Aspects of the disclosure relate to energy optimization. A computing platform may receive an event processing request. The computing platform may identify parameters of the event processing request. The computing platform may input the parameters into a global energy optimization model, to identify an edge computing system at which to process the event processing request. The computing platform may route the event processing request to the edge computing system along with commands to process the event processing request using an energy mix identified by a local energy optimization model, corresponding to the edge computing system, which may cause the edge computing system to: input the parameters of the event processing request into the local energy optimization model to identify the energy mix, and process, using the energy mix, the event processing request.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
G06Q 50/06 - Fourniture d'électricité, de gaz ou d'eau
H02J 3/00 - Circuits pour réseaux principaux ou de distribution, à courant alternatif
H02J 3/14 - Circuits pour réseaux principaux ou de distribution, à courant alternatif pour règler la tension dans des réseaux à courant alternatif par changement d'une caractéristique de la charge du réseau par interruption, ou mise en circuit, des charges du réseau, p.ex. charge équilibrée progressivement
2.
SYSTEM FOR IMPLEMENTING DYNAMIC MULTI-FACTOR SOFT LOCK ON USER IDENTIFIERS
Systems, computer program products, and methods are described herein for implementing dynamic multi-factor soft lock on user identifiers. The present invention is configured to receive, from a first user input device, a network registration request from a user to obtain authorization to execute resource transfers within a distributed network using a first user identifier; query, using an information retrieval engine, metadata associated with the user within the distributed network for traceable instances of digital activities of the user; determine one or more user identifiers based on at least the metadata associated with the user; execute, using an authentication subsystem, a soft lock on the one or more user identifiers; approve authorization for the user to execute the resource transfers within the distributed network using the first user identifier; and transmit control signals configured to cause the first user device to display the authorization.
A system includes a memory and a processor configured to detect that a primary mainframe job has failed, and extracts information related to the failed primary mainframe job, wherein the extracted information includes an error description of an error that caused the primary mainframe job to fail. The processor searches the memory based on the error description for a set of corrective actions corresponding to the error. In response to determining the set of corrective actions based on the search, the processor obtains a criticality index relating to the primary mainframe job. When the criticality index is lower than a criticality index threshold, the processor applies the set of corrective actions in relation to the failed primary mainframe job and processes the failed primary mainframe job after applying the set of corrective actions.
Methods for banking at an automated teller machine (ATM) using a mobile device. The ATM may automatically detect the presence of the mobile device in a vicinity of the ATM and initiate contact with the mobile device, or a mobile device may initiate contact with the ATM. After verifying user permission to access the ATM, the mobile device may be enabled to provide user access to one or more of the banking services available at the ATM using the mobile device and to view banking-related information on the mobile device. A mobile application on the mobile device may be used to access the ATM using the mobile device. While a mobile device is accessing the ATM, a screen on the ATM may become inactive for banking services and the option to select banking services directly at the ATM may be disabled.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06V 20/52 - Activités de surveillance ou de suivi, p.ex. pour la reconnaissance d’objets suspects
5.
Detecting and mitigating application security threats based on threat change patterns
A system for detecting and mitigating application security threats comprises a processor associated with a server. The processor executes a static security model to analyze a group of development code sets for an application to detect threat objects. The processor determines that a number of threat objects in each development code set is lower than a threshold. The processor further executes a run-time security model to analyze the combined code sets to determine a set of threat object measurements of application product releases for the application. The processor generates a set of threat change ratios per application based on a first threat object measurement and the threat object measurements after the first threat object measurement. The processor determines threat change patterns of the threat change ratios associated with the application product releases for the application. The processor determines whether to trigger a development security model for the application.
A system includes a memory and a processor configured to receive a request to process a primary mainframe job and extract information related to the primary mainframe job, wherein the extracted information includes one or more of data files, file attributes and database tables needed to process the primary mainframe job. The processor detects that one or more of the files, the file attributes and the database tables is unavailable, and in response, places the primary mainframe job on hold. The processor monitors availability of the one or more unavailable files, file attributes or database tables and in response to detecting that the one or more unavailable files, file attributes or database tables is available, processes the primary mainframe job.
Systems, computer program products, and methods are described herein for virtualization of non-fungible tokens. The present invention is configured to receive, via a first user input device, a resource transfer request using a virtual token from a first user, wherein the virtual token is electronically linked to an NFT of a resource transfer instrument; retrieve the NFT associated with the resource transfer instrument in response to receiving the resource transfer request; retrieve an NFT credential descriptor for the resource transfer request from a first metadata layer of the NFT associated with the resource transfer instrument; receive an authentication credential from the first user; determine whether the authentication credential matches an NFT credential descriptor that is electronically linked to the NFT associated with the resource transfer instrument; and authorize the resource transfer request based on at least determining that the authentication credential matches an NFT credential descriptor.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
8.
Detecting and mitigating application security threats based on quantitative analysis
A system for detecting and mitigating application security threats comprises a processor associated with a server. The processor analyzes a group of code sets of an application and determines a number of the threat objects in each code set. The processor further executes a run-time security model to analyze a combined code sets to determine threat object measurements and false positive measurements of application product releases for the application. The processor determines threat threshold ratios and false positive ratios per application. The processor further generates an array of quartile weights corresponding to a set of quartile ranges of the threat threshold ratios and a set of quartile ranges of the false positive ratios associated with the application. The processor generates an adjusted object measurement for the application based on a corresponding quartile weight in the array. The processor determines whether to trigger a development security model for the application.
Aspects of the disclosure relate to intelligently storing data in a fault tolerant system using robotic process automation and blockchain. The computing platform may generate a parent table to store a plurality of data points, wherein the parent table may comprise, for each data point of a plurality of data points, a row number, a row hash number, row hash nodes, a commit number, and/or commit nodes. The computing platform may identify relationships between the data points, and may generate a row hash node ledger and a commit node ledger to link the row hash nodes and the commit nodes to illustrate the relationships. The computing platform may receive a request to modify and/or restore the parent table. The computing platform may, based on determining an enterprise organization computing device is authorized to modify and/or restore the parent table, modify the ledgers to reflect changes to the parent table.
Methods are provided to secure a mutual Transport Layer Security (TLS) verification between a client computer and a server computer, using an authorized viewer. Methods may include intercepting a file at the authorized viewer. Methods may include using a content inspection Artificial Intelligence (AI) module to inspect the data. Methods may include preventing the transmission of malicious data to a server computer.
There is much data that is currently not being captured during user interaction with mobile apps that could provide insight into how to effectively address a user concern. Capturing such data may allow auto-adjustments of operational responses provided by mobile apps in response to detecting anomalous user inputs. Such anomalous user inputs may include keyboard dynamics or mobile device movement that deviate from an average or user specific levels. Such anomalous user inputs may indicate that a user concern is particularly urgent. Auto-adjustments to operation of a mobile app may include initiating targeted chatbot or live chat responses.
H04L 51/02 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel en utilisant des réactions automatiques ou la délégation par l’utilisateur, p.ex. des réponses automatiques ou des messages générés par un agent conversationnel
H04L 51/234 - Surveillance ou traitement des messages pour le suivi des messages
12.
System and method for integrating real-world interactions within a metaverse
A system for integrating real-world interactions within a virtual environment comprises a processor associated with a server. The processor receives a request with a first user data from a user device to conduct a first interaction in a real-world environment. The processor processes a user profile and the first user data to generate a virtual meeting area with an entity avatar associated with an entity device. The processor sends a first mobile deep link to the user device to grant access to the virtual meeting area. The processor conducts a second interaction between the user device and the entity avatar in the virtual meeting area and obtains a second user data from the user device. The processor processes the user profile and the second user data to generate contextual objects on a display of the user device. The processor renders the contextual objects into an application profile.
H04L 67/131 - Protocoles pour jeux, simulations en réseau ou réalité virtuelle
G06F 3/04815 - Interaction s’effectuant dans un environnement basé sur des métaphores ou des objets avec un affichage tridimensionnel, p.ex. modification du point de vue de l’utilisateur par rapport à l’environnement ou l’objet
H04L 65/403 - Dispositions pour la communication multipartite, p.ex. pour les conférences
13.
SYSTEM AND METHOD FOR MONITORING AND MANAGING SHARED RIGHTS IN RESOURCE UNITS
Embodiments of the present invention provide a system for monitoring and managing shared rights in resource units. In particular, the system may be configured to determine that a first user is initiating a first request to acquire shared rights in a resource, extract and display one or more fractional digital tokens associated with the resource, wherein the one or more fractional digital tokens are digital tokens stored on a distributed register, receive a selection of a first fractional digital token from the first user, extract and display a first security associated with the first fractional digital token, receive an input from the first user to acquire the first fractional digital token, and transfer the first fractional digital token to the first user.
Methods for enhancing compatibility of a document of an entity with an organization's database on a computer server to facilitate detection of a fraudulent submission. Methods may include receiving a populated document in a first format from the entity, using a processor to digitize the document into a digital format, such as bytes, and further into a second format, where the first format may not be compatible with the database and the second format may be compatible with the database. Methods may include using the processor, optionally running a statistical model, to determine an entity identifier, a predicted value of a data field in the document, and whether there is a difference between the value in the predicted data field and a corresponding value in the populated document. Methods may include implementing a corrective action, such as raising a fraud alert at the organization, when there is a difference.
Aspects of the disclosure relate to providing and maintaining efficient and effective processing of sets of work items in enterprise computing environments by optimizing distributed and parallelized batch data processing. A computing platform may initialize a monitoring process configured to monitor a pending workload in a work queue database. Subsequently, the computing platform may cause the monitoring process to query the work queue database and create one or more historical records indicative of a workload processing status associated with one or more processing workers. Then, the computing platform may identify one or more new parameter values for one or more processing parameters associated with the one or more processing workers based on the one or more historical records. Thereafter, the computing platform may configure the one or more processing workers based on the one or more new parameter values identified for the one or more processing parameters.
A system includes a memory and a processor. The memory stores a set of videos each of which is associated with an application of a set of applications and depicts a process performed using the application. For each video, the processor generates metadata associated with the depicted process, and stores the metadata within a collection of metadata in the memory. The processor receives a request for information from a user. In response, the processor identifies an application of the set of applications for use in generating a response to the request. The processor generates, based on the collection of metadata, instructions for interfacing with the first application to generate the response. The processor executes the instructions to interface with the first application to generate the response, and transmits the response to the user.
H04N 21/472 - Interface pour utilisateurs finaux pour la requête de contenu, de données additionnelles ou de services; Interface pour utilisateurs finaux pour l'interaction avec le contenu, p.ex. pour la réservation de contenu ou la mise en place de rappels, pour la requête de notification d'événement ou pour la transformation de contenus affichés
H04L 51/02 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel en utilisant des réactions automatiques ou la délégation par l’utilisateur, p.ex. des réponses automatiques ou des messages générés par un agent conversationnel
H04L 67/63 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises en acheminant une demande de service en fonction du contenu ou du contexte de la demande
H04N 21/443 - Procédés de système d'exploitation, p.ex. démarrage d'un boîtier décodeur STB, implémentation d'une machine virtuelle Java dans un boîtier décodeur STB ou gestion d'énergie dans un boîtier décodeur STB
17.
System, method and graphical user interface for providing a self-service application within a metaverse
A system for providing a self-service application within a virtual environment comprises a processor associated with a server. The processor receives a request with a first user data from a user device to conduct a first interaction in a real-world environment. The processor processes a user profile and the first user data to generate a virtual meeting area with an entity avatar associated with an entity device. The processor sends a first mobile deep link to the user device to grant access to the virtual meeting area. The processor generates a graphical user interface (GUI) to conduct the second interaction. The processor integrates a first video stream from the user device and a second video stream associated with the entity avatar on the GUI. The processor obtains a second user data from the first video stream and generate contextual objects. The processor renders the contextual objects into an application profile.
G06F 3/04815 - Interaction s’effectuant dans un environnement basé sur des métaphores ou des objets avec un affichage tridimensionnel, p.ex. modification du point de vue de l’utilisateur par rapport à l’environnement ou l’objet
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
Apparatus and methods for using deepfakes defensively to detect fake, spoofed, and hoax phone calls and videoconferences are provided. A program may record a target individual reciting exemplary phrases. The program may analyze the recordings to create a baseline. The program may use deepfake algorithms to create exemplar deepfake audiovisual representations of the target individual. The program may store the data in a database. The program may analyze, in real-time, a phone call or videoconference to determine whether they are legitimate or illegitimate by comparing the audio or audiovisual contents of the phone call or videoconference with the exemplar deepfakes. When the program determines the phone call or videoconference is illegitimate, the program may terminate the call or videoconference and inform the recipient and others.
H04M 3/436 - Dispositions pour intercepter des appels entrants
G10L 25/27 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes caractérisées par la technique d’analyse
G10L 25/51 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes spécialement adaptées pour un usage particulier pour comparaison ou différentiation
19.
SYSTEM AND METHOD FOR MONITORING AND MANAGING SHARED UTLIZATION OF RESOURCE UNITS
Embodiments of the present invention provide a system for monitoring and managing shared utilization of resource units. In particular, the system may be configured to receive an input from a user to create a primary digital token for a physical resource on a distributed register, in response to receiving the input, create the primary digital token and store the primary digital token on the distributed register, identify one or more parts of the physical resource, create fractional digital tokens for each of the one or more parts and store the fractional digital token on the distributed register, link each of the fractional digital tokens to the primary digital token, and allow at least one other user to acquire the fractional digital tokens.
Systems, computer program products, and methods are described herein for developers to initiate development operations from within a development environment of a user application. This can also be extendable dynamically for different user groups (e.g., testers, support, internal associates or employees, or the like), and environments (e.g., lower-level environments, production environments, or the like). As such, the invention offers a dynamic debug mode feature for virtual assistants based on different sections of users and environments.
Systems, computer program products, and methods are described herein for tracking and logging resource transfers in a distributed network. The present invention is configured to generate a distributed ledger associated with a resource identifier; receive a resource transfer associated with the resource identifier, the resource transfer comprising a resource transfer between a sender account and a recipient account; update the distributed ledger based on the resource transfer; and generate a resource token based on the distributed ledger.
Systems, methods, and computer program products are provided herein for hyperspectral imaging based authentication. An example method includes receiving check data associated with at least a first user and extracting one or more field details from the check data. By leveraging a hyperspectral imaging module, the method further includes generating hyperspectral image data associated with the one or more extracted field details and determining one or more spectral characteristics associated with the one or more extracted field details based on the hyperspectral image data. The method further includes determining a tampering indication for the check data based on the one or more spectral characteristics. The spectral characteristics may include one or more reflectance values associated with extracted field details across a plurality of spectral bands.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06V 10/44 - Extraction de caractéristiques locales par analyse des parties du motif, p.ex. par détection d’arêtes, de contours, de boucles, d’angles, de barres ou d’intersections; Analyse de connectivité, p.ex. de composantes connectées
G06V 10/60 - Extraction de caractéristiques d’images ou de vidéos relative aux propriétés luminescentes, p.ex. utilisant un modèle de réflectance ou d’éclairage
G06V 10/74 - Appariement de motifs d’image ou de vidéo; Mesures de proximité dans les espaces de caractéristiques
23.
SYSTEMS AND METHODS FOR EXTRACTING DISCRETE DATA FROM A DATA UNIT AND MANAGING ACCESS THERETO USING ELECTRONIC DIGITAL CERTIFICATES
Systems, computer program products, and methods are described herein for extracting discrete data from a data unit and managing access thereto using electronic digital certificates. The present invention may be configured to receive data units including content, identify discrete data for each data unit, and determine, for each discrete data, qualifications permitting access to the discrete data. The present invention may be configured to generate electronic digital certificates associated with the discrete data and store the electronic digital certificates on a distributed ledger. The present invention may be configured to generate, on the distributed ledger, smart contracts for managing access to the electronic digital certificates by generating smart contracts permitting access to the electronic digital certificates based on the qualifications. The present invention may be configured to automatically permit and/or prevent, using the smart contracts and based on the distributed ledger, access by applications to discrete data.
G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
24.
SYSTEMS, METHODS, AND APPARATUSES FOR VERIFYING AUTHENTICATION CREDENTIALS IN AN ELECTRONIC NETWORK
Systems, computer program products, and methods are described herein for verifying authentication credentials in an electronic network. The present invention is configured to receive a first IP address associated with a first access attempt; determine a first geolocation data based on the first IP address; receive a second IP address associated with a second access attempt; determine a second geolocation data based on the second IP address; determine a geolocation variance between the first and the second geolocation data; determine, based on the geolocation variance, an indication of potential movement between the access attempts; apply, based on the indication of potential movement, a verification machine learning model to the account identifier; generate, by the verification machine learning model, a privacy score; and generate, based on the privacy score, an alert user interface component to configure a GUI of a device associated with the user of the account.
SYSTEMS, METHODS, AND APPARATUSES FOR IDENTIFYING UNAUTHORIZED USE OF A USER'S AUTHENTICATION CREDENTIALS TO AN ELECTRONIC NETWORK BASED ON NON-PUBLIC DATA ACCESS
Systems, computer program products, and methods are described herein for identifying unauthorized use of a user's authentication credentials to an electronic network based on non-public data access. The present invention is configured to receive a verified access attempt at a first time for a user account; receive an unverified access attempt at a second time for the user account; determine the unverified access attempt is a credential sharing event for the user account; determine the user account is an internal account; determine an unverified user associated with the unverified access attempt is an external user; receive unverified account access logs associated with the unverified access attempt, the unverified account access logs comprising access to non-public data; and generate an unverified data access interface component to configure a graphical user interface of a device associated with a manager of the system.
A system receives an audio-video recording that includes image frames. For each image frame, a portion of the image frame is identified that corresponds to a first face of a first subject. An image region is determined for the identified portion of the image frame. A first face portion of the audio-video recording is stored that corresponds to the determined image region for each of the image frames along with a private key for the audio-video recording and a first mask identifier for the first subject. A public key is generated for the private key. A remaining portion of the audio-video recording is associated with the generated public key and the first mask identifier for the first subject. The remaining portion, the public key, and the first mask identifier are provided to a media server that communicates with a media player.
G06F 21/10 - Protection de programmes ou contenus distribués, p.ex. vente ou concession de licence de matériel soumis à droit de reproduction
G06V 40/16 - Visages humains, p.ex. parties du visage, croquis ou expressions
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04N 21/431 - Génération d'interfaces visuelles; Rendu de contenu ou données additionnelles
H04N 21/433 - Opération de stockage de contenu, p.ex. opération de stockage en réponse à une requête de pause ou opérations de cache
27.
Finger tracking to write on or correct mistakes on physical documents
Systems and methods for transferring data via a finger tracking smart device from a first user interface (“UI”) to a second UI is provided. The data transferred may be documentation data, including signatures and corrections. The finger tracking smart device may include one or more smart lenses. Methods may include triggering a tracking of the movement of the user's fingers on the first UI and further tracking a start point and an end point of the movement of the user's fingers based on detection of deliberate movements and gestures. Methods may further include capturing a segment of data within the start point of movement and the end point of movement and storing the segment of data in memory on the finger tracking smart device. Methods may further include updating the second UI based on an instruction in a data packet transmitted to the second UI, by inputting the segment of data at a point of movement of the user's fingers on the second UI.
Embodiments of the present invention provide a system for dynamically configuring graphical user interface based on tracking response to interface components. The system is configured for determining that a user has accessed an entity application via a user device, presenting a graphical user interface associated with the entity application to the user on the user device, wherein the graphical user interface comprises one or more interface components, monitoring and capturing response of the user via the user device based on presenting the graphical user interface, gauging the response of the user via an artificial intelligence engine, and dynamically configuring the graphical user interface based on gauging the response of the user.
G06F 3/04845 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs pour la transformation d’images, p.ex. glissement, rotation, agrandissement ou changement de couleur
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p.ex. des interruptions ou des opérations d'entrée–sortie
29.
SYSTEM AND METHOD FOR CONTROLLING RESOURCES USING PARALLEL COMPUTING DEVICES
A system is provided for controlling resources using parallel computing devices. In particular, the system may comprise one or more applications installed across one or more computing devices, where the one or more applications may be configured to control resource transfers. Certain applications may be configured such that one application, such as a primary application, may implement one or more controls or restrictions on resource transfers that may be executed by another application, or a secondary application. The primary application may further be configured to monitor the secondary application to retrieve various types of data from the secondary application, such as resource transfer metrics data. The system may be configured to, based on the data associated with the secondary application, generate one or more resource-related projections with respect to the secondary application. In this way, the system provides an efficient way to control resource transfers across parallel computing devices.
Systems, computer program products, and methods are described herein for script-based querying and aggregation of endpoint data via a directory access protocol. The present invention is configured to deploy a directory access protocol executor to a plurality of endpoint devices, determine an operating system for at least one of the plurality of endpoint devices, select a script to execute at the plurality of endpoint devices, and execute the script via the directory access protocol executor, wherein the script is executed as a login script, wherein the script determines a status of endpoint data at the endpoint, and wherein the endpoint data comprises endpoint tools currently available at the endpoint.
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p.ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
31.
Secure data transfer in a virtual environment using blockchain
A system for secure data transfer in a virtual environment receives a request to initiate a virtual interaction session between an avatar and an entity within the virtual environment. The avatar is operated by a user using a user device. The system presents a virtual data reader to the avatar. The virtual data reader comprises a screen to display data. The system receives user input from the user device. The user input includes user information and data object to be transferred to the entity. The user input is transferred from the user input to the virtual data reader. The system receives a security token from the avatar. The system verifies that the user input belongs to the user. The system also determines that the security token is valid. In response, the system transfers the data object to the entity and concludes the virtual interaction session.
Communication, authentication, and/or validation may be required in various types of device interactions. For example, for some types of device functions, user or device authentication may be required to confirm that the function can and should be performed. Authentication information may be communicated and authentication and/or validation may be performed using LoRaWAN signaling. LoRaWAN signaling provides low power and long-range communication capabilities to efficiently and effectively perform authentication processes. In some arrangements, LoRaWAN signals may be generated by both a first device (e.g., a user device) and a second device (e.g., a function-performing device) and subsequently compared to determine whether they correspond. This correspondence may provide the requisite authentication or validation of the first device and/or an associated user.
Transactions may be performed using a mobile device such as a user-wearable device using LoRaWAN protocol to minimize power consumption while maximizing communication range. Transaction information may be stored in the user-wearable device and transmitted to a transaction processing device using LoRaWAN communications. Transaction information may include user-specific information, payment information, merchant information, product information, user preference information and the like. In some instances, the only communication interface (or wireless communication interface) provided in the mobile device is a LoRaWAN communication interface.
Device information may be obtained using LoRaWAN communications. A device information request may be generated and transmitted by a user device and include request parameters such as a device type for which information is desired, a type of information requested, a geographic range for the request, and the like and/or combinations thereof. Device information requests may also be propagated or repeated by intermediary devices to achieve the desired request range. Accordingly, a recipient device of the original request may propagate or repeat, using LoRaWAN, a request signal if it determines that the request range has not been met. If the request range has been met, the recipient device might not repeat the request.
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
Systems, computer program products, and methods are described herein for generating and training a module selection engine for distribution allocation in a network environment. The present invention is configured to receive a subordinate user account identifier associated with a subordinate user account; determine a supervisor user account identifier associated with the subordinate user account identifier; apply a module selection engine to the subordinate user account identifier, wherein the module selection engine determines a plurality of modules to present to the subordinate user based on the subordinate user account identifier; generate, by the module selection engine, a plurality of module interface components; transmit the plurality of module interface components to a user device associated with the subordinate user account; and determine a plurality of module completion statuses for each module of the plurality of module interface components.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
H04L 67/12 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p.ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance
36.
System and method for pre-authenticating user devices within a metaverse
A system for pre-authenticating a user device to navigate through virtual operation areas comprises a processor associated with a server. The processor accesses a virtual environment and receives an interaction request from the user device for an interaction session. The processor determines a set of virtual operation areas in a virtual environment based on the interaction request. The processor generates a corresponding meta-profile associated with a user profile by mapping each pre-authentication token associated with the user device from a corresponding physical location to a corresponding virtual operation area. The processor generates an avatar associated with the user device and associates the avatar to the meta-profile and a set of pre-authentication tokens for the avatar to access the virtual operation areas. The processor identifies a first pre-authentication token associated with the user device and a first level virtual operation area and dynamically grants a first level authentication to the avatar.
Transactions between entities may be validated using LoRaWAN communications to more quickly process those transactions. In the example of check depositing, a first entity associated with a check payee may transmit a check clearance request to a second entity associated with a check payor using LoRaWAN communications. The LoRaWAN signaling and communications may be performed between devices within LoRaWAN range. For example, a check depositing device may receive a check deposit where the payor is associated with a different financial institution or entity. Accordingly, the check depositing device may communicate with another device associated with the payor institution or entity using LoRaWAN signals to confirm check clearance.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
38.
PLATFORM FOR GENERATING PUBLISHED REPORTS USING REPORT AND WORKSHEET BUILDING WITH POSITION MAPPING IDENTIFICATION
Systems, computer program products, and methods are described herein for providing a platform for generating published reports using report and worksheet building with position mapping identification. The present invention is configured to establish a reporting and analytics platform for a user interface and receive, from the user interface, a single-selection input referencing a set of system identification values associated with a first set of data in the reporting and analytics platform. The system may then display a plurality of formatting options for the set of system identification values on the user interface. The system can assign a selected formatting option to the system identification values and apply the selected formatting option to the first set of data in the reporting and analytics platform. The selected formatting options can be applied to additional sets of data based on system identification values.
Systems, computer program products, and methods are described herein for dynamically tracking resources using non-fungible tokens. The present invention is configured to electronically receive, over a distributed computing network from a computing device of a user, a request for a non-fungible token (NFT) for a resource, wherein the resource is a physical object; initiate a non-fungible token (NFT) generator on the resource in response to receiving the request; extract resource information from the resource; generate, using the NFT generator, the NFT, wherein the NFT comprises at least the resource information; and record the NFT for the resource on a distributed ledger.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
A system is provided for automatically generating electronic artifacts using extended functionality. In particular, the system may use a template-based process to automatically generate artifacts based on a defined set of parameters and/or variables. The system may further use one or more plugins which may provide extended functionality with respect to the artifact generation process. Accordingly, the artifact generation process may include initializing a parameter list based on application parameters and/or plugin parameters, processing the parameters, generating variables based on the parameters, and replacing variables in scheme template files with appropriate values (e.g., user supplied or plugin generated values) to output an artifact file to a predetermined location. In this way, the system provides a robust and efficient way to automatically generate artifacts.
Embodiments of the invention are directed to systems, methods, and computer program products for enhanced secure resource transmissions based on image capture via a resource processing terminal device. The invention provides a secure platform for transformation and structuring of resource data at a resource instrument device, and authentication of resource data, prior to initiation of a resource activity at the resource processing terminal device. Specifically, the invention is structured to construct an authorized credential element for processing of a resource activity at a first time interval prior to initiation of the resource activity. The invention is structured to execute a first resource processing activity at a subsequent time interval using the first authorized credential element, upon determining that the authorized credential element is compatible with the activity, and that the authorized credential element is pre-authenticated.
A system for detecting phishing websites accesses a website that comprises a plurality of images. The system extracts the plurality of images from the website. The system generates a hash value for each image from the plurality of images. Each hash value uniquely identifies its corresponding image. The system generates a first overall hash value for the website by hashing the generated hash values. The first overall hash value represents a signature of the website. The system compares the first overall hash value with a second overall hash value that is associated with a phishing website. The system determines whether the first overall hash value corresponds to the second overall hash value. If it is determined that the first overall hash value corresponds to the second overall hash value, the system determines that the website is associated with the phishing website.
A system for provisioning secured access to devices determines a location of a virtual environment in a virtual environment. The prevents access requests to the location where the virtual device is located. The system assigns a first security token to the virtual device. The system receives a request to access the virtual device, where the request is received from an avatar. The system receives a second security token to grant access to the virtual device. The system compares the first security token with the second security token. The system determines whether the second security token corresponds to the first security token. If it is determined that the second security token corresponds to the first security token, the system grants the avatar access to the virtual device. Otherwise, the system denies the avatar access to the virtual device and transmits a locking signal to the virtual device.
A system is provided for partitioning digital resources using a networked resource platform. In particular, the system may generate digital resources using a customized set of executable code such that each digital resource may comprise one or more digital resource partitions. Each digital resource share may be associated with a cryptographic address. Upon receiving a request from a user to transfer the digital resource partitions, the system may execute various validation checks on the cryptographic address and the digital resource before executing the transfer. In this way, the system provides an efficient way to partition and transfer digital resources.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Systems, computer program products, and methods are described herein for generating and authenticating use of a voucher associated with a resource in a distributed network. A distribution authentication system, like that described herein, is configured to generate a resource voucher based on a resource distribution from a transferor account to a recipient account, the resource voucher comprising an expiration period; receive a request for a voucher distribution; and authenticate, in response to receiving the request for the voucher distribution, whether the voucher distribution has met the expiration period, wherein, in the instance where the voucher distribution has met the expiration period, automatically redistribute the resource distribution to the transferor account.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
46.
SYSTEM AND METHOD FOR DATA ANALYSIS AND PROCESSING USING GRAPHICAL USER INTERFACE POSITION MAPPING IDENTIFICATION
Systems, computer program products, and methods are described herein for providing data analysis and processing using graphical user interface position mapping identification is provided. The method includes receiving a plurality of data packets from a plurality of data sources. The data packets contain one or more data metrics associated with an entity. The method also includes causing a rendering of a user interface that presents one or more selectable icons for selecting data to use from the plurality of data packets. The method further includes receiving one or more user selections of the one or more selectable icons. The one or more user selections indicate one or more of the plurality of data sources to use for a generation of a report. The method further includes generating the report based on one of more of the plurality of data packets from the selected data sources of the plurality of data sources. The method also includes causing a rendering relating to the report based on the generated report to the user interface.
An intelligent system for resource exchange event verification/authentication based on a comparison between the known Subscriber Identity Module (SIM) card features and the real-time extracted SIM card features. SIM card features are initially extracted from the SIM card of a user's mobile communication device and stored in a SIM card feature file that is associated with the user's mobile communication device. Subsequently, when the mobile communication device initiates a resource exchange event, the current SIM card features are extracted from the SIM card currently residing in the mobile communication device and compared to those SIM card features in the SIM card feature file. The comparison is an intelligent comparison that takes into account, normal changes that may have occurred between the generation of the SIM card feature file and time of the resource exchange event. If the comparison results in no abnormal changes, the resource exchange event is deemed to verified/authenticated and further processing may ensue.
A Subscriber Identity Module (SIM) card feature-based Non-Fungible Token. SIM card features, such as communication features, software/hardware features, electrical features, SIM Card behavior features and/or the like are extracted from the SIM card of a user's mobile communication device and a SIM card feature-based NFT is generated and stored on a distributed trust computing network. The distributed trust computing network serves to verify the authenticity of the underlying SIM card features. The NFT is subsequently used as a means for authentication is resource exchange events and other events requiring user/mobile communication device verification.
Systems, computer program products, and methods are described herein for real-time adjustment of resource allocation based on usage mapping via an artificial intelligence engine. The present invention is configured to receive a data transmission from a plurality of user devices, wherein the data transmission comprises resource usage data and user data; receive, from a plurality of distributed computing systems, resource allocation data; convert the resource allocation data and resource usage data to a standardized format; generate, via an artificial intelligence engine, a predicted networked interaction and a success score associated with the networked interaction; determine that the success score is above a predetermined threshold value; automatically generate a message identifying the networked interaction; and transmit the message in real time to at least one distributed computing system of the plurality of distributed computing systems, wherein the at least one distributed computing system is associated with the networked interaction.
Computer-implemented cyber-security, behavior-generated, event-type signed processes and machines provide for authentication and immutable transactions to overcome security risks. Clients submit requests for an immutable transactions and interactions responsive to the request are sent by the server to the client. The server generates behavioral expectations for the interactions, stores them for future comparison purposes, and transmits those to the client. The client executes user events for the interactions. The client behaviorally analyzes the user events and generates behavioral vectors corresponding to the user events. Intermediate client hashes that culminate in a final client hash are generated. User events are sent to the server. The server generates a server hash based on the behavioral expectations and the user events. The server compares the final client hash to the server hash to determine if the transaction is authentic and should be stored as immutable.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
51.
SYSTEM AND METHOD FOR PROCESSING OF EVENT DATA REAL TIME IN AN ELECTRONIC COMMUNICATION VIA AN ARTIFICIAL INTELLIGENCE ENGINE
Systems, computer program products, and methods are described herein for processing of event data real time in an electronic communication via an artificial intelligence engine. The present invention is configured to electronically receive an electronic communication from a user to an entity, identify event data associated with the user, identify an inflection level and a language attribution level from the electronic communication by processing the electronic communication with an input recognition engine, form a categorization level by categorizing the electronic communication comprising the inflection level and the language attribution level using an artificial intelligence engine, and route the electronic communication to a designated group containing users associated with the entity and/or an artificial intelligence-based dialogue resolution.
Systems, computer program products, and methods are described herein for dynamically generating linked security tests. The present invention may be configured to perform security tests on an application, generate, based on the results of the security tests, security test sequences that include at least one security test that the application failed, perform the security test sequences on the application, and, iteratively and until the application passes each security test sequence in an iteration, generate additional security test sequences. The present invention may be further configured to provide results of the security tests and security test sequences to one or more machine learning models to generate supplementary security test sequences and determine probabilities of the application failing the supplementary security test sequences.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 11/36 - Prévention d'erreurs en effectuant des tests ou par débogage de logiciel
A system for communicating email messages using tokens receives a request to send an email message to a receiver. The email message is associated with a sender's email address. The system determines whether the sender's email address is associated with a token from a plurality of tokens stored in a token-email address mapping table. The system generates a particular token for the sender's email address in response to determining that the sender's email address is not associated with a token, where the particular token uniquely identifies the sender's email address. The system sends the email message using the particular token instead of the sender's email address, such that the sender's email address remains anonymous from the perspective of the receiver.
Arrangements for generating and using client-side generated one-time passcodes (OTP) for transaction processing are provided. A request to register a user and/or user computing device for client-side OTP processing may be received. A request to register a merchant for client-side OTP processing may also be received and, in respond, a unique access key unique to the merchant may be generated and transmitted to one or more devices. A request to process a transaction may be received and may include the unique access key, transaction details, and user device data. The request may be analyzed to determine whether one or more criteria are met. If so, client-side OTP functions may be enabled. If not, client-side OTP functions might not be enabled and, instead, a request for additional authentication data may be generated and transmitted to the user computing device for display.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
Apparatus and methods for dynamically controlling application of a graphic processing unit (“GPU”) based on the current processing needs is described. A number of objects in each image may be detected. A machine learning model may be utilized to detect and classify objects in each image. Based on the number of detected objects, the GPU could be switched on to provide increased image processing performance. Dynamically turning the GPU on/off may reduce power consumption. When the GPU is turned off, a central processing unit (“CPU”) may be used to perform image processing.
G07F 19/00 - Systèmes bancaires complets; Dispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p.ex. guichets automatiques
Systems, computer program products, and methods are described herein for providing data analysis and processing using identification tagging of information on a graphical user interface. The method includes identifying a data point within a data rendering to a graphical user interface. The method also includes generating a point identification indicator for the given data point within the data rendering to the graphical user interface. The method includes receiving a user input associated with the data point within the data rendering to the graphical user interface. The user input includes a user commentary associated with the data associated with the data point within the data rendering to the graphical user interface. The method further includes associating the user input with the data point using the point identification indicator. The user input is associated with the data point within the data rendering to the graphical user interface via the point identification indicator.
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06F 40/117 - Mise en forme, c. à d. modification de l’apparence des documents Étiquetage; Annotation ; Désignation de bloc; Choix des attributs
G06F 40/18 - Traitement de texte Édition, p.ex. insertion ou suppression utilisant des lignes réglées de tableurs
57.
DIGITAL TWIN BASED EVALUATION, PREDICTION, AND FORECASTING FOR AGRICULTURAL PRODUCTS
Aspects of the disclosure relate to digital twin simulation. A computing platform may receive historical information. The computing platform may train, using the historical information, a digital twin model, configured to identify agricultural information based on input of a query requesting the agricultural information. The computing platform may receive, from a user device, a query requesting the agricultural information. The computing platform may input, into the digital twin model, the query, to output the agricultural information based on the historical information and the relationships between the feature models. The computing platform may direct a vendor computing system to execute actions based on the agricultural information, which may cause the vendor computing system to execute the one or more actions.
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
58.
Multi-Computer System for Maintaining Application Programming Interface Stability with Shared Computing Infrastructure
Arrangements for providing API stability functions are provided. In some aspects, call logs may be received and analyzed to identify a provider associated with each API call. Based on the provider, the call logs may be split into one or more provider-specific sub-logs. The provider-specific sub-logs may be analyzed to identify failed API calls and the sub-logs having failed API calls may be encrypted using a provider-specific encryption key. The encrypted data may be written to a blockchain where the provider may decrypt the data using the provider-specific key and identify and execute one or more corrective actions. Once a cause of the API call failure has been addressed, an indication of the correction may be received and displayed.
Systems, devices, and methods for improving neural network operations and accuracy are described. In an arrangement, the neural network may be applied for classifying input data to human-assigned labels. Training data being fed for training the neural network may be categorized in clusters (e.g., using a clustering algorithm). Training data and corresponding cluster identifiers may be used as test input and expected test output for the neural network, respectively. Neural network output from output nodes may then be mapped to the human-assigned labels.
36 - Services financiers, assurances et affaires immobilières
Produits et services
Establishment and administration of employee benefits plans; consultation services and the advising of employees in the field of employee benefits concerning insurance and finance; financial retirement plan consulting services; employee benefits consulting services; processing, administering and managing integrated employee benefit plans concerning insurance and finance, namely, defined contribution plans, health savings accounts, equity compensation plans, employee banking and investing plans and executive benefit service plans
61.
HYBRID METAVERSE USING EDGE NODES TO SUPPORT A SOFT REPOSITORY FOR EVENT PROCESSING
Aspects of the disclosure relate to a hybrid metaverse environment. A computing platform may synchronize, using edge nodes and with a physical repository server, a soft document repository. The computing platform may receive, via a metaverse application interface, an event processing request. The computing platform may identify, based on the event processing request and using a machine learning model, documents needed to execute the event processing request. The computing platform may update a request queue to identify the event processing request and the documents. The computing platform may access, using an edge node and via the soft document repository, the physical repository server to obtain document images corresponding to the identified documents, and may update a response queue to include the obtained document images. The computing platform may send, to an enterprise user device, a haptic alert indicating that the event processing request is ready for processing.
This application describes a security framework that allows a data payload transmitted on a network to be validated locally by any node on the network. A node that first receives the data payload may validate the information included in the data payload and generate a digital certificate based on the information. Each node that receives the data payload from the originating node may validate the digital signature using a locally accessible cryptographic key. The framework may support multiple security tiers by configuring nodes to mask information included in a data payload before transmitting the requested data payload to another node.
Systems, methods, and apparatus are provided for expedited e-check processing via a universal clearance platform. In response to e-check initiation, a captured biometric marker may be uploaded to the clearance platform along with the e-check data. The platform may mint the biometric marker and e-check data as NFTs. The platform may insert the NFTs as a key-value pair in an integrated DHT. The biometric marker may be the key and the e-check data may be stored as the corresponding value. The platform may validate the key against previously captured biometric information and map the validated key to the corresponding value via an overlay network associated with the DHT. The platform may validate the retrieved e-check data against a previously captured transaction history to clear the e-check. In response to e-check clearance, the platform may route the e-check data to the ACH network to complete the transfer.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
Aspects of the disclosure relate an IoT authentication system to strengthen and streamline authentication for transaction processing for users. A transaction computing platform using artificial intelligence may receive from a plurality of IoT devices information regarding interactions with a user. In some arrangements, transaction computing platform may generate constellations based on the received information. A trust status may be determined based on the generated constellations. Transaction authentication may be based at least in part on the determined trust status. In some embodiments, real-time updates of trust status along with transaction alerts may be provided to IoT devices.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Aspects of the disclosure relate an IoT authentication system to strengthen and streamline authentication for transaction processing for users. A transaction computing platform using artificial intelligence may receive from a plurality of IoT devices information regarding interactions with a user. In some arrangements, transaction computing platform may generate constellations based on the received information. A trust status may be determined based on the generated constellations. Transaction authentication may be based at least in part on the determined trust status. In some embodiments, real-time updates of trust status along with transaction alerts may be provided to IoT devices.
Systems, computer program products, and methods are described herein for identification of obfuscated electronic data through placeholder indicators. The present invention is configured to electronically receive, from a computing device of a user, a request to obfuscate one or more data artifacts stored on a first database; retrieve, from a data obfuscation repository, one or more data obfuscation algorithms; implement the one or more data obfuscation algorithms on the one or more data artifacts; generate one or more placeholder indicators identifying the one or more data obfuscation algorithms implemented on the one or more data artifacts; create one or more data fields corresponding to the one or more masked data artifacts on the first database; store the one or more placeholder indicators in the one or more data fields; and update the first database with the one or more masked data artifacts and the one or more placeholder indicators.
A system is provided for monitoring real-time data inputs across multiple channels, determining potential impacts to a network or entity policy taxonomy, and taking one or more automated, responsive actions based on determined impacts. In this way, the system described herein is able to optimize system processes and system protections on an enterprise-wide scale in response to current events, policy or regulation changes, or predicted measures taken by private or public entities that may necessitate adaptation of one or more workflow processes or technology taxonomies, either upstream or downstream of the system itself.
A system is provided for executing wireless resource transfers on a portable computing device using a secure digital token. In particular, in response to receiving a resource transfer request from a user, the system may dynamically generate a customized digital token in real-time based on information such as authentication credentials of the user, geolocation data, timestamps, and the like. The digital token may be validated and stored on a distributed register that may be accessible by an entity associated with the user. Upon validating the digital token, the entity's server may transmit the data needed to execute the resource transfer. In this way, the system may provide a secure and efficient way to execute resource transfers.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Aspects of the disclosure relate an IoT authentication system to strengthen and streamline authentication for transaction processing for users. A transaction computing platform may receive from a plurality of IoT devices information regarding interactions with a user. In some arrangements, transaction computing platform may generate constellations based on the received information. A trust status may be determined based on the generated constellations. Transaction authentication may be based at least in part on the determined trust status. In some embodiments, real-time updates of trust status along with transaction alerts may be provided to IoT devices.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/30 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques
70.
Incremental Image Import Process for Supporting Multiple Upstream Image Repositories
Aspects of the disclosure are directed to importing software container images, where an image importer that may import a very large number of container images into local repositories from one or more upstream repositories to an enterprise container platform. An associated computing cluster executes containers (for example, applications and operators) based on the imported container images. Each release (version) of a product supported by the enterprise container platform may require importing newer image sets with respect to the current version. With one aspect, an image importer maintains an image list for container images of the current version, where only missing newer container images for a newer version are added to the list. Only the missing container images for the new version are imported to the enterprise container platform. This approach circumvents importing previously imported container and/or available newer images, thus reducing the amount of imported data from upstream repositories.
Embodiments of the present invention provide a system for processing and integrating real-time environment instances into virtual reality live streams. The system is configured for determining that a user is accessing a virtual environment, capturing real-time environment instance associated with the virtual environment via one or more capturing devices, creating a neutral environment template based on processing the real-time environment instance, embedding one or more preferential objects associated with the user into the neutral environment template to generate a preferred environment template, and instantaneously integrating the preferred environment template into a virtual reality live stream associated with the virtual environment in real-time.
Methods for building and training a network of chatbots are provided. Methods may perform data analysis on a first chatbot in the network. The first chatbot may include a first domain of intents. The data analysis may identify and rank the intents in the first domain. The first domain may represent answers to a first domain of user queries. Methods may select a predetermined number of highest-ranking intents from the first domain based on the data analysis. Methods may input the selected intents into a second chatbot in the network. The second chatbot may include a second domain of intents. The second domain may represent answers to a second domain of user queries. Methods may input a hook into the second chatbot. The hook may include a trigger word and may correspond to the first domain. When the hook is triggered, the second chatbot may invoke the first chatbot.
H04L 51/02 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel en utilisant des réactions automatiques ou la délégation par l’utilisateur, p.ex. des réponses automatiques ou des messages générés par un agent conversationnel
Embodiments of the invention are directed to a system, method, and computer program product for processing data analytics within memory. The system first receives a request for data associated with a database. The system utilizes a feature catalog and a deep learning neural network to determine the data that comprises the one or more desired features. The system can also provide the requested data to a computing device.
A system comprises a light fidelity (LiFi) device. The LiFi device receives, from a receiving device, a first request to provide confidential data. The LiFi device masks the confidential data and modulates light with masked confidential data. The LiFi device emits the light modulated with the masked confidential data toward the receiving device. The LiFi device receives, from a virtual reality device, a second request to unmask the confidential data. The LiFi device communicates a blockchain data entry to a blockchain network, where the blockchain data entry indicates to determine whether a user is authorized to access unmasked confidential data. In response to the user being authorized, the LiFi device receives a confirmation message that indicates the user is authorized to access the unmasked confidential data. The LiFi device modulates light with the unmasked confidential data and emits the modulated light toward the virtual reality device.
A method enabling processing electronic transactions received at the ATM when network connection with the central server is disrupted. The method may enable processing each electronic transaction received using an alternative data routing pathway. The alternative data routing pathway may leverage one or more edge devices within close proximity to the ATM to serve as a proxy for transmitting data to the central server. The one or more edge devices may be enabled to carry electronic transaction data from electronic transactions processed locally at the ATM to a location where a network connection between the one or more edge devices and the central server may be established. When in a location including network connection, the one or more edge devices may transmit the electronic transaction data to the central server.
Apparatus and methods for providing an indicator of trustworthiness of a software application are provided. A program may receive information regarding the software application from a developer of the application. The program may analyze the application and determine that the application is trustworthy and secure. The program may then create a unique logo that may include various information to indicate to a user that the program has determined the application is trustworthy. The program may transmit the logo to the developer so the developer may incorporate the logo into the application. In an embodiment, the program may transmit the logo to a third-party application store for display on a page where the application is available.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures
77.
ELECTRONIC SYSTEM FOR DYNAMIC ADAPTED SECURITY ANALYSIS OF NETWORK RESOURCE COMPONENTS
Embodiments of the present invention relate to apparatuses, systems, methods and computer program products for dynamic adapted security analysis of network resource components. Specifically, the system is typically structured for providing proactive network security by dynamically analyzing entering network resource components for vulnerabilities, establishing adapted validation thresholds and mitigation actions, and preventing unsuccessfully validated network resource components in a distributed network. In some aspects, in response to determining that a file attribute data element of the first network program resource component is of a predetermined file type, the system blocks the incoming file transfer associated with the first network program resource component. The system subsequently initiates, via a network quarantine component, dynamic validation of the first network program resource component based on at least one or more categorical network program resource component records associated with the dynamic validated network resource library.
Embodiments of the present invention relate to apparatuses, systems, methods and computer program products for a dynamic quarantine engine integration with a validated network resource component library for network security. Specifically, the system typically is structured for real time deconstruction of incoming data and dynamic analysis of deconstructed components, and preventing unsuccessfully validated network resource components in a distributed network. In some aspects, in response to a successful first dynamic deconstructed validation of the first network program resource component, the system constructs a first categorical network program resource component record associated with the first network component at network resource structure database. The system then typically initiates a second dynamic deconstructed validation of the first categorical network program resource component record associated with the first network component.
Systems, computer program products, and methods are described herein for implementing parametric optimization analysis for resource selection. The present invention is configured to determine a first set of requirements associated with a resource exchange agreement; identify one or more non-fungible tokens (NFTs) for one or more categories of past resource exchange agreements based on at least the first set of requirements; extract, from the one or more NFTs, one or more resource descriptors associated with one or more past resource exchange agreements in the one or more categories; predict, using a machine learning subsystem, an optimal resource valuation model for one or more resources that meet the first set of requirements using the one or more resource descriptors and the first set of requirements; and transmit control signals configured to cause a first end-point device to display the optimal resource valuation model.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
G06F 40/40 - Traitement ou traduction du langage naturel
80.
SYSTEM AND METHOD FOR GENERATING A SANDBOX COMPUTING ENVIRONMENT FOR ANALYZING RESOURCE IMPACT
A system is provided for generating a sandbox computing environment for analyzing resource impact. In particular, the system may be configured to display a graphical user interface comprising a virtual environment platform that allows a user to run one or more simulations based on the user's resource position. In this regard, the system may generate a snapshot of a user account associated with a user and execute simulations on the snapshot to provide one or more projections with respect to resources associated with the user account. Each projection may illustrate a potential impact on the resources associated with the user in response to one or more actions or events associated with the resources. In this way, the system provides a secure and efficient way to analyze impacts of actions and/or events on resources.
Apparatus and methods for continuous real-time authentication are provided. The apparatus and methods may include using a biometric sensor on an Internet-of-things (“IoT”) device to measure a biometric attribute of a user. The measured biometric attribute may be transmitted to a server to compare to a stored biometric attribute and authenticate the user. The IoT device may continue to measure the biometric attribute of the user at a pre-determined interval. Each measurement may be used to authenticate the user. This continuous authentication process may take place without the user's conscious interaction with the IoT device. The apparatus and methods may include using the continuous authentication to process and approve a transaction the user requests.
Prevention of voice misappropriation in voice interaction/response systems. The system relies on telemetry data, including thermal data of components to determine whether a received voice command was made by actual voice. If the voice command is determined to have been made by an actual voice, a response to the command is generated and transmitted, otherwise if the voice command is determined to have likely not been made by an actual voice (e.g., artificial means replicating a voice, such as a laser or the like), no response to the command is transmitted or action taken with respect to the command.
H04Q 9/00 - Dispositions dans les systèmes de commande à distance ou de télémétrie pour appeler sélectivement une sous-station à partir d'une station principale, sous-station dans laquelle un appareil recherché est choisi pour appliquer un signal de commande ou
83.
AI-BASED SELECTION USING CASCADED MODEL EXPLANATIONS
Apparatus and methods for harnessing an explainable artificial intelligence system to execute computer-aided feature selection is provided. Methods may receive an AI-based model. The AI-based model may be trained with a plurality of training data elements. The AI-based model may identify a set of features from the training data elements. The AI-based model may execute with respect to a first input. Methods may use a cascade model with integrated gradients to identify a feature importance value for each of the plurality of features included in the training data. Based on the feature importance value identified for each feature, methods may determine a feature importance metric level. Based on the feature importance value identified for each feature, methods may remove features that are assigned a value lower than the feature importance metric level. This removal may be implemented to form a revised AI-based model. Methods may execute the revised AI-based model.
Resource exchange event authentication predicated on user location that is determined from short-range wireless signals transmitted from a card or wearable device in possession of the user. Artificial Intelligence (AI), including Machine Learning (ML) techniques are relied on to determine an authentication rule and/or parameters for an authentication rule as part of the authentication process. Thus, at least a portion of the authentication rules and/or parameters, which may be based not only on the aforementioned determined location of the user, but also on other factors such as time, amount of resource exchange event, type of objects/services being exchanged in the event and the like, are determined intelligently and dynamically at the time that the resource exchange event occurs.
H04W 12/47 - Dispositions de sécurité utilisant des modules d’identité utilisant la communication en champ proche [NFC] ou des modules d’identification par radiofréquence [RFID]
H04W 12/63 - Sécurité dépendant du contexte dépendant de la proximité
Apparatus and methods for using deepfakes defensively to detect fake, spoofed, and hoax accounts and posts on social media and elsewhere are provided. A program may gather verified images or writings of a target individual. The program may analyze the verified images and writings to create a baseline. The program may use deepfake algorithms to create exemplar deepfake images or writings. The program may store the data in a database. The program may search a network for social media accounts or posts that may meet the baseline and determine whether they are legitimate or illegitimate by comparing the contents of the accounts or posts with the exemplar deepfakes. When the program determines the accounts or posts are illegitimate, the program may initiate a takedown of those accounts or posts. The program may use machine learning algorithms to refine itself and become more accurate.
G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
G06V 40/50 - Traitement de données biométriques ou leur maintenance
G06V 40/16 - Visages humains, p.ex. parties du visage, croquis ou expressions
G06V 40/30 - Reconnaissance d’auteur; Lecture et vérification des signatures
86.
ELECTRONIC SECURITY SYSTEM OF NETWORK RESOURCE COMPONENT TRACKING AND ANALYSIS ACROSS A DISTRIBUTED NETWORK AND CONSTRUCTION OF A VALIDATED NETWORK RESOURCE COMPONENT LIBRARY
Embodiments of the present invention relate to apparatuses, systems, methods and computer program products for network resource component tracking and analysis across a distributed network and construction of a dynamic validated network resource library. Specifically, the system is typically structured for constructing an itemized hierarchical network resource structure database having integral granular technology element specific categorical data structures associated with determined plurality of network program resource components, denormalizing for enhancing data retrieval and processing performance, and providing network security by analyzing and validating the security of the composition of plurality of network program resource components, and detecting and remediating vulnerabilities.
Embodiments of the present invention relate to apparatuses, systems, methods and computer program products for security analysis and validation during construction and deployment of dynamic network components. Specifically, the system is typically structured for identifying and remediating defects in a first resource program code being built at an internal network layer of the first distributed network, in real-time, and validating the first resource program code at both a lower deployment environment and a higher deployment environment. In some aspects, the system, in response to the successful first validation of the first resource program code, stores the first resource program code at an artifactory system. In response to a successful second validation, the system then typically allows deployment of the first resource program code to the lower deployment environment. In response to a successful third validation, the system may initiate deployment of the first resource program code to the higher deployment environment.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
Systems that aid in application development, in particular, to the use of a resource ontology system that includes an interconnected map that links resources that interact with each other, as well as the individual components of the resources. The resource ontology system further stores the authentication of the resources, including if the resources are validated for use within application development, as well as whether or not the resources meet or fail to meet other resource requirements. The resource ontology system allows a user developing an application to access resources for use in the application development, which are trusted resources, and allows the organization to aid in standardizing and optimizing the use of resources that users may use in developing applications. Furthermore, the resource ontology system allows the user to more easily access and use secondary resources that are linked with resources already used by the user for application development.
An artificial intelligence (AI) and machine learning (ML) (collectively “AI/ML”) system that provides dynamic detection of potential of resource updates, authentication of the resources updates, and tracking of the links between resources through the use of resource signatures. The resource signatures may provide an indication of the application information, the resources that are accessed by the application, and the resources that access the application. As such, the AI/ML system can monitor and track the applications and updated resources that interact with the applications in order to identify any potential security issues, as well as to optimize and standardize the use of resources by the users when developing applications.
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
90.
SYSTEMS AND METHODS FOR IDENTIFYING AND VERIFYING SOFTWARE COMPONENT STORAGE LOCATIONS IN A NETWORK ENVIRONMENT
Systems, computer program products, and methods are described herein for systems and methods for identifying and verifying software component storage locations in a network environment. The present invention is configured to identify and verify software locations in a network environment by generating a network resource component tracking database associated with a network environment, the network resource component tracking database comprising a plurality of location indicators associated with a component; generating a plurality of location requests based on the plurality of location indicators; transmitting the plurality of location requests to a plurality of locations associated with the plurality of location indicators; receiving a plurality of location responses based on the plurality of location requests; and updating the network resource component tracking database based on the plurality of location responses.
Systems, computer program products, and methods are described herein for implementing interconnections and authenticating permissions between resource components. The present invention is configured to establishing a network resource component database that may include, for each network resource associated with the network, network resource component-level specifications and associated component signatures. The system may then receive a request for a new network resource to connect to a first network resource. The system may then determine a component signature of the new network resource and compare the component signature of the new network resource against the component signature of the first network resource to determine whether the new network resource and the first network resource are compatible within the network.
Systems, computer program products, and methods are described herein for secure user identification using digital image processing. The present invention is configured to receive, via a first user input device, an input selection of a first image from a first user, wherein the first image is associated with a second user; extract features of the first image; determine a secure image matching the first image based on at least the features of the first image; extract, from the secure image, a unique device identifier associated with the second user embedded thereon; and transmit control signals configured to cause the first user input device to display the unique device identifier.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06V 10/94 - Architectures logicielles ou matérielles spécialement adaptées à la compréhension d’images ou de vidéos
G06V 10/77 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant l’intégration et la réduction de données, p.ex. analyse en composantes principales [PCA] ou analyse en composantes indépendantes [ ICA] ou cartes auto-organisatrices [SOM]; Séparation aveugle de source
G06V 10/74 - Appariement de motifs d’image ou de vidéo; Mesures de proximité dans les espaces de caractéristiques
G06V 10/75 - Appariement de motifs d’image ou de vidéo; Mesures de proximité dans les espaces de caractéristiques utilisant l’analyse de contexte; Sélection des dictionnaires
G06V 20/00 - RECONNAISSANCE OU COMPRÉHENSION D’IMAGES OU DE VIDÉOS Éléments spécifiques à la scène
Apparatus and methods for a pattern identification transformer neural network is provided. The pattern identification transformer neural network may be able to learn from relatively small numbers of data elements. The pattern identification transformer neural network may function in similar method to the way humans transform data points. As such, the pattern identification transformer neural network may be able to learn patterns from a small number of examples and determine what attributes are helpful from a single experience. The pattern identification transformer neural networks may include a multi-head attention module, a normalize module and a feed forward neural network. The multi-head attention module may receive vectors that correspond to experiences. The normalize module may normalize the received vectors. The feed forward neural network may incorporate the received vectors into the neural network.
Embodiments of the invention are directed to systems, methods, and computer program products that provide a unique platform for analyzing, classifying, extracting, and dialogue information from audio file recordings between a customer and an agent of an entity. In particular, the novel present invention provides a unique platform for analyzing, classifying, extracting, and processing information from call recordings using an image-based encryption method and cognitive neural engine in order to segment audio files according to speaker, and later analyze recording information to generate contextual inferences regarding user preferences and agent performance.
G06F 16/68 - Recherche de données caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G10L 17/02 - Opérations de prétraitement, p.ex. sélection de segment; Représentation ou modélisation de motifs, p.ex. fondée sur l’analyse linéaire discriminante [LDA] ou les composantes principales; Sélection ou extraction des caractéristiques
95.
SYSTEMS AND METHODS FOR TRACKING, AUTHENTICATING, AND GENERATING RESOURCE DISTRIBUTIONS TO TRUSTED ENTITIES IN A NETWORK ENVIRONMENT
Systems, computer program products, and methods are described herein for tracking, authenticating, and generating resource distributions to trusted entities in a network environment. The present invention is configured to track a resource input distribution to a first user account; receive a third party distribution request from the first user account, the third party distribution request comprising at least a portion of the resource input distribution; and authenticate a third party associated with the third party distribution request, the authentication of the third party comprising a comparison of the third party against a trusted third party distribution set, wherein, in an instance where the third party matches at least one trusted third party of the trusted third party distribution set, allow a third party distribution associated with the third party distribution request.
Systems, computer program products, and methods are described herein for end-to-end automation of network infrastructure development changes. The present disclosure is configured to collect and archive data comprising feature logs, resource logs, and events in a central historical data storage. This data is subsequently normalized and events are correlated to specific features. This correlation involves locating differences in pre and post-deployment feature performance, which includes resource utilization, and maintaining a history of the analyzed data in the central historical data storage.
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p.ex. la hiérarchie ou l’analyse temporelle ou arborescente
97.
System for artificial intelligence-based engine for generating recommendations for resource allocation
A system is provided for an artificial intelligence-based engine for generating recommendations for resource allocation. In particular, the system may comprise an artificial intelligence module configured to access one or more data sources containing resource data associated with one or more users. Based on the resource data, the system may identify a group of analogous users with respect to a specific user. The system may then generate one or more recommendations for a resource allocation associated with the user. The one or more recommendations may then be presented on a graphical interface of a user device associated with the user. In this way, the system may provide an AI-driven method for efficient allocation of resources.
H04L 47/765 - Contrôle d'admission; Allocation des ressources en utilisant l'allocation dynamique des ressources, p.ex. renégociation en cours d'appel sur requête de l'utilisateur ou sur requête du réseau en réponse à des changements dans les conditions du réseau déclenchée par les nœuds de destination finale
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
98.
Platform for generating published reports using report and worksheet building with position mapping identification
Systems, computer program products, and methods are described herein for providing a platform for generating published reports using report and worksheet building with position mapping identification. The present invention is configured to establish a reporting and analytics platform for a user interface and receive, from the user interface, a single-selection input referencing a set of system identification values associated with a first set of data in the reporting and analytics platform. The system may then display a plurality of formatting options for the set of system identification values on the user interface. The system can assign a selected formatting option to the system identification values and apply the selected formatting option to the first set of data in the reporting and analytics platform. The selected formatting options can be applied to additional sets of data based on system identification values.
A system for providing a virtual on-watch—i.e., a comprehensive and actionable review of IT triage resources. The system includes a receiver for receiving a report of a service outage incident in a computer network, an auto-generated electronic bridge that electronic stages a response to the service outage incident, and a transmitter for transmitting, in real-time, an Application Programming Interface (API) call to a WebEx bridge platform for all bridge information available in the computer network. The bridge information includes the electronic bridges that are currently being hosted by the WebEx bridge platform. The system also includes information about responders currently involved in the plurality of electronic bridges. The system identifies responders that are qualified and that are electronically listed on the WebEx bridge as available to join electronic bridge. The WebEx bridge platform may send an electronic prompt to the at least one of the set of responders.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
A method for determining third party network compliance with a host entity network is provided. The method may include generating a scanning file that includes host entity network compliance standards and transferring the scanning file to an intermediary entity network. The method may further include generating an executable file that may run a plug-in scanning file to scan hardware and software resident at the third-party network for compliance. The method may further include transferring the executable file from the intermediary entity network to the third party network. The method may further include executing the executable file, generating a log file upon the completion of the running of the plug-in scanning file and digitally signing the log file. The method may further include deciphering the log file at the intermediary entity network, generating a readable report based on the deciphering and transferring the readable report to the host entity network.
H04L 41/0893 - Affectation de groupes logiques aux éléments de réseau
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p.ex. des interruptions ou des opérations d'entrée–sortie
H04L 41/069 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant des journaux de notifications; Post-traitement des notifications