-
公开(公告)号:US11222105B2
公开(公告)日:2022-01-11
申请号:US16217733
申请日:2018-12-12
Applicant: International Business Machines Corporation
Inventor: Mark Maresh , Colm Nolan , Juan F. Vargas , Michael J. Whitney
IPC: G06F21/36 , G06T11/00 , G06F3/0484 , G06F3/0482
Abstract: An example method includes enabling, by the user processing system, a user to associate a color with at least one of the plurality of pixels of a graphic, and generating a passcode. The passcode is based at least in part on the color associated with the at least one of the plurality of pixels. The method further includes transmitting, by the user processing system, the passcode to a host processing system. The method further includes determining, by the host processing system, whether the passcode matches an expected passcode that is based at least in part on a reference graphic comprising a plurality of reference pixels, each of the plurality of reference pixels having a color or a null value associated therewith. The method further includes, responsive to determining that the passcode matches the expected passcode, authorizing, by the host processing system, the user processing system to access a restricted resource.
-
公开(公告)号:US20200320180A1
公开(公告)日:2020-10-08
申请号:US16373040
申请日:2019-04-02
Applicant: International Business Machines Corporation
Inventor: Mark Maresh , Colm Nolan , Juan F. Vargas , Michael J. Whitney
Abstract: Methods, systems and computer program products for providing matrix transformation-based authentication are provided. Aspects include storing an original matrix having a plurality of cells. Each of the plurality of cells is in a selected state or an unselected state. Aspects also include receiving an original pin from a user device. The original pin includes a plurality of characters. Aspects also include selecting a bit operation. Aspects also include generating a modified matrix based on the original matrix, the original pin, and the bit operation. Aspects also include transmitting the modified matrix to the user device. Responsive to receiving a user authentication request comprising an authentication pin and an authentication matrix, aspects further include authenticating a user.
-
公开(公告)号:US10558790B2
公开(公告)日:2020-02-11
申请号:US15609221
申请日:2017-05-31
Applicant: International Business Machines Corporation
Inventor: Eric V. Kline , Mark E. Maresh , Colm Nolan , Juan F. Vargas , Cheranellore Vasudevan , Michael J. Whitney
Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.
-
公开(公告)号:US10333913B2
公开(公告)日:2019-06-25
申请号:US15595583
申请日:2017-05-15
Applicant: International Business Machines Corporation
Inventor: Eric V. Kline , Mark E. Maresh , Colm Nolan , Juan F. Vargas , Cheranellore Vasudevan , Michael J. Whitney
IPC: H04L29/06
Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.
-
公开(公告)号:US20180332013A1
公开(公告)日:2018-11-15
申请号:US15595583
申请日:2017-05-15
Applicant: International Business Machines Corporation
Inventor: Eric V. Kline , Mark E. Maresh , Colm Nolan , Juan F. Vargas , Cheranellore Vasudevan , Michael J. Whitney
IPC: H04L29/06
CPC classification number: H04L9/3228 , G06F21/36 , G09C5/00 , H04L63/083
Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.
-
公开(公告)号:US09946912B2
公开(公告)日:2018-04-17
申请号:US15432339
申请日:2017-02-14
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Erich Guenter , Mark E. Maresh , Colm Nolan , Juan F. Vargas , Michael J. Whitney
CPC classification number: G06K7/1447 , G06K7/1417 , G06K19/06037 , G06K19/06103
Abstract: Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented comprises assigning a first color representative of a 0-bit and a second color representative of a 1-bit. The method further comprises designating a starting cell pair and an ending cell pair. The method also comprises generating, by a processing device, the 2D symbology. The 2D symbology comprises a series of cells in a cell space starting with the starting cell pair and ending with the ending cell pair. Each cell between the starting cell pair and the ending cell pair corresponds to a bit of a binary string and has a common cell length. The cells corresponding to a 0-bit are colored the first color and the cells corresponding to a 1-bit are colored the second color.
-
公开(公告)号:US20170169268A1
公开(公告)日:2017-06-15
申请号:US15404221
申请日:2017-01-12
Applicant: International Business Machines Corporation
Inventor: Erich Guenter , Mark E. Maresh , Colm Nolan , Juan F. Vargas , Michael J. Whitney
CPC classification number: G06K7/1417 , G06K19/06037 , G06K19/06103
Abstract: Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes assigning a first data symbol representative of a 0-bit and a second data symbol representative of a 1-bit, each of the first data symbol and the second data symbol include a line segment. The method further includes designating a starting indicator and an ending indicator. The method also includes generating, by a processing device, the 2D symbology. The 2D symbology includes a series of data symbols representing a binary string. Each data symbol in the series of data symbols are positioned in an end-to-end orientation starting at the starting indicator and ending at the ending indicator. The series of data symbols include 0-bit symbols represented by the first data symbol and 1-bit symbols represented by the second data symbol.
-
公开(公告)号:US20170161683A1
公开(公告)日:2017-06-08
申请号:US14959199
申请日:2015-12-04
Applicant: International Business Machines Corporation
Inventor: Robert Allan , Constance E. Smith , Thembani Togwe , Michael J. Whitney
CPC classification number: G06Q10/103 , G06F17/30424 , G06Q10/06398 , H04L12/1822 , H04L65/403 , H04L67/22 , H04L67/24
Abstract: Aspects include a method, a system and a computer program product. The method includes identifying, on an electronic platform providing for an exchange of messages among multiple participants, at least one open issue to be resolved. Data is collected from the exchanged messages to determine a participation interaction parameter and a solution quality parameter associated with at least one open issue. The participation interaction parameter includes an accountability dynamic factor and collaboration dynamic factor and the solution quality parameter includes a velocity factor, a dormancy factor, and an extinction factor. When a sum of the participation interaction parameter and the solution quality parameter is below a threshold value, at least one open issue participant is invited to the electronic platform. It is also determined when the at least one open issue becomes a closed issue.
-
公开(公告)号:US11409856B2
公开(公告)日:2022-08-09
申请号:US16369863
申请日:2019-03-29
Applicant: International Business Machines Corporation
Inventor: Mark Maresh , Colm Nolan , Juan F. Vargas , Michael J. Whitney
Abstract: Methods, systems and computer program products for providing video-based authentication are provided. Aspects include receiving a master video comprising a recording of a first plurality of objects. Aspects also include identifying each of the first plurality of objects using image recognition techniques. Aspects also include receiving a user selection of a plurality of authentication objects, where the plurality of authentication objects are a subset of the first plurality of objects. Aspects also include receiving a user authentication request comprising an authentication video. The authentication video is a recording of a second plurality of objects. Aspects also include identifying each of the second plurality of objects using image recognition techniques. Aspects also include authenticating a user associated with the user authentication request in response to determining that identifications of a subset of objects of the second plurality of objects match identifications of the plurality of authentication objects.
-
公开(公告)号:US20220030702A1
公开(公告)日:2022-01-27
申请号:US16939006
申请日:2020-07-26
Applicant: International Business Machines Corporation
Inventor: Mark E. Maresh , Michael J. Whitney , Juan F. Vargas
IPC: H05K1/02
Abstract: An article comprises a superficial watermark located on a first surface. The article also comprises an embedded watermark that is embedded within the article. The embedded watermark may be viewed by an X-ray camera. A method comprises applying a metal-containing mixture to an inner layer of an article, resulting in an embedded watermark within the article. The method also comprises analyzing the properties of metal particles within the mixture. The method also comprises recording the first property.
-
-
-
-
-
-
-
-
-