US-20260127621-A1 - SYSTEMS AND METHODS FOR VERIFICATION
Abstract
Systems and methods for verification and authentication of digital and physical objects are described. The system performs the method of receiving a verification tag request, generating, a verification tag in response to the verification tag request, receiving a verification request comprising the verification tag, determining a verification notification based on the verification request; and transmitting the verification notification to a graphical user interface of a client network device.
Inventors
- Niclas Braun
- Julian Wiebke
Assignees
- For Safety Group, Inc.
Dates
- Publication Date
- 20260507
- Application Date
- 20241205
Claims (20)
- 1 . A method of verification comprising: receiving, by one or more processors, an object submission from a first network device, wherein the object submission comprises an object to be verified; generating, by the one or more processors, a verification tag associated with the object; receiving, by the one or more processors, a verification request from a second network device, the verification request comprising a search tag; transmitting, by the one or more processors, a verification notification to a graphical user interface of the second network device, in response to the verification request.
- 2 . The method of claim 1 , wherein the object comprises a digital object.
- 3 . The method of claim 1 , wherein the object comprises a physical object.
- 4 . The method of claim 1 , wherein the verification tag is stored on a blockchain network in communication with the one or more processors.
- 5 . The method of claim 1 , wherein the verification tag comprises a latitude, a longitude, an altitude, a time, and a unique number.
- 6 . The method of claim 1 , further comprising verifying, by the one or more processors, the verification request by comparing the search tag and the verification tag.
- 7 . The method of claim 1 , wherein the verification request comprises a search file.
- 8 . The method of claim 7 , further comprising verifying, by the one or more processors, the verification request by comparing the search file and the object.
- 9 . The method of claim 8 , further comprising determining, by the one or mor processors, a confidence level of the comparison between the search file and the object.
- 10 . The method of claim 9 , wherein the verification notification comprises the confidence level.
- 11 . A system comprising: one or more processors; and one or more tangible, non-transitory memories configured to communicate with the one or more processors, the one or more tangible, non-transitory memories having instructions stored thereon that, in response to execution by the one or more processors, cause the one or more processors to perform operations comprising: receiving, by the one or more processors, an object submission; generating, by the one or more processors, a verification tag in response to the object submission; receiving, by the one or more processors, a verification request comprising a search tag; determining, by the one or more processors, a verification notification based on the verification request; and transmitting, by the one or more processors, the verification notification to a graphical user interface of a network device in communication with the one or more processors.
- 12 . The system of claim 11 , wherein the object submission comprises an object to be verified, wherein the object is a digital object.
- 13 . The system of claim 11 , wherein the object submission comprises an object to be verified, wherein the object is a physical object.
- 14 . The system of claim 11 , wherein the verification tag is stored on a blockchain network in communication with the one or more processors.
- 15 . The system of claim 11 , wherein the verification tag comprises a latitude, a longitude, an altitude, a time, and a unique number.
- 16 . The system of claim 11 , further comprising verifying, by the one or more processors, the verification request by comparing a search file and the object submission.
- 17 . The system of claim 11 , further comprising the network device, wherein the network device comprises at least one of a camera and a microphone.
- 18 . The system of claim 17 , wherein the network device is configured to transmit a live verified object to the one or more processors from at least one of the camera and the microphone, wherein the one or more processors generates the verification tag for the live verified object.
- 19 . An article of manufacture including one or more non-transitory, tangible computer readable storage mediums having instructions stored thereon that, in response to execution by one or more processors, cause the one or more processors to perform operations comprising: receiving, by the one or more processors, an object submission; generating, by the one or more processors, a verification tag in response to the object submission; receiving, by the one or more processors, a verification request comprising a search tag; determining, by the one or more processors, a verification notification based on the verification request; and transmitting, by the one or more processors, the verification notification to a graphical user interface of a network device in communication with the one or more processors.
- 20 . The article of manufacture of claim 19 , wherein the object submission comprises an object to be verified, wherein the object is a digital object.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS This application is a continuation of, and claims priority to and the benefit of, U.S. patent application Ser. No. 18/970,652, filed Dec. 5, 2024 and entitled “SYSTEMS AND METHODS FOR VERIFICATION,” which is a non-provisional of, and claims priority to and the benefit of, U.S. Provisional Patent Application No. 63/717,623, filed Nov. 7, 2024 and entitled “SYSTEMS AND METHODS FOR VERIFICATION,” which is hereby incorporated by reference herein in its entirety for all purposes. FIELD This disclosure generally relates to systems and methods for verification of people, online content, and physical objects. BACKGROUND In the digital age, the consumption and sharing of multimedia content (e.g., photographs, audio files, video files, documents and text files)—has become ubiquitous. Social media platforms, news outlets, and various online marketplaces facilitate the rapid dissemination of information and media, often without sufficient verification mechanisms. With the rise of user-generated content, there has been a significant increase in anonymity associated with postings, often making it difficult to authenticate the origin or legitimacy of digital files. This challenge is compounded by the increasing sophistication of digital manipulation techniques, such as deepfakes and photoshopped images, which can deceive viewers and spread misinformation on a global scale. Additionally, fraudulent data manipulation can be implemented on corporate statements and spreadsheets that can result in market manipulation. Similarly, the rise of e-commerce and online trading platforms has brought with it the proliferation of physical goods that require verification of authenticity. Collectors of items such as sports memorabilia, luxury goods, and even pharmaceutical products (e.g., vaccines) are increasingly concerned about the risk of counterfeits, particularly because some of the items may be very valuable. Unscrupulous actors can take advantage of anonymity and the lack of secure verification processes, creating a growing market for fake items that resemble legitimate products. Further, these bad actors may provide fake goods under a false identity to further conceal their actions. A sufficient digital human identification method does not currently exist. The need for an effective system to verify digital documents, physical objects and/or human identification is paramount for both consumer protection and market integrity. Additionally, no existing system exists for tying a person's verified human identity to digital and physical assets, which would increase security and trust amongst consumers. Currently, there is no unified method for verifying the authenticity of digital multimedia content, physical objects, and/or human identity in a decentralized and anonymous online environment, or in an offline environment. While individual solutions may exist (e.g., digital watermarks for photos, certificates of authenticity for physical goods, physical seals etc.), these methods are often siloed, limited in scope, and susceptible to forgery or tampering. Moreover, traditional verification methods can be slow or expensive, which undermines the efficiency and scalability that should be part of today's fast-paced, digitally driven economy. Further, images, documents, audio clips and videos created by artificial intelligence are becoming increasingly realistic and harder to discern if the images and videos are authentic. A system and method for online verification that covers multimedia content (e.g., photos, audio files, video files, text files, documents), physical objects, and/or human identity is crucial in addressing these issues. Such a system would enable real-time, decentralized verification processes, fostering trust and transparency in digital and physical transactions. The increasing sophistication of forgery and the widespread anonymity of online actors highlight the pressing need for a solution that can both deter fraudulent behavior and provide peace of mind for users and consumers alike. SUMMARY In various embodiments, the method may comprise receiving, by one or more processors, an object submission from a first network device comprising an object, and generating, by the one or more processors, a verification tag associated with the object. The object can be a digital object, such as, for example, a video, a text file, a multimedia image, an audio file, and a document, or other digital objects. The object can be a physical object, such as medical equipment, vaccines, memorabilia, among other physical objects. In various embodiments, the method may comprise generating, by the one or more processors, a verification tag associated with the object. The verification tag may be assigned to the object, and it may comprise a latitude, a longitude, an altitude, a time, and a unique number. The method may comprise receiving, by one or more processors, a verification request from a second network