Centralized management of web application firewalls (WAFs) is disclosed. Network-security devices in data centers perform server load balancing and implement WAFs for applications. Vendor-specific bridges map application and system parameters for use by a management process. Policies for policy-name/device pairs are provided and grouped into policy groups, which can be included with global parent policy groups. Portions of policy metadata can be retrieved without degrading system performance to detect changes, which can then be synchronized across other applicable policies, groups, devices, and WAFs.
Systems, computer program products, and methods are described herein for AI-based adaptive security parameter calculation in license key generation with quantum-resistant protections. The present disclosure is configured to utilize advanced cryptographic techniques, including elliptic curve cryptography and SHA-3 hashing, to produce secure digital signatures for license keys. An AI-driven engine analyzes historical security data to adaptively adjust key generation parameters, ensuring enhanced protection against current and emerging threats. This adaptive approach allows for continuous learning and improvement of security measures, making the system robust against both classical and quantum cryptographic attacks. The disclosed methods integrate the generation, assessment, and validation of keys into a streamlined process that promotes high security while maintaining efficiency.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
3.
LEVERAGING SPATIAL COMPUTING LiDAR FEEDBACK TO DYNAMICALLY GENERATE IDENTITY PROFILES
Arrangements for leveraging LiDAR for user validation are provided. A computing platform may receive, from a spatial computing device, first data of a first user environment at a first time captured via LiDAR. A first spatial computing map of the first user environment at the first time may be generated and scored to indicate a likelihood that a user of the spatial computing device is valid. The computing platform may receive a request to process an event. In response, the computing platform may cause the spatial computing device to capture, via LiDAR, second data of a current environment of the user at a current time. A second spatial computing map based on the current environment of the user at the current time may be generated and scored. The score for the second spatial computing map may be compared to a threshold to determine whether to process the requested event.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A method includes receiving a data population and a plurality of constraints. The method includes representing a plurality of units corresponding to the data population by a first set of vectors, determining a holistic feature, and representing the holistic feature by a second vector. The method further includes defining a target volume based on a subset of the plurality of constraints, and for each unit, subtracting a vector representing a respective unit from a vector representing a current holistic feature to determine a third vector. The method thus includes instantiating a first data bucket and a second data bucket based on the plurality of units and the units corresponding to the current data population, and for each third vector, transferring units from the first data bucket to the second data bucket so as to cause the holistic feature to converge to the current holistic feature defined by the target volume.
Systems and methods are disclosed for executing large quantum programs efficiently and securely. It breaks down programs into small, logical components, leveraging runtime analysis and AI-driven labeling. These components are then deployed across distributed quantum hardware nodes based on factors like noise levels, capabilities, and geolocation, optimized by a deep learning engine. Ownership and deployment paths are tracked using non-fungible tokens (NFTs) on a blockchain network, ensuring security and transparency. Outputs from each node are validated and aggregated based on their NFT linkage, resulting in accurate and reliable program results. This distributed quantum DevOps framework promotes scalability, performance optimization, and secure management, accelerating the development and application of quantum computing across diverse fields.
G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computersPlatforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing
Systems, computer program products, and methods are described herein for determining module interdependency using advanced computational models for data analysis and automated processing. The present disclosure is configured to receive a module characteristic from a system environment, wherein the system environment comprises a module; map the module characteristic, wherein mapping the module characteristic comprises comparing the module characteristic associated with the module with the module characteristic associated with the system environment; determine a weight for the module, wherein determining the weight comprises evaluating a significance level of the information produced by the module, analyzing a number of active modules contributing to a process, computing a weight value, and prioritizing the modules based on the weight value; determine, using an artificial intelligence module, a module update for the module characteristic, wherein the module update comprises updating the module characteristic; and implement the module update in the system environment.
Systems, computer program products, and methods are described herein for preventing synthetic misappropriation events over an electronic network. The present disclosure is configured to identify a user communication associated with a communication channel; identify a user account associated with the user communication; collect user account data associated with the user account; receive at least one user communication data via the communication channel; transmit the at least one user communication data to at least one internal communication component; receive at least one internal communication data from the internal communication component; generate a virtual avatar based on at least one of user account data, the at least one user communication data, or the at least one internal communication data; and transmit a virtual avatar interface component based on the virtual avatar to a user device associated with the communication channel, wherein the virtual avatar comprises the at least one internal communication data.
Systems, methods, and apparatus are provided for tracking user interactions in a quantum system. An authentication persona may be routed to a quantum processor. The quantum processor may generate a virtual quantum channel. The virtual quantum channel may execute multiple attribute-based authentication chains concurrently. The quantum processor may dynamically change the attributes in the authentication chains for the duration of a user session. The quantum processor may substantially continuously validate the attributes in each chain for the duration of the user session. The quantum processor may map the virtual authentication channel to a potential state of quantum information. In some embodiments, the system may automatically scale the quantum processor during an authentication task by adding additional quantum circuits to each quantum thread when the authentication task has a duration that is longer than a threshold duration and/or a volume that is larger than a threshold volume.
A method for detecting document forgery in real-time at a smart device is provided. The method may include capturing, via a smart device, an image of a document. The method may include extracting, via the smart device, data from the image. Based on the data, the method may include creating a dataset that may include a document type for the document and document details included in the document. The method may include confirming, on the smart device, that user account data retrieved from a remote server correlates to user account identifying data included in the document details. Following the confirming, the method may include determining a validity of the document using a fraud document detection engine. When one or more discrepancies are identified between the dataset and the ML data, the method may include transmitting an electronic fraud alert notification from the smart device to a network of smart devices.
Provided herein is a spatial computing system. The system may include a spatial computing apparatus configured to receive an anchoring instruction and consequently anchor a virtual object to a physical object; an onboarding module configured to interface with an existing spatial computing software platform; a spatial telemetry extraction module configured to extract positioning metadata associated with the physical object; a spatial analyzer module configured to detect an anomaly in the anchoring instruction, wherein the anomaly may indicate a suspected attempt to glean personal information from an image of the physical object; an anchor validation module configured to monitor changes in anchoring instructions; a session management module configured to terminate a spatial computing session, upon receiving an indication of an anomaly; a spatial security rule orchestration module configured to block implementation of the anchoring instruction; and a deep learning module.
G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
G06T 19/00 - Manipulating 3D models or images for computer graphics
Systems, methods, and apparatus are provided for adaptive network routing protocols. A mobile device application may receive a request to pair a first payment instrument with a second payment instrument. The application may generate a preauthorized routing packet encoding information associated with the first payment instrument. The routing packet may be QR code encrypted using a private key associated with the network and functioning as a digital wallet. The routing packet may be deployed to a processing network associated with the second payment instrument. The processing network may receive transaction information from a point of sale, including a charge initiated using the second payment instrument. The processing network may access the routing packet and determine whether transaction routing is active. When transaction routing is active, the charge may be routed to the first payment instrument. When transaction routing is not active, the second payment instrument may be charged.
Arrangements for remotely developing an application are provided. A computing platform may receive a request to build an application. The computing platform may receive the request through an API gateway. The computing platform may use a smart contract to identify a first node as a parent node and a plurality of nodes as child nodes. The computing platform may direct the child nodes to transmit virtual copies of dependency packages to the parent node. The parent node may build the application after receiving the dependency packages. The computing platform may detect that the application has been successfully built and may automatically publish the application at an enterprise server.
Solutions for integration and ongoing management of enterprise applications operating in a networked environment are disclosed. An AI transformer extracts, transforms, and manages integration point information from various sources, including documents, UMLs, and other system diagrams. Instead of relying on traditional documentation, the invention utilizes blockchain-based NFTs (non-fungible tokens) to store and manage integration point information. NFTs are created using smart contracts, which define the rules and conditions for the NFT. A metadata engine prepares metadata for generating the Integration Point NFTs. An NFT manager creates the integration point NFTs. A change analyzer determines the impact of changes to integration points on different applications and functionalities. A release compliance component is integrated with DevOps and is responsible for ensuring that integration point changes are incorporated into all impacted applications according to the release defined in the NFT.
User authentication/login occurs prior to a user accessing a network, application, web site/service or coming in contact with a computing device. Pre-authenticating/logging-in of users in advance of the user visiting or accessing the computing technology. A single device passcode that unlocks the device and a passcode vault storing the user's passcodes. Unlocking the passcode vault provides for the passcodes stored therein to be automatically applied to the corresponding entities requiring authentication to grant users access without requiring any user input/actions. Machine-Learning (ML) models that are trained to learn user login patterns are implemented to identify login pattern(s) and subsequently passcodes are retrieved for the entities making up the login pattern(s) from the passcode vault. Prior to the user accessing the entities that make up the login pattern, the present invention accesses the entities and applies the retrieved passcodes to pre-authenticate the user.
Automated updating/changing of passcodes based on network, application and/or website specific passcode rules. Passcode rules for passcodes stored in a passcode vault are identified, including passcode structure rules and passcode expiration rules. Subsequently the expiration dates trigger automatic update/change of the passcodes in accordance with the passcode structure rules. Additionally, networks, applications and/or web sites/services associated with the passcodes may be monitored for security threats, which, when detected, trigger automatic update/change of the passcodes in accordance with the passcode structure rules. Such updating/changing of the passcodes may be transparent to the users or the users may receive notification alerts. In further embodiments of the networks, applications and/or web sites services are monitored for changes to their respective passcode rules, such that future automated passcode updates/changes may occur in accordance with the updated passcode rules.
Arrangements for simulation generation and abnormality detection are provided. In some examples, a computing platform may identify a plurality of applications for analysis. The computing platform may execute a plurality of simulated scenarios for each application and, based on execution of the simulated scenarios, the computing platform may capture abnormality results for each application. The abnormality results, as well as application information and/or simulated scenarios may be stored. In some examples, the computing platform may compare deployed versions of each application to the captured abnormality data to identify an abnormality in a deployed version of an application. Based on the identified abnormality, the computing platform may evaluate the identified abnormality to determine whether it can be resolved automatically. If so, the computing platform may execute one or more commands modifying the deployed application to resolve the abnormality.
Provided herein is an automated data sanitization system for sanitizing and overlaying data to a non-production environment. The system may include a data sanitization rule engine, which may be configured to receive a recommended set of rules for sanitizing a data source and/or define rules for the dataset. The system may include a feature comparison component, which may be configured to generate suggested sanitization rules for a new dataset, based on comparison with previous datasets. The system may include a data sanitization component, which may be configured to implement sanitization of a plurality of datasets. The system may include a gatekeeper, which may be configured to restrict export of a non-sanitized data source and/or to restrict overlaying of a non-sanitized data source onto a non-production environment.
A method, apparatus, and system for minting blockchain transactions, leveraging generative artificial intelligence (“AI”), based on information stored in a deoxyribonucleic acid (“DNA”) storage apparatus is provided. The method, apparatus, and system may include receiving a request to execute a transaction from a generative AI user prompt interface. The method, apparatus, and system may include, in response to receipt of the request, analyzing the request to identify user requirements associated with the request, generating a smart contract for each of the user requirements, and converting each of the user requirements to a binary code. The method, apparatus, and system may include synthesizing a DNA sequence including nucleotides, each group of the nucleotides corresponding to one of the binary codes. The method, apparatus, and system may include, after the synthesizing of the DNA sequence, producing a blockchain storing data relating to the transaction using data stored in the DNA sequence.
G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computersPlatforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing
19.
Monitor and Control Toxic Configuration in Container Deployment
Systems and processes are disclosed to monitor and control toxic configuration in software container deployment. AI-based monitor in each node provides end-to-end fault management system that can detect, diagnose, classify, and suggest remediation actions for non-virtualized cloud-based misconfiguration vulnerabilities. Anomalies are diagnosed using pre-computed fault signatures and automated remediation is integrated with a cloud management stack. Multiple monitoring layers within nodes secure the container-based virtualization environment. Container-based “CSTC security framework” virtualization technology provides security and identifies potential toxic configuration threats. CSTC security locates container-based systems at severe risk for DDOS attacks to kernel vulnerability/container breakout and ensures appropriate privilege configuration for user processes. Resource access limited based on policies and CSTC security profiles as well as provide AI-based monitoring of container runtime behavior to provide additional security layer that ensures safety and protection in container-based virtualization.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/55 - Detecting local intrusion or implementing counter-measures
20.
SINGLE DEVICE-LEVEL PASSCODE THAT PROVIDES AUTOMATED ACCESS TO MULTIPLE COMPUTING DEVICES AND PASSCODE-PROTECTED APPLICATIONS AND WEB SITES/SERVICES
A single device-level passcode serves to unlock a passcode vault, such that, automated login/access to other computing devices, applications, networks and/or websites/web services, which have the user's passcodes stored in the vault, occurs. Specifically, in the case of other computing devices, short-range wireless communication between the initial logged-in computing device and another computing device triggers retrieval of the other computing devices passcode from the passcode vault and automated user log-in at other computing device. The passcode may be mapped to previously-captured user characteristics, such that multi-factored authentication including user characteristic verification may occur at the time the passcode vault is unlocked (i.e., when the single passcode is entered), continuously throughout the device session and/or when the passcode vault is accessed to retrieve a passcode for another device, network, application or web site/service.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
21.
Orchestrate events in Distributed DevOps Apparatus Leveraging Generative AI
Systems and methods for orchestrating events in distributed DevOps apparatus leveraging generative AI are disclosed to automate and streamline software development and deployment in distributed DevOps environments using Generative Adversarial Networks (GANs) and other AI techniques. The method involves interpreting UML diagrams, design documents, or the like with generative AI and computer vision to create DevOps tasks, integrating with various DevOps tools for task management, and deploying generated rules for automated event execution. Metadata is generated and processed in order to facilitate AI analysis. The systems and methods reduce manual intervention, increase efficiency, and improve accuracy, scalability, security, and compliance in DevOps workflows.
Aspects related to providing explainable artificial intelligence (XAI) using distributed ledger technology are provided. An XAI platform may train a first iteration of a deep learning model. The platform may store a record of the model to a distributed ledger. The platform may automatically perform an iterative recording process to generate additional iterations of the model and store records of the additional iterations of the model. During the process, the platform may receive outputs of the model. Based on the outputs, the platform may identify an anomalous output. The platform may identify one or more source iterations of the model that correspond to the anomalous output. The platform may initiate one or more response actions based on identifying the one or more source iterations of the model.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
23.
SYSTEM FOR FEATURELESS IMAGE CATEGORIZATION AND RECOGNITION USING UNSUPERVISED LEARNING
Systems and methods are described for image categorization and recognition using unsupervised learning. The disclosure is configured to receive an unseen image; implement a first filter on the unseen image to generate a first version of the unseen image; implement a second filter on the first version of the unseen image to generate a second version of the unseen image; determine a subset of the second version of the recorded images that matches the second version of the unseen image; retrieve a subset of first version of recorded images associated with the subset of second version of recorded images; and determine a first recorded image from the subset of the first version of the recorded images that matches the first version of the unseen image. Thereafter, retrieve a first set of responsive actions associated with the first recorded image and provide the first set of responsive actions to the device.
G06V 10/75 - Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video featuresCoarse-fine approaches, e.g. multi-scale approachesImage or video pattern matchingProximity measures in feature spaces using context analysisSelection of dictionaries
G06V 10/36 - Applying a local operator, i.e. means to operate on image points situated in the vicinity of a given pointNon-linear local filtering operations, e.g. median filtering
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
24.
Transforming mainframe processes and routing based on system status
A mainframe processing system comprises a memory operable to store data transformation instructions and one or more processors, at least one of the one or more processors operably coupled to the memory. The one or more processors are configured to receive batch processing data from one or more data sources, identify a plurality of mainframe processes associated with corresponding batch processes, and dispatch each mainframe process to a respective mainframe site.
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
Aspects of the disclosure relate to a network traffic monitoring platform. The platform may train an attack pattern analysis model to output a behavior profile and a cumulative attack score. The platform may identify a password failure rate spike. The platform may extract a password hash from the network traffic. The platform may generate the behavior profile based on the password hash. The platform may generate the cumulative attack score based on the behavior profile. The platform may compare the cumulative attack score to a threshold. Based on identifying that the cumulative attack score is below the threshold, the platform may identify the password hash as a secure hash. Based on identifying that the cumulative attack score meets or exceeds the threshold, the platform may and generate password complexity rules. The platform may refine the attack pattern analysis model based on the attacked hash and the cumulative attack score.
Systems, computer program products, and methods are described herein for data block analysis prioritization and routing via quantum machine learning. The present disclosure includes retrieving distributed ledger transactions, retrieving a stream of telemetry data of computer hardware, clustering, based on the transaction metadata, the distributed ledger transactions using a clustering engine, generating, using a machine learning model, a predetermined number of transaction placement schemas of the computer hardware, determining, from a probability output by parallel simulation testing via a quantum computer, a prime schema and a configuration of the prime computer hardware, and routing, based on the prime schema, a transaction cluster to the prime computer hardware.
Arrangements for using generative artificial intelligence models for ATM process generation are provided. In some examples, a computing platform may receive, from at least one image or measurement capture device, dimension data associated with an ATM. The ATM may have a plurality of components arranged on a face of the ATM. The dimension data may be input to a generative artificial intelligence model and the model may be executed to output, based on the dimension data, a position or location of each ATM component relative to a reference point on the ATM. In some examples, the model may further output at least one audio script describing the location of each component. The model may output one or more translations of the at least one audio script. The computing platform may transmit or send the at least one audio script to the ATM for presentation during user interaction with the ATM.
G07F 19/00 - Complete banking systemsCoded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
Aspects of the disclosure relate to NFT exchanges. A computing platform may generate a plurality of F-NFTs including F-NFT identifiers that configure the F-NFTs for end-to-end tracking. The computing platform may extract, from a voice communication, information of a request to transfer an F-NFT. The computing platform may generate, based on the information of the request, a text file. The computing platform may input, into a GPT-4 algorithm, the text file to produce a F-NFT contract identifying the F-NFT, the transferor of the F-NFT, and a transferee of the F-NFT. The computing platform may send, to an NFT exchange platform, the F-NFT contract, which may cause the NFT exchange platform to transfer custody of the F-NFT from an account of the transferor at a first institution to an account of the transferee at a second institution.
Tracking digital resources used in resource exchange events conducted in virtual reality computing environments. Digital resources used in resource exchange events conducted in virtual reality computing environments are tagged with data that at least identifies the location of the resource exchange event in terms of virtual reality computing environment and/or sub-environments. In response, machine-learning algorithm(s) are implemented that analyze the tags to determine resource exchange event movement patterns for specific digital resources. The resource exchange event movement patterns may include digital resource movement across multiple different virtual computing environments.
A computing platform may train, using historical information classification information, an information classification model, which may configure the information classification model to classify information and identify, based on the classification, a storage location. The computing platform may receive, from a user device, a request to store information. The computing platform may identify, using the information classification model, a cloud based storage location for the information. The computing platform may generate an NFT representative of the first cloud based storage location. The computing platform may direct a cloud based storage system to store the information at the cloud based storage location. The computing platform may send, to the user device, the NFT. The computing platform may receive, from the user device, the NFT and a request to access the information. Based on validating the NFT, the computing platform may grant the user device access to the information.
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
33.
SYSTEM AND METHOD FOR LEVERAGING DISTRIBUTED REGISTER TECHNOLOGY TO MONITOR, TRACK, AND RECOMMEND UTILIZATION OF RESOURCES
Embodiments of the present invention provide a system for leveraging distributed register technology to securely monitoring, tracking, and recommending utilization of resources. The system is configured for gathering one or more input parameters from one or more entity systems, collecting activity data from one or more third party systems, analyzing the activity data collected from the one or third party systems, generating one or more recommendations based on the one or more input parameters and analyzing the activity data, wherein the one or more recommendations are associated with one or more activities, estimating resource usage for the one or more recommendations, and allocating resources to the one or more recommendations.
Systems, and methods are described herein for integrated analysis of foreground and background communication data. The present disclosure is configured to collect foreground communication data from one or more data sources; collect background communication data from one or more data sources; pre-process the collected data to clean, normalize, and transform it into a uniform format; integrate the pre-processed data into a cohesive dataset via data alignment based on common identifiers such as timestamps or session IDs; analyze the integrated dataset using an artificial intelligence (AI) engine employing machine learning algorithms to identify patterns and generate responses based on the cohesive dataset; generate an initial AI response based on the analysis; present the AI-generated response and alternative solutions to a user through an interactive user interface; capture user feedback on the presented responses and alternative solutions; and retrain the AI engine based on the captured user feedback to improve future decision-making.
An artificial intelligence (AI) and machine learning (ML) (collectively “AI/ML”) system that provides dynamic detection of potential of resource updates, authentication of the resources updates, and tracking of the links between resources through the use of resource signatures. The resource signatures may provide an indication of the application information, the resources that are accessed by the application, and the resources that access the application. As such, the AI/ML system can monitor and track the applications and updated resources that interact with the applications in order to identify any potential security issues, as well as to optimize and standardize the use of resources by the users when developing applications.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
36.
TechWiki - Computer Diagnostics using Quantum Annealing and Blockchain Framework
A quantum computing system for determining diagnostic solutions for detected faults in computing devices using at least quantum annealing is described. The quantum computing system takes advantage of superposition and entanglement properties of qubits. A plurality of qubits is initialized into states representing historical data associated with historical faults and historical diagnostic solutions. Couplers entangle the plurality of qubits together based on the detected fault, generating a set of states in uniform superposition. Biases influence the energy levels of the set of states based on the detected fault. The quantum computing system measures a state with the lowest energy level within the set of states to determine diagnostic solutions to the detected fault. The system may further leverage a blockchain ledger for securely storing and accessing historical data associated with historical faults and historical diagnostic solutions.
Embodiments of the invention are directed to a system, method, or computer program product for convenient, secure digital data archiving and utilization across multiple communication channels. The system and methods may also include an array of indications regarding what documents may be required to be uploaded by a user, how many documents to upload, and a confirmation of documents uploaded being the correct types following a user upload action. As such, the system may utilize JSON templates indicating a number of required documents, a correct confirmation message following document upload, and a mechanism for confirming that the documents being uploaded are the correct types of documents via an analysis of input fields of the uploaded documents.
A method for managing metaverse instances includes registering a physical control level for a user. The physical control level includes information about physical locations and data items that the user is allowed to access within an entity. A digital identity is generated for the user. The digital identity includes a virtual control level for an avatar of the user and allows the avatar to access a metaverse instance of a metaverse of the entity. The virtual control level is synchronized with the physical control level. Computing resources to be allocated to the metaverse instance are determined. A first instruction is sent to a metaverse server to open the metaverse instance. A second instruction is sent to the metaverse server to allocate the computing resources to the metaverse instance. A third instruction is sent to the metaverse server to generate the avatar. The avatar is allowed access to the metaverse instance.
Various aspects of the disclosure relate to enforcing dynamically updated network security policies in real-time (or upon an identified update) from multiple organizations and anonymously analyze computing system configuration information uploaded from third-party computing systems. An analysis engine monitors compliance information and compare the compliance information against the security rules and/or requirements for one or more enterprise networks. A visualization providing a network map with a visual representation of each product system service system may include communication links between internal applications and/or computing systems and drill-down capability to identify issues as they are occurring or are predicted to occur. The security escrow system may include a mechanism to automatically enable/disable access between third party networks and one or more enterprise computing systems in real-time based on identified compliance information.
Enterprise organizations often have thousands or tens of thousands of employees accessing various websites while conducting business. Users may inadvertently reach compromised websites, unsecure websites, and/or websites that include broken links, which may be used by bad actors to redirect users to websites that include malware threats. Accordingly, arrangements described herein provide for real-time detection and notification of non-functioning websites to enable users to avoid potential malicious acts associated with these non-functioning websites.
A method includes analyzing a first log of a first log type generated by a first data store and determining if the first log has a first format of the first log type. In response to determining that the first log does not have the first format of the first log type, the first data store and the first log type are identified as degraded. A first impact score is determined for the first log type. First dependency information is analyzed for the first data store. In response to determining that no data store receives data items from the first data store, a report is generated. The report includes an identification that the first data store is degraded, an identification that the first log type is degraded, and the first impact score associated with the first log type.
A method analyzes dependency information for a first data store. Upon determining that a data pipeline associates a first log type generated by the first data store with a second log type generated by a second data store, a first number of logs of the first log type that are generated at a first time, a first baseline number, and a first threshold value are determined. Upon determining that the first number of logs differs from the first baseline number by less than the first threshold value, a second number of logs of the second log type that are generated at a second time, a second baseline number, and a second threshold value are determined. Upon determining that the second number of logs differs from the second baseline number by more than the second threshold value, the data pipeline is identified as degraded.
A computing platform may generate, using a test case generation model, a plurality of large language model (LLM) test cases. The computing platform may input, into an LLM, the plurality of LLM test cases, which may produce a plurality of unverified LLM test results. The computing platform may input, into a validation model, the plurality of LLM test cases, which may produce a plurality of validated LLM test results. The computing platform may compare, using a falsified output evaluation model, the plurality of unverified LLM test results with the corresponding plurality of validated LLM test results, which may produce an LLM compliance score for the LLM. The computing platform may compare the LLM compliance score to a compliance threshold. Based on identifying that the LLM compliance score meets or exceeds the compliance threshold, the computing platform may automatically deploy the LLM for use in an enterprise environment.
A computing platform may train a machine learning model to detect and analyze threat actor activities. The computing platform may generate dynamic honeypotted files and deploy the generated dynamic honeypotted files as adaptive defenses to threat actors in a computing environment. The computing platform may adapt to threat actor activities based on analyzed behavior of the threat actor and any identified tools used by the threat actor to gain access to the computing system. Threat actor activities may be written to a blockchain to publicly record all transactions related to a threat actor's activities for analysis and generation of adaptive defenses to threat actor attacks. The computing platform may cause redirection of the threat actor into a specific computing environment through generation and deployment of dynamic honeypotted files.
Various aspects of the disclosure relate to enforcing dynamically updated network security policies in real-time (or upon an identified update) from multiple organizations and anonymously analyze computing system configuration information uploaded from third-party computing systems. An analysis engine monitors compliance information and compare the compliance information against the security rules and/or requirements for one or more enterprise networks. A visualization providing a network map with a visual representation of each product system service system may include communication links between internal applications and/or computing systems and drill-down capability to identify issues as they are occurring or are predicted to occur. The security escrow system may include a mechanism to automatically enable/disable access between third party networks and one or more enterprise computing systems in real-time based on identified compliance information.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
Various aspects of the disclosure relate to enforcing dynamically updated network security policies in real-time (or upon an identified update) from multiple organizations and anonymously analyze computing system configuration information uploaded from third-party computing systems. An analysis engine monitors compliance information and compare the compliance information against the security rules and/or requirements for one or more enterprise networks. A visualization providing a network map with a visual representation of each product system service system may include communication links between internal applications and/or computing systems and drill-down capability to identify issues as they are occurring or are predicted to occur. The security escrow system may include a mechanism to automatically enable/disable access between third party networks and one or more enterprise computing systems in real-time based on identified compliance information.
A computing platform may train a machine learning model to detect and analyze threat actor activities. The computing platform may generate dynamic honeypots and deploy the generated dynamic honeypots as adaptive defenses to threat actors in a computing environment. The computing platform may adapt to threat actor activities based on analyzed behavior of the threat actor and any identified tools used to by the threat actor to gain access to the computing system. The computing platform may cause redirection of the threat actor into a specific computing environment through generation and deployment of dynamic honeypots.
A computing platform may configure a dependency knowledge graph indicating file dependencies for mainframe applications, and an error knowledge graph indicating errors and corresponding solutions for the mainframe applications. The computing platform may receive mainframe source code. The computing platform may analyze, using the knowledge graphs, the mainframe source code to identify potential errors and corresponding solutions. Based on identifying an error in the mainframe source code, the computing platform may cause the mainframe source code to be updated according to the corresponding solution. The computing platform may analyze, using the dependency knowledge graph and the error knowledge graph, the updated mainframe source code to identify remaining errors. Based on identifying an absence of the remaining errors, the computing platform may send, to a mainframe build and deployment engine, the updated mainframe source code, which may cause the mainframe build and deployment engine to automatically execute a build process.
Access control within a virtual reality computing system(s) is provided. Once a user requests entry into a virtual reality computing environment and their identity is verified (i.e., authenticating), access privileges are determined/assigned for the user that restrict or allow user access to virtual locations and/or virtual objects/avatars present in the virtual reality computing environment. In specific instances, the access privileges may be dynamically altered during the user's virtual reality computing session based on the user's interactions or other behaviors exhibited during the user's virtual reality computing session. As such the present invention provides necessary control over what areas of a virtual reality computing environment a user can access and/or which virtual objects/avatars a user can interact with.
Promoting various banking and financial services by means of discounts, advertisements, and incentives generated in connection with customers' use of deposit accounts, checking accounts, certificates of deposit, individual retirement accounts, brokerage accounts and general investment accounts
Promoting various banking and financial services by means of discounts, advertisements, and incentives generated in connection with customers' use of deposit accounts, checking accounts, certificates of deposit, individual retirement accounts, brokerage accounts and general investment accounts
Promoting various banking and financial services by means of discounts, advertisements, and incentives generated in connection with customers' use of deposit accounts, checking accounts, certificates of deposit, individual retirement accounts, brokerage accounts and general investment accounts
53.
INTELLIGENT RESOURCE EVALUATOR SYSTEM FOR ROBOTIC PROCESS AUTOMATIONS
Aspects of the disclosure relate to an intelligent resource evaluation engine. A computing platform may monitor the plurality of RPA machines to detect parameter information. The computing platform may store the parameter information along with corresponding RPA machines as a key value pairs in a database. The computing platform may identify first current parameter information for a first RPA machine using the key value pairs. The computing platform may input the first current parameter information into an intelligent resource evaluation model, which may output first machine selection information for the first RPA machine. Based on identifying that the first RPA machine is sufficient to execute the first robotic automation process, the computing platform may send direct the first RPA machine to execute the first robotic automation process.
G05B 13/02 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
Polymorphic non-attributable processes and architectures to monitor threat domains (e.g., pharming or phishing websites) are disclosed. Obfuscated requests may be generated by control servers to be blended in with normal traffic sent over cloud networks with randomized exit nodes or with normal traffic sent through an anonymization network. Requests may be sent at randomized intervals or time periods determined algorithmically. The requests are obfuscated in order to mask the origination information and location so that the threat actor does not detect that the website is being monitored. User agents may be spoofed and requests may present as if they originated from residential IP addresses. Automatic real-time monitoring can be provided to determine when sites resolve and are addressable. Fingerprint information, screenshots, security certificate, and other threat domain data can be captured. Request responses can be scanned for threat indicia.
Aspects of the disclosure relate to computing hardware and software for dynamic control limit configuration. A computing platform may receive and format historical data. The computing platform may input the formatted data into a control limit prediction model, which may output predicted control limits by weighting, using an ensemble model, outputs from a plurality of other models to produce predicted control limits. The computing platform may adjust existing control limits based on predicted control limits to create actual control limits. The computing platform may receive real time data, and may identify, using the actual control limits and the real time data, a deviation score for the real time data. The computing platform may compare the deviation score to the actual control limits. Based on detecting that the deviation score breaches the actual control limits, the computing platform may send an indication of the breach.
A method for facilitating electronic transactions between a first mobile device and a second mobile device is provided. At a central server, when internet connection is established, the method may include receiving transaction data and prior to processing an electronic transaction based on the transaction data, verifying the electronic transaction. The verifying may include retrieving a first activity log from the first mobile device and a first browser timeout history. The method may further include retrieving from the second mobile device a second activity log and a second browser timeout history. The method may further include verifying that a first mobile application was active when a browser on the first mobile device was in timeout and that a second mobile application was active when a browser on the second mobile device was in timeout.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
The invention relates to adaptation/alteration of a digital file referenced to a Non-Fungible Token (NFT) via NFT metadata-defined adaptation rules and criteria, i.e., predefined conditions or events that trigger the occurrence of digital file adaptation. The adapted digital file may be presented to indicate a change in a state associated with a specific type of NFT. The NFT may be an authentication NFT used to verify the identity of a user/users, and the digital file may be presented within computing networks or applications for conveying user authenticity to other users within the computing network or application. The predefined conditions are security events that have a positive/negative impact on the authenticity of the user or group of users. Occurrence of one or more of the predefined security events triggers adaptation and presentation of the adapted digital file indicating an increase/decrease in the level of authenticity associated with the user/users.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
58.
Method for Dynamic AI Supported Graph-Analytics Self Learning Templates
Methods and systems described herein for addressing issues associated with varying graph analytics tools that require different tool-specific coding languages. An artificial intelligence (AI) sub-system of various modules extracts metadata from a dataset and identifies nodes and relationships in the dataset using the metadata. The dataset is matched with a corresponding graph-analytics template in a data store, and a dynamic template modifier modifies the corresponding graph-analytics template. In some examples, the AI system generates smart guided videos with logical breakpoints that are embedded along with templates for quick learning and to build faster graphical analytics. The AI system includes a dynamic template modifier and a cognitive smart AI engine that includes a graph.
An apparatus may comprise a memory communicatively coupled to a processor. The processor may be configured to receive an evaluation request to perform multiple data processing operations; determine a microservice configured to fulfill the first evaluation request; and determine multiple publishing commands associated with the microservice. The one or more microservices may be integrated in multiple Interactive Voice Response (IVR) operations. The processor may be further configured to obtain input parameters of the one or more input parameters corresponding to the microservice; generate a response to the evaluation request associated with the microservice, compare the response to an expected response of the one or more expected responses; and determine whether the response matches the expected response. In response to determining that the response does not match the expected response, the processor is configured to update the publishing commands in accordance with multiple rules and policies, and publish the microservice.
A plurality of data interactions are monitored and a plurality of potential exceptions relating to the data interactions are identified. Each potential exceptions is analyzed based on a respective pre-configured logic to determine a result relating to the potential exception. A plurality of data objects are generated, wherein each data object includes one or more of the potential exceptions, the results determined for the potential exceptions and other related data. The data objects are passed as nodes of a tangle associated with a tangle network. A federated machine learning (ML) model is deployed with each node passed to the tangle to determine whether the results are correct. A report is generated including a plurality of potential exceptions determined as valid.
Aspects of the disclosure relate to s computing system that is configured to use heuristic and/or metaheuristic algorithms based on swarm learning (SL) intelligence frameworks and combine SL with blockchain and edge computing frameworks to provide a technologically efficient, responsive, and/or adaptable solution to detecting and preventing defects in software applications.
Aspects of the disclosure relate to s computing system that is configured to use heuristic and/or metaheuristic algorithms based on swarm learning (SL) intelligence frameworks and combine SL with blockchain and edge computing frameworks to provide a technologically efficient, responsive, and/or adaptable solution to detecting and preventing defects in software applications.
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
G06N 3/006 - Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
63.
Intuitive Defect Prevention with Swarm Learning Intelligence over Blockchain Network
Aspects of the disclosure relate to s computing system that is configured to use heuristic and/or metaheuristic algorithms based on swarm learning (SL) intelligence frameworks and combine SL with blockchain and edge computing frameworks to provide a technologically efficient, responsive, and/or adaptable solution to detecting and preventing defects in software applications.
A hybrid system for natural language processing is provided. The system may include a transceiver operable to receive a query from a user. The query may include a stock portion integrated with a set of real-time conditions specific to the user. The transceiver may transmit the query to a model and to a response application. The model may receive the query and communicate with a data store. Based on historical data stored at the data store, the model may separate the stock portion from the set of real-time conditions, formulate a response to the stock portion and insert placeholders into the response for responses to the real-time conditions portion. The response application may receive the query and the response. The response application may communicate with private data stores to formulate responsive elements for the placeholders. The response application may insert the responsive elements into the placeholders to complete the response.
Systems and methods for validating the accuracy of an authenticated, end-to-end, digital response system are provided. Methods may include curating a database of training data, including historical profile data and historical interaction data. Profile data may include a name, an identifier, and a set of financial instruments for a plurality of system users. Interaction data may include records of multi-step interactions between the system users and the digital response system. Methods may include generating, via a machine-learning (ML) engine and based on the training data: a test profile including a fictitious name, a fictitious identifier, and a fictitious set of financial instruments; authentication data for the test profile including a username and password that are operational for authenticating the test profile to the digital response system; and a simulated conversation for the test profile including an utterance that is associated with an intended request. Methods may include: initiating a validation session by logging the test profile into the digital response system using the authentication data; feeding the simulated conversation as an input to the digital response system; receiving a response from the digital response system; scoring the accuracy of the response vis-à-vis the intended request; generating an accuracy report based on the accuracy score; and submitting the accuracy report to a system administrator.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
The invention relates to adaptation/alteration of a digital file referenced to a Non-Fungible Token (NFT) via NFT metadata-defined adaptation rules and criteria, i.e., predefined conditions or events that trigger the occurrence of digital file adaptation. The adapted digital file may be presented to indicate a change in a state associated with a specific type of NFT. The NFT may be an authentication NFT used to verify the identity of a user/users, and the digital file may be presented within computing networks or applications as a means of conveying user authenticity to other users within the computing network or application. The predefined conditions are security events that have a positive/negative impact on the authenticity of the user or group of users. Occurrence of one or more of the predefined security events triggers adaptation and presentation of the adapted digital file indicating an increase/decrease in the level of authenticity associated with the user/users.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
The invention relates to adaptation/alteration of a digital file referenced to a Non-Fungible Token (NFT) via NFT metadata-defined adaptation rules and criteria, i.e., predefined conditions or events that trigger the occurrence of digital file adaptation. The adapted digital file may be presented to indicate a change in a state associated with a specific type of NFT. The NFT may be an authentication NFT used to verify the identity of a user/users, and the digital file may be presented within computing networks or applications for conveying user authenticity to other users within the computing network or application. The predefined conditions are security events that have a positive/negative impact on the authenticity of the user or group of users. Occurrence of one or more of the predefined security events triggers adaptation and presentation of the adapted digital file indicating an increase/decrease in the level of authenticity associated with the user/users.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
68.
AUTOMATED TELLER MACHINE ("ATM") COLOR TECHNOLOGY FOR MASS TRANSACTION PRE-STAGING
Wait times at ATMs may undermine the utility of these self-service machines. ATMs are configured to provide faster self-service kiosks that allow users to quickly perform common financial transactions. However, it has been increasingly common for users to have to wait in a queue to access an ATM. Systems and methods are provided for an ATM that pre-stages transactions by extracting account balance, account status, account fraud, and other necessary information from a plurality of smart cards, before a user begins interacting with the ATM. Information extracted from the plurality of smart cards may be transferred to the ATM wirelessly. Color changes may then be sent from the ATM to the plurality of smart cards. The color changes indicate whether the plurality of smart cards may transact with the ATM without any additional information, thereby improving the transaction processing efficiency of the plurality of smart cards and enhancing user satisfaction.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
69.
SYSTEMS AND METHODS FOR FAST AND SIMULTANEOUS MULTI-FACTOR AUTHENTICATION USING VECTOR COMPUTING
Aspects of the disclosure relate to multi-factor authentication. A computing system may receive, from an authenticated entity, a plurality of authenticated inputs. Normalized authenticated inputs may be generated. An n-dimensional authenticated signature vector corresponding to the plurality of normalized authenticated inputs may be generated. A plurality of multi-factor authentication (MFA) inputs may be received. A plurality of normalized multi-factor authentication inputs may be generated. An n-dimensional multi-factor authentication vector corresponding to the plurality of normalized MFA input may be generated. There may be a determination of whether a distance between the n-dimensional authenticated signature vector and the multi-factor authentication vector not exceeding an authentication distance threshold. Based on the distance between the n-dimensional authenticated signature vector and the multi-factor authentication vector not exceeding the authentication distance threshold, an indication that the plurality of multi-factor authentication inputs have been authenticated may be generated.
Systems, computer program products, and methods are described herein for improving computing performance by implementing an application package orchestrator in an electronic environment. The present disclosure is configured to identify an instruction(s) associated with a current application(s); apply the instruction(s) to an NLP engine; generate, by the NLP engine, a stepwise metadata packet, wherein the stepwise metadata packet comprises a standardized set of computer-readable instructions; apply the stepwise metadata packet to an application package orchestrator model; query, by the application package orchestrator model, a programming template database based on the stepwise metadata package, wherein the programming template database comprises pre-generated programming actions; determine, based on the query, whether the pre-generated programming actions resolve each of the standardized set of computer-readable instructions of the stepwise metadata packet; and generate an application package based on a combination of the pre-generated programming actions that resolve each of the standardized set of computer-readable instructions.
Systems, computer program products, and methods are described herein for dynamic task management across a network. The method includes receiving a task to be completed by one or more end-point devices. The method also includes determining one or more task actions that are part of the task. The method further includes receiving a task action input indicating a change to at least one of the one or more task actions or an additional task action to be added to the one or more task actions. The method still further includes updating the one or more task actions based on the task action input. The method also includes determining a task action order for each of the one or more task actions. The method further includes assigning at least one of the task actions to at least one of the end-point devices on the network based on the task action order.
Systems, computer program products, and methods are described herein for a secure transactional process utilizing a novel approach to data management within resource instruments. The described technology specifically addresses the need for enhanced security in electronic transactions by incorporating a system that dynamically retrieves, encrypts, stores, and subsequently erases transactional data in a secure manner. At the core of these systems is the use of electrically erasable programmable read-only memory (EEPRAM) which temporarily houses transaction details in an encrypted form. The details are securely fetched from an entity server following the verification of a transaction terminal integrity through unique cryptographic keys.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
73.
system and method for digitally marking artificial intelligence (AI) generated content
A processor receives request to generate content using an AI tool and generates the requested content using the AI tool. The processor detects that the AI tool used a first AI module and a second AI module associated with the AI tool to generate the requested content. In response, the processor accesses, from a memory, a first digital signature associated with the first AI module and a second digital signature associated with the second AI module. The processor generates a combined digital signature based on the first digital signature and the second digital signature and embeds the combined digital signature in the generated content to generate a marked content.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A system is provided for generating an electronic data fabric using virtualized photocrosslinking-based parallel computing process. In particular, the system may, using an artificial intelligence (“AI”) model, identify one or more users and a subject or description of a communication in order to determine the data needs of the one or more users, where such data may reside within one or more databases, websites, applications, tools, and/or the like. The system may then use a simulated photocrosslinking based process to assimilate various combinations of datasets and place the data sets within a virtualized environment. The virtualized data may then be linked to a data fabric to identify the linkages and/or sublinkages between the virtualized data and the underlying data. Subsequently, upon receiving a data request from a user, the system may use the metadata within the data fabric to dynamically recall the relevant data in real time.
Systems, computer program products, and methods are described herein for the implementation of an alternative data management system. The method includes dividing a process into one or more tasks, including a first task, to be completed. The method also includes determining a first task availability status for the first task. The first task availability status indicates whether the first task can be started by a user. The first task availability is designated as waiting in an instance in which at least one prerequisite task exists for the first task. The method includes causing the first task availability status to be changed from waiting to ready in an instance in which at least a portion of the prerequisite task(s) is completed. The method further includes assigning the first task to a first user in an instance in which the first user finishes one of the one or more tasks.
Systems, computer program products, and methods are described herein for securing data transfers across multiple devices on a network. The method includes receiving a transfer identifier associated with a data transfer request. The method also includes generating a transfer record associated with the transfer identifier for the data transfer request. The transfer record indicates node(s) in which the data transfer request has transmitted. The method further includes receiving a transfer data packet associated with a receiving node. The receiving node received the data transfer request from a transmitting node. The transfer data packet includes the transfer identifier. The method still further includes causing a verification signal to be transmitted to the receiving node in an instance in which the transfer data packet is verified. The method also includes updating the transfer record based on the transfer data packet.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
An interactive distributive platform apparatus configured to be a single source of truth. The platform may include entity identifier data stored in a database. The data may be placed in a grid through an AI algorithm. The AI algorithm may place the data in the grid using one or more rules. The data may be extracted into datasets. The datasets may be placed in corresponding selected nodes. Placement of the datasets may occur using smart contracts. The nodes may be part of a holochain. The datasets and rules may be validated in an interactive distributive platform. The interactive distributive platform may be the single source of truth. The interactive distributive platform may direct any request that enters the system to the correct node.
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Provided herein is a system. The system may include a parallel metaverse creator layer. The system may include a parallel metaverse verifier layer. The system may include a data sharing interface. The system may include a data deciphering interface. The system may include an NFT stacker. The system may include an NFT validator. The system may include a payment decision interface. the system may include a transaction decision interface. The system may include a payment initiator interface. The system may include a transaction initiator interface.
Provided herein is a system. The system may include a parallel metaverse creator layer. The system may include a parallel metaverse verifier layer. The system may include a data sharing interface. The system may include a data deciphering interface. The system may include an NFT stacker. The system may include an NFT validator. The system may include a payment decision interface. the system may include a transaction decision interface. The system may include a payment initiator interface. The system may include a transaction initiator interface.
.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems and methods may include contributing to a quantum-resistant blockchain that stores a quantum-resistant audit trail of changes to a dataset. A non-transitory computer readable medium may store instructions that are run on a computer processor to populate a block with a log of a dataset, run a quantum-resistant cryptographic algorithm to encrypt the block, distribute the block to and receive approval from blockchain nodes to add the block to the blockchain, and run the algorithm to encrypt the block onto the blockchain. The method may include repeating the steps of running the non-transitory medium on the computer processor to populate a second block with a second log of the dataset, run the algorithm to encrypt the second block, distribute the second block to and receive approval from the blockchain nodes to add the block to the blockchain, and run the algorithm to encrypt the second block onto the blockchain.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
80.
SYSTEM FOR OPTIMIZING WORKFLOW MANAGEMENT AND RESPONSE SYSTEMS IN A DISTRIBUTED NETWORK USING AI
Systems, computer program products, and methods are described herein for optimizing workflow management and response systems in a distributed network. The present disclosure is configured to integrate various enterprise systems, analyze workflow data for efficiency improvements, automate access management, and enhance task prioritization using advanced machine learning algorithms. Specifically, the system leverages real-time analytics and historical data to fine-tune workflows, predict delegation needs, and provide end-users with an actionable dashboard, thus streamlining operations and decision-making processes within an organization.
Systems, computer program products, and methods are described herein for secure training of machine learning models. The present disclosure is configured to receive a training dataset, wherein the training dataset comprises personally identifiable information (PII); implement a data sanitization algorithm using adjustable data sanitization parameters on the training dataset to generate a corresponding sanitized training dataset; train an ML model using the sanitized training dataset; deploy the trained ML model on a live dataset; evaluate a performance accuracy of the ML model against an accuracy threshold; and iteratively adjust the data sanitization parameters for subsequent iterative re-training of the ML model until the performance accuracy of the ML model meets the accuracy threshold.
A method includes analyzing a first block of a blockchain stored in a blockchain network. The first block is associated with an interaction between computing systems. Upon determining that the interaction is illegitimate, a first instruction is sent to the blockchain network to create and add a dispute block associated with a dispute of the interaction to the blockchain. Upon determining that the blockchain includes an intermediate block between the first block and the dispute block that is associated with a subsequent interaction that is performed after the interaction, source and destination computing systems for the interaction and the subsequent interaction are determined. Upon approving reversals of the interaction and the subsequent interaction, a second instruction is sent to each destination computing system to initiate a reversal of a respective interaction. A notification is sent to each source computing system that the reversal of the respective interaction is approved.
Various aspects of the disclosure relate to automated identification of illicit transfers of cryptocurrency via mixing organizations. A cryptocurrency tracing system is configured to transfer a series of electronic transactions between known digital wallets via a suspect mixing organization. The cryptocurrency tracing system traces each cryptocurrency transaction through a plurality of mixing digital wallets to identify all possible mixing digital wallets being used by the mixing organization. Based on the identified mixing digital wallets, suspect digital wallets are identified and a second series of transactions are initiated between the known digital wallets via the mixing digital wallets. Based on these transfers, suspect digital wallets can be monitored to identify cryptocurrency transfer patterns representative of an attempt to obscure illicit funds transfers. Once identified, the suspect digital wallets may be automatically frozen.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
84.
SYSTEMS AND METHODS FOR DATA SECURITY MODEL BASED ANOMALY DETERMINATIONS
Systems, methods, and computer program products are provided herein for data security model based anomaly determinations. An example method includes receiving a product evaluation request that is associated with a first product dataset including product data entries and accessing a data security model. The data security model includes a plurality of data objects including one or more data entries where each data object defines an associated model level indicative of the hierarchical position of the data object within the data security model and one or more links between the data objects that define data object interdependency parameters. The example method includes determining data objects of the data security model applicable to the first product dataset and determining one or more anomalies associated with the first product dataset based on a comparison between the one or more product data entries and the applicable data objects of the data security model.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
85.
System and method for securely synchronizing and integrating data stored in databases associated with multiple entities
A method includes accessing the first user data set and the second user data set. The second user data set includes a homomorphically-encrypted data set. The method includes executing a predictive model trained to generate a homomorphically-encrypted recommendation of an identified interaction for a user based at least in part upon the first user data set and the homomorphically-encrypted data set. The user is associated with at least one of the first entity or the second entity. The method further includes transmitting the homomorphically-encrypted recommendation of the identified interaction for the user to a computing system associated with the second database and the second entity, receiving, from the computing system associated with the second database and the second entity, a decrypted recommendation of the identified interaction for the user, and transmitting the decrypted recommendation to a computing system associated with the user.
Aspects of the disclosure relate to detection of confidential information used in generative artificial intelligence platforms. An artificial intelligence computing platform having at least one processor, a memory, and a communication interface may generate questions and ask other generative artificial intelligence platforms the generated questions to determine if the other generative artificial intelligent platforms answers indicate that restricted access, confidential, or proprietary information data has been leaked and disseminated. In an embodiment, prompt injection may be used to determine if external generative artificial intelligence platforms are utilizing an enterprises confidential or proprietary information. A computing platform may transmit, via the communication interface, to an administrative computing device, information regarding the unauthorized dissemination which, when processed by the administrative computing device causes a notification to be displayed on the administrative computing device.
Arrangements for machine learning-based code development and release are provided. In some examples, a request to release code may be received from a developer portal and may include the code and a type of release. Based on the type of release, one or more requirements for release may be identified by a rules engine. Code testing data responsive to the one or more requirements may be retrieved from the developer portal and a machine learning model may be executed using the code, type of release and code testing data as inputs. The model may output a release authorization decision. If the release authorization decision includes approval of the release, the code may be deployed to a production environment. If the release authorization decision includes a denial of the request to release the code, the code may be returned to the developer portal for further modification or testing.
Systems, computer program products, and methods are described herein for centralized application development and pipeline management via event data streaming. The present disclosure embraces event data received from discrete components of an application development pipeline platform. The event data is received directly, via webhooks, or via change data capture. The event data is analyzed to determine conformity to a standardized data structure. If the discrete components already transmit and receive event data in the standardized data structure, the application development pipeline platform communicates with such discrete components directly. If the discrete components don't transmit and receive event data in the standardized data, a middleware layer receives the event data from the discrete components and transforms the event data from the discrete components to the standardized data structure.
A system and method for submission and recordation of application programmer interfaces (APIs) using non-fungible tokens (NFTs) inserted into a blockchain.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Aspects of the disclosure relate to generating and replicating training data. A computing system may generate different versions of training data and corresponding different sequence numbers. A distributed machine learning model may be trained to generate different versions of the training data based on the corresponding different sequence numbers. The training data and identical copies of the distributed machine learning model may be sent to secondary computing devices. A second sequence number corresponding to a second version of the training data may be determined. The second sequence number may be sent to secondary computing devices. Based on inputting the second sequence number into the identical copy of the distributed machine learning model, copies of the second version of the training data may be generated in the secondary computing devices.
Systems and processes are disclosed to leverage conversational AI across voice and digital channels by automating employee interactions with clients to deliver humanized experiences with speed and accuracy. Live phone conversation. Transcriptions between clients and agents are generated. AI assist provides automation based on client interactions. Prompts are provided to speak to customers. Real time updates and summaries are sent to client devices and streamed to customize agent sessions. Auto navigation of agent views and manipulations of the agent screen are optimized by AI. Instant client validations are enabled via audible and visual confirmations on client devices. Various other AI implementations for improved processing our similarly disclosed.
Systems, computer program products, and methods are described herein for dynamically determining procedures for electronic communications using cellular automaton processing. The present invention is configured to identify at least one enquiry message; determine, based on the an enquiry message(s), a case type(s) associated with the enquiry message(s); trigger an intelligent classification component, wherein the intelligent classification component is configured to determine a procedure(s) for the enquiry message(s); trigger a cellular automaton engine which comprises an array of a plurality of cells in a grid-based structure, and wherein the cellular automaton engine is configured to select and perform at least one procedure for the enquiry message(s); determine, by the cellular automaton engine, a best procedure based on the selection and performance of the procedure(s) for the enquiry message(s); and generate a response(s) for the enquiry message(s) based on the determined best procedure by the cellular automaton engine.
H04M 1/72436 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. short messaging services [SMS] or e-mails
Embodiments of the present invention provide a system for employing adaptive pixel selector techniques for calculating color contrast ratio with dead pixel mitigation. The system is configured for determining that a user is testing user interface accessibility compliance of at least one user interface associated with one or more applications, determining one or more rules associated with the user interface accessibility compliance of the one or more applications, selecting a pixel from the at least one user interface, determining that the pixel is not a defective pixel, calculating a color contrast ratio associated with the pixel, determining if the color contrast ratio is in compliance with the one or more rules, and displaying an output associated with determining if the color contrast ratio is in compliance with the one or more rules.
A method includes receiving and analyzing data items to generate a weight for each data item. In response to determining that a first weight of a first data item is within a first weight range, the method determines that the first data item has a high security level. In response to determining that a second weight of a second data item is within a second weight range, the method determines that the second data item has a medium security level. A first subset of the data items having the high security level are encrypted with a first cryptography algorithm to generate first encrypted data items. A second subset of the data items having the medium security level are encrypted with a second cryptography algorithm to generate second encrypted data items. An artificial intelligence/machine learning model is trained using the first and second encrypted data items as a training data set.
Embodiments of the present invention provide a system for conversion of real-time voice logs to user interface logs for debugging of Interactive Voice Response (IVR) interactions. The system is configured for determining that a user has initiated a real-time voice interaction with a voice interaction processing platform, generating a real-time voice log associated with the real-time voice interaction, parsing the real-time voice log, via a real-time parser, converting, in real-time via a real-time converter, the parsed voice log to a real-time user interface log, generating a real-time user interface comprising the real-time user interface log, and displaying the real-time user interface comprising the real-time user interface log to the user for debugging the real-time voice interaction.
A system is provided for intelligent automatic resolution of inactive computer code in a multi cloud environment. In particular, the system may comprise an artificial intelligence powered apparatus that may use one or more machine learning models and/or neural networks to analyze data from a cloud computing environment, such as system logs, memory dumps, real-time status queries, and/or the like. Based on analyzing the data, the system may identify inactive, unused, and/or redundant code within the cloud computing environment. The system may then compute a confidence level associated with the identification of the inactive code. Upon detecting that the confidence level has exceeded a defined threshold, the system may automatically initiate one or more remediation processes, such as deletion or modification of the inactive code. In this way, the system may provide a way to automatically remove inactive code from the cloud computing environment.
Aspects related to impersonation detection using an authentication enforcement engine are provided. An authentication enforcement platform may retrieve electronic signatures and device records. The platform may train an authentication enforcement engine, using the electronic signatures and device records, to generate similarity scores for transmissions. The platform may intercept a transmission. The platform may generate a similarity score for the transmission based on extracted information of the transmission. The platform may identify whether the similarity score satisfies a threshold. If the similarity score satisfies a threshold, the platform may update a device record, update the authentication enforcement engine, and route the transmission. If the similarity score fails to satisfy the threshold score, the platform may identify whether manual review is necessary. In some examples, the platform may initiate security actions responsive to the transmission. The platform may update the authentication enforcement engine based on initiating the security actions.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
98.
Intelligent Apparatus To Monitor And Auto Deploy Security Policy Rules On Container Based Cloud Infrastructure Leveraging NFT & Quantum Knowledge Graph
Aspects of the disclosure relate to monitoring and deploying security policy rules in in a container-based computing infrastructure. A computing platform may train a quantum knowledge graph based on interactions in a container-based computing infrastructure. The computing platform may generate and deploy, to the container-based computing infrastructure, one or more security rules associated with interactions in the container-based computing infrastructure based on the quantum knowledge graph les. Subsequently, the computing platform may monitor interactions between containers in the container-based computing infrastructure and identify, using the quantum knowledge graph, an anomaly in a first interaction between a first container and a second container. Based on identifying the anomaly, the computing platform may thereafter perform a verification analysis of the first interaction to determine a potential security risk and send, to an administrator computing platform, an alert action configured to be displayed on an interface of the administrator computing platform.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computersPlatforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing
A system is configured to obtain information relating to a current application environment of a software application and build a plurality of model application environments based on the obtained information. The system runs the software application using the current application environment and each of the model application environments. The system collects a plurality of performance metrics related to performance of the software application in the current application environment and each of the model application environments while running in the simulated environment. The system generates a recommendation report based on the performance metrics, wherein the recommendation report comprises a recommendation of a different technology product for at least one of the technology components used in the current application environment, wherein the different technology product is different from a current technology product used for the at least one technology component in the current application environment.
Systems, computer program products, and methods are described herein for automatically building dynamic queries for identifying data in unstructured datasets. The present disclosure is configured to receive a plurality of pre-defined query templates associated with an alert type(s); dynamically filter the plurality of pre-defined query templates based on the alert type(s); identify an unstructured database note(s) based on a user identifier; apply the unstructured database note(s) and the filtered plurality of pre-defined query templates to an unstructured notes search engine; generate, by the unstructured notes search engine, at least one raw score for the at least one unstructured database note and for each alert type(s); transform, by the unstructured notes search engine, the at least one raw score to a relevancy score using a quantile transformation; and determine a highest relevancy score for each of the at least one unstructured database note for the user identifier.