SYSTEM AND METHOD FOR AN IMAGE EXCHANGE WITH ORIGIN TRACING

    公开(公告)号:US20250068706A1

    公开(公告)日:2025-02-27

    申请号:US18812995

    申请日:2024-08-22

    Abstract: The present invention is a system and method for high-bandwidth digital content protection, to be implemented on an array of platforms. The disclosed invention utilizes convolutional neural networks to scan a plurality of online databases, datasets, and content libraries to determine the authentication and origination of digital content and to prevent the appropriation of digital media and content. The present invention implements metadata preservation schemas and utilizes artificial intelligence to determine whether an image has been doctored or appropriated. In addition, the present invention provides a marketplace for brands and content creators to professionally interact and collaborate.

    Secure Software Life Duration Timer

    公开(公告)号:US20250068704A1

    公开(公告)日:2025-02-27

    申请号:US18238115

    申请日:2023-08-25

    Abstract: An example embodiment includes an example embodiment includes a method performed by a processor of a user device. The method including receiving, by the processor of the user device, instructions for installing application software on the user device, and installing the application software on the user device based on the instructions. The installation including installing library code of the application software in a section of a memory device of the user device and installing timer code in the section of the memory device along with the library code. The erasure of the timer code from the memory device causes erasure of the library code from the memory device. Decrementing, by the processor of the user device, the timer code when the processor executes the library code, the timer code limiting a life duration of the user device executing the application software.

    Identity and license verification system for working with highly sensitive data

    公开(公告)号:US12229310B2

    公开(公告)日:2025-02-18

    申请号:US17762164

    申请日:2019-09-27

    Abstract: The system has a unique identifier (2) stored in client's hardware (1). Via a transfer environment (3) using a higher layer protocol (4), the unique identifier (2) is coupled to a server (5), where, in an evaluation module (6), it is connected to a substitution and calculation module (7). A w polynomial system (8) stored in the persistent memory (9) of the server (5) is also connected to the substitution and calculation module (7), the output of which is a calculated key (10). At the same time, the client's hardware (1) stores a local key (11) which is via the transfer environment (3) using the higher layer protocol (4) connected to a key comparison module (12) to which the calculated key (10) is also connected. The key comparison module (12) is through its positive output (13) and negative output (14) connected via the transfer environment (3) using the higher layer protocol (4) to a response processing module (15) which is stored in the client's hardware (1). The system, at high security levels, provides the required response speed even for a large number of users and/or licenses without significantly increasing the space/memory requirements of computing resources.

    DEVICES, SYSTEMS, AND METHODS FOR EFFICIENTLY ENCRYPTING INFORMATION INTO A DIGITAL ASSET

    公开(公告)号:US20250053623A1

    公开(公告)日:2025-02-13

    申请号:US18366126

    申请日:2023-08-07

    Inventor: Allen Y. YANG

    Abstract: A computer-implemented method of embedding information within a digital asset is disclosed herein. The method can include receiving a digital asset from a computer network, wherein the digital asset comprises a plurality of pixel values, embedding information within the digital asset by altering the plurality of pixel values, compressing the digital asset with the embedded information, generating an altered digital asset based on the compressed digital asset with the embedded information, and transmitting the altered digital asset to a computing device configured to retrieve the embedded information from the altered digital asset.

    MANAGE TRAINING DATA IN ARTIFICIAL INTELLIGENCE

    公开(公告)号:US20250053622A1

    公开(公告)日:2025-02-13

    申请号:US18796394

    申请日:2024-08-07

    Applicant: Ava Labs, Inc.

    Abstract: Various aspects of the subject technology relate to systems, methods, and machine-readable media for managing training data in artificial intelligence (AI) models. Various aspects may include receiving, at a blockchain, training data from data sources. Aspects may also include validating authenticity of the data sources. Aspects may also include receiving a request for training AI models using the training data and training the models based on an approval of the request. Aspects may also include submitting a first transaction to the blockchain for the training of the models using the training data. Aspects may also include generating a response to a query from a user using the models based on at least a subset of the training data. Aspects may also include submitting a second transaction to the blockchain for leveraging the subset of the training data to generate the response to the query.

    SYSTEM AND METHOD FOR A LINE OF CREDIT BASED DIGITAL CONTENT MULTI-CHAMBERED CLOUD BASED DISTRIBUTION PLATFORM

    公开(公告)号:US20250045723A1

    公开(公告)日:2025-02-06

    申请号:US18802059

    申请日:2024-08-13

    Abstract: A method whereby a user is granted access to a digital content distribution platform subsequent to the user downloading a computer application onto a client device. Granting access includes providing the user with a line-of-credit usable by the user to access digital content files from the digital content distribution platform. The method includes receiving, from the client device, a user interaction with a social networking platform and increasing the line-of-credit as a function of the user's interaction with the social networking platform. The method includes receiving, from the user, a selection of a digital content file located on the digital content distribution platform and providing the user with access to the selected digital content file if a limit of the line-of-credit exceeds an associated cost of the selected digital content file, and then decreasing the line-of-credit by at least a portion of the line-of-credit.

    PROTECTION OF DIGITAL ASSETS WITHIN THE BLOCKCHAIN BY APPROVAL REVOCATIONS

    公开(公告)号:US20250045361A1

    公开(公告)日:2025-02-06

    申请号:US18362443

    申请日:2023-07-31

    Abstract: A method and system for protecting of digital assets within the blockchain by approval revocations. The method comprises detecting an approval of a transaction by a least one user node connected to the approval node over a blockchain network; generating a revoke transaction comprising un-approval of the transaction; monitoring a smart contract associated with the transaction to determine a risk factor; and responsive to the risk factor exceeding a pre-determined risk level threshold, triggering an execution of the revoke transaction.

    Group travel between artificial reality destinations

    公开(公告)号:US12218944B1

    公开(公告)日:2025-02-04

    申请号:US18045203

    申请日:2022-10-10

    Abstract: Aspects of the present disclosure are directed to group travel between artificial reality (XR) destinations. Currently, users in an artificial reality (XR) experience cannot travel with a group to a specific destination or between destinations (e.g., to and from virtual worlds, levels, applications, etc.). Thus, some implementations assign users within a group in a multiplayer XR experience (e.g., a virtual lobby) a same session identifier. When the users select a destination, some implementations can provide a computing system hosting the destination with the session identifier associated with the users, such that the hosting computing system can ensure that the users travel to the same instance of the destination together. If a user does not already have the destination installed, some implementations can allow the user to acquire access rights to the destination, then travel to the same instance of the destination as the other users.

Patent Agency Ranking