SYSTEM AND METHOD FOR MONITORING AND RESTRICTING ELECTRONIC COMMUNICATION IN A NETWORK BASED ON COMMUNICATION CHARACTERISTICS

    公开(公告)号:US20240372863A1

    公开(公告)日:2024-11-07

    申请号:US18143309

    申请日:2023-05-04

    Abstract: Systems, computer program products, and methods are described herein for monitoring and restricting electronic communication in a network based on communication characteristics. The method includes receiving an electronic communication from an end-point device. The method also includes identifying a potential user identity associated with the electronic communication. The potential user identity is based on one or more user identifiers associated with the electronic communication. The method further includes determining one or more restriction tags relating to the potential user identity. Each of the one or more restriction tags include a restriction to communication between the end-point device and one or more entity users. The method still further includes causing a restriction action to be executed based on determining the potential user identity has one or more restriction tags. The restriction action is at least one of a restriction notification or a communication restriction to communication with the end-point device.

    DEVICE FOR EXECUTING AUDIO CRYPTOLOGY IN REAL-TIME FOR AUDIO MISAPPROPRIATION PREVENTION

    公开(公告)号:US20240022770A1

    公开(公告)日:2024-01-18

    申请号:US17866109

    申请日:2022-07-15

    CPC classification number: H04N21/233 H04N21/266

    Abstract: Embodiments of the present invention provide a system for executing audio cryptology in real-time for audio misappropriation prevention. The system is configured for identifying, via a cryptographic device, one or more audio signals, causing the cryptographic device to generate and emit a dynamically varying continuous audio tone, continuously monitoring in real-time the one or more audio signals, via the cryptographic device, determining, via the cryptographic device, termination of the one or more audio signals based on continuously monitoring the one or more audio signals in real-time, and causing the cryptographic device to stop generating and emitting the dynamically varying continuous audio tone.

    Deepfake Detection System
    6.
    发明申请

    公开(公告)号:US20250148788A1

    公开(公告)日:2025-05-08

    申请号:US18387461

    申请日:2023-11-07

    Abstract: Various aspects of the disclosure relate to automated monitoring of content associated with an individual for indicators that the content may be a deepfake. A deepfake analysis training device trains artificial intelligence-based models based on validated content associated with one or more profiles. Each profile is associated with an individual. A deepfake analysis engine may be installed on computing devices to monitor access to content (e.g., multimedia content) for deepfakes associated with the one or more profiles, as configured. The deepfake analysis engine may be stand-alone application, an application extension, or may be integrated into third-party applications via application programming interface functions. Analyzed content is assigned a likelihood score that is compared to threshold values that indicates a likelihood that the content is a deepfake. When identified, deepfake content initiates an alert generation and/or blocking of the content otherwise the content is presented to a user.

    Defensive deepfake for detecting spoofed accounts

    公开(公告)号:US12284212B2

    公开(公告)日:2025-04-22

    申请号:US18665672

    申请日:2024-05-16

    Abstract: Apparatus and methods for using deepfakes defensively to detect fake, spoofed, and hoax accounts and posts on social media and elsewhere are provided. A program may gather verified images or writings of a target individual. The program may analyze the verified images and writings to create a baseline. The program may use deepfake algorithms to create exemplar deepfake images or writings. The program may store the data in a database. The program may search a network for social media accounts or posts that may meet the baseline and determine whether they are legitimate or illegitimate by comparing the contents of the accounts or posts with the exemplar deepfakes. When the program determines the accounts or posts are illegitimate, the program may initiate a takedown of those accounts or posts. The program may use machine learning algorithms to refine itself and become more accurate.

    Automatic alerting communications systems and methods

    公开(公告)号:US12198122B2

    公开(公告)日:2025-01-14

    申请号:US18488171

    申请日:2023-10-17

    Inventor: Kyle Mayers

    Abstract: A system includes a user device and a computing system. The user device accesses a plurality of images captured by a camera and identifies, from the plurality of images, a particular image that depicts a portion of a user interaction object. The user device transmits the particular image across a wireless communications network. The computing system accesses the particular image depicting the portion of the user interaction object and determines a data item from the particular image. The computing system compares the data item to one or more accounts of the user and sends instructions to the user device to display an alert message on the electronic display based on the comparison of the data item to the one or more accounts.

    DEFENSIVE DEEPFAKE FOR DETECTING LIVE DEEPFAKED AUDIO AND VIDEO

    公开(公告)号:US20240089371A1

    公开(公告)日:2024-03-14

    申请号:US17941100

    申请日:2022-09-09

    CPC classification number: H04M3/436 G10L25/27 G10L25/51

    Abstract: Apparatus and methods for using deepfakes defensively to detect fake, spoofed, and hoax phone calls and videoconferences are provided. A program may record a target individual reciting exemplary phrases. The program may analyze the recordings to create a baseline. The program may use deepfake algorithms to create exemplar deepfake audiovisual representations of the target individual. The program may store the data in a database. The program may analyze, in real-time, a phone call or videoconference to determine whether they are legitimate or illegitimate by comparing the audio or audiovisual contents of the phone call or videoconference with the exemplar deepfakes. When the program determines the phone call or videoconference is illegitimate, the program may terminate the call or videoconference and inform the recipient and others.

    System for isolated access and analysis of suspicious code in a disposable computing environment

    公开(公告)号:US11636203B2

    公开(公告)日:2023-04-25

    申请号:US16907994

    申请日:2020-06-22

    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in a way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The analyst may set the virtual environment configurations (e.g., applications, programs, settings, etc.) of the virtual container. The analyst may determine how the suspicious information effects the virtual environment configuration and/or use tools to analyze the suspicious information. When harmful information is identified the virtual container may be discarded (e.g., folded up and deleted), and a new virtual container may be provided to the analyst to continue to analyze the suspicious information and/or new suspicious information.

Patent Agency Ranking