Patents by Inventor Juan F. Vargas
Juan F. Vargas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240291861Abstract: Cybersecurity is provided for a transaction initiated by a matrix barcode using a smart device connected to a computer network by a device having a computer receiving a reading of a matrix barcode on an item. The matrix barcode electronically pointing to a URL (Uniform Resource Locator) for a web-based resource accessible using the device via a computer network. Using the computer of the device or a service computer, determining information parameters about the matrix barcode, and determining when the URL is identified as a registered service provider in a knowledge corpus communicating with the service computer. The URL can be validated as registered, when the URL is identified as corresponding to the registered service provider and based on the information parameters.Type: ApplicationFiled: February 27, 2023Publication date: August 29, 2024Inventors: Juan F. Vargas, Mark E. Maresh
-
Patent number: 11790076Abstract: A computer-implemented method for authenticating a request to access a remote resource includes identifying a request from a first device to access a resource located on a second device. The computer-implemented method further includes retrieving one or more encrypted passwords for authenticating access to the resource from a partition of a vault located on the first device. The computer-implemented method further includes comparing the one or more encrypted passwords retrieved from the partition of the vault located on the first device to one or more designated passwords stored on the second device. The computer-implemented method further includes granting the first device access to the resource located on the second device based, at least in part, on the one or more encrypted passwords retrieved from the partition of the vault located on the first device matching the one or more designated passwords stored on the second device.Type: GrantFiled: June 3, 2021Date of Patent: October 17, 2023Assignee: International Business Machines CorporationInventors: Mark E. Maresh, Michael J. Whitney, Juan F. Vargas, Erich Guenter
-
Patent number: 11589227Abstract: A computer-implemented method, a computer program product, and a computer system for using a mobile device to authenticate a user to access a secure facility. An authentication service determines whether the mobile device of the user is locked. The authentication service requests the user to unlock the mobile device and determines whether the user has unlocked the mobile device. The authentication service retrieves, from the mobile device, a first token and a MAC address. The authentication service retrieves, from a database, a token identifier of the mobile device and a personal identifier of the user. The authentication service generates a second token, based on the token identifier, the personal identifier, and the MAC address. The authentication service determines whether the first and the second tokens match. The authentication service grants the user access to the secure facility, in response to the first and the second tokens matching.Type: GrantFiled: February 11, 2020Date of Patent: February 21, 2023Assignee: KYNDRYL, INC.Inventors: Juan F. Vargas, Mark E. Maresh, Michael J. Whitney, Colm Nolan
-
Publication number: 20220391490Abstract: A computer-implemented method for authenticating a request to access a remote resource includes identifying a request from a first device to access a resource located on a second device. The computer-implemented method further includes retrieving one or more encrypted passwords for authenticating access to the resource from a partition of a vault located on the first device. The computer-implemented method further includes comparing the one or more encrypted passwords retrieved from the partition of the vault located on the first device to one or more designated passwords stored on the second device. The computer-implemented method further includes granting the first device access to the resource located on the second device based, at least in part, on the one or more encrypted passwords retrieved from the partition of the vault located on the first device matching the one or more designated passwords stored on the second device.Type: ApplicationFiled: June 3, 2021Publication date: December 8, 2022Inventors: Mark E. Maresh, Michael J. Whitney, Juan F. Vargas, Erich Guenter
-
Patent number: 11423405Abstract: A method for peer validation for unauthorized transactions includes receiving a request to validate a user performing a transaction anomaly, wherein the transaction anomaly represents a potential fraudulent financial transaction. The method, responsive to identifying one or more boundaries to search for validation users, identifies a set of validation users in the identified one or more boundaries, where each validation user from the set of validation users has the ability to visually confirm the user performing the transaction as a valid user associated with an account for the transaction anomaly. The method displays information for the valid user associated with the account for the transaction anomaly. The method, responsive to determining the user is not validated for the transaction anomaly, declines the transaction anomaly.Type: GrantFiled: September 10, 2019Date of Patent: August 23, 2022Assignee: International Business Machines CorporationInventors: Michael J. Whitney, Colm Nolan, Mark Maresh, Juan F Vargas
-
Patent number: 11409856Abstract: Methods, systems and computer program products for providing video-based authentication are provided. Aspects include receiving a master video comprising a recording of a first plurality of objects. Aspects also include identifying each of the first plurality of objects using image recognition techniques. Aspects also include receiving a user selection of a plurality of authentication objects, where the plurality of authentication objects are a subset of the first plurality of objects. Aspects also include receiving a user authentication request comprising an authentication video. The authentication video is a recording of a second plurality of objects. Aspects also include identifying each of the second plurality of objects using image recognition techniques.Type: GrantFiled: March 29, 2019Date of Patent: August 9, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
-
Patent number: 11392682Abstract: Example techniques are described for image-based user authentication. An example method includes receiving, by a host system, a passphrase comprising a plurality of words, the passphrase being provided for authentication of a user. The method further includes generating, by the host system, an image selection grid comprising a plurality of images, each word from the passphrase corresponding to one or more images from the image selection grid. The method further includes receiving, by the host system, a plurality of selected images from the image selection grid. The method further includes storing, by the host system, the selected images as a login challenge for the user.Type: GrantFiled: December 22, 2020Date of Patent: July 19, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael J. Whitney, Colm Nolan, Mark Maresh, Juan F. Vargas
-
Patent number: 11296886Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.Type: GrantFiled: April 5, 2019Date of Patent: April 5, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
-
Publication number: 20220030702Abstract: An article comprises a superficial watermark located on a first surface. The article also comprises an embedded watermark that is embedded within the article. The embedded watermark may be viewed by an X-ray camera. A method comprises applying a metal-containing mixture to an inner layer of an article, resulting in an embedded watermark within the article. The method also comprises analyzing the properties of metal particles within the mixture. The method also comprises recording the first property.Type: ApplicationFiled: July 26, 2020Publication date: January 27, 2022Inventors: Mark E. Maresh, Michael J. Whitney, Juan F. Vargas
-
Patent number: 11222105Abstract: An example method includes enabling, by the user processing system, a user to associate a color with at least one of the plurality of pixels of a graphic, and generating a passcode. The passcode is based at least in part on the color associated with the at least one of the plurality of pixels. The method further includes transmitting, by the user processing system, the passcode to a host processing system. The method further includes determining, by the host processing system, whether the passcode matches an expected passcode that is based at least in part on a reference graphic comprising a plurality of reference pixels, each of the plurality of reference pixels having a color or a null value associated therewith. The method further includes, responsive to determining that the passcode matches the expected passcode, authorizing, by the host processing system, the user processing system to access a restricted resource.Type: GrantFiled: December 12, 2018Date of Patent: January 11, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
-
Patent number: 11138297Abstract: A computer-implemented method includes receiving an indication of a first selected instrument, where the first selected instrument is selected from a plurality of instruments. One or more first sequences of notes are received. One or more saved sound compositions are generated based on the first selected instrument and the one or more first sequences of notes. One or more current sound compositions are compared to the one or more saved sound compositions using sound analysis. A user is authenticated based on a similarity between the one or more current sound compositions and the one or more saved sound composition.Type: GrantFiled: July 31, 2018Date of Patent: October 5, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Juan F. Vargas, Mark Maresh, Michael J. Whitney, Colm Nolan
-
Patent number: 11120118Abstract: Examples of techniques for location validation for authentication are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes presenting, by a processing device, a location-based security challenge to a user. The method further includes responsive to presenting the location-based security challenge to the user, receiving, by the processing device, media from the user. The method further includes validating, by the processing device, the media received from the user against the location-based security challenge to determine whether the user is located at an authorized location. The method further includes responsive to determining that the user is located at an authorized location, authenticating, by the processing device, the user to grant access for the user to a resource.Type: GrantFiled: November 22, 2017Date of Patent: September 14, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
-
Publication number: 20210250765Abstract: A computer-implemented method, a computer program product, and a computer system for using a mobile device to authenticate a user to access a secure facility. An authentication service determines whether the mobile device of the user is locked. The authentication service requests the user to unlock the mobile device and determines whether the user has unlocked the mobile device. The authentication service retrieves, from the mobile device, a first token and a MAC address. The authentication service retrieves, from a database, a token identifier of the mobile device and a personal identifier of the user. The authentication service generates a second token, based on the token identifier, the personal identifier, and the MAC address. The authentication service determines whether the first and the second tokens match. The authentication service grants the user access to the secure facility, in response to the first and the second tokens matching.Type: ApplicationFiled: February 11, 2020Publication date: August 12, 2021Inventors: Juan F. Vargas, Mark E. Maresh, Michael J. Whitney, Colm Nolan
-
Patent number: 11062001Abstract: Methods, systems and computer program products for providing matrix transformation-based authentication are provided. Aspects include storing an original matrix having a plurality of cells. Each of the plurality of cells is in a selected state or an unselected state. Aspects also include receiving an original pin from a user device. The original pin includes a plurality of characters. Aspects also include selecting a bit operation. Aspects also include generating a modified matrix based on the original matrix, the original pin, and the bit operation. Aspects also include transmitting the modified matrix to the user device. Responsive to receiving a user authentication request comprising an authentication pin and an authentication matrix, aspects further include authenticating a user.Type: GrantFiled: April 2, 2019Date of Patent: July 13, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
-
Publication number: 20210110021Abstract: Example techniques are described for image-based user authentication. An example method includes receiving, by a host system, a passphrase comprising a plurality of words, the passphrase being provided for authentication of a user. The method further includes generating, by the host system, an image selection grid comprising a plurality of images, each word from the passphrase corresponding to one or more images from the image selection grid. The method further includes receiving, by the host system, a plurality of selected images from the image selection grid. The method further includes storing, by the host system, the selected images as a login challenge for the user.Type: ApplicationFiled: December 22, 2020Publication date: April 15, 2021Inventors: Michael J. Whitney, Colm Nolan, Mark Maresh, Juan F. Vargas
-
Patent number: 10949512Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.Type: GrantFiled: July 10, 2019Date of Patent: March 16, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
-
Publication number: 20210073818Abstract: A method for peer validation for unauthorized transactions includes receiving a request to validate a user performing a transaction anomaly, wherein the transaction anomaly represents a potential fraudulent financial transaction. The method, responsive to identifying one or more boundaries to search for validation users, identifies a set of validation users in the identified one or more boundaries, where each validation user from the set of validation users has the ability to visually confirm the user performing the transaction as a valid user associated with an account for the transaction anomaly. The method displays information for the valid user associated with the account for the transaction anomaly. The method, responsive to determining the user is not validated for the transaction anomaly, declines the transaction anomaly.Type: ApplicationFiled: September 10, 2019Publication date: March 11, 2021Inventors: Michael J. Whitney, COLM NOLAN, Mark Maresh, Juan F. Vargas
-
Patent number: 10893041Abstract: According to aspects of the present disclosure, a computer-implemented method includes generating, by a host processing system, a single use authentication map to map a private set of characters to a public set of characters. The method further includes transmitting, by the host processing system, the single use authentication map to a user processing system that presents an authentication interface comprising the public set of characters to enable a user to enter a user passcode using the public set of characters. The user processing system encodes the user passcode into a single use passcode using the single use authentication map. The method further includes the host processing system receiving the single use passcode from the user processing system, decoding the single use passcode back the user passcode using the single use authentication map, and determining whether the user passcode matches an expected passcode.Type: GrantFiled: October 10, 2018Date of Patent: January 12, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
-
Patent number: 10885176Abstract: Example techniques are described for image-based user authentication. An example method includes receiving, by a host system, a passphrase comprising a plurality of words, the passphrase being provided for authentication of a user. The method further includes generating, by the host system, an image selection grid comprising a plurality of images, each word from the passphrase corresponding to one or more images from the image selection grid. The method further includes receiving, by the host system, a plurality of selected images from the image selection grid. The method further includes storing, by the host system, the selected images as a login challenge for the user.Type: GrantFiled: June 11, 2018Date of Patent: January 5, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael J. Whitney, Colm Nolan, Mark Maresh, Juan F. Vargas
-
Publication number: 20200320180Abstract: Methods, systems and computer program products for providing matrix transformation-based authentication are provided. Aspects include storing an original matrix having a plurality of cells. Each of the plurality of cells is in a selected state or an unselected state. Aspects also include receiving an original pin from a user device. The original pin includes a plurality of characters. Aspects also include selecting a bit operation. Aspects also include generating a modified matrix based on the original matrix, the original pin, and the bit operation. Aspects also include transmitting the modified matrix to the user device. Responsive to receiving a user authentication request comprising an authentication pin and an authentication matrix, aspects further include authenticating a user.Type: ApplicationFiled: April 2, 2019Publication date: October 8, 2020Inventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney