Consult an Expert
Trademark
Design Registration
Consult an Expert
Trademark
Copyright
Patent
Infringement
Design Registration
More
Consult an Expert
Consult an Expert
Trademark
Design Registration
Login
AI-Driven Data Encryption for Secure Messaging
Extensive patent search conducted by a registered patent agent
Patent search done by experts in under 48hrs
₹999
₹399
Abstract
Information
Inventors
Applicants
Specification
Documents
ORDINARY APPLICATION
Published
Filed on 13 November 2024
Abstract
The invention presents an AI-driven data encryption system for secure messaging applications, leveraging machine learning to dynamically adapt encryption strategies based on real-time threat analysis and user behavior. The system incorporates an AI analysis module that assesses potential vulnerabilities, selects optimal encryption algorithms, and generates unique cryptographic keys tailored to each message session. By continuously learning from encrypted traffic and evolving threats, the invention enhances security, providing adaptive, scalable protection for various messaging platforms without compromising performance. This innovative approach ensures robust data privacy across personal, enterprise, and critical communication environments.
Patent Information
Application ID | 202441087848 |
Invention Field | COMMUNICATION |
Date of Application | 13/11/2024 |
Publication Number | 47/2024 |
Inventors
Name | Address | Country | Nationality |
---|---|---|---|
Mr. R. Ramaiah | Assistant Professor, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
Poturu Sravan Sai | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
Pulipati Anusuya | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
Pulluru Sri Harshitha | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
Ragi Indu | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
R Venkata Hemanth Kumar | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
Ravinuthala Jahnavi | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
Revuri Kusumavathi | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist, Andhra Pradesh, India-524101, India. | India | India |
R N Venkata Sai Bhavana | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist, Andhra Pradesh, India-524101, India. | India | India |
Salla Priyanka | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist, Andhra Pradesh, India-524101, India. | India | India |
Applicants
Name | Address | Country | Nationality |
---|---|---|---|
Audisankara College of Engineering & Technology | Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist, Andhra Pradesh, India-524101, India. | India | India |
Specification
Description:The present invention relates to data security and encryption technologies, specifically focusing on enhancing secure messaging applications using artificial intelligence (AI). It introduces an innovative method that leverages AI-driven algorithms to dynamically select and optimize encryption techniques, thereby ensuring robust protection against evolving cyber threats and providing secure, adaptive communication for users in real-time messaging environments.
BACKGROUND OF THE INVENTION
The following description of related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section be used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of prior art.
With the increasing prevalence of digital communication, secure messaging has become a vital conce , Claims:1. A method for secure messaging using AI-driven data encryption, comprising:
• Collecting message data and metadata from a messaging application;
• Analyzing the collected data using an AI model to detect potential threats and vulnerabilities;
• Selecting an encryption algorithm based on the analysis performed by the AI model;
• Dynamically generating an encryption key using a cryptographic algorithm, wherein the generation process is guided by the AI model's output;
• Encrypting the message data using the selected encryption algorithm and generated encryption key;
• Transmitting the encrypted message data over a secure communication channel.
2. The method of claim 1, wherein the AI model is a machine learning model trained on historical threat data, user behavior patterns, and encryption performance metrics.
3. The method of claim 1, wherein the encryption key is dynamically updated based on real-time analysis of network conditions and detected threat levels.
4. The method of claim 1, further comprising:
•
Documents
Name | Date |
---|---|
202441087848-COMPLETE SPECIFICATION [13-11-2024(online)].pdf | 13/11/2024 |
202441087848-DECLARATION OF INVENTORSHIP (FORM 5) [13-11-2024(online)].pdf | 13/11/2024 |
202441087848-DRAWINGS [13-11-2024(online)].pdf | 13/11/2024 |
202441087848-FORM 1 [13-11-2024(online)].pdf | 13/11/2024 |
202441087848-FORM-9 [13-11-2024(online)].pdf | 13/11/2024 |
202441087848-REQUEST FOR EARLY PUBLICATION(FORM-9) [13-11-2024(online)].pdf | 13/11/2024 |
Talk To Experts
Calculators
Downloads
By continuing past this page, you agree to our Terms of Service,, Cookie Policy, Privacy Policy and Refund Policy © - Uber9 Business Process Services Private Limited. All rights reserved.
Uber9 Business Process Services Private Limited, CIN - U74900TN2014PTC098414, GSTIN - 33AABCU7650C1ZM, Registered Office Address - F-97, Newry Shreya Apartments Anna Nagar East, Chennai, Tamil Nadu 600102, India.
Please note that we are a facilitating platform enabling access to reliable professionals. We are not a law firm and do not provide legal services ourselves. The information on this website is for the purpose of knowledge only and should not be relied upon as legal advice or opinion.