Various aspects of the disclosure relate to automated monitoring and remediation of computing threats at an endpoint computing device. An endpoint monitoring tool is configured to monitor for security threats on the local host computing device. An identified threat causes the endpoint monitoring tool to automatically quarantine the local device and any associated user accounts. During a pre-defined time period the endpoint monitoring tool analyzes an impact of the threat and any user activities from the time a suspect file was created. The endpoint monitoring tool attempts to automatically mitigate the security threat during the pre-defined time period. If the threat was cleared, the local computing device and the user accounts are released for normal use. If the threat was unable to be cleared within the time period, additional mitigation processes are triggered.
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
2.
SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING AND AUTHENTICATING VIRTUAL RESOURCE TRANSFER DEVICES COMPRISING ELECTRONIC DATA RECORDS IN A DISTRIBUTED NETWORK
Systems, computer program products, and methods are described herein for implementing and authenticating virtual resource transfer devices comprising electronic data records in a distributed network. The present invention is configured to receive data associated with a virtual resource token owned by a user; determine a resource value of the virtual resource token; generate a virtual resource transfer device associated with the virtual resource token; and generate, based on the resource value of the virtual resource token, a resource transfer availability of the virtual resource transfer device.
Embodiments of the invention are directed to a system, method, or computer program product for convenient, secure digital data archiving and utilization across multiple communication channels. The system and methods may also include an array of indications regarding what documents may be required to be uploaded by a user, how many documents to upload, and a confirmation of documents uploaded being the correct types following a user upload action. As such, the system may utilize JSON templates indicating a number of required documents, a correct confirmation message following document upload, and a mechanism for confirming that the documents being uploaded are the correct types of documents via an analysis of input fields of the uploaded documents.
Systems, methods, and computer program products are provided for resource transfers with authentication based on hyperspectral imaging. An example method includes receiving a request for hyperspectral image generation associated with a first user and receiving one or more account credentials of the first user. The method further includes generating, via a hyperspectral imaging module, hyperspectral image data based on the one or more account credentials of a first user and generating, via the hyperspectral imaging module, a hyperspectral image based on the hyperspectral image data. The method may further cause application of the hyperspectral on a body of a resource transfer object.
Aspects of the disclosure relate to information security. A computing platform may configure a connector framework to: preconfigure identities of data production systems without involvement of a third party system, and ingest information, received from the data production systems, directly into a storage layer at each of a plurality of data recipient systems, where the information may be received in a plurality of different programming languages, and the plurality of data production systems may be located in different geographic regions. The computing platform may receive, at the connector framework and from a first data production system of the data production systems, first information. The computing platform may ingest the first information by: replicating, using the connector framework, the first information, and making available, to the plurality of data recipient systems, the first information, which may cause storage of the replicated first information in real time.
A method for user credential authentication includes receiving real-time logs from a blockchain network that is configured to perform an authentication process of a user. The real-time logs are normalized and bucketized to generate processed real-time logs, which are stored in a block and are added to a blockchain. The processed real-time logs are analyzed to identify the plurality of real-time behavioral patterns of the user. A first authentication score is determined by comparing a first real-time behavioral pattern to a respective first historical behavioral pattern. The first authentication score is compared to a first authentication score threshold, which corresponds to the first real-time behavioral pattern and the respective first historical behavioral pattern. In response to the first authentication score being less than the first authentication score threshold, a first instruction is sent to the blockchain network to temporarily stop the authentication process of the user.
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
7.
SYSTEMS, METHODS, AND APPARATUSES FOR TRACKING NETWORK TRAFFIC DATA AND IDENTIFYING ROGUE ACCESS PATTERNS IN AN ELECTRONIC NETWORK
Systems, computer program products, and methods are described herein for tracking network traffic data and identifying rogue access patterns in an electronic network. The present invention is configured to receive a plurality of peer user accounts; receiving a plurality of peer user data associated with the plurality of peer user accounts; generating a relational mapping based at least on the predetermined group; and generating a plurality of peer historical data access patterns based on the plurality of peer user data over the historical predetermined period. The present invention may further be configured to receive a primary user account; receive a plurality of primary user data; generate a plurality of primary user access patterns; compare the plurality of peer historical data access patterns and the plurality of primary user access patterns to generate an abnormality score; and determine whether the abnormality score meets the abnormality threshold.
A device that is configured to receive user activity information that includes information about user interactions with a network device for a plurality of users. The device is further configured to input the user activity information into a first machine learning model that is configured to receive user activity information and to output a set of bad actor candidates based on the user activity information. The device is further configured to filter the user activity information based on the set of bad actor candidates. The device is further configured to input the filtered user activity information into a second machine learning model that is configured to receive the filtered user activity information and to output system exposure information that identifies network security threats. The device is further configured to identify network security actions based on the network security threats and to execute the network security actions.
Systems, methods, and computer program products are provided herein for hyperspectral imaging based electronic authentication resource transfers. An example method includes receiving a resource transfer request associated with at least a first user and receiving hyperspectral image data associated with the first user. The method further includes extracting, via a hyperspectral imaging module, one or more account credentials of the first user from the hyperspectral image data. The method also includes effectuating the resource transfer associated with an account of the first user as defined by the one or more account credentials. The hyperspectral image data may be generated in response to an image capturing operation performed by the hyperspectral imaging module and may be indicative of a hyperspectral image supported by a resource transfer object.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06F 21/45 - Structures ou outils d’administration de l’authentification
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
10.
System and method for using a validated card in a virtual environment
An apparatus for using a validated card in a virtual environment comprises a processor associated with a server. The processor is configured to receive a request to conduct an interaction between a first avatar and an entity in a virtual environment. The processor is further configured to receive card information and device information from an unknown user device. The processor is further configured to verify that the unknown user device is a first user device. The processor is further configured to receive virtual session information that is associated with a virtual environment session. The processor is further configured to determine if the request to conduct the interaction occurred in the same virtual environment session as the reception of the card information. The processor is further configured to conduct the interaction between the first avatar and the entity with the received card information.
Systems, computer program products, and methods are described herein for electronic resource transfer authentication via a user characteristic data verification engine. The system receives a request to transfer electronic resources from a first endpoint device of a merchant. The system then identifies a resource vehicle owner associated with the electronic resource transfer, identifies at least one second endpoint device, then transmits a request for verification from the entity to the at least one second endpoint device, utilizing an application programming interface. The user characteristic feedback hardware of the at least one second endpoint device collects identifier data from the user of the at least one second endpoint device, and a user characteristic data verification engine is initiated and thereafter determines a binary identification output. An entirety of the electronic resources are distributed to the merchant based on the binary identification output.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/42 - Confirmation, p.ex. contrôle ou autorisation de paiement par le débiteur légal
12.
AUTOMATED SYSTEM FOR AUTHENTICATION AND MONITORING USE OF AN ARTIFICIAL INTELLIGENCE ENGINE
Systems, computer program products, and methods are described herein for authentication and monitoring of an artificial intelligence (AI) engine. The present invention is configured to receive, from a first network device, a first set of binary data associated with an AI engine; calculate, based on the first set of binary data, an engine hash value; store the engine hash value; receive, from a second network device, an approval of the first set of binary data; update an approval status of the engine hash value; receive, from a network device associated with a final user, a second set of binary data; determine that a second hash value associated with the second set of binary data matches the engine hash value; and transmit a notification to the network device associated with the final user, wherein the notification instructs the network device to allow the final user to launch the AI engine.
A method for database backup, search, and recovery using a quantum-computing-powered system with multi-dimensional scaling is provided. The method may include storing a first dataset in a first local database, generating a second dataset from a critical subset of the first dataset, and storing the second dataset in a second remote, cloud-based, database. The method may include receiving a search query at the first database. The method may include receiving a first indication of an outage at the first database and, in response to the first indication, routing the search query to a quantum processor and executing the search on the second dataset. The method may include receiving a second indication of a loss of data from the first dataset at the first database, and, in response to the second indication, restoring the critical subset of the first dataset to the first database from the second dataset at the second database using the quantum processor. The method may include automatically scaling the quantum processor during a processing task.
G06N 10/80 - Programmation quantique, p.ex. interfaces, langages ou boîtes à outils de développement logiciel pour la création ou la manipulation de programmes capables de fonctionner sur des ordinateurs quantiques; Plate-formes pour la simulation ou l’accès aux ordinateurs quantiques, p.ex. informatique quantique en nuage
G06F 16/21 - Conception, administration ou maintenance des bases de données
Aspects of the disclosure relate to generating a multi-platform remediation infrastructure based on intelligently forecasting and configuring a remediation schedule. The computing platform may continuously analyze components within the enterprise organization infrastructure to identify at least one vulnerability within the infrastructure. The computing platform may group the vulnerabilities based on identified similarities and may identify, for each group, a time during which each vulnerability may be remediated. The computing platform may use the times to generate a remediation schedule and may analyze the remediation schedule to determine whether the schedule comprises anomalies. Based on determining the remediation schedule does not comprise anomalies, the computing platform may remediate the vulnerabilities indicated on the remediation schedule. Alternatively, based on determining the remediation schedule comprises anomalies, the computing platform may further analyze the vulnerabilities to determine whether the vulnerabilities may be remediated.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
A system for enhancing multi-factor authentication comprises a processor associated with a server. The processor receives a first request with user identity data to access an application service from a user device. The processor generates a multi-factor authentication code to verify a user identity and a user device. The processor implements a customized operation rule with the multi-factor authentication code and a customized security code to generate an enhanced multi-factor authentication code. The processor presents the multi-factor authentication code to the user device with a response for the user to provide the enhanced multi-factor authentication code. The processor determines whether a user input code matches the enhanced multi-factor authentication code. In response to determining that the user input code matches the enhanced multi-factor authentication code, the processor authorizes the user device associated with the user to interact with the entity, such as, for example, to implement the application service.
Systems, computer program products, and methods are described herein for machine learning based network session interaction. The present disclosure is configured to receive, from an end-point device, a user input, wherein the user input comprises natural language data; extract a first set of attributes associated with the user input; determine, using a machine learning (ML) subsystem, a first set of adaptive response actions to the user input based on the first set of attributes; and execute the first set of adaptive response actions.
Systems, computer program products, and methods are described herein for authentication and monitoring of an artificial intelligence (AI) engine. The present invention is configured to receive, from a first network device, a first set of binary data associated with an AI engine; calculate, based on the first set of binary data, an engine hash value; store the engine hash value; receive, from a second network device, an approval of the first set of binary data; update an approval status of the engine hash value; receive, from a network device associated with a final user, a second set of binary data; determine that a second hash value associated with the second set of binary data matches the engine hash value; and transmit a notification to the network device associated with the final user, wherein the notification instructs the network device to allow the final user to launch the AI engine.
A network traffic correlation engine monitors inbound and/or outbound connection information received from on each host computer system on a network. Each host device on the network store data logs corresponding to information corresponding to communications sent by the device and received by the device. The network traffic correlation engine correlates connections between different hosts throughout the network. If the network traffic correlation engine identified unmatched outbound and inbound connections, the network traffic correlation engine generates an alert to initiate further investigation and may also provide a mapping of the communications showing a possible start device for the connection and/or a type of access that the connections may now be providing.
A device configured to identify a first link between a value of a first data element in a first plurality of data elements and values of a first set of data elements in a second plurality of data elements and to remove the first link between the first data element and the first set of data elements. The device is further configured to input the data elements into a machine learning model that is configured to output a second link between the first data element and a second set of data elements. The device is further configured to create an entry in a relationship table that identifies the first data element and the second set of data elements. The device is further configured to generate a data stream with the first data element and the second set of data elements and to output the data stream.
A network security computing system includes a steganographic communications analysis engine monitoring incoming and outgoing messages on a secure computing network. The steganographic communications analysis engine identifies a pattern of file transfers between a first computing device on the secure computing network and an internal or external message recipient. When a pattern is identified, the steganographic communications analysis engine quarantines an associated computing device from the secure network. The steganographic communications analysis engine analyzes files transferred between the computing device and the recipient for indications of steganographic information and causes display, based on an identified indication of steganography, an indication that the computing device had been compromised by command and control malware.
A computing device comprising a secure browser extension for a web browser monitors for satisfaction of one or more operating conditions to identify whether one or more unauthorized applications are intercepting web browser communications. Based on satisfaction of at least one operating condition, the secure browser extension of the computing device sends an HTTPS request to a known service via the web browser. The secure browser extension receives an HTTPS response to the HTTPS request via the web browser. The secure browser extension determines whether the certificate included in the HTTPS response is trusted by the secure browser extension. Based on determining the certificate is not trusted, the secure browser extension terminates the web browser session and generates a notification for display at the computing device that indicates web browser communications are compromised.
A big data analysis system may include a big data repository communicatively coupled to a data accumulation server and a predictive graph processing system. The data accumulation server may be configured to receive information from a plurality of data sources, the information corresponding to user interaction with one or more computing devices associated with an organization via a networked computing system, store the information received from the plurality of sources in the big data repository; and monitor the plurality of data sources to update the data stored in the big data repository. The predictive graph processing system is configured to receive information stored in the big data repository, transform the information received from the big data repository into a predictive graph data set based on a predictive model, and store the predictive graph data set to a visualization data repository.
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06F 16/901 - Indexation; Structures de données à cet effet; Structures de stockage
G06F 16/904 - Navigation; Visualisation à cet effet
G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
23.
DISTRIBUTED LEDGER SYSTEM FOR SUPERVISION OF AN ARTIFICIAL INTELLIGENCE ENGINE
Systems, computer program products, and methods are described herein for monitoring an artificial intelligence (AI) engine. The present invention is configured to receive, from a first network device, a first set of decision parameters associated with an AI engine; encrypt the first set of decision parameters, generating an encrypted dataset; store the encrypted dataset on a transaction object; receive, from a second network device, an output associated with the AI engine; update the transaction object based on the output associated with the AI engine; and transmit a notification to the first network device, wherein the notification comprises a decrypted dataset.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
24.
SYSTEMS AND METHODS FOR CONTROLLING ELECTRONIC COMMUNICATIONS IN REAL TIME VIA AN ARTIFICIAL INTELLIGENCE ENGINE BASED ON LOCATION DATA AND USER DATA
Systems, computer program products, and methods are described herein for controlling electronic communications in real time via an artificial intelligence engine based on location data and user data. The present invention may be configured to determine a location of a user device associated with a user based on location data generated by the user device and determine, using an emotional artificial intelligence engine, an emotional state of the user based on user data. The present invention may be configured to determine resources associated with the user and identify, from the resources associated with the user, relevant resources associated with an entity in proximity to the location of the user device. The present invention may be configured to generate, based on the emotional state of the user, notifications including information regarding the relevant resources and present, using an output device of the user device, the notifications to the user.
A system that involves a secure network, an unsecure network and a bridge server is provided. The bridge server may retrieve updates to applications from the unsecure network. The bridge server may store the retrieved updates on a secure storage location within the secure network. Devices located on the secure network may continually, periodically or otherwise check the secure storage location for updates. The updates may be downloaded to the devices for execution on the devices.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
26.
SYSTEM AND METHOD FOR SECURE VALIDATION, REGISTRATION, AND DISTRIBUTION OF RESOURCES IN A DISTRIBUTED ELECTRONIC NETWORK
Embodiments of the present invention provide a system for secure validation, registration, and distribution of resources in a distributed electronic network. In particular, the system may be configured to determine that a user is at a third party entity location for acquiring computing device provided by a third party entity associated with the third party entity location, establish a connection between a user device of the user and the computing device, cause the user device to extract computing device information associated with the computing device, via the connection, receive an input associated with acquiring the computing device, transfer funds associated with acquiring the computing device from a resource pool of the user to an entity resource pool associated with the third party entity, via the user device, and establish a smart contract between the user and the third party entity associated with the computing device.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
27.
Real-time dynamic caching platform for metaverse environments using non-fungible tokens
Aspects of the disclosure relate to a dynamic caching platform. The dynamic caching platform may train a machine learning model based on historical complexity score information. The dynamic caching platform may receive information streams from a client metaverse device and a metaverse host system. The dynamic caching platform may generate a complexity score based on the interaction information streams using the machine learning model. The dynamic caching platform may compare the complexity score to complexity thresholds. Based on the comparison, the dynamic caching platform may identify caching rules. The dynamic caching platform may cache interaction information based on the caching rules. The dynamic caching platform may update the complexity score using the machine learning model. The dynamic caching platform may update the caching rules based on the updated complexity score. The dynamic caching platform may cache interaction information based on the updated caching rules.
G06F 12/0802 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p.ex. mémoires cache
Systems, computer program products, and methods are described herein for network traffic routing and load balancing in an electronic network. The present disclosure is configured to identify, by an application layer, at least one website access request by a user account, wherein a website access request comprises a website identifier; transmit the website access request to a traffic routing layer; identify, by the traffic routing layer, a plurality of potential websites; determine, by the traffic routing layer, whether a routing identifier is present for the user account and in response to determining the routing identifier, pin the user account to a pinned website of the potential websites based on the routing identifier; and determine, by the traffic routing layer, whether the pinned website comprises an up attribute or down attribute, and to direct the website access request based on at least this up or down attribute.
A method for consolidating backup status data associated with backup operations performed at a specialty backup service platform into a centralized backup service platform may be provided. The method may include receiving data feeds associated with each backup operation, each data feed comprising backup status data associated with a backup operation performed at the specialty backup service platform. The method may also include extracting the backup status data from each data feed and following the extracting, conforming the backup status data at the centralized backup service platform to be consistent with the standardized format. The method may also include for each data feed received from the specialty backup service platform, running a performance-scan on the backup status data within the data feed for determining whether the backup operation was a success or a failure.
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
30.
System and method for server monitoring and problem resolution for electronic mail messages
A method is provided that comprises monitoring for a change in a first security configuration setting in a relay server and comparing the change in the first security configuration setting to historical data that contains validated authentication configuration settings that previously allowed for the delivery of a historical electronic mail message to an external network. The method further comprises identifying a candidate change to the first security configuration setting based on the comparison, where the candidate change to the first security configuration setting when implemented results in the delivery of a first electronic mail message to the external network. The method further comprises implementing the candidate change to the first security configuration setting such that the relay server allows the delivery of the first electronic message to the external network.
Apparatus and methods for enhancing a videotelephony conference experience by generating dynamic audio channels. Audio outputs may be provided to listeners over different channels. The multiple channels may simulate live, in-person conversation with conference participants. For example, listeners may also conduct separate, private conversations with other participants of the conference without leaving the general conference conversation. The videotelephony conference interface may coordinate presentation of participants to reflect the audio channels provided to a listener. For example, actively speaking participants may be positioned in different regions of the interface.
User interactions are tracked within a Graphical User Interface (GUI) configured for user consent/authorization, specifically user interactions that indicate that the user has abandoned the consent/authorization process. As a result of such tracking/recordation, abandonment metrics are determined, such as volume of abandonments over a given time period, rate of abandonment, time to abandonment and the like. In specific embodiments of the invention, the abandonment metrics are used to intelligently determine, in some instances on a per-user basis, whether a need exists to reconfigure the GUI and, if a need exists, what sensory alterations to the GUI should be implemented.
Systems, computer program products, and methods are described herein for network traffic discovery and analysis. The present invention is configured to capture data traffic across network ports in a computing environment; retrieve source code from code repositories; determine that the data traffic and the source code are associated with application programming interface (API) traffic; determine a first API associated with the API traffic; determine, using a machine learning (ML) subsystem, whether the first API meets supervisory requirements; and invoke a remediation protocol in an instance when the first API does not meet supervisory requirements.
H04L 47/2425 - Trafic caractérisé par des attributs spécifiques, p.ex. la priorité ou QoS pour la prise en charge de spécifications de services, p.ex. SLA
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
34.
MACHINE LEARNING BASED SYSTEM(S) FOR NETWORK TRAFFIC DISCOVERY AND ROUTING
Systems, computer program products, and methods are described herein for network traffic discovery and routing. The present invention is configured to capture data traffic across network ports in a computing environment; retrieve source code from code repositories; determine that the data traffic and the source code are associated with application programming interface (API) traffic; determine one or more end-point devices associated with the API traffic; determine a first API capable of processing the API traffic, wherein the first API meets supervisory requirements; and transmit a notification to the one or more end-point devices, wherein the notification comprises a recommendation to use the first API to process the API traffic.
H04L 47/2425 - Trafic caractérisé par des attributs spécifiques, p.ex. la priorité ou QoS pour la prise en charge de spécifications de services, p.ex. SLA
A system for integrating trading account security with associate investment policy (AIP) governance is provided. The system includes a processor, a receiver, and a series of containers. The receiver may receive an associate trade request including an associate social security number (SSN), an associate name, a name of a security to which the trade request is directed, a last security purchase data, the last security purchase data associated with the security, and a broker dealer name. The employee may be a private side employee. The system may include a series of containers for storing microservices. The containers communicate with a database engine. The trade request may be industry compliant and employer regulations compliant. The processor may transmit a fully compliant trade request to an employer platform. Following receipt of a trade request confirmation from the employer platform, the associate trading platform may execute the trade request.
A system for integrating trading account security with associate investment policy (AIP) governance is provided, including a processor and a receiver for receiving an associate trade request. The trade request may include an associate social security number and name, a name of a security, a last security purchase data, the last data for the security, and a broker dealer name. The processor may determine that the employee is a private side employee and then use a series of containers in electronic communication with a database or engine to determine industry and employer regulations compliance, after which the processor may transmit the request to an employer trading platform and may include an instruction to allow executing the trade request within a pre-determined time period and prompting the associate with a selectable option to execute the trade request.
G06Q 40/04 - Transactions; Opérations boursières, p.ex. actions, marchandises, produits dérivés ou change de devises
G06Q 40/06 - Gestion de biens; Planification ou analyse financières
37.
REAL TIME SYSTEM WITH ARTIFICIAL INTELLIGENCE (AI) MECHANISM FOR RECTIFYING TRADING REQUESTS DENIED BASED ON ASSOCIATED INVESTMENT POLICY (AIP) GOVERNANCE
A computer system for integrating trading account security with associate investment policy (AIP) governance is provided. The system includes a processor and a receiver. A received trade request may include an associate social security number, an associate name, a security name, a last security purchase data, and a broker dealer name. The employee may be a private side employee. The processor may use a series of containers in electronic communication with a database or database engine to determine that the trade request is industry compliant and employer regulations compliant. When the trade request is determined to be non-compliant, then the processor may electronically message or e-mail the employee 1) a trade denial and 2) insider trading mitigation messages. Following a determination that the trade request is fully compliant; the processor may transmit the trade request to an employer trading platform and prompt the associate to execute the trade request.
A method using one or more mobile devices for transporting information from an automated teller machine (“ATM”) to a central server when the ATM does not support a network connection and, upon return of the one or more mobile devices to the ATM, updating the ATM may be provided. The method may include transporting electronic transaction data processed locally at the ATM, via a mobile device, to a location where a network connection between the mobile device and the central server may be established. When in a location including network connection, the method may include transmitting the electronic transaction data to the central server. When the mobile device is detected to have returned to be within the pre-determined range of the ATM, the method may include transmitting a data packet to the ATM, the data packet received from the central server, thereby updating the ATM of the transmittal.
Aspects of the disclosure relate to energy optimization. A computing platform may receive an event processing request, and may identify its parameters. The computing platform may package, based on the parameters, the event processing request into containers. The computing platform may input the parameters into an energy optimization model, which may identify: a data center computing system and an energy mix for processing the event processing request. The computing platform may encrypt the containers. The computing platform may send, to the data center computing system, the encrypted containers and commands directing the data center computing system to: decrypt the encrypted containers to identify the event processing request, and process the event processing request using the energy mix, which may cause the data center computing system to decrypt the encrypted containers and process the event processing request using the energy mix.
G06Q 50/06 - Fourniture d'électricité, de gaz ou d'eau
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
40.
System and method for switching between public and private operations for conducting interactions in a metaverse
A system for switching between public and private operations for conducting interactions comprises a processor associated with a server. The processor accesses a virtual environment configured to provide interactions associated with an entity. The processor receives interaction objects and an input operation mode from an avatar associated with a user device for an interaction. The processor determines the input operation mode is a private operation mode and further processes the interaction objects and the user profile to determine a first set of protocols compatible with the private operation mode. The processor verifies that the interaction objects match authentication requirements of the first set of the protocols. The processor determines a system environment is compatible with the first set of the protocols and comprises a set of applications in the private operation mode. The processor executes the applications to process the interaction objects to conduct the first interaction.
Aspects of the disclosure relate to identifying and resolving consumer transactions using consumer call analytics. The computing platform may monitor consumer transactions and score each detected transaction. The computing platform may predict, using the score associated with the transaction, whether the consumer may request assistance with the transaction. The computing platform may receive, from the consumer, a request for assistance with at least one transaction. The computing platform may use a unique consumer identifier to identify transactions associated with the consumer. The computing platform may determine whether at least one similar consumer request for assistance was previously received. If at least one similar consumer request for assistance was previously received, the computing platform may retrieve the previously received request and a corresponding solution. Alternatively, a similar consumer request for assistance was not previously received, the computing platform may generate a solution to the consumer request.
Apparatus and methods for a proactive monitoring-container switching system is provided. The system may include a server cluster. The system may proactively monitor the servers within the cluster to determine if one or more servers within the cluster are showing weaknesses. Upon identifying the weaknesses, the system may identify an available server within the cluster and copy the contents of the weakened server to the available server. The system may then switch the DNS pointer from the weakened server to the available server. Switching the DNS pointer may switch any users and/or applications from the weakened server to the available server with minimal disruption. The synchronizing between servers may maintain the health of the server cluster.
G06F 11/20 - Détection ou correction d'erreur dans une donnée par redondance dans le matériel en utilisant un masquage actif du défaut, p.ex. en déconnectant les éléments défaillants ou en insérant des éléments de rechange
Arrangements for providing emerging topic detection are provided. In some aspects, customer issue data may be received. For instance, voice data from customer and customer service associate interactions may be received. The customer issue data may be converted to text data and the text data may be further analyzed. For instance, a first body of terms for a first time period and a second body of terms for a second time period after the first time period may be generated. The generated first body of terms may be subtracted from the second body of terms to generate filtered terms. The filtered terms may then be further analyzed using, for instance, Latent Dirichlet Allocation (LDA) to identify emerging terms that may then be categorized and stored in one or more databases. In some examples, emerging terms and/or associated categories may be transmitted to a computing device for display on a dashboard.
A data manager receives a first data layout from a data source and classifies the first data layout as corresponding to a first data domain. The data manager compares the first data layout with one or more existing data layouts that are already classified as corresponding to the first data domain and detects that at least one attribute and corresponding dataset of the first data layout matches with a second attribute and corresponding second dataset from an existing data layout. Data manager generates a second data layout corresponding to the first data layout, wherein the second data layout is a copy of the first data layout with the at least one attribute and the corresponding dataset from the first data layout replaced by the second attribute and the second dataset from the first existing data layout. Data manager loads a data warehouse from the second data layout.
G06F 16/20 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet de données structurées, p.ex. de données relationnelles
G06F 16/21 - Conception, administration ou maintenance des bases de données
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
An ATM is configured to interact with a mobile device and provide user access to one or more of the banking services available at the ATM using the mobile device. Banking-related information may be viewed and/or input at the ATM using the mobile device. The ATM may have multiple vertical levels of deposit slots, withdrawal trays and/or receipt dispensers. A level at the ATM at which the user interacts with the ATM for deposits, withdrawals, or receipts may be selected. The level may be specified by the user of the mobile device, at the ATM or using the mobile device, or may be determined by the ATM.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
46.
Artificial Intelligence-Based Lateral Movement Identification Tool
A lateral movement identification tool analyzes communications sent and received from a local host to identify potential instances of lateral movement. When the host-based lateral movement identification tool identifies a host to host connection, the tool processes one or more artificial intelligence algorithms to analyze information from local network resources including a directory service, a local network system such as a network basic input/output system, a domain name system, and event logs. The lateral movement identification tool correlates the aggregated information with identified host to host messaging and sends alerts when lateral movement is suspected. Alerts may be either presented locally or provided to a central console based on configuration information.
A screen-less automated teller machine (ATM) may be configured to interact with a mobile device. The ATM may automatically detect the presence of the mobile device in a vicinity of the ATM and initiate contact with the mobile device, or a mobile device may initiate contact with the ATM. After verifying user permission to access the ATM, the mobile device may be enabled to provide user access to one or more of the banking services available at the ATM using the mobile device. As the ATM is screen-less, banking-related information may be viewed and/or input at the ATM using the mobile device. An application on the mobile device may be used to access and interact with the ATM using the mobile device.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G07F 19/00 - Systèmes bancaires complets; Dispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p.ex. guichets automatiques
48.
SYSTEMS, METHODS, AND APPARATUSES FOR TRANSMISSION OF VERIFICATION CERTIFICATES IN AN ELECTRONIC NETWORK
The present invention provides for implementing an internal entity intermediate certificate authority via a mutual transport layer security conversation to allow an entity-specific certificate authority to generate its own certificate which is transmitted to a second point in the internal transmission for sending of the external certificate authority generated certificate to the external entity for mutual authentication. Further, in this way, the first point of internal transmission does not have to store the certificate in its own hardware security module.
Systems, computer program products, and methods are described herein for implementing resource ownership verifications in a federated distributed ledger. The present invention is configured to receive a query, wherein the query comprises a resource identifier; identify a federated distributed ledger associated with the resource identifier, the federated distributed ledger comprising data associated with an ownership of a resource associated with the resource identifier; query at least one entity associated with the resource, the query of the at least one entity associated with the resource comprising an update request of the resource, wherein the update request comprises a request to the at least one entity associated with the resource to determine a current owner of the resource; and update the federated distributed ledger with the current owner of the resource.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
50.
SYSTEM AND METHOD FOR SECURELY ELECTRONICALLY TRANSMITTING CRYPTOGRAPHIC CERTIFICATES IN HIGH DATA TRANSMISSION VOLUME
Embodiments of the present invention provide a system for securely electronically transmitting cryptographic certificates in high data transmission volume. The system is configured for initiating setup of an external secure hardware device, storing one or more digital keys and one or more cryptographic certificates associated with the digital keys on the external secure hardware device, determining initialization of an entity application, storing copies of at least the one or more cryptographic certificates in a cache memory of the entity application, generating a request for transmitting to a third party entity, extracting a cryptographic certificate from the cache memory associated with the third party entity, and transmitting the request and the cryptographic certificate to the third party entity.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Aspects of the disclosure relate to energy optimization. A computing platform may receive a cryptocurrency request indicating a gas price and KPIs of the cryptocurrency request. The computing platform may input the gas price and the KPIs into a mining optimization model, which may cause the mining optimization model to output an energy mix for use in processing the cryptocurrency request. The energy mix may indicate energy sources, capable of providing an amount of energy needed to process the cryptocurrency request and used to support operation of a data center configured to process cryptocurrency requests, and a cost of the amount of energy from the energy mix may be less than a cost of the amount of energy from other available energy sources. The computing platform may send commands directing the data center to process the cryptocurrency request using the energy mix, which may cause it to do so.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
52.
Generating Transaction Recommendations Based on Monitoring and Analyzing Consumer Transactions
Aspects of the disclosure relate to generating transaction recommendations based on monitoring and analyzing consumer transactions. The computing platform may monitor consumer transactions and a transaction history associated with a consumer. The computing platform may analyze the transaction history and identify transactional issues the consumer may have experienced. The computing platform may determine whether current enterprise organization programs address the identified transactional issues. If the current enterprise organization programs fail to address the transactional issues, the computing platform may generate solutions to the transactional issues. Alternatively, if the current enterprise organization programs address the transactional issues, the computing platform may retrieve the programs. The computing platform may initiate communication with the consumer to transmit the programs and/or the generated solutions.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
53.
SYSTEM AND METHOD FOR IDENTIFYING AND PREVENTING MISAPPROPRIATION USING NORMALIZED REQUEST SEQUENCES
Systems, computer program products, and methods are described herein for identifying and preventing misappropriation using normalized request sequences. The method includes receiving a sequence of two or more requests associated with a user. The method also includes comparing the sequence of two or more requests with one or more past sequence of two or more past requests. The method further includes determining whether the sequence of two or more requests were carried out by the user or the malfeasant actor. The determination is made based on a comparison of the sequence of two or more requests with at least one of the one or more past sequence of two or more past requests. The method also includes causing an escalation action to be executed in an instance in which the sequence of two or more requests was carried out by the malfeasant actor.
A system for establishing a network communication between two or more users receives a request to establish a call between an endpoint device associated with a user and user equipment (UE) associated with a client. The system determines that the endpoint device is available for a call by querying a network node configured to route calls to the endpoint device. The system routes a first call to the endpoint device. The system routes a second call to the UE. The system establishes a call between the user and the client by merging the first call and the second call.
H04L 65/1069 - Gestion de session Établissement ou terminaison d'une session
H04L 65/1104 - Protocole d'initiation de session [SIP]
H04M 3/51 - Dispositions centralisées de réponse aux appels demandant l'intervention d'un opérateur
H04M 3/523 - Dispositions centralisées de réponse aux appels demandant l'intervention d'un opérateur avec répartition ou mise en file d'attente des appels
55.
DEEP LEARNING ARCHITECTURE FOR ADVERSE MEDIA SCREENING
Systems, methods, and apparatus are provided for deep learning architecture for adverse media screening. A dynamic data stream may be generated from news reports acquired from a variety of media channels in a variety of formats. Reports may be separated by format. A graphing module for each type of media may use geometric clustering algorithms to group reports into a coherence graph. Fact-checking sources may be incorporated into the graph. A graph neural network may determine coherence between news claims and fact-checking sources, between news claims and supporting report details, between similar reports, and/or between video and audio within the report itself. The network may output a legitimacy score for a report. A credible report may be flagged and retrieved in the course of a customer screening. Materiality may be determined for a credible report and may trigger a customer account closure protocol.
G06N 3/067 - Réalisation physique, c. à d. mise en œuvre matérielle de réseaux neuronaux, de neurones ou de parties de neurone utilisant des moyens optiques
56.
Dynamic Context Aware Response System for Enterprise Protection
Arrangements for providing context aware response functions are provided. In some examples, sensor data may be received from a plurality of sensors in a sensor data farm associated with an enterprise organization. The sensor data may be received from various types of sensors and/or from sensors from various vendors or manufacturers. a machine learning model may be executed to analyze the sensor data. Based on an output of the machine learning model, a determination may be made as to whether one or more enterprise-specific thresholds have been met or exceeded. If not, additional, subsequently received data may be analyzed. If so, one or more notifications or notification actions may be identified. In some examples, the notification or notification actions may be executed and response data may be received. The response data may be used to update and/or validate the machine learning model.
Arrangements for sensor data normalization and analysis are provided. In some arrangements, first sensor data may be received from a first sensor of a first sensor type. The first sensor may be associated with a first vendor and may output data in a first format unique to the first vendor. Second sensor data may be received from a second sensor. The second sensor may be a second sensor type. The second sensor may be associated with a second vendor and may output data in a second format unique to the second vendor. The first and second sensor data may be normalized from the first format and second format to a uniform format unique to an enterprise organization. The formatted data may be compared to one or more enterprise-specific thresholds. If one or more thresholds have been met or exceeded, a notification may be generated and transmitted to a computing device.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
58.
MULTIFACTOR AUTHENTICATION VIA BIFURCATED PASSCODE AND NON-FUNGIBLE TOKEN
Multifactor user authentication leveraging secure tokenization, such as a Non-Fungible Token (NFT) and multiple passkeys (e.g., bifurcated passkey). One or more authentication NFTs are generated that use some form of a user's authentication credentials as the seed input for the NFT encryption/hash algorithm(s). In addition, passkeys are distributed to and/or made accessible to multiple passkey holders. In response to an event that requests multifactor authentication of the user, a plurality passkeys are requested, received and verified. Each of the passkeys being requested and received from, or at the directive of, one of the multiple passkey holders. In response to verifying the plurality of passkeys, at least one of the authentication NFTs is accessed and the cryptographic hash algorithm(s) is implemented to decrypt the authentication NFT(s) and identify the one or more user credentials. In response, the user is authenticated based at least on the user credentials that formed the basis for the authentication NFT(s).
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Arrangements for providing typosquatting detection and notification functions are provided. In some aspects, user input data may be received. The user input may include a website or website address received via a web browser address bar displayed on a user computing device. The user input may be analyzed, using a machine learning model, to determine a likelihood of typosquatting. The determined likelihood may be compared to a threshold and, if the likelihood is below the threshold, the user may proceed with the request to access the website. If the likelihood meets or exceeds the threshold, a notification or user interface may be generated requesting user input confirming that the user input reflects a correct or desired website. User response data may be received and used to update and/or validate the machine learning model.
In response to receiving a tagging request to map a first non-fungible token (NFT) to a first user device, a processor transmits an authorization request to a second user device to map the first NFT to the first user device. In response to receiving an approval of the request, the processor transmits a request to a minting server of an NFT blockchain network to generate the first NFT for the first user device. The processor stores a token ID of the generated first NFT in a memory. In response to receiving a second authorization from the first user device to perform a data interaction, the processor requests the NFT blockchain network based on the token ID, verification of the first user device. In response to receiving an indication that the first user device is verified, the processor processes the data interaction.
Aspects of the disclosure relate to generating a modified web farm framework for routing web traffic based on similarities between web traffic requests. A computing platform may receive a request to establish a server connection to host a virtual workspace. The computing platform may identify a pod and a server within the pod with network capacity to host the virtual workspace. The computing platform may assign the virtual workspace to the pod and the server, and may generate a cookie indicating connection details associated with the virtual workspace. The computing platform may receive a consumer request to connect to the virtual workspace and may transmit the cookie to the consumer. The computing platform may monitor and analyze the server connection, and may modify the server assignment associated with the virtual workspace based on determining the server connection was lost and/or terminated.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
H04L 67/1008 - Sélection du serveur pour la répartition de charge basée sur les paramètres des serveurs, p.ex. la mémoire disponible ou la charge de travail
H04L 67/141 - Configuration des sessions d'application
H04L 67/146 - Marqueurs pour l'identification sans ambiguïté d'une session particulière, p.ex. mouchard de session ou encodage d'URL
62.
System for performing programmatic operations using an image-based query language
A computing device generates a call in a programming language of a computing application requesting a feature of videos stored in a media repository. A query system receive the call and determines a command associated with obtaining the feature requested by the call. The determined command corresponds to an image analysis to perform on at least a portion of the stored videos. The query system determines, based at least in part on the determined command, an artificial intelligence model to execute on at least the portion of the stored videos. The query system determine, by executing the determined artificial intelligence model, a model output that includes the requested feature. The query system provides, in the programming language of the computing application, an indication of the requested feature.
G06F 16/783 - Recherche de données caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
Systems, computer program products, and methods are described herein for implementing dynamic multi-factor soft lock on user identifiers. The present invention is configured to receive, from a first user input device, a network registration request from a user to obtain authorization to execute resource transfers within a distributed network using a first user identifier; query, using an information retrieval engine, metadata associated with the user within the distributed network for traceable instances of digital activities of the user; determine one or more user identifiers based on at least the metadata associated with the user; execute, using an authentication subsystem, a soft lock on the one or more user identifiers; approve authorization for the user to execute the resource transfers within the distributed network using the first user identifier; and transmit control signals configured to cause the first user device to display the authorization.
A system for detecting and mitigating application security threats comprises a processor associated with a server. The processor executes a static security model to analyze a group of development code sets for an application to detect threat objects. The processor determines that a number of threat objects in each development code set is lower than a threshold. The processor further executes a run-time security model to analyze the combined code sets to determine a set of threat object measurements of application product releases for the application. The processor generates a set of threat change ratios per application based on a first threat object measurement and the threat object measurements after the first threat object measurement. The processor determines threat change patterns of the threat change ratios associated with the application product releases for the application. The processor determines whether to trigger a development security model for the application.
A system includes a memory and a processor configured to detect that a primary mainframe job has failed, and extracts information related to the failed primary mainframe job, wherein the extracted information includes an error description of an error that caused the primary mainframe job to fail. The processor searches the memory based on the error description for a set of corrective actions corresponding to the error. In response to determining the set of corrective actions based on the search, the processor obtains a criticality index relating to the primary mainframe job. When the criticality index is lower than a criticality index threshold, the processor applies the set of corrective actions in relation to the failed primary mainframe job and processes the failed primary mainframe job after applying the set of corrective actions.
Methods for banking at an automated teller machine (ATM) using a mobile device. The ATM may automatically detect the presence of the mobile device in a vicinity of the ATM and initiate contact with the mobile device, or a mobile device may initiate contact with the ATM. After verifying user permission to access the ATM, the mobile device may be enabled to provide user access to one or more of the banking services available at the ATM using the mobile device and to view banking-related information on the mobile device. A mobile application on the mobile device may be used to access the ATM using the mobile device. While a mobile device is accessing the ATM, a screen on the ATM may become inactive for banking services and the option to select banking services directly at the ATM may be disabled.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06V 20/52 - Activités de surveillance ou de suivi, p.ex. pour la reconnaissance d’objets suspects
67.
ENERGY OPTIMIZATION PLATFORM USING ARTIFICIAL INTELLIGENCE AND EDGE COMPUTING
Aspects of the disclosure relate to energy optimization. A computing platform may receive an event processing request. The computing platform may identify parameters of the event processing request. The computing platform may input the parameters into a global energy optimization model, to identify an edge computing system at which to process the event processing request. The computing platform may route the event processing request to the edge computing system along with commands to process the event processing request using an energy mix identified by a local energy optimization model, corresponding to the edge computing system, which may cause the edge computing system to: input the parameters of the event processing request into the local energy optimization model to identify the energy mix, and process, using the energy mix, the event processing request.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
G06Q 50/06 - Fourniture d'électricité, de gaz ou d'eau
H02J 3/00 - Circuits pour réseaux principaux ou de distribution, à courant alternatif
H02J 3/14 - Circuits pour réseaux principaux ou de distribution, à courant alternatif pour règler la tension dans des réseaux à courant alternatif par changement d'une caractéristique de la charge du réseau par interruption, ou mise en circuit, des charges du réseau, p.ex. charge équilibrée progressivement
Systems, computer program products, and methods are described herein for virtualization of non-fungible tokens. The present invention is configured to receive, via a first user input device, a resource transfer request using a virtual token from a first user, wherein the virtual token is electronically linked to an NFT of a resource transfer instrument; retrieve the NFT associated with the resource transfer instrument in response to receiving the resource transfer request; retrieve an NFT credential descriptor for the resource transfer request from a first metadata layer of the NFT associated with the resource transfer instrument; receive an authentication credential from the first user; determine whether the authentication credential matches an NFT credential descriptor that is electronically linked to the NFT associated with the resource transfer instrument; and authorize the resource transfer request based on at least determining that the authentication credential matches an NFT credential descriptor.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
69.
Detecting and mitigating application security threats based on quantitative analysis
A system for detecting and mitigating application security threats comprises a processor associated with a server. The processor analyzes a group of code sets of an application and determines a number of the threat objects in each code set. The processor further executes a run-time security model to analyze a combined code sets to determine threat object measurements and false positive measurements of application product releases for the application. The processor determines threat threshold ratios and false positive ratios per application. The processor further generates an array of quartile weights corresponding to a set of quartile ranges of the threat threshold ratios and a set of quartile ranges of the false positive ratios associated with the application. The processor generates an adjusted object measurement for the application based on a corresponding quartile weight in the array. The processor determines whether to trigger a development security model for the application.
A system includes a memory and a processor configured to receive a request to process a primary mainframe job and extract information related to the primary mainframe job, wherein the extracted information includes one or more of data files, file attributes and database tables needed to process the primary mainframe job. The processor detects that one or more of the files, the file attributes and the database tables is unavailable, and in response, places the primary mainframe job on hold. The processor monitors availability of the one or more unavailable files, file attributes or database tables and in response to detecting that the one or more unavailable files, file attributes or database tables is available, processes the primary mainframe job.
Methods are provided to secure a mutual Transport Layer Security (TLS) verification between a client computer and a server computer, using an authorized viewer. Methods may include intercepting a file at the authorized viewer. Methods may include using a content inspection Artificial Intelligence (AI) module to inspect the data. Methods may include preventing the transmission of malicious data to a server computer.
Aspects of the disclosure relate to intelligently storing data in a fault tolerant system using robotic process automation and blockchain. The computing platform may generate a parent table to store a plurality of data points, wherein the parent table may comprise, for each data point of a plurality of data points, a row number, a row hash number, row hash nodes, a commit number, and/or commit nodes. The computing platform may identify relationships between the data points, and may generate a row hash node ledger and a commit node ledger to link the row hash nodes and the commit nodes to illustrate the relationships. The computing platform may receive a request to modify and/or restore the parent table. The computing platform may, based on determining an enterprise organization computing device is authorized to modify and/or restore the parent table, modify the ledgers to reflect changes to the parent table.
There is much data that is currently not being captured during user interaction with mobile apps that could provide insight into how to effectively address a user concern. Capturing such data may allow auto-adjustments of operational responses provided by mobile apps in response to detecting anomalous user inputs. Such anomalous user inputs may include keyboard dynamics or mobile device movement that deviate from an average or user specific levels. Such anomalous user inputs may indicate that a user concern is particularly urgent. Auto-adjustments to operation of a mobile app may include initiating targeted chatbot or live chat responses.
H04L 51/02 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel en utilisant des réactions automatiques ou la délégation par l’utilisateur, p.ex. des réponses automatiques ou des messages générés par un agent conversationnel
H04L 51/234 - Surveillance ou traitement des messages pour le suivi des messages
74.
System and method for integrating real-world interactions within a metaverse
A system for integrating real-world interactions within a virtual environment comprises a processor associated with a server. The processor receives a request with a first user data from a user device to conduct a first interaction in a real-world environment. The processor processes a user profile and the first user data to generate a virtual meeting area with an entity avatar associated with an entity device. The processor sends a first mobile deep link to the user device to grant access to the virtual meeting area. The processor conducts a second interaction between the user device and the entity avatar in the virtual meeting area and obtains a second user data from the user device. The processor processes the user profile and the second user data to generate contextual objects on a display of the user device. The processor renders the contextual objects into an application profile.
H04L 67/131 - Protocoles pour jeux, simulations en réseau ou réalité virtuelle
G06F 3/04815 - Interaction s’effectuant dans un environnement basé sur des métaphores ou des objets avec un affichage tridimensionnel, p.ex. modification du point de vue de l’utilisateur par rapport à l’environnement ou l’objet
H04L 65/403 - Dispositions pour la communication multipartite, p.ex. pour les conférences
75.
SYSTEM AND METHOD FOR MONITORING AND MANAGING SHARED RIGHTS IN RESOURCE UNITS
Embodiments of the present invention provide a system for monitoring and managing shared rights in resource units. In particular, the system may be configured to determine that a first user is initiating a first request to acquire shared rights in a resource, extract and display one or more fractional digital tokens associated with the resource, wherein the one or more fractional digital tokens are digital tokens stored on a distributed register, receive a selection of a first fractional digital token from the first user, extract and display a first security associated with the first fractional digital token, receive an input from the first user to acquire the first fractional digital token, and transfer the first fractional digital token to the first user.
Methods for enhancing compatibility of a document of an entity with an organization's database on a computer server to facilitate detection of a fraudulent submission. Methods may include receiving a populated document in a first format from the entity, using a processor to digitize the document into a digital format, such as bytes, and further into a second format, where the first format may not be compatible with the database and the second format may be compatible with the database. Methods may include using the processor, optionally running a statistical model, to determine an entity identifier, a predicted value of a data field in the document, and whether there is a difference between the value in the predicted data field and a corresponding value in the populated document. Methods may include implementing a corrective action, such as raising a fraud alert at the organization, when there is a difference.
Aspects of the disclosure relate to providing and maintaining efficient and effective processing of sets of work items in enterprise computing environments by optimizing distributed and parallelized batch data processing. A computing platform may initialize a monitoring process configured to monitor a pending workload in a work queue database. Subsequently, the computing platform may cause the monitoring process to query the work queue database and create one or more historical records indicative of a workload processing status associated with one or more processing workers. Then, the computing platform may identify one or more new parameter values for one or more processing parameters associated with the one or more processing workers based on the one or more historical records. Thereafter, the computing platform may configure the one or more processing workers based on the one or more new parameter values identified for the one or more processing parameters.
A system includes a memory and a processor. The memory stores a set of videos each of which is associated with an application of a set of applications and depicts a process performed using the application. For each video, the processor generates metadata associated with the depicted process, and stores the metadata within a collection of metadata in the memory. The processor receives a request for information from a user. In response, the processor identifies an application of the set of applications for use in generating a response to the request. The processor generates, based on the collection of metadata, instructions for interfacing with the first application to generate the response. The processor executes the instructions to interface with the first application to generate the response, and transmits the response to the user.
H04N 21/472 - Interface pour utilisateurs finaux pour la requête de contenu, de données additionnelles ou de services; Interface pour utilisateurs finaux pour l'interaction avec le contenu, p.ex. pour la réservation de contenu ou la mise en place de rappels, pour la requête de notification d'événement ou pour la transformation de contenus affichés
H04L 51/02 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel en utilisant des réactions automatiques ou la délégation par l’utilisateur, p.ex. des réponses automatiques ou des messages générés par un agent conversationnel
H04L 67/63 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises en acheminant une demande de service en fonction du contenu ou du contexte de la demande
H04N 21/443 - Procédés de système d'exploitation, p.ex. démarrage d'un boîtier décodeur STB, implémentation d'une machine virtuelle Java dans un boîtier décodeur STB ou gestion d'énergie dans un boîtier décodeur STB
79.
System, method and graphical user interface for providing a self-service application within a metaverse
A system for providing a self-service application within a virtual environment comprises a processor associated with a server. The processor receives a request with a first user data from a user device to conduct a first interaction in a real-world environment. The processor processes a user profile and the first user data to generate a virtual meeting area with an entity avatar associated with an entity device. The processor sends a first mobile deep link to the user device to grant access to the virtual meeting area. The processor generates a graphical user interface (GUI) to conduct the second interaction. The processor integrates a first video stream from the user device and a second video stream associated with the entity avatar on the GUI. The processor obtains a second user data from the first video stream and generate contextual objects. The processor renders the contextual objects into an application profile.
G06F 3/04815 - Interaction s’effectuant dans un environnement basé sur des métaphores ou des objets avec un affichage tridimensionnel, p.ex. modification du point de vue de l’utilisateur par rapport à l’environnement ou l’objet
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
Apparatus and methods for using deepfakes defensively to detect fake, spoofed, and hoax phone calls and videoconferences are provided. A program may record a target individual reciting exemplary phrases. The program may analyze the recordings to create a baseline. The program may use deepfake algorithms to create exemplar deepfake audiovisual representations of the target individual. The program may store the data in a database. The program may analyze, in real-time, a phone call or videoconference to determine whether they are legitimate or illegitimate by comparing the audio or audiovisual contents of the phone call or videoconference with the exemplar deepfakes. When the program determines the phone call or videoconference is illegitimate, the program may terminate the call or videoconference and inform the recipient and others.
H04M 3/436 - Dispositions pour intercepter des appels entrants
G10L 25/27 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes caractérisées par la technique d’analyse
G10L 25/51 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes spécialement adaptées pour un usage particulier pour comparaison ou différentiation
81.
SYSTEM AND METHOD FOR MONITORING AND MANAGING SHARED UTLIZATION OF RESOURCE UNITS
Embodiments of the present invention provide a system for monitoring and managing shared utilization of resource units. In particular, the system may be configured to receive an input from a user to create a primary digital token for a physical resource on a distributed register, in response to receiving the input, create the primary digital token and store the primary digital token on the distributed register, identify one or more parts of the physical resource, create fractional digital tokens for each of the one or more parts and store the fractional digital token on the distributed register, link each of the fractional digital tokens to the primary digital token, and allow at least one other user to acquire the fractional digital tokens.
Systems, computer program products, and methods are described herein for developers to initiate development operations from within a development environment of a user application. This can also be extendable dynamically for different user groups (e.g., testers, support, internal associates or employees, or the like), and environments (e.g., lower-level environments, production environments, or the like). As such, the invention offers a dynamic debug mode feature for virtual assistants based on different sections of users and environments.
Systems, computer program products, and methods are described herein for tracking and logging resource transfers in a distributed network. The present invention is configured to generate a distributed ledger associated with a resource identifier; receive a resource transfer associated with the resource identifier, the resource transfer comprising a resource transfer between a sender account and a recipient account; update the distributed ledger based on the resource transfer; and generate a resource token based on the distributed ledger.
Systems, methods, and computer program products are provided herein for hyperspectral imaging based authentication. An example method includes receiving check data associated with at least a first user and extracting one or more field details from the check data. By leveraging a hyperspectral imaging module, the method further includes generating hyperspectral image data associated with the one or more extracted field details and determining one or more spectral characteristics associated with the one or more extracted field details based on the hyperspectral image data. The method further includes determining a tampering indication for the check data based on the one or more spectral characteristics. The spectral characteristics may include one or more reflectance values associated with extracted field details across a plurality of spectral bands.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06V 10/44 - Extraction de caractéristiques locales par analyse des parties du motif, p.ex. par détection d’arêtes, de contours, de boucles, d’angles, de barres ou d’intersections; Analyse de connectivité, p.ex. de composantes connectées
G06V 10/60 - Extraction de caractéristiques d’images ou de vidéos relative aux propriétés luminescentes, p.ex. utilisant un modèle de réflectance ou d’éclairage
G06V 10/74 - Appariement de motifs d’image ou de vidéo; Mesures de proximité dans les espaces de caractéristiques
85.
SYSTEMS AND METHODS FOR EXTRACTING DISCRETE DATA FROM A DATA UNIT AND MANAGING ACCESS THERETO USING ELECTRONIC DIGITAL CERTIFICATES
Systems, computer program products, and methods are described herein for extracting discrete data from a data unit and managing access thereto using electronic digital certificates. The present invention may be configured to receive data units including content, identify discrete data for each data unit, and determine, for each discrete data, qualifications permitting access to the discrete data. The present invention may be configured to generate electronic digital certificates associated with the discrete data and store the electronic digital certificates on a distributed ledger. The present invention may be configured to generate, on the distributed ledger, smart contracts for managing access to the electronic digital certificates by generating smart contracts permitting access to the electronic digital certificates based on the qualifications. The present invention may be configured to automatically permit and/or prevent, using the smart contracts and based on the distributed ledger, access by applications to discrete data.
G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
86.
SYSTEMS, METHODS, AND APPARATUSES FOR VERIFYING AUTHENTICATION CREDENTIALS IN AN ELECTRONIC NETWORK
Systems, computer program products, and methods are described herein for verifying authentication credentials in an electronic network. The present invention is configured to receive a first IP address associated with a first access attempt; determine a first geolocation data based on the first IP address; receive a second IP address associated with a second access attempt; determine a second geolocation data based on the second IP address; determine a geolocation variance between the first and the second geolocation data; determine, based on the geolocation variance, an indication of potential movement between the access attempts; apply, based on the indication of potential movement, a verification machine learning model to the account identifier; generate, by the verification machine learning model, a privacy score; and generate, based on the privacy score, an alert user interface component to configure a GUI of a device associated with the user of the account.
SYSTEMS, METHODS, AND APPARATUSES FOR IDENTIFYING UNAUTHORIZED USE OF A USER'S AUTHENTICATION CREDENTIALS TO AN ELECTRONIC NETWORK BASED ON NON-PUBLIC DATA ACCESS
Systems, computer program products, and methods are described herein for identifying unauthorized use of a user's authentication credentials to an electronic network based on non-public data access. The present invention is configured to receive a verified access attempt at a first time for a user account; receive an unverified access attempt at a second time for the user account; determine the unverified access attempt is a credential sharing event for the user account; determine the user account is an internal account; determine an unverified user associated with the unverified access attempt is an external user; receive unverified account access logs associated with the unverified access attempt, the unverified account access logs comprising access to non-public data; and generate an unverified data access interface component to configure a graphical user interface of a device associated with a manager of the system.
A system receives an audio-video recording that includes image frames. For each image frame, a portion of the image frame is identified that corresponds to a first face of a first subject. An image region is determined for the identified portion of the image frame. A first face portion of the audio-video recording is stored that corresponds to the determined image region for each of the image frames along with a private key for the audio-video recording and a first mask identifier for the first subject. A public key is generated for the private key. A remaining portion of the audio-video recording is associated with the generated public key and the first mask identifier for the first subject. The remaining portion, the public key, and the first mask identifier are provided to a media server that communicates with a media player.
G06F 21/10 - Protection de programmes ou contenus distribués, p.ex. vente ou concession de licence de matériel soumis à droit de reproduction
G06V 40/16 - Visages humains, p.ex. parties du visage, croquis ou expressions
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04N 21/431 - Génération d'interfaces visuelles; Rendu de contenu ou données additionnelles
H04N 21/433 - Opération de stockage de contenu, p.ex. opération de stockage en réponse à une requête de pause ou opérations de cache
89.
Finger tracking to write on or correct mistakes on physical documents
Systems and methods for transferring data via a finger tracking smart device from a first user interface (“UI”) to a second UI is provided. The data transferred may be documentation data, including signatures and corrections. The finger tracking smart device may include one or more smart lenses. Methods may include triggering a tracking of the movement of the user's fingers on the first UI and further tracking a start point and an end point of the movement of the user's fingers based on detection of deliberate movements and gestures. Methods may further include capturing a segment of data within the start point of movement and the end point of movement and storing the segment of data in memory on the finger tracking smart device. Methods may further include updating the second UI based on an instruction in a data packet transmitted to the second UI, by inputting the segment of data at a point of movement of the user's fingers on the second UI.
Embodiments of the present invention provide a system for dynamically configuring graphical user interface based on tracking response to interface components. The system is configured for determining that a user has accessed an entity application via a user device, presenting a graphical user interface associated with the entity application to the user on the user device, wherein the graphical user interface comprises one or more interface components, monitoring and capturing response of the user via the user device based on presenting the graphical user interface, gauging the response of the user via an artificial intelligence engine, and dynamically configuring the graphical user interface based on gauging the response of the user.
G06F 3/04845 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs pour la transformation d’images, p.ex. glissement, rotation, agrandissement ou changement de couleur
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p.ex. des interruptions ou des opérations d'entrée–sortie
91.
SYSTEM AND METHOD FOR CONTROLLING RESOURCES USING PARALLEL COMPUTING DEVICES
A system is provided for controlling resources using parallel computing devices. In particular, the system may comprise one or more applications installed across one or more computing devices, where the one or more applications may be configured to control resource transfers. Certain applications may be configured such that one application, such as a primary application, may implement one or more controls or restrictions on resource transfers that may be executed by another application, or a secondary application. The primary application may further be configured to monitor the secondary application to retrieve various types of data from the secondary application, such as resource transfer metrics data. The system may be configured to, based on the data associated with the secondary application, generate one or more resource-related projections with respect to the secondary application. In this way, the system provides an efficient way to control resource transfers across parallel computing devices.
Systems, computer program products, and methods are described herein for script-based querying and aggregation of endpoint data via a directory access protocol. The present invention is configured to deploy a directory access protocol executor to a plurality of endpoint devices, determine an operating system for at least one of the plurality of endpoint devices, select a script to execute at the plurality of endpoint devices, and execute the script via the directory access protocol executor, wherein the script is executed as a login script, wherein the script determines a status of endpoint data at the endpoint, and wherein the endpoint data comprises endpoint tools currently available at the endpoint.
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p.ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
93.
Secure data transfer in a virtual environment using blockchain
A system for secure data transfer in a virtual environment receives a request to initiate a virtual interaction session between an avatar and an entity within the virtual environment. The avatar is operated by a user using a user device. The system presents a virtual data reader to the avatar. The virtual data reader comprises a screen to display data. The system receives user input from the user device. The user input includes user information and data object to be transferred to the entity. The user input is transferred from the user input to the virtual data reader. The system receives a security token from the avatar. The system verifies that the user input belongs to the user. The system also determines that the security token is valid. In response, the system transfers the data object to the entity and concludes the virtual interaction session.
Communication, authentication, and/or validation may be required in various types of device interactions. For example, for some types of device functions, user or device authentication may be required to confirm that the function can and should be performed. Authentication information may be communicated and authentication and/or validation may be performed using LoRaWAN signaling. LoRaWAN signaling provides low power and long-range communication capabilities to efficiently and effectively perform authentication processes. In some arrangements, LoRaWAN signals may be generated by both a first device (e.g., a user device) and a second device (e.g., a function-performing device) and subsequently compared to determine whether they correspond. This correspondence may provide the requisite authentication or validation of the first device and/or an associated user.
Transactions may be performed using a mobile device such as a user-wearable device using LoRaWAN protocol to minimize power consumption while maximizing communication range. Transaction information may be stored in the user-wearable device and transmitted to a transaction processing device using LoRaWAN communications. Transaction information may include user-specific information, payment information, merchant information, product information, user preference information and the like. In some instances, the only communication interface (or wireless communication interface) provided in the mobile device is a LoRaWAN communication interface.
Device information may be obtained using LoRaWAN communications. A device information request may be generated and transmitted by a user device and include request parameters such as a device type for which information is desired, a type of information requested, a geographic range for the request, and the like and/or combinations thereof. Device information requests may also be propagated or repeated by intermediary devices to achieve the desired request range. Accordingly, a recipient device of the original request may propagate or repeat, using LoRaWAN, a request signal if it determines that the request range has not been met. If the request range has been met, the recipient device might not repeat the request.
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
Systems, computer program products, and methods are described herein for generating and training a module selection engine for distribution allocation in a network environment. The present invention is configured to receive a subordinate user account identifier associated with a subordinate user account; determine a supervisor user account identifier associated with the subordinate user account identifier; apply a module selection engine to the subordinate user account identifier, wherein the module selection engine determines a plurality of modules to present to the subordinate user based on the subordinate user account identifier; generate, by the module selection engine, a plurality of module interface components; transmit the plurality of module interface components to a user device associated with the subordinate user account; and determine a plurality of module completion statuses for each module of the plurality of module interface components.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
H04L 67/12 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p.ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance
98.
System and method for pre-authenticating user devices within a metaverse
A system for pre-authenticating a user device to navigate through virtual operation areas comprises a processor associated with a server. The processor accesses a virtual environment and receives an interaction request from the user device for an interaction session. The processor determines a set of virtual operation areas in a virtual environment based on the interaction request. The processor generates a corresponding meta-profile associated with a user profile by mapping each pre-authentication token associated with the user device from a corresponding physical location to a corresponding virtual operation area. The processor generates an avatar associated with the user device and associates the avatar to the meta-profile and a set of pre-authentication tokens for the avatar to access the virtual operation areas. The processor identifies a first pre-authentication token associated with the user device and a first level virtual operation area and dynamically grants a first level authentication to the avatar.
Transactions between entities may be validated using LoRaWAN communications to more quickly process those transactions. In the example of check depositing, a first entity associated with a check payee may transmit a check clearance request to a second entity associated with a check payor using LoRaWAN communications. The LoRaWAN signaling and communications may be performed between devices within LoRaWAN range. For example, a check depositing device may receive a check deposit where the payor is associated with a different financial institution or entity. Accordingly, the check depositing device may communicate with another device associated with the payor institution or entity using LoRaWAN signals to confirm check clearance.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
100.
PLATFORM FOR GENERATING PUBLISHED REPORTS USING REPORT AND WORKSHEET BUILDING WITH POSITION MAPPING IDENTIFICATION
Systems, computer program products, and methods are described herein for providing a platform for generating published reports using report and worksheet building with position mapping identification. The present invention is configured to establish a reporting and analytics platform for a user interface and receive, from the user interface, a single-selection input referencing a set of system identification values associated with a first set of data in the reporting and analytics platform. The system may then display a plurality of formatting options for the set of system identification values on the user interface. The system can assign a selected formatting option to the system identification values and apply the selected formatting option to the first set of data in the reporting and analytics platform. The selected formatting options can be applied to additional sets of data based on system identification values.