Search

US-12626020-B2 - System for secure information transfer in a virtual environment

US12626020B2US 12626020 B2US12626020 B2US 12626020B2US-12626020-B2

Abstract

Systems, computer program products, and methods are described herein for secure information transfer in a virtual environment. The present disclosure is configured to receive, using a first user input device, real-time communication from a first user during a virtual interaction session with a second user in the virtual environment; determine that at least a portion of the real-time communication comprises sensitive information; initiate a temporary sub-session within the virtual interaction session in response to determining that the real-time communication comprises sensitive information, thereby temporarily pausing the virtual interaction session; record the sensitive information within the temporary sub-session; terminate the temporary sub-session in response to recording the sensitive information; and resume the virtual interaction session to continue receiving the real-time communication.

Inventors

  • Sruthi Subramanian
  • Kalyan Chakravarthy Pallapolu
  • Gali Mohan Sreenivas
  • Gondi Mahesh

Assignees

  • BANK OF AMERICA CORPORATION

Dates

Publication Date
20260512
Application Date
20230306

Claims (16)

  1. 1 . A system for secure information transfer in a virtual environment, the system comprising: a processing device; a non-transitory storage device containing instructions when executed by the processing device, causes the processing device to perform the steps of: receive, from a first user input device, a request from a first user to establish a virtual interaction session with a second user; generate a first notification indicating the request from the first user to establish the virtual interaction session with the second user; transmit the first notification to a second user input device associated with the second user; receive, from the second user input device, a user input from the second user acknowledging the request to establish the virtual interaction session with the first user; in response to receiving the user input, establish the virtual interaction session between the first user and the second user based on an interaction purpose between the first user and the second user; receive, using the first user input device, real-time communication from the first user during the virtual interaction session with the second user in the virtual environment; determine that at least a portion of the real-time communication comprises sensitive information; determine that the second user does not have requisite authorization to be privy to the sensitive information; initiate a temporary sub-session within the virtual interaction session in response to determining that the real-time communication comprises sensitive information and that the second user does not have the requisite authorization to be privy to the sensitive information, thereby temporarily pausing the virtual interaction session; record the sensitive information within the temporary sub-session; terminate the temporary sub-session in response to recording the sensitive information; and resume the virtual interaction session to continue receiving the real-time communication.
  2. 2 . The system of claim 1 , wherein executing the instructions further causes the processing device to: receive, from the second user, a query directed to the first user; and determine that the query is associated with the sensitive information.
  3. 3 . The system of claim 2 , wherein executing the instructions further causes the processing device to: parse, using a natural language processing (NLP) subsystem, the query into one or more components; generate, using the NLP subsystem, a parse tree for the query using the one or more components; and determine that the query is associated with the sensitive information based on at least the parse tree.
  4. 4 . The system of claim 2 , wherein executing the instructions to determine that the query is associated with the sensitive information further causes the processing device to: determine that a response to the query by the first user is likely to comprise the sensitive information.
  5. 5 . The system of claim 1 , wherein the first user is represented by a first virtual object in the virtual environment and the second user is represented by a second virtual object in the virtual environment.
  6. 6 . The system of claim 5 , wherein executing the instructions to initiate the temporary sub-session within the virtual interaction session further causes the processing device to: generate an interactive virtual object to replace the second virtual object in the temporary sub-session, thereby denying the second user access to the temporary sub-session; generate a duplicate instance of the first virtual object representing the first user in the temporary sub-session, thereby allowing the first user to participate in the temporary sub-session; and record the sensitive information exchanged between the duplicate instance of the first virtual object and the interactive virtual object within the temporary sub-session.
  7. 7 . The system of claim 6 , wherein executing the instructions further causes the processing device to: receive, within the temporary sub-session, the sensitive information from the duplicate instance of the first virtual object representing the first user; record the sensitive information within the temporary sub-session, wherein recording further comprises encrypting the sensitive information to generate encrypted sensitive information; and generate a second notification indicating that the sensitive information received from the duplicate instance of the first virtual object representing the first user has been recorded and encrypted; and transmit the second notification to the second user.
  8. 8 . The system of claim 1 , wherein the real-time communication comprises at least speech input and/or gesture-based input.
  9. 9 . The system of claim 1 , wherein executing the instructions to record the sensitive information further causes the processing device to: invoke a cloud-based application programming interface (API); and store the sensitive information in the cloud-based API.
  10. 10 . A computer program product for secure information transfer in a virtual environment, the computer program product comprising a non-transitory computer-readable medium comprising code causing an apparatus to: receive, from a first user input device, a request from a first user to establish a virtual interaction session with a second user; generate a first notification indicating the request from the first user to establish the virtual interaction session with the second user; transmit the first notification to a second user input device associated with the second user; receive, from the second user input device, a user input from the second user acknowledging the request to establish the virtual interaction session with the first user; in response to receiving the user input, establish the virtual interaction session between the first user and the second user based on an interaction purpose between the first user and the second user; receive, using the first user input device, real-time communication from the first user during the virtual interaction session with the second user in the virtual environment; determine that at least a portion of the real-time communication comprises sensitive information; determine that the second user does not have requisite authorization to be privy to the sensitive information; initiate a temporary sub-session within the virtual interaction session in response to determining that the real-time communication comprises sensitive information and that the second user does not have the requisite authorization to be privy to the sensitive information, thereby temporarily pausing the virtual interaction session; record the sensitive information within the temporary sub-session; terminate the temporary sub-session in response to recording the sensitive information; and resume the virtual interaction session to continue receiving the real-time communication.
  11. 11 . The computer program product of claim 10 , wherein the code is further configured to cause the apparatus to: receive, from the second user, a query directed to the first user; and determine that the query is associated with the sensitive information.
  12. 12 . The computer program product of claim 11 , wherein the code is further configured to cause the apparatus to: parse, using a natural language processing (NLP) subsystem, the query into one or more components; generate, using the NLP subsystem, a parse tree for the query using the one or more components; and determine that the query is associated with the sensitive information based on at least the parse tree.
  13. 13 . The computer program product of claim 11 , wherein, in determining that the query is associated with the sensitive information, the code is further configured to cause the apparatus to: determine that a response to the query by the first user is likely to comprise the sensitive information.
  14. 14 . The computer program product of claim 10 , wherein the first user is represented by a first virtual object in the virtual environment and the second user is represented by a second virtual object in the virtual environment.
  15. 15 . The computer program product of claim 14 , wherein, in initiating the temporary sub-session within the virtual interaction session, the code is further configured to cause the apparatus to: generate an interactive virtual object to replace the second virtual object in the temporary sub-session, thereby denying the second user access to the temporary sub-session; generate a duplicate instance of the first virtual object representing the first user in the temporary sub-session, thereby allowing the first user to participate in the temporary sub-session; and record the sensitive information exchanged between the duplicate instance of the first virtual object and the interactive virtual object within the temporary sub-session.
  16. 16 . A method for secure information transfer in a virtual environment, the method comprising: receiving, from a first user input device, a request from a first user to establish a virtual interaction session with a second user; generating a first notification indicating the request from the first user to establish the virtual interaction session with the second user; transmitting the first notification to a second user input device associated with the second user; receiving, from the second user input device, a user input from the second user acknowledging the request to establish the virtual interaction session with the first user; in response to receiving the user input, establishing the virtual interaction session between the first user and the second user based on an interaction purpose between the first user and the second user; receiving, using the first user input device, real-time communication from the first user during the virtual interaction session with the second user in the virtual environment; determining that at least a portion of the real-time communication comprises sensitive information; determining that the second user does not have requisite authorization to be privy to the sensitive information; initiating a temporary sub-session within the virtual interaction session in response to determining that the real-time communication comprises sensitive information and that the second user does not have the requisite authorization to be privy to the sensitive information, thereby temporarily pausing the virtual interaction session; recording the sensitive information within the temporary sub-session; terminating the temporary sub-session in response to recording the sensitive information; and resuming the virtual interaction session to continue receiving the real-time communication.

Description

TECHNOLOGICAL FIELD Example embodiments of the present disclosure relate to secure information transfer in a virtual environment. BACKGROUND The use of augmented and/or virtual reality computing environments (collectively referred to herein as “virtual environments”) have become increasing more prevalent. By way of example, Metaverse is a hypothetical iteration of the Internet as a single, universal and immersive virtual environment that is facilitated by the use of virtual reality and augmented reality headsets. Applicant has identified a number of deficiencies and problems associated with secure information transfer in a virtual environment. Through applied effort, ingenuity, and innovation, many of these identified problems have been solved by developing solutions that are included in embodiments of the present disclosure, many examples of which are described in detail herein. BRIEF SUMMARY Systems, methods, and computer program products are provided for secure information transfer in a virtual environment. In one aspect, a system for secure information transfer in a virtual environment is presented. The system comprising: a processing device; a non-transitory storage device containing instructions when executed by the processing device, causes the processing device to perform the steps of: receive, using a first user input device, real-time communication from a first user during a virtual interaction session with a second user in the virtual environment; determine that at least a portion of the real-time communication comprises sensitive information; initiate a temporary sub-session within the virtual interaction session in response to determining that the real-time communication comprises sensitive information, thereby temporarily pausing the virtual interaction session; record the sensitive information within the temporary sub-session; terminate the temporary sub-session in response to recording the sensitive information; and resume the virtual interaction session to continue receiving the real-time communication. In some embodiments, executing the instructions further causes the processing device to: receive, from the first user input device, a request to establish the virtual interaction session with the second user; and establish the virtual interaction session between the first user and the second user in response to receiving the request. In some embodiments, executing the instructions further causes the processing device to: generate a first notification indicating the request from the first user to establish the virtual interaction session with the second user; transmit the first notification to a second user input device associated with the second user; receive, from the second user input device, a user input from the second user acknowledging the request to establish the virtual interaction session with the first user; and establish the virtual interaction session between the first user and the second user in response to receiving the user input. In some embodiments, executing the instructions further causes the processing device to: receive, from the second user, a query directed to the first user; and determine that the query is associated with the sensitive information. In some embodiments, executing the instructions further causes the processing device to: parse, using a natural language processing (NLP) subsystem, the query into one or more components; generate, using the NLP subsystem, a parse tree for the query using the one or more components; and determine that the query is associated with the sensitive information based on at least the parse tree. In some embodiments, executing the instructions to determine that the query is associated with the sensitive information further causes the processing device to: determine that a response to the query by the first user is likely to comprise the sensitive information. In some embodiments, the first user is represented by a first virtual object in the virtual environment and the second user is represented by a second virtual object in the virtual environment. In some embodiments, executing the instructions to initiate the temporary sub-session within the virtual interaction session further causes the processing device to: generate an interactive virtual object to replace the second virtual object in the temporary sub-session, thereby denying the second user access to the temporary sub-session; generate a duplicate instance of the first virtual object representing the first user in the temporary sub-session, thereby allowing the first user to participate in the temporary sub-session; and record the sensitive information exchanged between the duplicate instance of the first virtual object and the interactive virtual object within the temporary sub-session. In some embodiments, executing the instructions further causes the processing device to: receive, within the temporary sub-session, the sensitive information from the duplicate instance of t