Multiple image reverse turing test
First Claim
Patent Images
1. A method of a computer determining that an applicant seeking access to said computer is a human applicant, the method comprising the steps of:
- selecting by said computer an image containing human-readable data;
dividing by said computer said image into a plurality of separated sub-images;
presenting by said computer said plurality of separated sub-images to said applicant by a graphical user interface, said graphical user interface allowing said human applicant to manipulate at least one of a position, an orientation, or a size of at least one of said plurality of separated sub-images, whereby, said plurality of separated sub-images forms a reassembled image, said reassembled image containing human-readable data;
said human applicant following the steps comprising of;
recognizing by said human applicant a feature of said reassembled image, said feature comprising human-readable data, said human applicant responding to said human-readable data by performing the step of inputting said human-readable data to said computer to be authenticated;
said computer verifying that said applicant is said human applicant only if said applicant provides an input responsive to recognition of said human-readable data;
determining by said computer that said applicant is said human applicant, whereby, if said response is correct to allow access to said computer; and
, determining by said computer that said applicant is said human applicant, whereby, if said response is incorrect to deny access to said computer.
0 Assignments
0 Petitions
Accused Products
Abstract
In a Reverse Turing Test an applicant seeking access to a computer process is presented with an image containing human-readable data that is intended to be inaccessible to an automated process or bot. In an improved Reverse Turing Test the applicant is presented with multiple sub-images that have to be rearranged in order to yield the overall image. This does not substantially increase a human applicant'"'"'s difficulty in dealing with the test, but makes it much more difficult for a bot to interpret the image.
20 Citations
12 Claims
-
1. A method of a computer determining that an applicant seeking access to said computer is a human applicant, the method comprising the steps of:
-
selecting by said computer an image containing human-readable data; dividing by said computer said image into a plurality of separated sub-images; presenting by said computer said plurality of separated sub-images to said applicant by a graphical user interface, said graphical user interface allowing said human applicant to manipulate at least one of a position, an orientation, or a size of at least one of said plurality of separated sub-images, whereby, said plurality of separated sub-images forms a reassembled image, said reassembled image containing human-readable data; said human applicant following the steps comprising of; recognizing by said human applicant a feature of said reassembled image, said feature comprising human-readable data, said human applicant responding to said human-readable data by performing the step of inputting said human-readable data to said computer to be authenticated; said computer verifying that said applicant is said human applicant only if said applicant provides an input responsive to recognition of said human-readable data; determining by said computer that said applicant is said human applicant, whereby, if said response is correct to allow access to said computer; and
, determining by said computer that said applicant is said human applicant, whereby, if said response is incorrect to deny access to said computer. - View Dependent Claims (2)
-
-
3. A method of a computer system determining that an applicant seeking access to said computer system is a human applicant, the method comprising the steps of:
-
generating by said computer system a computer file representative of a plurality of separated sub-images that can be combined by said human applicant to yield an image containing human-readable data; displaying by said computer system said plurality of separated sub-images on a graphical user interface accessible to said applicant, whereby, said graphical user interface is operable by said human applicant to combine said plurality of separated sub-images, in accordance with said human applicant'"'"'s manipulation thereof to yield said image containing human-readable data; said human applicant following the steps comprising of; recognizing by said human applicant said human-readable data contained within said image; submitting by said human applicant a response based on a visual recognition of said human-readable data; said computer verifying that said applicant is said human applicant only if said applicant supplies an input responsive to said human-readable data; determining by said computer system that said applicant is said human applicant, whereby, if said response is correct to allow access to said computer; and
, determining by said computer system that said applicant is said human applicant, whereby, if said response is incorrect to deny access to said computer. - View Dependent Claims (4, 5, 6)
-
-
7. A method of a computer system determining that an applicant seeking access to said computer system is not human and thereupon denying the requested access, the method comprising the steps of:
-
generating by said computer system a first data set representative of an image containing human-readable data; generating by said computer system a second data set representative of a plurality of separated sub-images of said image containing human-readable data, whereby, said plurality of separated sub-images are separated from each other by at least one of translation, rotation, overlay, or change of size; supplying by said computer system said second data set to a graphical user interface operable by said human applicant to reassemble said image containing human-readable data by said human applicant manipulating at least one of said plurality of separated sub-images; said human applicant following the steps comprising of; recognizing by said human applicant a feature on said reassembled image, said feature comprising human-readable data, said human applicant responding to said human-readable data by performing the step of inputting said human-readable data on said computer to be authenticated; said computer verifying that said applicant is said human applicant only if said applicant provides an input responsive to recognition of said human-readable data; determining by said computer system if said applicant is not human, whereby, if said response is correct to allow access to said computer; and
, determining by said computer system if said applicant is not human, whereby, if said response is incorrect to deny access to said computer. - View Dependent Claims (8, 12)
-
-
9. A method of a computer determining that an applicant seeking access to said computer is a human applicant, the method comprising the steps of:
-
selecting by said computer an image containing human-readable data; dividing by said computer said image into a plurality of separated sub-images; presenting by said computer said plurality of separated sub-images to said applicant by a graphical user interface, said graphical user interface allowing said human applicant to manipulate at least one of a position, an orientation, or a size of at least one of said plurality of separated sub-images, whereby, said plurality of separated sub-images forms a reassembled image, said reassembled image containing human-readable data; said human applicant following the steps comprising of; recognizing by said human applicant instructions on said reassembled image, said human applicant responding to said instructions by following the steps of said instructions; said computer verifying that an applicant is said human applicant only if said applicant follows said steps of said instructions; determining by said computer that said applicant is said human applicant, whereby, if said response is correct to allow access to said computer; and
, determining by said computer that said applicant is said human applicant, whereby, if said response is incorrect to deny access to said computer. - View Dependent Claims (10, 11)
-
Specification