17962488. AUTOMATED SYSTEM FOR AUTHENTICATION AND MONITORING USE OF AN ARTIFICIAL INTELLIGENCE ENGINE simplified abstract (Bank of America Corporation)
Contents
- 1 AUTOMATED SYSTEM FOR AUTHENTICATION AND MONITORING USE OF AN ARTIFICIAL INTELLIGENCE ENGINE
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 AUTOMATED SYSTEM FOR AUTHENTICATION AND MONITORING USE OF AN ARTIFICIAL INTELLIGENCE ENGINE - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 How does the system handle updates to the AI engine's binary data and hash values over time?
- 1.11 What measures are in place to prevent unauthorized access to the stored hash values and sensitive data?
- 1.12 Original Abstract Submitted
AUTOMATED SYSTEM FOR AUTHENTICATION AND MONITORING USE OF AN ARTIFICIAL INTELLIGENCE ENGINE
Organization Name
Inventor(s)
Sanjeev J. Nair of Plainsboro NJ (US)
Rahul Kumar Mishra of Skillman NJ (US)
Pushkar Gahlaut of Plainsboro NJ (US)
AUTOMATED SYSTEM FOR AUTHENTICATION AND MONITORING USE OF AN ARTIFICIAL INTELLIGENCE ENGINE - A simplified explanation of the abstract
This abstract first appeared for US patent application 17962488 titled 'AUTOMATED SYSTEM FOR AUTHENTICATION AND MONITORING USE OF AN ARTIFICIAL INTELLIGENCE ENGINE
Simplified Explanation
The patent application describes a system for authenticating and monitoring an artificial intelligence (AI) engine through the use of hash values and network devices.
- The system receives binary data associated with an AI engine, calculates an engine hash value based on the data, and stores it.
- An approval of the data is received from a second network device, updating the approval status of the engine hash value.
- When a final user attempts to launch the AI engine, the system compares a second hash value of the user's data with the stored engine hash value to authenticate the user.
Potential Applications
This technology could be applied in various industries such as cybersecurity, data protection, and AI development.
Problems Solved
This system addresses the issues of unauthorized access to AI engines, ensuring only approved users can launch and interact with the AI.
Benefits
The system provides a secure and reliable method for authenticating users and monitoring the use of AI engines, enhancing data security and user privacy.
Potential Commercial Applications
"Secure Authentication and Monitoring System for AI Engines: Enhancing Data Security and User Privacy"
Possible Prior Art
There may be prior art related to authentication and monitoring systems for software applications, but specific examples are not provided in the abstract.
Unanswered Questions
How does the system handle updates to the AI engine's binary data and hash values over time?
The patent abstract does not mention how the system manages changes or updates to the AI engine's data and hash values.
What measures are in place to prevent unauthorized access to the stored hash values and sensitive data?
The abstract does not detail the security measures implemented to protect the engine hash values and binary data from unauthorized access or tampering.
Original Abstract Submitted
Systems, computer program products, and methods are described herein for authentication and monitoring of an artificial intelligence (AI) engine. The present invention is configured to receive, from a first network device, a first set of binary data associated with an AI engine; calculate, based on the first set of binary data, an engine hash value; store the engine hash value; receive, from a second network device, an approval of the first set of binary data; update an approval status of the engine hash value; receive, from a network device associated with a final user, a second set of binary data; determine that a second hash value associated with the second set of binary data matches the engine hash value; and transmit a notification to the network device associated with the final user, wherein the notification instructs the network device to allow the final user to launch the AI engine.