Human interactive proof with authentication
First Claim
Patent Images
1. A method in a computer system for verifying the identity of a person, the method comprising:
- receiving information purporting to be from the person;
sending a challenge to the person, wherein the challenge is in a form that is easier for a human to answer than a machine, and wherein the challenge requests knowledge that is based on the identity of the person;
receiving a response to the challenge;
comparing the received response to a correct response; and
if the received response matches the correct response, identifying the person as the source of the information.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for authenticating that a user responding to a HIP challenge is the user that was issued the challenge is provided. Upon receiving information from a sender purporting to be a particular user, the authentication system generates a HIP challenge requesting information based on the user'"'"'s identity. Upon receiving a response to the challenge, the authentication system compares the response with the correct response previously stored for that user. If the two responses match, the authentication system identifies the user as the true source of the information.
-
Citations
20 Claims
-
1. A method in a computer system for verifying the identity of a person, the method comprising:
-
receiving information purporting to be from the person;
sending a challenge to the person, wherein the challenge is in a form that is easier for a human to answer than a machine, and wherein the challenge requests knowledge that is based on the identity of the person;
receiving a response to the challenge;
comparing the received response to a correct response; and
if the received response matches the correct response, identifying the person as the source of the information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-readable medium containing instructions for verifying the identity of a person, by a method comprising:
-
receiving a request to access a resource, the request purporting to be from the person;
sending a challenge, wherein the challenge includes a human interactive proof challenge, and wherein the challenge requests external information that the person is more likely to know than people generally;
receiving a response to the challenge;
comparing the received response to a correct response; and
if the received response matches the correct response, identifying the person as the source of the request.
-
-
18. A system for verifying the identity of a person comprising:
-
a request receiving component;
a challenge generating component, wherein a challenge is in a form that includes human interactive proof, and wherein the challenge requests external information that the person is more likely to know than people generally; and
a response validating component. - View Dependent Claims (19, 20)
-
Specification