Patents by Inventor Juan F. Vargas

Juan F. Vargas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10237258
    Abstract: Systems, methods, and computer-readable media are disclosed for obtaining authenticated access to a service provider system, or more specifically, to a user account maintained on the service provider system, using a single key authentication mechanism. This mechanism includes generating an authentication image that includes user-generated content, user application-generated content, and service provider-generated content; sending the authentication image to the service provider system, which is configured to authenticate access to the user account based at least in part on the authentication image; and receiving an indication as to whether access to the user account has been authenticated.
    Type: Grant
    Filed: November 30, 2016
    Date of Patent: March 19, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20180349582
    Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.
    Type: Application
    Filed: November 15, 2017
    Publication date: December 6, 2018
    Applicant: International Business Machines Corporation
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Publication number: 20180349578
    Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.
    Type: Application
    Filed: May 31, 2017
    Publication date: December 6, 2018
    Applicant: International Business Machines Corporation
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Publication number: 20180349661
    Abstract: Examples of techniques for encoding data in a 2D symbology are disclosed. In one example described herein, a computer-implemented method comprises capturing an image of the 2D symbology. The 2D symbology comprises a series of data symbols representing a binary string. Each of the data symbols comprises a line segment, and each data symbol in the series of data symbols are positioned in an end-to-end orientation starting at a starting indicator designated by a first symbol and ending at an ending indicator designated by a second symbol. The first symbol differs from the second symbol, and the series of data symbols comprise 0-bit symbols represented by a first data symbol and 1-bit symbols represented by a second data symbol. The method further comprises extracting the binary string from the 2D symbology by reading each of the data symbols between the starting indicator and the ending indicator.
    Type: Application
    Filed: August 8, 2018
    Publication date: December 6, 2018
    Inventors: Erich Guenter, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20180332013
    Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.
    Type: Application
    Filed: May 15, 2017
    Publication date: November 15, 2018
    Applicant: International Business Machines Corporation
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Patent number: 10078771
    Abstract: Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes assigning a first data symbol representative of a 0-bit and a second data symbol representative of a 1-bit, each of the first data symbol and the second data symbol include a line segment. The method further includes designating a starting indicator and an ending indicator. The method also includes generating, by a processing device, the 2D symbology. The 2D symbology includes a series of data symbols representing a binary string. Each data symbol in the series of data symbols are positioned in an end-to-end orientation starting at the starting indicator and ending at the ending indicator. The series of data symbols include 0-bit symbols represented by the first data symbol and 1-bit symbols represented by the second data symbol.
    Type: Grant
    Filed: January 12, 2017
    Date of Patent: September 18, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Erich Guenter, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 10055569
    Abstract: Embodiments are described for logging in to a location-specific user account on a host system. An example method includes sending, by a user device, as part of a login request, an authentication image. The method further includes receiving an authentication response from the host system based on determining whether the login request is sent from an authorized login-location, which is based on a comparison of the authentication image with a reference image captured at the authorized login-location. The method further includes, in response to the authentication image matching the reference image within a predetermined threshold range, receiving access to the user account based on the authentication response.
    Type: Grant
    Filed: October 3, 2017
    Date of Patent: August 21, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20180157819
    Abstract: Examples of techniques for sequential object set passwords are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include presenting, by a processing device, an object set to a user, wherein the object set comprises a plurality of objects in a first order; receiving, by the processing device, a rearranged object set, wherein the rearranged object set comprises the plurality of objects in a second order; comparing the rearranged object set to a known sequential object set stored in a data store; and responsive to determining that the rearranged object set matches a known sequential object set, enabling the user to access a restricted resource.
    Type: Application
    Filed: December 1, 2016
    Publication date: June 7, 2018
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20180157823
    Abstract: Examples of techniques for sequential object set passwords are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include receiving, at a user device, a first object set; transmitting, to a processing device, a first rearranged object set that represents the first object set rearranged into a first sequential order by the user; and responsive to the first rearranged object set matching a first known sequential object set, receiving, at the user device, a second object set.
    Type: Application
    Filed: December 1, 2016
    Publication date: June 7, 2018
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20180152428
    Abstract: Systems, methods, and computer-readable media are disclosed for obtaining authenticated access to a service provider system, or more specifically, to a user account maintained on the service provider system, using a single key authentication mechanism. This mechanism includes generating an authentication image that includes user-generated content, user application-generated content, and service provider-generated content; sending the authentication image to the service provider system, which is configured to authenticate access to the user account based at least in part on the authentication image; and receiving an indication as to whether access to the user account has been authenticated.
    Type: Application
    Filed: November 30, 2016
    Publication date: May 31, 2018
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20180150626
    Abstract: Systems, methods, and computer-readable media are disclosed for authenticating access to a service provider system, or more specifically, to a user account maintained on the service provider system, using a single key authentication mechanism. The service provider system may receive an authentication image from a user application executing on a user device. The authentication image may include first data generated in response to user input to the user device, second data generated by the user application, and third data generated by the service provider system. The service provider system may then authenticate access to the user account based at least in part on the authentication image and send an indication to the user device that access to the user account has been authenticated. Authenticating access to the user account includes determining that the first data, second data, and third data match respective data expected by the service provider system.
    Type: Application
    Filed: November 30, 2016
    Publication date: May 31, 2018
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 9984319
    Abstract: Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes assigning a first data symbol representative of a 0-bit and a second data symbol representative of a 1-bit, each of the first data symbol and the second data symbol include a line segment. The method further includes designating a starting indicator and an ending indicator. The method also includes generating, by a processing device, the 2D symbology. The 2D symbology includes a series of data symbols representing a binary string. Each data symbol in the series of data symbols are positioned in an end-to-end orientation starting at the starting indicator and ending at the ending indicator. The series of data symbols include 0-bit symbols represented by the first data symbol and 1-bit symbols represented by the second data symbol.
    Type: Grant
    Filed: January 12, 2017
    Date of Patent: May 29, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Erich Guenter, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20180114008
    Abstract: A computer-implemented method for allowing access to a user account hosted by a host site. The method includes receiving an access attempt code requesting access to the user account hosted by the host site and retrieving an access code for allowing access to the user account hosted by the host site, the access code comprising user provided images in a defined sequence. The method also includes determining whether the access attempt code matches the access code, and based on a determination that the access attempt code matches the access code, providing the access to the user account hosted by the host site.
    Type: Application
    Filed: October 24, 2016
    Publication date: April 26, 2018
    Inventors: MARK E. MARESH, COLM NOLAN, JUAN F. VARGAS, MICHAEL J. WHITNEY
  • Publication number: 20180114009
    Abstract: Embodiments are described for logging in to a location-specific user account on a host system. An example method includes sending, by a user device, as part of a login request, an authentication image. The method further includes receiving an authentication response from the host system based on determining whether the login request is sent from an authorized login-location, which is based on a comparison of the authentication image with a reference image captured at the authorized login-location. The method further includes, in response to the authentication image matching the reference image within a predetermined threshold range, receiving access to the user account based on the authentication response.
    Type: Application
    Filed: October 3, 2017
    Publication date: April 26, 2018
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20180115894
    Abstract: A computer-implemented method for securing access to a host site. The method includes creating, using a processor system, an access code for access to a user account hosted by the host site and providing, using the processor system, the access code to the host site, the access code including user provided images in a defined sequence. The method also includes creating, using the processor system, an access attempt code for access to the user account hosted by the host site and transmitting, by the processor system, the access attempt code to the host site. Based on a determination that the access attempt code matches the access code, the method includes accessing, using the processor system, the user account hosted by the host site.
    Type: Application
    Filed: October 24, 2016
    Publication date: April 26, 2018
    Inventors: MARK E. MARESH, COLM NOLAN, JUAN F. VARGAS, MICHAEL J. WHITNEY
  • Patent number: 9946912
    Abstract: Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented comprises assigning a first color representative of a 0-bit and a second color representative of a 1-bit. The method further comprises designating a starting cell pair and an ending cell pair. The method also comprises generating, by a processing device, the 2D symbology. The 2D symbology comprises a series of cells in a cell space starting with the starting cell pair and ending with the ending cell pair. Each cell between the starting cell pair and the ending cell pair corresponds to a bit of a binary string and has a common cell length. The cells corresponding to a 0-bit are colored the first color and the cells corresponding to a 1-bit are colored the second color.
    Type: Grant
    Filed: February 14, 2017
    Date of Patent: April 17, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Erich Guenter, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 9922280
    Abstract: Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented comprises assigning a first color representative of a 0-bit and a second color representative of a 1-bit. The method further comprises designating a starting cell pair and an ending cell pair. The method also comprises generating, by a processing device, the 2D symbology. The 2D symbology comprises a series of cells in a cell space starting with the starting cell pair and ending with the ending cell pair. Each cell between the starting cell pair and the ending cell pair corresponds to a bit of a binary string and has a common cell length. The cells corresponding to a 0-bit are colored the first color and the cells corresponding to a 1-bit are colored the second color.
    Type: Grant
    Filed: February 14, 2017
    Date of Patent: March 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Erich Guenter, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 9811653
    Abstract: Embodiments are described for logging in to a location-specific user account on a host system. An example method includes sending, by a user device, as part of a login request, an authentication image. The method further includes receiving an authentication response from the host system based on determining whether the login request is sent from an authorized login-location, which is based on a comparison of the authentication image with a reference image captured at the authorized login-location. The method further includes, in response to the authentication image matching the reference image within a predetermined threshold range, receiving access to the user account based on the authentication response.
    Type: Grant
    Filed: October 24, 2016
    Date of Patent: November 7, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 9760819
    Abstract: Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method for encoding data in a 2D symbology is provided. The method comprises assigning a first indicium representative of a 0-bit and a second indicium representative of a 1-bit, designating a starting indicator, and generating, by a processing device, the 2D symbology including a unit array defining a bit length and a plurality of bit arrays.
    Type: Grant
    Filed: December 14, 2015
    Date of Patent: September 12, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Erich Guenter, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20170206390
    Abstract: Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented comprises assigning a first color representative of a 0-bit and a second color representative of a 1-bit. The method further comprises designating a starting cell pair and an ending cell pair. The method also comprises generating, by a processing device, the 2D symbology. The 2D symbology comprises a series of cells in a cell space starting with the starting cell pair and ending with the ending cell pair. Each cell between the starting cell pair and the ending cell pair corresponds to a bit of a binary string and has a common cell length. The cells corresponding to a 0-bit are colored the first color and the cells corresponding to a 1-bit are colored the second color.
    Type: Application
    Filed: February 14, 2017
    Publication date: July 20, 2017
    Inventors: Erich Guenter, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney