Methods and apparatuses for controlling access to computer systems and for annotating media files
First Claim
1. A method of controlling access to a system, comprising:
- generating a challenge to a user of the system, wherein the challenge includes a plurality of parts including;
at least one verify part of the challenge for which an answer is known; and
at least one read part of the challenge for which an answer is not known;
prompting the user to solve the challenge including the verify part of the challenge and the read part of the challenge without identifying to the user which of the parts is the verify part and which of the parts is the read part;
receiving input from the user;
determining if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge;
identifying the input from the user relative to the read part of the challenge as an answer to the read part of the challenge, if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; and
allowing the user to access the computer system if the input from the user relative to the verify part of the challenge corresponds with known answer for the verify part of the challenge and without determining if the input from the user relative to the read part of the challenge is correct.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatuses for controlling access to computer systems and for annotating media files. One embodiment includes a method including generating a challenge to a user, wherein the challenge includes a verify part and a read part. The methods also includes prompting the user to solve both the verify part of the challenge and the read part of the challenge; receiving input from the user; determining if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; and identifying the input from the user relative to the read part of the challenge as an answer to the read part of the challenge, if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge.
53 Citations
25 Claims
-
1. A method of controlling access to a system, comprising:
-
generating a challenge to a user of the system, wherein the challenge includes a plurality of parts including; at least one verify part of the challenge for which an answer is known; and at least one read part of the challenge for which an answer is not known; prompting the user to solve the challenge including the verify part of the challenge and the read part of the challenge without identifying to the user which of the parts is the verify part and which of the parts is the read part; receiving input from the user; determining if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; identifying the input from the user relative to the read part of the challenge as an answer to the read part of the challenge, if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; and allowing the user to access the computer system if the input from the user relative to the verify part of the challenge corresponds with known answer for the verify part of the challenge and without determining if the input from the user relative to the read part of the challenge is correct. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-readable storage device having recorded and stored thereon instructions which, when executed by a processor, cause the processor to perform operations of:
-
generating a challenge to a user of a computer system, wherein the challenge includes a plurality of parts including; at least one verify part of the challenge for which an answer is known; and at least one read part of the challenge for which an answer is not known; prompting the user to solve the challenge including the verify part of the challenge and the read part of the challenge without identifying to the user which of the parts is the verify part and which of the parts is the read part; receiving input from the user; determining if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; identifying the input from the user relative to the read part of the challenge as an answer to the read part of the challenge, if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; and allowing the user to access the computer system if the input from the user relative to the verify part of the challenge corresponds with known answer for the verify part of the challenge and without determining if the input from the user relative to the read part of the challenge is correct. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
a network; a plurality of computers, wherein; at least one of the computers is being used by a user attempting to gain access to another computer in the system; at least one of the computers includes a processor and a memory, and wherein the memory includes computer-readable instructions which, when executed by the processor, cause the processor to perform operations of; generating a challenge to the computer being used by the user, wherein the challenge includes a plurality of parts including; at least one verify part of the challenge for which an answer is known; and at least one read part of the challenge for which an answer is not known; prompting the computer of the user to solve the challenge including the verify part of the challenge and the read part of the challenge without identifying to the user which of the parts is the verify part and which of the parts is the read part; receiving input from the computer of the user; determining if the input from the computer of the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; identifying the input from the computer of the user relative to the read part of the challenge as an answer to the read part of the challenge, if the input from the computer of the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; and allowing the user to access the computer if the input from the user relative to the verify part of the challenge corresponds with known answer for the verify part of the challenge and without determining if the input from the user relative to the read part of the challenge is correct. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification