Patents by Inventor Mark E. Maresh

Mark E. Maresh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10558790
    Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.
    Type: Grant
    Filed: May 31, 2017
    Date of Patent: February 11, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Publication number: 20190332750
    Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.
    Type: Application
    Filed: July 10, 2019
    Publication date: October 31, 2019
    Applicant: International Business Machines Corporation
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Patent number: 10395015
    Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.
    Type: Grant
    Filed: November 15, 2017
    Date of Patent: August 27, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Publication number: 20190238335
    Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.
    Type: Application
    Filed: April 5, 2019
    Publication date: August 1, 2019
    Applicant: International Business Machines Corporation
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Patent number: 10333913
    Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.
    Type: Grant
    Filed: May 15, 2017
    Date of Patent: June 25, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Patent number: 10318780
    Abstract: Examples of techniques for encoding data in a 2D symbology are disclosed. In one example described herein, a computer-implemented method comprises capturing an image of the 2D symbology. The 2D symbology comprises a series of data symbols representing a binary string. Each of the data symbols comprises a line segment, and each data symbol in the series of data symbols are positioned in an end-to-end orientation starting at a starting indicator designated by a first symbol and ending at an ending indicator designated by a second symbol. The first symbol differs from the second symbol, and the series of data symbols comprise 0-bit symbols represented by a first data symbol and 1-bit symbols represented by a second data symbol. The method further comprises extracting the binary string from the 2D symbology by reading each of the data symbols between the starting indicator and the ending indicator.
    Type: Grant
    Filed: August 8, 2018
    Date of Patent: June 11, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Erich Guenter, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20190156009
    Abstract: Examples of techniques for location validation for authentication are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes presenting, by a processing device, a location-based security challenge to a user. The method further includes responsive to presenting the location-based security challenge to the user, receiving, by the processing device, media from the user. The method further includes validating, by the processing device, the media received from the user against the location-based security challenge to determine whether the user is located at an authorized location. The method further includes responsive to determining that the user is located at an authorized location, authenticating, by the processing device, the user to grant access for the user to a resource.
    Type: Application
    Filed: November 22, 2017
    Publication date: May 23, 2019
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20190158479
    Abstract: Systems, methods, and computer-readable media are disclosed for obtaining authenticated access to a service provider system, or more specifically, to a user account maintained on the service provider system, using a single key authentication mechanism. This mechanism includes generating an authentication image that includes user-generated content, user application-generated content, and service provider-generated content; sending the authentication image to the service provider system, which is configured to authenticate access to the user account based at least in part on the authentication image; and receiving an indication as to whether access to the user account has been authenticated.
    Type: Application
    Filed: January 18, 2019
    Publication date: May 23, 2019
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20190141042
    Abstract: Methods, systems and computer program products for controlling access to a host site are provided. Aspects include receiving, receiving an authentication video and processing the authentication video to identify a plurality of scenes. Aspects also include identifying a representative image for each of the plurality of scenes and comparing the representative image for each of the plurality of scenes with stored one of a plurality of master images. Based on a determination that a similarity between the representative image for each of the plurality of scenes and the one of the plurality of master images is between a first threshold level and second threshold level, aspects include granting access to the host site.
    Type: Application
    Filed: November 9, 2017
    Publication date: May 9, 2019
    Inventors: MARK E. MARESH, COLM NOLAN, JUAN F. VARGAS, MICHAEL J. WHITNEY
  • Patent number: 10256509
    Abstract: A wet cell battery, where a first cell in a wet-cell battery includes a set of anode electrodes and a set of cathode electrodes, and where electrically conductive debris accumulates on a surface inside the first cell to an expected height. An anode electrode in the set of anode electrodes has an anode end closest to the surface, and a cathode electrode in the set of cathode electrodes has a cathode end closest to the surface. A first gap distance between the anode end and the surface is different from a second gap distance between the cathode end and the surface. When the electrically conductive debris accumulates up to the expected height, the debris fails to make simultaneous electrical contact with the anode electrode and the cathode electrode due to the different gap distances.
    Type: Grant
    Filed: February 7, 2017
    Date of Patent: April 9, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Marc H. Coq, Richard J. Fishbune, Mark E. Maresh, Eric B. Swenson
  • Patent number: 10248784
    Abstract: Examples of techniques for sequential object set passwords are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include receiving, at a user device, a first object set; transmitting, to a processing device, a first rearranged object set that represents the first object set rearranged into a first sequential order by the user; and responsive to the first rearranged object set matching a first known sequential object set, receiving, at the user device, a second object set.
    Type: Grant
    Filed: December 1, 2016
    Date of Patent: April 2, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 10237258
    Abstract: Systems, methods, and computer-readable media are disclosed for obtaining authenticated access to a service provider system, or more specifically, to a user account maintained on the service provider system, using a single key authentication mechanism. This mechanism includes generating an authentication image that includes user-generated content, user application-generated content, and service provider-generated content; sending the authentication image to the service provider system, which is configured to authenticate access to the user account based at least in part on the authentication image; and receiving an indication as to whether access to the user account has been authenticated.
    Type: Grant
    Filed: November 30, 2016
    Date of Patent: March 19, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Publication number: 20190058226
    Abstract: A wet-cell in a battery is configured with a set of i-electrodes. A collection surface inside the wet-cell is identified where electrically conductive debris accumulates to an expected height. A first i-electrode of a first polarity in the set of i-electrodes is configured to be located at substantially the expected height inside the wet-cell. A second i-electrode of a second polarity in the set of i-electrodes is configured to be located at substantially the expected height inside the wet-cell. A first indication device is installed where the first i-electrode and the second i-electrode are configured in an electrical circuit via the first indication device, wherein when the electrically conductive debris has accumulated up to the expected height, makes simultaneous electrical contact with the first i-electrode and the second i-electrode and activates the first indication device.
    Type: Application
    Filed: October 24, 2018
    Publication date: February 21, 2019
    Applicant: International Business Machines Corporation
    Inventors: Marc H. Coq, Richard J. Fishbune, Mark E. Maresh, Eric B. Swenson
  • Publication number: 20180349582
    Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.
    Type: Application
    Filed: November 15, 2017
    Publication date: December 6, 2018
    Applicant: International Business Machines Corporation
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Publication number: 20180349578
    Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.
    Type: Application
    Filed: May 31, 2017
    Publication date: December 6, 2018
    Applicant: International Business Machines Corporation
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Publication number: 20180349661
    Abstract: Examples of techniques for encoding data in a 2D symbology are disclosed. In one example described herein, a computer-implemented method comprises capturing an image of the 2D symbology. The 2D symbology comprises a series of data symbols representing a binary string. Each of the data symbols comprises a line segment, and each data symbol in the series of data symbols are positioned in an end-to-end orientation starting at a starting indicator designated by a first symbol and ending at an ending indicator designated by a second symbol. The first symbol differs from the second symbol, and the series of data symbols comprise 0-bit symbols represented by a first data symbol and 1-bit symbols represented by a second data symbol. The method further comprises extracting the binary string from the 2D symbology by reading each of the data symbols between the starting indicator and the ending indicator.
    Type: Application
    Filed: August 8, 2018
    Publication date: December 6, 2018
    Inventors: Erich Guenter, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 10147982
    Abstract: A wet-cell in a battery is configured with a set of i-electrodes. A collection surface inside the wet-cell is identified where electrically conductive debris accumulates to an expected height. A first i-electrode of a first polarity in the set of i-electrodes is configured to be located at substantially the expected height inside the wet-cell. A second i-electrode of a second polarity in the set of i-electrodes is configured to be located at substantially the expected height inside the wet-cell. A first indication device is installed where the first i-electrode and the second i-electrode are configured in an electrical circuit via the first indication device, wherein when the electrically conductive debris has accumulated up to the expected height, makes simultaneous electrical contact with the first i-electrode and the second i-electrode and activates the first indication device.
    Type: Grant
    Filed: February 7, 2017
    Date of Patent: December 4, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Marc H. Coq, Richard J. Fishbune, Mark E. Maresh, Eric B. Swenson
  • Publication number: 20180332013
    Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.
    Type: Application
    Filed: May 15, 2017
    Publication date: November 15, 2018
    Applicant: International Business Machines Corporation
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Patent number: 10078771
    Abstract: Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes assigning a first data symbol representative of a 0-bit and a second data symbol representative of a 1-bit, each of the first data symbol and the second data symbol include a line segment. The method further includes designating a starting indicator and an ending indicator. The method also includes generating, by a processing device, the 2D symbology. The 2D symbology includes a series of data symbols representing a binary string. Each data symbol in the series of data symbols are positioned in an end-to-end orientation starting at the starting indicator and ending at the ending indicator. The series of data symbols include 0-bit symbols represented by the first data symbol and 1-bit symbols represented by the second data symbol.
    Type: Grant
    Filed: January 12, 2017
    Date of Patent: September 18, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Erich Guenter, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 10055569
    Abstract: Embodiments are described for logging in to a location-specific user account on a host system. An example method includes sending, by a user device, as part of a login request, an authentication image. The method further includes receiving an authentication response from the host system based on determining whether the login request is sent from an authorized login-location, which is based on a comparison of the authentication image with a reference image captured at the authorized login-location. The method further includes, in response to the authentication image matching the reference image within a predetermined threshold range, receiving access to the user account based on the authentication response.
    Type: Grant
    Filed: October 3, 2017
    Date of Patent: August 21, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney