Multiple image reverse turing test
First Claim
Patent Images
1. A method of authenticating a user as human, comprising the steps of:
- providing a segmented image, said segmented image having at least a first portion of said segmented image being positioned in a non-contacting position with a second portion, said first portion of said segmented image having a first portion boarder, said second portion of said segmented image having a second portion boarder, said first portion border is adapted to abut said second portion border by said user, thereby, orienting said first portion of said segmented image and said second portion of said segmented image at a juxtaposed location;
a computer presenting said segmented image to said user by a graphical user interface;
configuring said segmented image to be assembled by said user within said graphical user interface , whereby, said first portion of said segmented image is adapted to be aligned in a non-overlapping orientation with said second portion of said segmented image by said user, whereby, at least one of said first portion of said segmented image and said second portion of said segmented image are adapted to be positioned by said user without said first portion of said segmented image overlapping said second portion of said segmented image, thereby creating a non-segmented image;
identifying a data set within said non-segmented image;
requiring said user input of said data set; and
,authenticating said user as human, said authentication based on a comparison between said user input and said data set from said non-segmented image.
0 Assignments
0 Petitions
Accused Products
Abstract
In a Reverse Turing Test an applicant seeking access to a computer process is presented with an image containing human-readable data that is intended to be inaccessible to an automated process or bot. In an improved Reverse Turing Test the applicant is presented with multiple sub-images that have to be rearranged in order to yield the overall image. This does not substantially increase a human applicant'"'"'s difficulty in dealing with the test, but makes it much more difficult for a bot to interpret the image.
-
Citations
18 Claims
-
1. A method of authenticating a user as human, comprising the steps of:
-
providing a segmented image, said segmented image having at least a first portion of said segmented image being positioned in a non-contacting position with a second portion, said first portion of said segmented image having a first portion boarder, said second portion of said segmented image having a second portion boarder, said first portion border is adapted to abut said second portion border by said user, thereby, orienting said first portion of said segmented image and said second portion of said segmented image at a juxtaposed location; a computer presenting said segmented image to said user by a graphical user interface; configuring said segmented image to be assembled by said user within said graphical user interface , whereby, said first portion of said segmented image is adapted to be aligned in a non-overlapping orientation with said second portion of said segmented image by said user, whereby, at least one of said first portion of said segmented image and said second portion of said segmented image are adapted to be positioned by said user without said first portion of said segmented image overlapping said second portion of said segmented image, thereby creating a non-segmented image; identifying a data set within said non-segmented image; requiring said user input of said data set; and
,authenticating said user as human, said authentication based on a comparison between said user input and said data set from said non-segmented image. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of prohibiting an unauthorized user from accessing a system, comprising the steps of:
-
providing a non-segmented image, said non-segmented image having a configuration containing a data set; prompting said non-segmented image to be configured into a segmented image with at least a portion of one segment being positioned in a non-contacting position of said non-segmented image, said portion of one segment having a boarder, said segmented image having a boarder, said border of said portion of one segment is adapted to abut said border of said segmented image by a user, thereby, orienting said portion of one segment and said segmented image at a juxtaposed location; presenting said segmented image by a graphical user interface of a computer to be assembled by said user, whereby, said portion of one segment is adapted to be aligned in a non-overlapping orientation with said segmented image by said user, whereby, said portion of one segment is adapted to be positioned by said user without overlapping said segmented image, thereby creating said non-segmented image; displaying said data set within said non-segmented image; requiring the user input of said data set by said computer; determining by said computer if said user is said unauthorized user by comparing said input with said data set from said non-segmented image; and
,prohibiting by said computer said unauthorized user access to said system if said unauthorized user'"'"'s said input does not match with said data set. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A method of authenticating a user as human, comprising the steps of:
-
said user requesting access to a system; generating a segmented image for said user to identify, said segmented image containing a segmented data set; said segmented image having a boarder, whereby, said boarder of at least one segment of said segmented image is adapted to abut said boarder of a juxtaposed segmented image; a computer presenting said segmented image to said user by a graphical user interface; configuring said segmented image into a non-segmented image by said user within said graphical user interface, whereby, said segmented image is aligned in a non-overlapping orientation with another segmented image containing said segmented data set by said user; said user identifying said data set within said non-segmented image; submitting an input by said user; and
,said computer authorizing said user as human by matching said input to said data set in said non-segmented image. - View Dependent Claims (15, 16, 17, 18)
-
Specification