System security using human authorization
First Claim
Patent Images
1. A method comprising:
- determining that a system configuration parameter of a computing device has been modified from a first state to a second state;
determining whether the system configuration parameter is protected;
if it is determined that the system configuration parameter is designated as protected, presenting to a user of the computing device a message including human-discernable information that is obscured from detection by a computer-implemented process;
requesting from the user an action that indicates recognition of the human-discernable information; and
if the user does not perform the requested action, returning the system configuration parameter to the first state.
2 Assignments
0 Petitions
Accused Products
Abstract
In response to the occurrence of a restricted event in a computing device, a user of the computing device is presenting with a challenge including information designed to assist in determining whether the challenge is answered by a human. If it is determined that the challenge was not answered by a human, the restricted event is counteracted.
-
Citations
19 Claims
-
1. A method comprising:
-
determining that a system configuration parameter of a computing device has been modified from a first state to a second state; determining whether the system configuration parameter is protected; if it is determined that the system configuration parameter is designated as protected, presenting to a user of the computing device a message including human-discernable information that is obscured from detection by a computer-implemented process; requesting from the user an action that indicates recognition of the human-discernable information; and if the user does not perform the requested action, returning the system configuration parameter to the first state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
in response to the occurrence of a restricted event in a computing device, presenting to a user of the computing device a challenge including information designed to assist in determining whether the challenge is answered by a human; determining whether the challenge was answered by a human; and if it is determined that the challenge was not answered by a human, counteracting the restricted event, wherein the restricted event comprises a call to a specified Application Programming Interface (API) to modify a system configuration parameter and wherein counteracting the restricted event comprises preventing the API from modifying the system configuration parameter. - View Dependent Claims (10, 11, 12, 13)
-
-
14. One or more computer-readable media embodying computer-executable instruction that, when executed by a computer, cause the computer to implement a method comprising:
-
detecting a request to modify a system configuration parameter of a computing device; in response to detecting the request, determining whether the system configuration parameter is protected; if it is determined that the system configuration parameter is protected, presenting to a user of the computing device a human-discernable a message including information that is obscured from detection by a computer-implemented process; requesting from the user an action that indicates recognition of the information; and if the user does not perform the requested action, preventing modification of the system configuration parameter. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification