System security using human authorization
First Claim
Patent Images
1. A method comprising:
- determining that a system configuration parameter of a computing device has been modified from a first state to a second state;
determining whether the system configuration parameter is protected;
if it is determined that the system configuration parameter is designated as protected, presenting to a user of the computing device a message including human-discernable information that is obscured from detection by a computer-implemented process;
requesting from the user an action that indicates recognition of the human-discernable information; and
if the user does not perform the requested action, returning the system configuration parameter to the first state.
2 Assignments
0 Petitions
Accused Products
Abstract
In response to the occurrence of a restricted event in a computing device, a user of the computing device is presenting with a challenge including information designed to assist in determining whether the challenge is answered by a human. If it is determined that the challenge was not answered by a human, the restricted event is counteracted.
-
Citations
20 Claims
-
1. A method comprising:
-
determining that a system configuration parameter of a computing device has been modified from a first state to a second state;
determining whether the system configuration parameter is protected;
if it is determined that the system configuration parameter is designated as protected, presenting to a user of the computing device a message including human-discernable information that is obscured from detection by a computer-implemented process;
requesting from the user an action that indicates recognition of the human-discernable information; and
if the user does not perform the requested action, returning the system configuration parameter to the first state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
in response to the occurrence of a restricted event in a computing device, presenting to a user of the computing device a challenge including information designed to assist in determining whether the challenge is answered by a human;
determining whether the challenge was answered by a human; and
if it is determined that the challenge was not answered by a human, counteracting the restricted event. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. One or more computer-readable media embodying computer-executable instruction that, when executed by a computer, cause the computer to implement a method comprising:
-
detecting a request to modify a system configuration parameter of a computing device;
in response to detecting the request, determining whether the system configuration parameter is protected;
if it is determined that the system configuration parameter is protected, presenting to a user of the computing device a human-discernable a message including information that is obscured from detection by a computer-implemented process;
requesting from the user an action that indicates recognition of the information; and
if the user does not perform the requested action, preventing modification of the system configuration parameter. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification