DRAG AND DROP HUMAN AUTHENTICATION
First Claim
Patent Images
1. A system comprising:
- a non-transitory memory storing a location of an image to be moved by a user and a location the image is expected to be moved to on a user device display; and
one or more hardware processors in communication with the non-transitory memory and configured for;
receiving a request from a user to access information;
displaying, on a user device, at least one image for the user to move;
identifying an image for the user to move;
communicating, to the user device, a first location to move the image;
receiving a second location where the user moved the image;
determining whether the second location matches the first location; and
authenticating the user as a human if, at least, the second location matches the first location.
1 Assignment
0 Petitions
Accused Products
Abstract
A new human authentication test requires the user to move an image to a specified location on the display. In one embodiment, the user is presented with a display having one or more images and instructions (plain text or distorted) to move a specific image to a specific location on the display. The user then moves the image, which can be text, distorted text, a symbol, an icon, or any image, to the specified location. The system then checks where the image was moved. If the location is the one expected, the system can authenticate the response as coming from a human, as opposed to a machine or program.
21 Citations
20 Claims
-
1. A system comprising:
-
a non-transitory memory storing a location of an image to be moved by a user and a location the image is expected to be moved to on a user device display; and one or more hardware processors in communication with the non-transitory memory and configured for; receiving a request from a user to access information; displaying, on a user device, at least one image for the user to move; identifying an image for the user to move; communicating, to the user device, a first location to move the image; receiving a second location where the user moved the image; determining whether the second location matches the first location; and authenticating the user as a human if, at least, the second location matches the first location. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
receiving, electronically from a user device, a request from a user to access information; displaying, on the user device, at least one image for the user to move; identifying an image for the user to move; communicating, to the user device, a first location to move the image; receiving a second location where the user moved the image; determining whether the second location matches the first location; and authenticating the user as a human if, at least, the second location matches the first location. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium comprising a plurality of machine-readable instructions which when executed by one or more processors of a server are adapted to cause the server to perform a method comprising:
-
receiving a request from a user to access information; displaying, on a user device, at least one image for the user to move; identifying an image for the user to move; communicating, to the user device, a first location to move the image; receiving a second location where the user moved the image; determining whether the second location matches the first location; and authenticating the user as a human if, at least, the second location matches the first location. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification