System for electronic data obfuscation and protection using independent destructible data objects

    公开(公告)号:US12105794B2

    公开(公告)日:2024-10-01

    申请号:US18125420

    申请日:2023-03-23

    IPC分类号: G06F21/54 G06F21/31 G06F21/60

    摘要: A system is provided for electronic data obfuscation and protection using independent destructible data objects. The system may split a set of data into a data portion and a key portion, where the data portion may be stored in a database separately from the key portion. The data portion may further comprise a set of executable code for a time or iteration based destructible data object, where the data object may incrementally decrease a countdown value based on the passage of time and/or iterations. If the countdown value reaches a threshold value without being refreshed, the data object may automatically execute one or more processes to protect the set of data. In this way, the system provides a secure way to prevent unauthorized access to sensitive data.

    Multi-MCC code bundle for use in increasing travel security

    公开(公告)号:US12015924B2

    公开(公告)日:2024-06-18

    申请号:US16940518

    申请日:2020-07-28

    摘要: A proxy-based method for improving digital security during a user's travel is provided. The method may include determining a bundle of merchant category classification (MCC) codes. This bundle preferably reflects a baseline travel condition. The baseline travel condition is associated with a user mobile device. The method may also include dynamically updating a characteristic associated with the bundle of MCC codes based on updated travel conditions. The method may also include determining an occurrence of an anomalous user mobile device activity. The determination may be based on a comparison of the updated characteristic associated with the bundle of MCC codes and the baseline travel conditions; and in response to a determination of anomalous user mobile device activity, increasing a security level associated with the mobile device associated with the user.

    System for authorization of electronic data access and processing functions within a distributed server network

    公开(公告)号:US11881939B2

    公开(公告)日:2024-01-23

    申请号:US17494351

    申请日:2021-10-05

    IPC分类号: H04L29/06 H04L9/40

    CPC分类号: H04L63/105

    摘要: A system provides for authorization of data access and processing functions within a distributed server network using a delegated proof-of-stake consensus mechanism. In particular, the system may use assign authorization levels to each node within the network environment. Certain actions or processes performed within the network (e.g., potentially damaging actions) may require that the node proposing the action meets a threshold authorization level before authorizing the action. The system may further increase or decrease authorization levels for each node depending on the outcomes of the proposed actions. In this way, the system may provide a secure way to authorize certain actions or processes taken within a computing environment.

    Homomorphic Encryption-Based Testing Computing System

    公开(公告)号:US20240020222A1

    公开(公告)日:2024-01-18

    申请号:US18374016

    申请日:2023-09-28

    发明人: Brandon Sloane

    IPC分类号: G06F11/36 H04L9/00 G06F11/32

    摘要: A homomorphic encryption-based testing computing system provides a risk-based, automated, one-directional push of production data through a homomorphic encryption tool and distributes the encrypted data to use in testing of applications. Data elements and test requirements are considered when automatically selecting a homomorphic encryption algorithm. A decisioning component selects an algorithm to use to homomorphically encrypt the data set and a push mechanism performs one or both of the homomorphic encryption and distribution of the encrypted data set to at least one intended host. Once delivered, the testing software and/or testing procedures proceed using the encrypted data set, where results of the testing may be stored in a data store. A validation mechanism may validate the test data against production data and communicates whether testing was successful.

    SYSTEM AND METHOD FOR DYNAMIC USER AUTHENTICATION

    公开(公告)号:US20230403270A1

    公开(公告)日:2023-12-14

    申请号:US17839155

    申请日:2022-06-13

    IPC分类号: H04L9/40

    CPC分类号: H04L63/0861

    摘要: An apparatus for dynamic user authentication comprises a processor associated with a server. The processor is configured to receive session data associated with a first user, wherein the session data comprises user parameters for a session and to receive an interaction request to authorize an interaction of a first avatar associated with the first user in a virtual environment. The processor is further configured to compare the user parameters of the session data to user parameters of a stored user profile and to authorize the interaction in response to comparing the session data to the stored user profile if a confidence threshold is satisfied. The processor is further configured to train the machine learning algorithm with the received session data to update the user profile, wherein updating the user profile improves information security by authenticating that the first user is authorized to interact via the first avatar.

    SYSTEM FOR SECURING ELECTRONIC DEVICES AND ELECTRONIC DATA USING AUTOMATED DYNAMIC CONTROL MODIFICATIONS

    公开(公告)号:US20230344874A1

    公开(公告)日:2023-10-26

    申请号:US17725138

    申请日:2022-04-20

    IPC分类号: H04L9/40

    CPC分类号: H04L63/205

    摘要: A system is provided for securing electronic devices and electronic data using automated dynamic control modifications. In particular, the system may comprise one or more electronic devices or computing devices, each of which may have a protection module installed thereon, where the security module may be configured by the system. The security module may define a time period within which the computing device must establish an authenticated connection to an authorized and/or trusted network. If the time period elapses without an authenticated connection and/or upon the occurrence of certain predetermined conditions, the security module may perform a secure wipe of the data on the computing device. In this way, the system may provide a way to secure electronic devices and data within the network environment.