| CPC H04L 67/1076 (2013.01) [H04L 67/1085 (2013.01); H04L 67/1093 (2013.01)] | 16 Claims |

|
1. A system for verifying a peer-to-peer network transmission, the system comprising:
a peer-to-peer computing network comprising a plurality of peer nodes; and
a computing platform comprising a memory and one or more computing processor devices in communication with the memory, wherein the memory stores a peer-to-peer network transmission verification sub-system including a first Artificial Intelligence (AI) model, wherein the peer-to-peer network transmission verification sub-system is executable by at least one of the one or more computing processor devices and configured to:
receive, from a first peer node from amongst the plurality of peer nodes, a peer-to-peer network transmission, wherein the peer-to-peer network transmission includes (i) a second peer node identifier associated with a second peer node from amongst the plurality of peer nodes and (ii) a first transmission purpose;
hold the peer-to-peer network transmission in a pending transmission queue;
while the peer-to-peer network transmission is held in the pending transmission queue:
initiate communication of a first push notification to the second peer node, wherein the first push notification is configured to request input of a second transmission purpose;
receive, from the second peer node, a response to the first push notification that includes the second transmission purpose;
execute the first AI model that is trained to determine whether the first transmission purpose matches the second transmission purpose;
determine, by the first AI model, that the first transmission purpose does not match the second transmission purpose;
generate and store a verification code;
initiate communication of a second push notification to the second peer node that includes the verification code;
initiate communication of a third push notification to the second peer node, wherein the third push notification is configured to request input of the verification code;
receive, from the second peer node, a response to the third push notification that includes an inputted verification code;
determine whether the stored verification code matches the inputted verification code; and
determine that the stored verification code matches the inputted verification code;
release the peer-to-peer network transmission from the pending transmission queue;
wherein the memory further stores a misappropriation detection sub-system including a second AI model, wherein the misappropriation detection sub-system is executable by at least one of the one or more computing processor devices and configured to:
receive, from the peer-to-peer network transmission verification sub-system, a first notification that indicates that the peer-to-peer network transmission is being held in the pending transmission, wherein the first notification includes the first transmission purpose;
execute the second AI model that is trained to determine a potential misappropriation associated with the peer-to-peer network transmission based on the first transmission purpose;
determine the potential misappropriation; and
initiate communication of second notification to the peer-to-peer network transmission verification sub-system, wherein the second notification indicates a potential misappropriation associated with the peer-to-peer network transmission.
|