| CPC H04L 63/1483 (2013.01) [G06Q 50/01 (2013.01); G06V 40/171 (2022.01); G06V 40/172 (2022.01); G06V 40/33 (2022.01); G06V 40/40 (2022.01); G06V 40/50 (2022.01)] | 20 Claims |

|
1. A defensive deepfake computer program product, the computer program product comprising executable instructions, the executable instructions stored on a non-transitory computer-readable storage medium, when the executable instructions executed by a processor on a computer system cause the processor to:
gather two or more verified images of a target individual;
analyze, through one or more artificial intelligence/machine learning (“AI/ML”) algorithms, the two or more verified images to determine one or more unique facial characteristics of the target individual;
create, through one or more AI/ML deepfake algorithms, one or more deepfake images of the target individual;
store the one or more unique facial characteristics, and the one or more deepfake images in a database;
search a network for one or more social media accounts that include the one or more unique facial characteristics; and
determine when the one or more social media accounts are illegitimate by comparing the one or more social media accounts with the one or more deepfake images.
|