Patents by Inventor Juan F. Vargas

Juan F. Vargas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11790076
    Abstract: A computer-implemented method for authenticating a request to access a remote resource includes identifying a request from a first device to access a resource located on a second device. The computer-implemented method further includes retrieving one or more encrypted passwords for authenticating access to the resource from a partition of a vault located on the first device. The computer-implemented method further includes comparing the one or more encrypted passwords retrieved from the partition of the vault located on the first device to one or more designated passwords stored on the second device. The computer-implemented method further includes granting the first device access to the resource located on the second device based, at least in part, on the one or more encrypted passwords retrieved from the partition of the vault located on the first device matching the one or more designated passwords stored on the second device.
    Type: Grant
    Filed: June 3, 2021
    Date of Patent: October 17, 2023
    Assignee: International Business Machines Corporation
    Inventors: Mark E. Maresh, Michael J. Whitney, Juan F. Vargas, Erich Guenter
  • Patent number: 11589227
    Abstract: A computer-implemented method, a computer program product, and a computer system for using a mobile device to authenticate a user to access a secure facility. An authentication service determines whether the mobile device of the user is locked. The authentication service requests the user to unlock the mobile device and determines whether the user has unlocked the mobile device. The authentication service retrieves, from the mobile device, a first token and a MAC address. The authentication service retrieves, from a database, a token identifier of the mobile device and a personal identifier of the user. The authentication service generates a second token, based on the token identifier, the personal identifier, and the MAC address. The authentication service determines whether the first and the second tokens match. The authentication service grants the user access to the secure facility, in response to the first and the second tokens matching.
    Type: Grant
    Filed: February 11, 2020
    Date of Patent: February 21, 2023
    Assignee: KYNDRYL, INC.
    Inventors: Juan F. Vargas, Mark E. Maresh, Michael J. Whitney, Colm Nolan
  • Publication number: 20220391490
    Abstract: A computer-implemented method for authenticating a request to access a remote resource includes identifying a request from a first device to access a resource located on a second device. The computer-implemented method further includes retrieving one or more encrypted passwords for authenticating access to the resource from a partition of a vault located on the first device. The computer-implemented method further includes comparing the one or more encrypted passwords retrieved from the partition of the vault located on the first device to one or more designated passwords stored on the second device. The computer-implemented method further includes granting the first device access to the resource located on the second device based, at least in part, on the one or more encrypted passwords retrieved from the partition of the vault located on the first device matching the one or more designated passwords stored on the second device.
    Type: Application
    Filed: June 3, 2021
    Publication date: December 8, 2022
    Inventors: Mark E. Maresh, Michael J. Whitney, Juan F. Vargas, Erich Guenter
  • Patent number: 11423405
    Abstract: A method for peer validation for unauthorized transactions includes receiving a request to validate a user performing a transaction anomaly, wherein the transaction anomaly represents a potential fraudulent financial transaction. The method, responsive to identifying one or more boundaries to search for validation users, identifies a set of validation users in the identified one or more boundaries, where each validation user from the set of validation users has the ability to visually confirm the user performing the transaction as a valid user associated with an account for the transaction anomaly. The method displays information for the valid user associated with the account for the transaction anomaly. The method, responsive to determining the user is not validated for the transaction anomaly, declines the transaction anomaly.
    Type: Grant
    Filed: September 10, 2019
    Date of Patent: August 23, 2022
    Assignee: International Business Machines Corporation
    Inventors: Michael J. Whitney, Colm Nolan, Mark Maresh, Juan F Vargas
  • Patent number: 11409856
    Abstract: Methods, systems and computer program products for providing video-based authentication are provided. Aspects include receiving a master video comprising a recording of a first plurality of objects. Aspects also include identifying each of the first plurality of objects using image recognition techniques. Aspects also include receiving a user selection of a plurality of authentication objects, where the plurality of authentication objects are a subset of the first plurality of objects. Aspects also include receiving a user authentication request comprising an authentication video. The authentication video is a recording of a second plurality of objects. Aspects also include identifying each of the second plurality of objects using image recognition techniques.
    Type: Grant
    Filed: March 29, 2019
    Date of Patent: August 9, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 11392682
    Abstract: Example techniques are described for image-based user authentication. An example method includes receiving, by a host system, a passphrase comprising a plurality of words, the passphrase being provided for authentication of a user. The method further includes generating, by the host system, an image selection grid comprising a plurality of images, each word from the passphrase corresponding to one or more images from the image selection grid. The method further includes receiving, by the host system, a plurality of selected images from the image selection grid. The method further includes storing, by the host system, the selected images as a login challenge for the user.
    Type: Grant
    Filed: December 22, 2020
    Date of Patent: July 19, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael J. Whitney, Colm Nolan, Mark Maresh, Juan F. Vargas
  • Patent number: 11296886
    Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.
    Type: Grant
    Filed: April 5, 2019
    Date of Patent: April 5, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Publication number: 20220030702
    Abstract: An article comprises a superficial watermark located on a first surface. The article also comprises an embedded watermark that is embedded within the article. The embedded watermark may be viewed by an X-ray camera. A method comprises applying a metal-containing mixture to an inner layer of an article, resulting in an embedded watermark within the article. The method also comprises analyzing the properties of metal particles within the mixture. The method also comprises recording the first property.
    Type: Application
    Filed: July 26, 2020
    Publication date: January 27, 2022
    Inventors: Mark E. Maresh, Michael J. Whitney, Juan F. Vargas
  • Patent number: 11222105
    Abstract: An example method includes enabling, by the user processing system, a user to associate a color with at least one of the plurality of pixels of a graphic, and generating a passcode. The passcode is based at least in part on the color associated with the at least one of the plurality of pixels. The method further includes transmitting, by the user processing system, the passcode to a host processing system. The method further includes determining, by the host processing system, whether the passcode matches an expected passcode that is based at least in part on a reference graphic comprising a plurality of reference pixels, each of the plurality of reference pixels having a color or a null value associated therewith. The method further includes, responsive to determining that the passcode matches the expected passcode, authorizing, by the host processing system, the user processing system to access a restricted resource.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: January 11, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 11138297
    Abstract: A computer-implemented method includes receiving an indication of a first selected instrument, where the first selected instrument is selected from a plurality of instruments. One or more first sequences of notes are received. One or more saved sound compositions are generated based on the first selected instrument and the one or more first sequences of notes. One or more current sound compositions are compared to the one or more saved sound compositions using sound analysis. A user is authenticated based on a similarity between the one or more current sound compositions and the one or more saved sound composition.
    Type: Grant
    Filed: July 31, 2018
    Date of Patent: October 5, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Juan F. Vargas, Mark Maresh, Michael J. Whitney, Colm Nolan
  • Patent number: 11120118
    Abstract: Examples of techniques for location validation for authentication are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes presenting, by a processing device, a location-based security challenge to a user. The method further includes responsive to presenting the location-based security challenge to the user, receiving, by the processing device, media from the user. The method further includes validating, by the processing device, the media received from the user against the location-based security challenge to determine whether the user is located at an authorized location. The method further includes responsive to determining that the user is located at an authorized location, authenticating, by the processing device, the user to grant access for the user to a resource.
    Type: Grant
    Filed: November 22, 2017
    Date of Patent: September 14, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20210250765
    Abstract: A computer-implemented method, a computer program product, and a computer system for using a mobile device to authenticate a user to access a secure facility. An authentication service determines whether the mobile device of the user is locked. The authentication service requests the user to unlock the mobile device and determines whether the user has unlocked the mobile device. The authentication service retrieves, from the mobile device, a first token and a MAC address. The authentication service retrieves, from a database, a token identifier of the mobile device and a personal identifier of the user. The authentication service generates a second token, based on the token identifier, the personal identifier, and the MAC address. The authentication service determines whether the first and the second tokens match. The authentication service grants the user access to the secure facility, in response to the first and the second tokens matching.
    Type: Application
    Filed: February 11, 2020
    Publication date: August 12, 2021
    Inventors: Juan F. Vargas, Mark E. Maresh, Michael J. Whitney, Colm Nolan
  • Patent number: 11062001
    Abstract: Methods, systems and computer program products for providing matrix transformation-based authentication are provided. Aspects include storing an original matrix having a plurality of cells. Each of the plurality of cells is in a selected state or an unselected state. Aspects also include receiving an original pin from a user device. The original pin includes a plurality of characters. Aspects also include selecting a bit operation. Aspects also include generating a modified matrix based on the original matrix, the original pin, and the bit operation. Aspects also include transmitting the modified matrix to the user device. Responsive to receiving a user authentication request comprising an authentication pin and an authentication matrix, aspects further include authenticating a user.
    Type: Grant
    Filed: April 2, 2019
    Date of Patent: July 13, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20210110021
    Abstract: Example techniques are described for image-based user authentication. An example method includes receiving, by a host system, a passphrase comprising a plurality of words, the passphrase being provided for authentication of a user. The method further includes generating, by the host system, an image selection grid comprising a plurality of images, each word from the passphrase corresponding to one or more images from the image selection grid. The method further includes receiving, by the host system, a plurality of selected images from the image selection grid. The method further includes storing, by the host system, the selected images as a login challenge for the user.
    Type: Application
    Filed: December 22, 2020
    Publication date: April 15, 2021
    Inventors: Michael J. Whitney, Colm Nolan, Mark Maresh, Juan F. Vargas
  • Patent number: 10949512
    Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.
    Type: Grant
    Filed: July 10, 2019
    Date of Patent: March 16, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Publication number: 20210073818
    Abstract: A method for peer validation for unauthorized transactions includes receiving a request to validate a user performing a transaction anomaly, wherein the transaction anomaly represents a potential fraudulent financial transaction. The method, responsive to identifying one or more boundaries to search for validation users, identifies a set of validation users in the identified one or more boundaries, where each validation user from the set of validation users has the ability to visually confirm the user performing the transaction as a valid user associated with an account for the transaction anomaly. The method displays information for the valid user associated with the account for the transaction anomaly. The method, responsive to determining the user is not validated for the transaction anomaly, declines the transaction anomaly.
    Type: Application
    Filed: September 10, 2019
    Publication date: March 11, 2021
    Inventors: Michael J. Whitney, COLM NOLAN, Mark Maresh, Juan F. Vargas
  • Patent number: 10893041
    Abstract: According to aspects of the present disclosure, a computer-implemented method includes generating, by a host processing system, a single use authentication map to map a private set of characters to a public set of characters. The method further includes transmitting, by the host processing system, the single use authentication map to a user processing system that presents an authentication interface comprising the public set of characters to enable a user to enter a user passcode using the public set of characters. The user processing system encodes the user passcode into a single use passcode using the single use authentication map. The method further includes the host processing system receiving the single use passcode from the user processing system, decoding the single use passcode back the user passcode using the single use authentication map, and determining whether the user passcode matches an expected passcode.
    Type: Grant
    Filed: October 10, 2018
    Date of Patent: January 12, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 10885176
    Abstract: Example techniques are described for image-based user authentication. An example method includes receiving, by a host system, a passphrase comprising a plurality of words, the passphrase being provided for authentication of a user. The method further includes generating, by the host system, an image selection grid comprising a plurality of images, each word from the passphrase corresponding to one or more images from the image selection grid. The method further includes receiving, by the host system, a plurality of selected images from the image selection grid. The method further includes storing, by the host system, the selected images as a login challenge for the user.
    Type: Grant
    Filed: June 11, 2018
    Date of Patent: January 5, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael J. Whitney, Colm Nolan, Mark Maresh, Juan F. Vargas
  • Publication number: 20200320180
    Abstract: Methods, systems and computer program products for providing matrix transformation-based authentication are provided. Aspects include storing an original matrix having a plurality of cells. Each of the plurality of cells is in a selected state or an unselected state. Aspects also include receiving an original pin from a user device. The original pin includes a plurality of characters. Aspects also include selecting a bit operation. Aspects also include generating a modified matrix based on the original matrix, the original pin, and the bit operation. Aspects also include transmitting the modified matrix to the user device. Responsive to receiving a user authentication request comprising an authentication pin and an authentication matrix, aspects further include authenticating a user.
    Type: Application
    Filed: April 2, 2019
    Publication date: October 8, 2020
    Inventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20200311244
    Abstract: Methods, systems and computer program products for providing video-based authentication are provided. Aspects include receiving a master video comprising a recording of a first plurality of objects. Aspects also include identifying each of the first plurality of objects using image recognition techniques. Aspects also include receiving a user selection of a plurality of authentication objects, where the plurality of authentication objects are a subset of the first plurality of objects. Aspects also include receiving a user authentication request comprising an authentication video. The authentication video is a recording of a second plurality of objects. Aspects also include identifying each of the second plurality of objects using image recognition techniques.
    Type: Application
    Filed: March 29, 2019
    Publication date: October 1, 2020
    Inventors: Mark Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney