Spam reduction in real time communications by human interaction proof
First Claim
Patent Images
1. A system comprising;
- at least one processor configured to execute computer-executable instructions; and
memory storing computer-executable instructions that, when executed by the at least one processor, implement;
an interface component configured to receive data related to a real time data communication between two or more clients; and
a verification component configured to identify a particular client participating within the real time data communication as a potential security threat, communicate a message including a human interaction proof (HIP) to the particular client from a user participating within the real time data communication, authenticate a human identity for the particular client by evaluating a response to the HIP, and communicate a result associated with the HIP to the user, wherein the verification component includes;
a detection component configured to dynamically monitor the real time data communication in order to identify potential security threats and configured to provide a warning to the user about potential security issues with the particular client, andan HIP generator configured to create the HIP to be provided to the particular client during the real time data communication between the two or more clients.
2 Assignments
0 Petitions
Accused Products
Abstract
The claimed subject matter provides a system and/or a method that facilitates authenticating a data communication. An interface component can receive data related to a real time data communication between two or more clients. A verification component can employ a human interaction proof (HIP) to a client participating within the real time data communication, wherein a human identity of the client is authenticated as a function of a response to the HIP.
22 Citations
20 Claims
-
1. A system comprising;
-
at least one processor configured to execute computer-executable instructions; and memory storing computer-executable instructions that, when executed by the at least one processor, implement; an interface component configured to receive data related to a real time data communication between two or more clients; and a verification component configured to identify a particular client participating within the real time data communication as a potential security threat, communicate a message including a human interaction proof (HIP) to the particular client from a user participating within the real time data communication, authenticate a human identity for the particular client by evaluating a response to the HIP, and communicate a result associated with the HIP to the user, wherein the verification component includes; a detection component configured to dynamically monitor the real time data communication in order to identify potential security threats and configured to provide a warning to the user about potential security issues with the particular client, and an HIP generator configured to create the HIP to be provided to the particular client during the real time data communication between the two or more clients. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-implemented method comprising:
-
monitoring a real time data communication between two or more clients in order to identify potential security threats; identifying a particular client participating within the real time data communication as a potential security threat; providing, to a user participating within the real time data communication, a warning about potential security issues with the particular client; creating a human interaction proof (HIP) to be provided to the particular client during the real time data communication; communicating a message including the HIP to the particular client from the user participating within the real time data communication; authenticating a human identity for the particular client by evaluating a response to the HIP provided by the particular client; and communicating a result associated with the HIP to the user participating within the real time data communication. - View Dependent Claims (18, 19)
-
-
20. A computer-readable storage device storing computer-executable instructions that, when executed by a computing device, cause the computing device to perform operations comprising:
-
monitoring a real time data communication between two or more clients in order to identify potential security threats; identifying a particular client participating within the real time data communication as a potential security threat; providing, to a user participating within the real time data communication, a warning about potential security issues with the particular client; creating a human interaction proof (HIP) to be provided to the particular client during the real time data communication; communicating a message including the HIP to the particular client from the user participating within the real time data communication; authenticating a human identity for the particular client by evaluating a response to the HIP provided by the particular client; and communicating a result associated with the HIP to the user participating within the real time data communication.
-
Specification