SYSTEMS AND METHODS FOR USER AUTHENTICATION
First Claim
Patent Images
1. A computer-implemented method comprising:
- determining, by a computing system, at least one operation that causes a challenge-response test to be activated for authenticating a user;
determining, by the computing system, a first set of content items that each have a threshold similarity to a query content item;
determining, by the computing system, a second set of content items that each have a threshold dissimilarity to the query content item; and
providing, by the computing system, the challenge-response test for display to the user, wherein the challenge-response test presents a group of content items including the first set of content items and the second set of content items.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and non-transitory computer-readable media can determine at least one operation that causes a challenge-response test to be activated for authenticating a user. A first set of content items that each have a threshold similarity to a query content item can be determined. A second set of content items that each have a threshold dissimilarity to the query content item can be determined. The challenge-response test can be provided for display to the user. The challenge-response test presents a group of content items including the first set of content items and the second set of content items.
13 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
determining, by a computing system, at least one operation that causes a challenge-response test to be activated for authenticating a user; determining, by the computing system, a first set of content items that each have a threshold similarity to a query content item; determining, by the computing system, a second set of content items that each have a threshold dissimilarity to the query content item; and providing, by the computing system, the challenge-response test for display to the user, wherein the challenge-response test presents a group of content items including the first set of content items and the second set of content items. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
at least one processor; and a memory storing instructions that, when executed by the at least one processor, cause the system to perform; determining at least one operation that causes a challenge-response test to be activated for authenticating a user; determining a first set of content items that each have a threshold similarity to a query content item; determining a second set of content items that each have a threshold dissimilarity to the query content item; and providing the challenge-response test for display to the user, wherein the challenge-response test presents a group of content items including the first set of content items and the second set of content items. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory computer-readable storage medium including instructions that, when executed by at least one processor of a computing system, cause the computing system to perform a method comprising:
-
determining at least one operation that causes a challenge-response test to be activated for authenticating a user; determining a first set of content items that each have a threshold similarity to a query content item; determining a second set of content items that each have a threshold dissimilarity to the query content item; and providing the challenge-response test for display to the user, wherein the challenge-response test presents a group of content items including the first set of content items and the second set of content items. - View Dependent Claims (17, 18, 19, 20)
-
Specification