Active hip
First Claim
1. A method for implementing an Active HIP for protecting a computing service from unwarranted access, the method comprising:
- randomly selecting a HIP challenge from a pool of two or more HIP challenges;
randomly selecting a set quantity of Active HIP key codelets from a collection of two or more Active HIP key codelets, wherein the set quantity of Active HIP key codelets, executed, generates a correct Active HIP key;
selecting a set quantity of Active HIP characteristic codelets from a collection of one or more Active HIP characteristic codelets, wherein the set quantity of Active HIP characteristic codelets, when executed, collects information about a computing device;
conflating the set quantity of Active HIP key codelets and the set quantity of Active HIP characteristic codelets with the HIP challenge in Active HIP software to be executed by a computing device that requested the computing service;
providing the Active HIP software to the computing device that requested the computing service;
receiving a response to the Active HIP software;
allowing access to the computing service when the response to the Active HIP software comprises a correct solution for the HIP challenge, the correct Active HIP key, the correct Active HIP key being different from the correct solution for the HIP challenge, and information about the computing device that indicates the computing device is not attempting an unwarranted access to the computing service;
denying access to the computing service when the response to the Active HIP software does not comprise the correct solution for the HIP challenge;
denying access to the computing service when the response to the Active HIP software does not comprise the correct Active HIP key; and
denying access to the computing service when the response to the Active HIP software comprises information about the computing device that indicates that the computing device is attempting an unwarranted access to the computing service.
2 Assignments
0 Petitions
Accused Products
Abstract
Computing services that unwanted entities may wish to access for improper, and potentially illegal, use can be more effectively protected by using Active HIP systems and methodologies. An Active HIP involves dynamically swapping one random HIP challenge, e.g., but not limited to, image, for a second random HIP challenge, e.g., but not limited to, image. An Active HIP can also, or otherwise, involve stitching together, or otherwise collecting and including, within Active HIP software, i.e., a HIP web page, to be executed by a computing device of a user seeking access to a HIP-protected computing service x number of software executables randomly selected from a pool of y number of software executables. The x number of software executables, when run, generates a random Active HIP key. If the generated Active HIP key accompanies a correct user response to the valid HIP challenge the system and/or methodology can assume with a degree of certainty that the current user is a legitimate human user and allow the current user access to the requested computing service.
-
Citations
20 Claims
-
1. A method for implementing an Active HIP for protecting a computing service from unwarranted access, the method comprising:
-
randomly selecting a HIP challenge from a pool of two or more HIP challenges; randomly selecting a set quantity of Active HIP key codelets from a collection of two or more Active HIP key codelets, wherein the set quantity of Active HIP key codelets, executed, generates a correct Active HIP key; selecting a set quantity of Active HIP characteristic codelets from a collection of one or more Active HIP characteristic codelets, wherein the set quantity of Active HIP characteristic codelets, when executed, collects information about a computing device; conflating the set quantity of Active HIP key codelets and the set quantity of Active HIP characteristic codelets with the HIP challenge in Active HIP software to be executed by a computing device that requested the computing service; providing the Active HIP software to the computing device that requested the computing service; receiving a response to the Active HIP software; allowing access to the computing service when the response to the Active HIP software comprises a correct solution for the HIP challenge, the correct Active HIP key, the correct Active HIP key being different from the correct solution for the HIP challenge, and information about the computing device that indicates the computing device is not attempting an unwarranted access to the computing service; denying access to the computing service when the response to the Active HIP software does not comprise the correct solution for the HIP challenge; denying access to the computing service when the response to the Active HIP software does not comprise the correct Active HIP key; and denying access to the computing service when the response to the Active HIP software comprises information about the computing device that indicates that the computing device is attempting an unwarranted access to the computing service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for implementing an Active HIP for protecting a computing service from unwarranted access, the system comprising:
-
a processor operatively coupled to a memory and configured to provide; a pool of HIP challenges from which a HIP challenge can be randomly selected; a collection of Active HIP key codelets from which collection a set quantity of Active HIP key codelets can be randomly selected that, when executed, generates a correct Active HIP key; a combination application to conflate the set quantity of Active HIP key codelets and the set quantity of Active HIP characteristic codelets with the HIP challenge in Active HIP software to be executed by a computing device that requested the computing service; a transmitter configured to provide the Active HIP software to the computing device that requested the computing service; a receiver configured to receive a response to the Active HIP software; and a determinator that resolves whether a response from a computing device comprises a correct solution for the HIP challenge and further determines that the response from the computing device comprises the correct Active HIP key, the correct Active HIP key being different from the correct solution for the HIP challenge, the determinator being configured to; allow access to the computing service when the response to the Active HIP software comprises a correct solution for the HIP challenge, the correct Active HIP key, the correct Active HIP key being different from the correct solution for the HIP challenge, and information about the computing device that indicates the computing device is not attempting an unwarranted access to the computing service; deny access to the computing service when the response to the Active HIP software does not comprise the correct solution for the HIP challenge; deny access to the computing service when the response to the Active HIP software does not comprise the correct Active HIP key; and deny access to the computing service when the response to the Active HIP software comprises information about the computing device that indicates that the computing device is attempting an unwarranted access to the computing service. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method for implementing an Active HIP, the method comprising:
-
randomly selecting a HIP challenge from a pool of two or more HIP challenges, the HIP challenge including an audio stream; randomly selecting a set quantity of Active HIP key codelets from a collection of Active HIP key codelets, wherein each one of the set quantity of Active HIP key codelets, when executed, generates a bit with a value of zero or a bit with a value of one and a result of the execution of the set quantity of Active HIP key codelets is a correct Active HIP key; conflating the HIP challenge with the set quantity of Active HIP key codelets in Active HIP software to be executed by a computing device; providing the Active HIP software to the computing device; receiving a response to the Active HIP software; allowing access to the computing service when the response to the Active HIP software comprises a correct identification of the HIP challenge and the correct Active HIP key, the correct Active HIP key being different from the correct identification of the HIP challenge; denying access to the computing service when the response to the Active HIP software does not comprise the correct identification of the HIP challenge; denying access to the computing service when the response to the Active HIP software does not comprise an Active HIP key; and denying access to the computing service when the response to the Active HIP software does not comprise the correct Active HIP key. - View Dependent Claims (18, 19, 20)
-
Specification