Search

US-12621144-B2 - System for monitoring access to a virtual environment using device tagging

US12621144B2US 12621144 B2US12621144 B2US 12621144B2US-12621144-B2

Abstract

Systems, computer program products, and methods are described herein for monitoring access to a virtual environment using device tagging. The present disclosure is configured to receive, from a user input device, a request from a user to establish a first virtual object to access a virtual environment; receive parameters associated with the first virtual object; determine device information associated with the user input device; generate a first unique key based on at least the parameters and the device information; link the user input device and the first virtual object with the first unique key; store the first unique key in a key repository; and establish the first virtual object for the user to access the virtual environment, wherein the first virtual object is established to access the virtual environment exclusively with the user input device.

Inventors

  • Krishna Rangarao Mamadapur
  • Jigesh Rajendra Safary

Assignees

  • BANK OF AMERICA CORPORATION

Dates

Publication Date
20260505
Application Date
20230223

Claims (14)

  1. 1 . A system for monitoring access to a virtual environment using device tagging, the system comprising: a processing device; a non-transitory storage device containing instructions when executed by the processing device, causes the processing device to perform the steps of: receive, from a user input device, a request from a user to establish a first virtual object to access a virtual environment; receive one or more parameters associated with the first virtual object; determine device information associated with the user input device; generate a first unique key based on at least the one or more parameters associated with the first virtual object and the device information associated with the user input device, wherein generating the first unique key further comprises: initiating a feed forward neural network (NN) on the one or more parameters associated with the first virtual object, the device information, and reciprocal channel characteristics between uplink and downlink connection associated with the user input device, wherein the reciprocal channel characteristics comprise at least received signal strength (RSS), memory size and usage, response time, average latency, error rate, requests per second, and throughput; and generating, using the feed forward NN, the first unique key based on at least the one or more parameters associated with the first virtual object and the device information; link the user input device and the first virtual object with the first unique key; store the first unique key in a key repository, wherein the key repository is configured to store one or more unique keys associated with one or more virtual objects linked to the user input device; and establish the first virtual object for the user to access the virtual environment, wherein the first virtual object is established to access the virtual environment exclusively with the user input device.
  2. 2 . The system of claim 1 , wherein executing the instructions further causes the processing device to: discretely embed the first unique key on the first virtual object.
  3. 3 . The system of claim 1 , wherein executing the instructions further causes the processing device to: receive, from the user input device, a request to access the virtual environment using a virtual object; retrieve, from the virtual object, a key embedded thereon; determine whether the key retrieved from the virtual object matches the one or more keys associated with the one or more virtual objects linked to the user input device; and authorize the user input device to access the virtual environment using the virtual object in an instance where the key retrieved from the virtual object matches the one or more keys associated with the one or more virtual objects linked to the user input device.
  4. 4 . The system of claim 3 , wherein executing the instructions further causes the processing device to: deny the user input device access to the virtual environment using the virtual object in an instance where the key retrieved from the virtual object does not match the one or more keys associated with the one or more virtual objects linked to the user input device.
  5. 5 . The system of claim 1 , wherein the first unique key is encrypted prior to being used to link the user input device and the first virtual object.
  6. 6 . A computer program product for monitoring access to a virtual environment using device tagging, the computer program product comprising a non-transitory computer-readable medium comprising code causing an apparatus to: receive, from a user input device, a request from a user to establish a first virtual object to access a virtual environment; receive one or more parameters associated with the first virtual object; determine device information associated with the user input device; generate a first unique key based on at least the one or more parameters associated with the first virtual object and the device information associated with the user input device, wherein generating the first unique key further comprises: initiating a feed forward neural network (NN) on the one or more parameters associated with the first virtual object, the device information, and reciprocal channel characteristics between uplink and downlink connection associated with the user input device, wherein the reciprocal channel characteristics comprise at least received signal strength (RSS), memory size and usage, response time, average latency, error rate, requests per second, and throughput; and generating, using the feed forward NN, the first unique key based on at least the one or more parameters associated with the first virtual object, the device information, and the reciprocal channel characteristics; link the user input device and the first virtual object with the first unique key; store the first unique key in a key repository, wherein the key repository is configured to store one or more unique keys associated with one or more virtual objects linked to the user input device; and establish the first virtual object for the user to access the virtual environment, wherein the first virtual object is established to access the virtual environment exclusively with the user input device.
  7. 7 . The computer program product of claim 6 , wherein the code further causes the apparatus to: discretely embed the first unique key on the first virtual object.
  8. 8 . The computer program product of claim 6 , wherein the code further causes the apparatus to: receive, from the user input device, a request to access the virtual environment using a virtual object; retrieve, from the virtual object, a key embedded thereon; determine whether the key retrieved from the virtual object matches the one or more keys associated with the one or more virtual objects linked to the user input device; and authorize the user input device to access the virtual environment using the virtual object in an instance where the key retrieved from the virtual object matches the one or more keys associated with the one or more virtual objects linked to the user input device.
  9. 9 . The computer program product of claim 8 , wherein the code further causes the apparatus to: deny the user input device access to the virtual environment using the virtual object in an instance where the key retrieved from the virtual object does not match the one or more keys associated with the one or more virtual objects linked to the user input device.
  10. 10 . The computer program product of claim 6 , wherein the first unique key is encrypted prior to being used to link the user input device and the first virtual object.
  11. 11 . A method for monitoring access to a virtual environment using device tagging, the method comprising: receiving, from a user input device, a request from a user to establish a first virtual object to access a virtual environment; receiving one or more parameters associated with the first virtual object; determining device information associated with the user input device; generating a first unique key based on at least the one or more parameters associated with the first virtual object and the device information associated with the user input device, wherein generating the first unique key further comprises: initiating a feed forward neural network (NN) on the one or more parameters associated with the first virtual object, the device information, and reciprocal channel characteristics between uplink and downlink connection associated with the user input device, wherein the reciprocal channel characteristics comprise at least received signal strength (RSS), memory size and usage, response time, average latency, error rate, requests per second, and throughput; and generating, using the feed forward NN, the first unique key based on at least the one or more parameters associated with the first virtual object, the device information, and the reciprocal channel characteristics; linking the user input device and the first virtual object with the first unique key; storing the first unique key in a key repository, wherein the key repository is configured to store one or more unique keys associated with one or more virtual objects linked to the user input device; and establishing the first virtual object for the user to access the virtual environment, wherein the first virtual object is established to access the virtual environment exclusively with the user input device.
  12. 12 . The method of claim 11 , wherein the method further comprises: discretely embedding the first unique key on the first virtual object.
  13. 13 . The method of claim 11 , wherein the method further comprises: receiving, from the user input device, a request to access the virtual environment using a virtual object; retrieving, from the virtual object, a key embedded thereon; determining whether the key retrieved from the virtual object matches the one or more keys associated with the one or more virtual objects linked to the user input device; and authorizing the user input device to access the virtual environment using the virtual object in an instance where the key retrieved from the virtual object matches the one or more keys associated with the one or more virtual objects linked to the user input device.
  14. 14 . The method of claim 13 , wherein the method further comprises: denying the user input device access to the virtual environment using the virtual object in an instance where the key retrieved from the virtual object does not match the one or more keys associated with the one or more virtual objects linked to the user input device.

Description

TECHNOLOGICAL FIELD Example embodiments of the present disclosure relate to monitoring access to a virtual environment. BACKGROUND The use of augmented and/or virtual reality computing environments (collectively referred to herein as “virtual environments”) have become increasing more prevalent. By way of example, Metaverse is a hypothetical iteration of the Internet as a single, universal and immersive virtual environment that is facilitated by the use of virtual reality and augmented reality headsets. Applicant has identified a number of deficiencies and problems associated with monitoring and authenticating access to a virtual environment. Through applied effort, ingenuity, and innovation, many of these identified problems have been solved by developing solutions that are included in embodiments of the present disclosure, many examples of which are described in detail herein BRIEF SUMMARY Systems, methods, and computer program products are provided for monitoring access to a virtual environment using device tagging. In one aspect, a system for monitoring access to a virtual environment using device tagging is presented. The system comprising: a processing device; a non-transitory storage device containing instructions when executed by the processing device, causes the processing device to perform the steps of: receive, from a user input device, a request from a user to establish a first virtual object to access a virtual environment; receive one or more parameters associated with the first virtual object; determine device information associated with the user input device; generate a first unique key based on at least the one or more parameters associated with the first virtual object and the device information associated with the user input device; link the user input device and the first virtual object with the first unique key; store the first unique key in a key repository, wherein the key repository is configured to store one or more unique keys associated with one or more virtual objects linked to the user input device; and establish the first virtual object for the user to access the virtual environment, wherein the first virtual object is established to access the virtual environment exclusively with the user input device. In some embodiments, executing the instructions further causes the processing device to: capture reciprocal channel characteristics between uplink and downlink connection associated with the user input device; and generate the first unique key based on at least the one or more parameters associated with the first virtual object, the device information, and the reciprocal channel characteristics. In some embodiments, executing the instructions further causes the processing device to: discretely embed the first unique key on the first virtual object. In some embodiments, executing the instructions further causes the processing device to: receive, from the user input device, a request to access the virtual environment using a virtual object; retrieve, from the virtual object, a key embedded thereon; determine whether the key retrieved from the virtual object matches the one or more keys associated with the one or more virtual objects linked to the user input device; and authorize the user input device to access the virtual environment using the virtual object in an instance where the key retrieved from the virtual object matches the one or more keys associated with the one or more virtual objects linked to the user input device. In some embodiments, wherein executing the instructions further causes the processing device to: deny the user input device access to the virtual environment using the virtual object in an instance where the key retrieved from the virtual object does not match the one or more keys associated with the one or more virtual objects linked to the user input device. In some embodiments, executing the instructions to generate the unique key further causes the processing device to: initiate a feed forward neural network (NN) on the one or more parameters associated with the first virtual object and the device information; and generate, using the feed forward NN, the first unique key based on at least the one or more parameters associated with the first virtual object and the device information. In some embodiments, the first unique key is encrypted prior to being used to link the user input device and the first virtual object. In another aspect, a computer program product for monitoring access to a virtual environment using device tagging is presented. The computer program product comprising a non-transitory computer-readable medium comprising code causing an apparatus to: receive, from a user input device, a request from a user to establish a first virtual object to access a virtual environment; receive one or more parameters associated with the first virtual object; determine device information associated with the user input device; generate a first unique key ba