METHODS AND APPARATUSES FOR CONTROLLING ACCESS TO COMPUTER SYSTEMS AND FOR ANNOTATING MEDIA FILES
First Claim
1. A method of controlling access to a system, comprising:
- generating a challenge to a user of the system, wherein the challenge includes;
a verify part of the challenge for which an answer is known; and
a read part of the challenge for which an answer is not known;
prompting the user to solve both the verify part of the challenge and the read part of the challenge;
receiving input from the user;
determining if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; and
identifying the input from the user relative to the read part of the challenge as an answer to the read part of the challenge, if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatuses for controlling access to computer systems and for annotating media files. One embodiment includes a method including generating a challenge to a user, wherein the challenge includes a verify part and a read part. The methods also includes prompting the user to solve both the verify part of the challenge and the read part of the challenge; receiving input from the user; determining if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; and identifying the input from the user relative to the read part of the challenge as an answer to the read part of the challenge, if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge.
104 Citations
22 Claims
-
1. A method of controlling access to a system, comprising:
-
generating a challenge to a user of the system, wherein the challenge includes; a verify part of the challenge for which an answer is known; and a read part of the challenge for which an answer is not known; prompting the user to solve both the verify part of the challenge and the read part of the challenge; receiving input from the user; determining if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; and identifying the input from the user relative to the read part of the challenge as an answer to the read part of the challenge, if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. Computer-readable instructions which, when executed by a processor, cause the processor to perform operations of:
-
generating a challenge to a user of the computer system, wherein the challenge includes; a verify part of the challenge for which an answer is known; and a read part of the challenge for which an answer is not known; prompting the user to solve both the verify part of the challenge and the read part of the challenge; receiving input from the user; determining if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; and identifying the input from the user relative to the read part of the challenge as an answer to the read part of the challenge, if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A system comprising:
-
a network; a plurality of computers, wherein; at least one of the computers is being used by a user attempting to gain access to another computer; at least one of the computers includes a processor and a memory, and wherein the memory includes computer-readable instructions which, when executed by the processor, cause the processor to perform operations of; generating a challenge to the computer being used by the user, wherein the challenge includes; a verify part of the challenge for which an answer is known; and a read part of the challenge for which an answer is not known; prompting of the user to solve both the verify part of the challenge and the read part of the challenge; receiving input from the computer of the user; determining if the input from the computer of the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; and identifying the input from the computer of the user relative to the read part of the challenge as an answer to the read part of the challenge, if the input from the computer of the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge. - View Dependent Claims (19, 20, 21, 22)
-
Specification