Generating evaluation-mask for multi-factor authentication

    公开(公告)号:GB2616774B

    公开(公告)日:2025-03-05

    申请号:GB202309459

    申请日:2021-11-11

    Applicant: IBM

    Abstract: In an approach to improve multi-factor authentication embodiments generate an evaluation-mask over one or more modified items on a modified image created by a generative adversarial network (GAN). Further, embodiments create a scoring grid by comparing an original image with the modified image to identify different pixels between the original image and the modified image, and overlay the evaluation-mask over the identified different pixels on the modified image. Embodiments display the modified image as a multi-factor authentication prompt to a user and prompt the user to provide a response that identifies one or more modifications in the modified image. Additionally, embodiments compute an evaluation score based on a comparison of the response from the user with the evaluation-mask, to validate the response from the user, and authenticate and grant the user access to data or other resources if the evaluation score meets or exceeds a predetermined threshold.

    Software upgrade stability recommendations

    公开(公告)号:GB2604007A

    公开(公告)日:2022-08-24

    申请号:GB202117487

    申请日:2021-12-03

    Applicant: IBM

    Abstract: Disclosed is a method that determines the potential impact of software upgrades on a computing device. The method works by detecting the configuration of each device 102(1) – 102(N) on a network 106, including the software and hardware elements present in the devices. Then a query for an upgrade 113 for an application on a device is received. The device configuration 103(1) of the device requesting the update is identified, and other devices that installed the update are identified. The operating history of the behaviour of devices with the update and the profile of the devices are retrieved. The profiles are analysed for hardware and software conflicts with the application, and then determine if the upgrade will potentially cause a failure in the software or hardware present in the first device based operational history of the application and the update in the other devices and the similarity between the profile of the other devices and the device being upgraded. The user is then presented with a recommendation of whether to install the upgrade on their device.

Patent Agency Ranking