Patents by Inventor Colm Nolan
Colm Nolan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11589227Abstract: A computer-implemented method, a computer program product, and a computer system for using a mobile device to authenticate a user to access a secure facility. An authentication service determines whether the mobile device of the user is locked. The authentication service requests the user to unlock the mobile device and determines whether the user has unlocked the mobile device. The authentication service retrieves, from the mobile device, a first token and a MAC address. The authentication service retrieves, from a database, a token identifier of the mobile device and a personal identifier of the user. The authentication service generates a second token, based on the token identifier, the personal identifier, and the MAC address. The authentication service determines whether the first and the second tokens match. The authentication service grants the user access to the secure facility, in response to the first and the second tokens matching.Type: GrantFiled: February 11, 2020Date of Patent: February 21, 2023Assignee: KYNDRYL, INC.Inventors: Juan F. Vargas, Mark E. Maresh, Michael J. Whitney, Colm Nolan
-
Patent number: 11423405Abstract: A method for peer validation for unauthorized transactions includes receiving a request to validate a user performing a transaction anomaly, wherein the transaction anomaly represents a potential fraudulent financial transaction. The method, responsive to identifying one or more boundaries to search for validation users, identifies a set of validation users in the identified one or more boundaries, where each validation user from the set of validation users has the ability to visually confirm the user performing the transaction as a valid user associated with an account for the transaction anomaly. The method displays information for the valid user associated with the account for the transaction anomaly. The method, responsive to determining the user is not validated for the transaction anomaly, declines the transaction anomaly.Type: GrantFiled: September 10, 2019Date of Patent: August 23, 2022Assignee: International Business Machines CorporationInventors: Michael J. Whitney, Colm Nolan, Mark Maresh, Juan F Vargas
-
Patent number: 11409856Abstract: Methods, systems and computer program products for providing video-based authentication are provided. Aspects include receiving a master video comprising a recording of a first plurality of objects. Aspects also include identifying each of the first plurality of objects using image recognition techniques. Aspects also include receiving a user selection of a plurality of authentication objects, where the plurality of authentication objects are a subset of the first plurality of objects. Aspects also include receiving a user authentication request comprising an authentication video. The authentication video is a recording of a second plurality of objects. Aspects also include identifying each of the second plurality of objects using image recognition techniques.Type: GrantFiled: March 29, 2019Date of Patent: August 9, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
-
Patent number: 11392682Abstract: Example techniques are described for image-based user authentication. An example method includes receiving, by a host system, a passphrase comprising a plurality of words, the passphrase being provided for authentication of a user. The method further includes generating, by the host system, an image selection grid comprising a plurality of images, each word from the passphrase corresponding to one or more images from the image selection grid. The method further includes receiving, by the host system, a plurality of selected images from the image selection grid. The method further includes storing, by the host system, the selected images as a login challenge for the user.Type: GrantFiled: December 22, 2020Date of Patent: July 19, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael J. Whitney, Colm Nolan, Mark Maresh, Juan F. Vargas
-
Patent number: 11296886Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.Type: GrantFiled: April 5, 2019Date of Patent: April 5, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
-
Patent number: 11222105Abstract: An example method includes enabling, by the user processing system, a user to associate a color with at least one of the plurality of pixels of a graphic, and generating a passcode. The passcode is based at least in part on the color associated with the at least one of the plurality of pixels. The method further includes transmitting, by the user processing system, the passcode to a host processing system. The method further includes determining, by the host processing system, whether the passcode matches an expected passcode that is based at least in part on a reference graphic comprising a plurality of reference pixels, each of the plurality of reference pixels having a color or a null value associated therewith. The method further includes, responsive to determining that the passcode matches the expected passcode, authorizing, by the host processing system, the user processing system to access a restricted resource.Type: GrantFiled: December 12, 2018Date of Patent: January 11, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
-
Patent number: 11138297Abstract: A computer-implemented method includes receiving an indication of a first selected instrument, where the first selected instrument is selected from a plurality of instruments. One or more first sequences of notes are received. One or more saved sound compositions are generated based on the first selected instrument and the one or more first sequences of notes. One or more current sound compositions are compared to the one or more saved sound compositions using sound analysis. A user is authenticated based on a similarity between the one or more current sound compositions and the one or more saved sound composition.Type: GrantFiled: July 31, 2018Date of Patent: October 5, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Juan F. Vargas, Mark Maresh, Michael J. Whitney, Colm Nolan
-
Patent number: 11120118Abstract: Examples of techniques for location validation for authentication are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes presenting, by a processing device, a location-based security challenge to a user. The method further includes responsive to presenting the location-based security challenge to the user, receiving, by the processing device, media from the user. The method further includes validating, by the processing device, the media received from the user against the location-based security challenge to determine whether the user is located at an authorized location. The method further includes responsive to determining that the user is located at an authorized location, authenticating, by the processing device, the user to grant access for the user to a resource.Type: GrantFiled: November 22, 2017Date of Patent: September 14, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
-
Publication number: 20210250765Abstract: A computer-implemented method, a computer program product, and a computer system for using a mobile device to authenticate a user to access a secure facility. An authentication service determines whether the mobile device of the user is locked. The authentication service requests the user to unlock the mobile device and determines whether the user has unlocked the mobile device. The authentication service retrieves, from the mobile device, a first token and a MAC address. The authentication service retrieves, from a database, a token identifier of the mobile device and a personal identifier of the user. The authentication service generates a second token, based on the token identifier, the personal identifier, and the MAC address. The authentication service determines whether the first and the second tokens match. The authentication service grants the user access to the secure facility, in response to the first and the second tokens matching.Type: ApplicationFiled: February 11, 2020Publication date: August 12, 2021Inventors: Juan F. Vargas, Mark E. Maresh, Michael J. Whitney, Colm Nolan
-
Patent number: 11062001Abstract: Methods, systems and computer program products for providing matrix transformation-based authentication are provided. Aspects include storing an original matrix having a plurality of cells. Each of the plurality of cells is in a selected state or an unselected state. Aspects also include receiving an original pin from a user device. The original pin includes a plurality of characters. Aspects also include selecting a bit operation. Aspects also include generating a modified matrix based on the original matrix, the original pin, and the bit operation. Aspects also include transmitting the modified matrix to the user device. Responsive to receiving a user authentication request comprising an authentication pin and an authentication matrix, aspects further include authenticating a user.Type: GrantFiled: April 2, 2019Date of Patent: July 13, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
-
Publication number: 20210110021Abstract: Example techniques are described for image-based user authentication. An example method includes receiving, by a host system, a passphrase comprising a plurality of words, the passphrase being provided for authentication of a user. The method further includes generating, by the host system, an image selection grid comprising a plurality of images, each word from the passphrase corresponding to one or more images from the image selection grid. The method further includes receiving, by the host system, a plurality of selected images from the image selection grid. The method further includes storing, by the host system, the selected images as a login challenge for the user.Type: ApplicationFiled: December 22, 2020Publication date: April 15, 2021Inventors: Michael J. Whitney, Colm Nolan, Mark Maresh, Juan F. Vargas
-
Patent number: 10949512Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.Type: GrantFiled: July 10, 2019Date of Patent: March 16, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
-
Publication number: 20210073818Abstract: A method for peer validation for unauthorized transactions includes receiving a request to validate a user performing a transaction anomaly, wherein the transaction anomaly represents a potential fraudulent financial transaction. The method, responsive to identifying one or more boundaries to search for validation users, identifies a set of validation users in the identified one or more boundaries, where each validation user from the set of validation users has the ability to visually confirm the user performing the transaction as a valid user associated with an account for the transaction anomaly. The method displays information for the valid user associated with the account for the transaction anomaly. The method, responsive to determining the user is not validated for the transaction anomaly, declines the transaction anomaly.Type: ApplicationFiled: September 10, 2019Publication date: March 11, 2021Inventors: Michael J. Whitney, COLM NOLAN, Mark Maresh, Juan F. Vargas
-
Patent number: 10893041Abstract: According to aspects of the present disclosure, a computer-implemented method includes generating, by a host processing system, a single use authentication map to map a private set of characters to a public set of characters. The method further includes transmitting, by the host processing system, the single use authentication map to a user processing system that presents an authentication interface comprising the public set of characters to enable a user to enter a user passcode using the public set of characters. The user processing system encodes the user passcode into a single use passcode using the single use authentication map. The method further includes the host processing system receiving the single use passcode from the user processing system, decoding the single use passcode back the user passcode using the single use authentication map, and determining whether the user passcode matches an expected passcode.Type: GrantFiled: October 10, 2018Date of Patent: January 12, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
-
Patent number: 10885176Abstract: Example techniques are described for image-based user authentication. An example method includes receiving, by a host system, a passphrase comprising a plurality of words, the passphrase being provided for authentication of a user. The method further includes generating, by the host system, an image selection grid comprising a plurality of images, each word from the passphrase corresponding to one or more images from the image selection grid. The method further includes receiving, by the host system, a plurality of selected images from the image selection grid. The method further includes storing, by the host system, the selected images as a login challenge for the user.Type: GrantFiled: June 11, 2018Date of Patent: January 5, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael J. Whitney, Colm Nolan, Mark Maresh, Juan F. Vargas
-
Publication number: 20200320180Abstract: Methods, systems and computer program products for providing matrix transformation-based authentication are provided. Aspects include storing an original matrix having a plurality of cells. Each of the plurality of cells is in a selected state or an unselected state. Aspects also include receiving an original pin from a user device. The original pin includes a plurality of characters. Aspects also include selecting a bit operation. Aspects also include generating a modified matrix based on the original matrix, the original pin, and the bit operation. Aspects also include transmitting the modified matrix to the user device. Responsive to receiving a user authentication request comprising an authentication pin and an authentication matrix, aspects further include authenticating a user.Type: ApplicationFiled: April 2, 2019Publication date: October 8, 2020Inventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
-
Publication number: 20200311244Abstract: Methods, systems and computer program products for providing video-based authentication are provided. Aspects include receiving a master video comprising a recording of a first plurality of objects. Aspects also include identifying each of the first plurality of objects using image recognition techniques. Aspects also include receiving a user selection of a plurality of authentication objects, where the plurality of authentication objects are a subset of the first plurality of objects. Aspects also include receiving a user authentication request comprising an authentication video. The authentication video is a recording of a second plurality of objects. Aspects also include identifying each of the second plurality of objects using image recognition techniques.Type: ApplicationFiled: March 29, 2019Publication date: October 1, 2020Inventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
-
Patent number: 10693857Abstract: Systems, methods, and computer-readable media are disclosed for obtaining authenticated access to a service provider system, or more specifically, to a user account maintained on the service provider system, using a single key authentication mechanism. This mechanism includes generating an authentication image that includes user-generated content, user application-generated content, and service provider-generated content; sending the authentication image to the service provider system, which is configured to authenticate access to the user account based at least in part on the authentication image; and receiving an indication as to whether access to the user account has been authenticated.Type: GrantFiled: January 18, 2019Date of Patent: June 23, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
-
Publication number: 20200193008Abstract: An example method includes enabling, by the user processing system, a user to associate a color with at least one of the plurality of pixels of a graphic, and generating a passcode. The passcode is based at least in part on the color associated with the at least one of the plurality of pixels. The method further includes transmitting, by the user processing system, the passcode to a host processing system. The method further includes determining, by the host processing system, whether the passcode matches an expected passcode that is based at least in part on a reference graphic comprising a plurality of reference pixels, each of the plurality of reference pixels having a color or a null value associated therewith. The method further includes, responsive to determining that the passcode matches the expected passcode, authorizing, by the host processing system, the user processing system to access a restricted resource.Type: ApplicationFiled: December 12, 2018Publication date: June 18, 2020Inventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
-
Patent number: 10642966Abstract: User authentication is facilitated. A plurality of images on one or more display levels is presented to a user in random order. A password is received from the user, and the password includes a set of images selected from the plurality of images and an indication of a particular sequence of the images in the set of images. A determination is made as to whether the password matches a predefined password, and access is provided based on determining there is a match of the password and the predefined password.Type: GrantFiled: November 30, 2017Date of Patent: May 5, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Colm Nolan, Mark Maresh, Michael J. Whitney, Juan Vargas