computing platform may validate the actual response data by comparing the actual response data with the predicted response data. Based on comparing the actual response data with the predicted response data, the computing platform may identify whether the actual response data matches the predicted response data. Based on identifying that the actual response data matches the predicted response data, the computing platform may send the actual response data to the user device.
-
公开(公告)号:US20230385251A1
公开(公告)日:2023-11-30
申请号:US17824015
申请日:2022-05-25
发明人: Vijay Kumar Yarabolu
IPC分类号: G06F16/215 , G06F16/23
CPC分类号: G06F16/215 , G06F16/2365
摘要: A database manager segments data stored in a database into a plurality of data segments and randomly combines the data segments into a plurality of data chromosomes that form an initial generation of a genetic algorithm. The database manager then runs multiple iterations of the genetic algorithm on the initial generation, wherein each iteration forms a new generation of data chromosomes based on data segments having the highest optimization metrics from a previous generation, wherein the optimization metric of a data segment represents a degree of importance of the data segment. When the genetic algorithm converges a fitness score is calculated for each data segment, wherein the fitness score of a data segment equals a number of iterations of the genetic algorithm the data segment survived before the genetic algorithm was terminated. Data is deleted from the database based on the fitness scores of the data segments.
-
公开(公告)号:US20230318930A1
公开(公告)日:2023-10-05
申请号:US17708540
申请日:2022-03-30
发明人: Vijay Kumar Yarabolu
IPC分类号: H04L41/16
CPC分类号: H04L41/16 , H04L67/133 , H04L67/51
摘要: Cognitive analysis, including artificial intelligence, is implemented to dynamically determine service discovery and service binding. Specifically, cognitive analysis is used to determine a client's capabilities and based on the capabilities, a service version is selected and coupled/bound to the client. As a result of such loose coupling/binding with service signatures, service version upgrade at the client is not mandatory in the event of a server-side service version upgrade.
-
公开(公告)号:US20230269263A1
公开(公告)日:2023-08-24
申请号:US17679893
申请日:2022-02-24
发明人: Vijay Kumar Yarabolu
CPC分类号: H04L63/1425 , H04L63/1466 , H04L41/16 , G06K9/6259
摘要: A machine learning (ML) attack detection and prevention system may monitor operation of an explainable artificial intelligence (AI) model processed by an application server to provide a product or service to a user. The AI model outputs explainable data and/or other outputs used in decision making. The ML attack detection and prevention system derives business rules based on the explainable data produced by the explainable AI model. Additionally, the ML attack detection and prevention system processes rules repositories of simulation failure data, historical failure data and business rules to derive possible fraud rules based on the data collected in above step. Based on a comparison of rules derived from the AI model output and the possible fraud rules, the ML attack detection and prevention system issues an alert if a fraud condition is suspected and causes the application server to revert back to a previous version of the AI model.
-
公开(公告)号:US20220400122A1
公开(公告)日:2022-12-15
申请号:US17345444
申请日:2021-06-11
发明人: Vijay Kumar Yarabolu
摘要: Aspects of the disclosure relate to cognitive auditing of client bound data. A computing platform may intercept a request from a user device to an application server. The computing platform may identify content requested by the user device and generate predicted response data based on the requested content. The computing platform may transmit the request to the application server. The computing platform may receive, from the application server, actual response data. The computing platform may validate the actual response data by comparing the actual response data with the predicted response data. Based on comparing the actual response data with the predicted response data, the computing platform may identify whether the actual response data matches the predicted response data. Based on identifying that the actual response data matches the predicted response data, the computing platform may send the actual response data to the user device.
-
公开(公告)号:US11487857B2
公开(公告)日:2022-11-01
申请号:US16580051
申请日:2019-09-24
摘要: A fog/edge server machine for authenticating a user in an edge computing model is disclosed using a data spectrum table and spectrum hash values to improve performance, efficiency, and/or security. The edge computing model may include, in some examples, a secure Internet of Things (IoT) and/or mobile-based authentication system. Illustrative embodiments of a spectrum table stored at fog/edge server, a spectrum data array and spectrum hash value generated and stored in memory at the fog/edge sever, and a large, data table stored at an application server are disclosed herein to show continuous/subsequent authentication of the user with attributes/values/inputs collected by one or more edge devices during post-login activities/interactions to re-authenticate/maintain the authentication.
-
公开(公告)号:US11356244B2
公开(公告)日:2022-06-07
申请号:US16893559
申请日:2020-06-05
发明人: Vijay Kumar Yarabolu
摘要: Embodiments of the invention are directed to a system, method, or computer program product structured for continuous authentication and encryption. In some embodiments, the system is structured for receiving content from an entity system, displaying the content as masked content, and determining, using cognitive analysis, that a user wearing smart glasses is viewing a first portion of the masked content through the smart glasses, where the first portion of the masked content is associated with a first content hash. The system is also structured for identifying a first decryption key associated with the first content hash and determining a first cognitive hash. The system is also structured for receiving a first wearable hash from the smart glasses, comparing the first cognitive hash to the first wearable hash, and in response to the first cognitive hash matching the first wearable hash, transmitting the first decryption key to the smart glasses.
-
公开(公告)号:US20210397696A1
公开(公告)日:2021-12-23
申请号:US16903536
申请日:2020-06-17
发明人: Vijay Kumar Yarabolu
摘要: Embodiments of the invention are directed to a system, method, or computer program product structured for identifying potential misappropriation attempts into a technology resource and enforcing a credential lockout. In some embodiments, a system is structured for receiving a user credential associated with a first log-on attempt to access a technology resource, determining whether the user credential matches a stored valid credential, and, if it does not match, performing a misappropriation assessment. The misappropriation assessment includes evaluating and weighting a plurality of potential misappropriation factors, determining a misappropriation score from the weighted plurality of potential misappropriation factors, and adding the misappropriation score to a cumulative misappropriation score for the technology resource. The system is also structured for determining whether the cumulative misappropriation score has reached or exceeded a threshold and, if it has, enforcing a credential lockout for the technology resource.
-
-
-
-
-
-
-
-
-