Methods of Creating a Corpus of Spoken CAPTCHA Challenges
First Claim
Patent Images
1. A method of controlling access to one or more resources using a computing system comprising:
- coupling the computing system to a voice reference database containing voice reference data for both human and machine related entities;
processing a request for access from a first unverified entity with the computing system to the one or more resources;
in response to said request for access to the computing system from said first unverified entity, presenting an access challenge task with the computing system;
wherein said access challenge task requires that said first unverified entity provide an input utterance with at least some entity related audio information to the computing system as part of a challenge response in order to be satisfied;
processing said entity related audio information input with the computing system based on a comparison to said voice reference data for both human and machine related entities;
performing a determination with the computing system or a second computing system as to whether said first unverified entity is a human or a machine;
controlling with the computing system whether said first unverified entity is allowed to access the one or more resources based on said determination.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods of creating a corpus of spoken CAPTCHA challenges are disclosed. The methods involve training a computing system with samples of human voices and computer synthesized voices articulating a set of reference challenge items, scoring the reference challenge items based on differences in articulation between human and machine articulation of each challenge item, and selecting suitable challenge items from among the reference challenge items based on the score.
31 Citations
18 Claims
-
1. A method of controlling access to one or more resources using a computing system comprising:
-
coupling the computing system to a voice reference database containing voice reference data for both human and machine related entities; processing a request for access from a first unverified entity with the computing system to the one or more resources; in response to said request for access to the computing system from said first unverified entity, presenting an access challenge task with the computing system; wherein said access challenge task requires that said first unverified entity provide an input utterance with at least some entity related audio information to the computing system as part of a challenge response in order to be satisfied; processing said entity related audio information input with the computing system based on a comparison to said voice reference data for both human and machine related entities; performing a determination with the computing system or a second computing system as to whether said first unverified entity is a human or a machine; controlling with the computing system whether said first unverified entity is allowed to access the one or more resources based on said determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A challenge system for identifying a source of data input to a computing system comprising:
-
one or more software routines implemented in a non-transitory computer readable medium and adapted to cause the challenge system to; couple the computing system to a voice reference database containing voice reference data for both human and machine related entities; process a request for access from a first unverified entity to the one or more resources; present an access challenge task in response to said request for access from said first unverified entity; wherein said access challenge task requires that said first unverified entity provide an input utterance with at least some entity related audio information to the computing system as part of a challenge response in order to be satisfied; process said entity related audio information input based on a comparison to said voice reference data for both human and machine related entities; perform a determination with the computing system or a second computing system as to whether said first unverified entity is a human or a machine; control whether said first unverified entity is allowed to access the one or more resources based on said determination.
-
Specification