ACTIVE HIP
First Claim
1. A method for implementing an Active HIP for protecting a computing service from unwarranted access, the method comprising:
- identifying a HIP challenge;
randomly selecting a set quantity of Active HIP key codelets from a collection of two or more Active HIP key codelets, wherein the set quantity of Active HIP key codelets, when executed, generates an Active HIP key;
selecting a set quantity of Active HIP characteristic codelets from a collection of one or more Active HIP characteristic codelets, wherein the set quantity of Active HIP characteristic codelets, when executed, collects information about a computing device;
conflating the set quantity of Active HIP key codelets and the set quantity of Active HIP characteristic codelets with the HIP challenge in Active HIP software to be executed by a computing device that requested the computing service;
providing the Active HIP software to the computing device that requested the computing service;
receiving a response to the Active HIP software;
allowing access to the computing service when the response to the Active HIP software comprises a correct solution for the HIP challenge, a correct Active HIP key, and information about the computing device that indicates the computing device is not attempting an unwarranted access to the computing service;
denying access to the computing service when the response to the Active HIP software does not comprise a correct solution for the HIP challenge;
denying access to the computing service when the response to the Active HIP software does not comprise a correct Active HIP key; and
denying access to the computing service when the response to the Active HIP software comprises information about the computing device that indicates that the computing device is attempting an unwarranted access to the computing service.
2 Assignments
0 Petitions
Accused Products
Abstract
Computing services that unwanted entities may wish to access for improper, and potentially illegal, use can be more effectively protected by using Active HIP systems and methodologies. An Active HIP involves dynamically swapping one random HIP challenge, e.g., but not limited to, image, for a second random HIP challenge, e.g., but not limited to, image. An Active HIP can also, or otherwise, involve stitching together, or otherwise collecting and including, within Active HIP software, i.e., a HIP web page, to be executed by a computing device of a user seeking access to a HIP-protected computing service x number of software executables randomly selected from a pool of y number of software executables. The x number of software executables, when run, generates a random Active HIP key. If the generated Active HIP key accompanies a correct user response to the valid HIP challenge the system and/or methodology can assume with a degree of certainty that the current user is a legitimate human user and allow the current user access to the requested computing service.
83 Citations
20 Claims
-
1. A method for implementing an Active HIP for protecting a computing service from unwarranted access, the method comprising:
-
identifying a HIP challenge; randomly selecting a set quantity of Active HIP key codelets from a collection of two or more Active HIP key codelets, wherein the set quantity of Active HIP key codelets, when executed, generates an Active HIP key; selecting a set quantity of Active HIP characteristic codelets from a collection of one or more Active HIP characteristic codelets, wherein the set quantity of Active HIP characteristic codelets, when executed, collects information about a computing device; conflating the set quantity of Active HIP key codelets and the set quantity of Active HIP characteristic codelets with the HIP challenge in Active HIP software to be executed by a computing device that requested the computing service; providing the Active HIP software to the computing device that requested the computing service; receiving a response to the Active HIP software; allowing access to the computing service when the response to the Active HIP software comprises a correct solution for the HIP challenge, a correct Active HIP key, and information about the computing device that indicates the computing device is not attempting an unwarranted access to the computing service; denying access to the computing service when the response to the Active HIP software does not comprise a correct solution for the HIP challenge; denying access to the computing service when the response to the Active HIP software does not comprise a correct Active HIP key; and denying access to the computing service when the response to the Active HIP software comprises information about the computing device that indicates that the computing device is attempting an unwarranted access to the computing service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for implementing an Active HIP for protecting a computing service from unwarranted access, the system comprising:
-
a HIP challenge generator that identifies a HIP challenge; a collection of Active HIP key codelets from which collection a set quantity of Active HIP key codelets can be randomly selected that, when executed, generates an Active HIP key; and a determinator that resolves whether a response from a computing device comprises a correct solution for the HIP challenge and further determines that the response from the computing device comprises a correct Active HIP key. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method for implementing an Active HIP, the method comprising:
-
randomly obtaining a HIP challenge; randomly selecting a set quantity of Active HIP key codelets from a collection of Active HIP key codelets, wherein each one of the set quantity of Active HIP key codelets, when executed, generates a bit with a value of zero or a bit with a value of one and a result of the execution of the set quantity of Active HIP key codelets is an Active HIP key; conflating the HIP challenge with the set quantity of Active HIP key codelets in Active HIP software to be executed by a computing device; providing the Active HIP software to the computing device; receiving a response to the Active HIP software; allowing access to the computing service when the response to the Active HIP software comprises a correct identification of the HIP challenge and a correct Active HIP key; denying access to the computing service when the response to the Active HIP software does not comprise a correct identification of the HIP challenge; denying access to the computing service when the response to the Active HIP software does not comprise an Active HIP key; and denying access to the computing service when the response to the Active HIP software does not comprise a correct Active HIP key. - View Dependent Claims (18, 19, 20)
-
Specification