US 12,328,394 B2
System for augmented hash-based portioning of non-fungible electronic resources for detection of unauthorized duplicates
George Anthony Albero, Charlotte, NC (US); and Maharaj Mukherjee, Poughkeepsie, NY (US)
Assigned to BANK OF AMERICA CORPORATION, Charlotte, NC (US)
Filed by BANK OF AMERICA CORPORATION, Charlotte, NC (US)
Filed on Jun. 7, 2022, as Appl. No. 17/834,038.
Prior Publication US 2023/0396437 A1, Dec. 7, 2023
Int. Cl. H04L 9/32 (2006.01); G06F 21/10 (2013.01)
CPC H04L 9/3213 (2013.01) [G06F 21/10 (2013.01); H04L 9/3239 (2013.01); G06F 21/101 (2023.08)] 20 Claims
OG exemplary drawing
 
1. A system for augmented hash-based portioning of non-fungible electronic resources for detection of unauthorized duplicates, the system comprising:
a processor;
a non-transitory storage device containing instructions that, when executed by the processor, cause the processor to:
receive, from a first user input device, an unauthorized duplication detection request for a first non-fungible token (NFT) from a first user, wherein the first NFT is associated with a first digital resource, wherein the first user is an owner of the first NFT;
segment, using a resource segmentation engine, the first digital resource into a first set of resource portions, wherein segmenting the first digital resource further comprises:
overlaying a first bounding segment pattern on the first digital resource, wherein the first bounding segment patterns overlap with one another; and
generating the first set of resource portions for the first digital resource based on at least overlaying the first bounding segment pattern on the first digital resource;
generate a first set of hash values corresponding to the first set of resource portions;
retrieve, from a virtual environment, a second digital resource, wherein the second digital resource is associated with a second NFT;
segment, using the resource segmentation engine, the second digital resource into a second set of resource portions;
generate a second set of hash values corresponding to the second set of resource portions;
determine that the second digital resource is similar to the first digital resource based on at least the first set of hash values and the second set of hash values;
determine that the second NFT is an unauthorized duplication of the first NFT; and
trigger one or more responsive actions for execution in response to determining that the second NFT is an unauthorized duplication of the first NFT.