Method and Apparatus for Network Authentication of Human Interaction and User Identity
First Claim
1. A computer-implemented method for authenticating a user of a computer comprising:
- selecting one or more 3-dimensional models, each of the one or more 3-dimensional models containing geometric shape data for a respective object in three spatial dimensions;
receiving one or more rendering parameters associated with each respective object;
for each respective object, randomly varying the one or more rendering parameters, within pre-defined thresholds and/or constraints, such that each respective object remains recognizable by a human;
generating a 2-dimensional image based on the result of the varying step;
generating metadata based on each respective object, and the one or more rendering parameters;
communicating the 2-dimensional image for presentation at the computer;
receiving user input data concerning the 2-dimensional image;
comparing the metadata and the user input data to determine if the user interacting with the computer is a human user; and
authenticating or not authenticating based on the result of the comparing step.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus are provided to enable a server to determine if a client connecting to the server is doing so by means of human user interaction, as opposed to an automated process. In order to authorize access to services, the option of determining user identity, such as by means of a graphical shared secret, is also provided. Three aspects are described: (i) image formation from an object model; (ii) presentation of image choices to a user, and (iii) user action. Image formation includes the creation of one or more categorized 2-dimensional images with object regions for each image automatically qualified. These one or more categorized images can be created by means of a Randomizable Image Generation Object for Human Recognition, comprised of (i) a 3-dimensional object model, (ii) a plurality of rendering threshold and constraint parameters, and (iii) categorization and qualitative metadata. The one or more 2-dimensional images are preferably transmitted to the user for authentication without the image metadata, which may be retained on the server. Related inquiry text can be sent when human user interaction is being determined and not user identity authentication.
114 Citations
20 Claims
-
1. A computer-implemented method for authenticating a user of a computer comprising:
-
selecting one or more 3-dimensional models, each of the one or more 3-dimensional models containing geometric shape data for a respective object in three spatial dimensions; receiving one or more rendering parameters associated with each respective object; for each respective object, randomly varying the one or more rendering parameters, within pre-defined thresholds and/or constraints, such that each respective object remains recognizable by a human; generating a 2-dimensional image based on the result of the varying step; generating metadata based on each respective object, and the one or more rendering parameters; communicating the 2-dimensional image for presentation at the computer; receiving user input data concerning the 2-dimensional image; comparing the metadata and the user input data to determine if the user interacting with the computer is a human user; and authenticating or not authenticating based on the result of the comparing step. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 20)
-
-
12. A system for authenticating a user comprising:
a processor for; selecting one or more 3-dimensional models, each of the one or more 3-dimensional models containing geometric shape data for a respective object in three spatial dimensions; receiving one or more rendering parameters associated with each respective object; for each respective object, randomly varying the one or more rendering parameters, within pre-defined thresholds and/or constraints, such that each respective object remains recognizable by a human; generating a 2-dimensional image based on the result of the varying step; generating metadata based on each respective object, and the one or more rendering parameters; communicating the 2-dimensional image for presentation at a computer; receiving user input data concerning the 2-dimensional image; comparing the metadata and the user input data to determine if the user interacting with the computer is a human user; and authenticating or not authenticating based on the result of the comparing step. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
Specification