SECURE DATA STORAGE AND RETRIEVAL INCORPORATING HUMAN PARTICIPATION
First Claim
1. A computer related security method incorporating human participation, the method comprising:
- receiving a request for data stored in a storage medium;
responsive to the request, providing a puzzle, wherein human participation is intended to obtain a solution to the puzzle;
receiving a proposed solution to the puzzle;
determining if the proposed solution is correct; and
if the proposed solution is correct, allowing access to the data stored in the storage medium.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer related security mechanism requires that a human participate in an access verification sequence. Upon a request to access secure data, a puzzle is provided to the requester. Proper solution of the puzzle requires human participation. The puzzle is chosen such that its solution is within the capabilities of a human, but beyond the current state of the art for computer systems. The puzzled can be visually and/or audibly rendered to the user. In one configuration, the puzzle is obtained via a library of pluggable puzzle generators. Puzzle generators in the library can be replaced as the state of the art of computing technology improves.
-
Citations
20 Claims
-
1. A computer related security method incorporating human participation, the method comprising:
-
receiving a request for data stored in a storage medium; responsive to the request, providing a puzzle, wherein human participation is intended to obtain a solution to the puzzle; receiving a proposed solution to the puzzle; determining if the proposed solution is correct; and if the proposed solution is correct, allowing access to the data stored in the storage medium. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for implementing computer related security incorporating human participation, the system comprising:
-
an input/output portion configured to; receive a request for data stored in a memory portion; responsive to the request, provide a puzzle, wherein human participation is intended to obtain a solution to the puzzle; and receive a proposed solution to the puzzle; a processing portion configure to; determine if the proposed solution is correct; and if the proposed solution is correct, allow access to the data stored in the memory portion; and the memory portion configured to store the data. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable medium having stored thereon computer-executable instructions for performing computer related security incorporating human participation, by performing the steps of:
-
receiving a request for data stored in a storage medium; responsive to the request, obtaining a puzzle from a library of pluggable puzzle generators; providing the puzzle, wherein human participation is intended to obtain a solution to the puzzle; receiving a proposed solution to the puzzle; determining if the proposed solution is correct; and if the proposed solution is correct, allowing access to the data stored in the storage medium. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification