Method of advertising using an electronic processor authorization challenge
First Claim
1. A method of an electronic processor determining that an applicant seeking access to said electronic processor is a human applicant, the method comprising the steps of:
- selecting by said electronic processor an image comprising human-readable data, whereby, said human-readable data comprising;
an advertisement; and
,an authorization key, whereby, said advertisement and said authorization key are oriented within said image;
dividing by said electronic processor said image into a plurality of separated sub-images;
presenting by said electronic processor said plurality of separated sub-images to said applicant by a graphical user interface, said graphical user interface allowing said human applicant to manipulate at least one of a position, an orientation, or a size of at least one of said plurality of separated sub-images, whereby, said plurality of separated sub-images forms a reassembled image, said reassembled image having human-readable data;
said human applicant following the steps comprising of;
recognizing by said human applicant said authorization key, said human applicant responding to said authorization key by inputting said authorization key to said electronic processor to be authenticated;
said electronic processor verifying that said applicant is said human applicant only if said applicant provides an input responsive to recognition of said authorization key;
determining by said electronic processor that said applicant is said human applicant, whereby, if said response is correct to allow access to said electronic processor; and
,determining by said electronic processor that said applicant is said human applicant, whereby, if said response is incorrect to deny access to said electronic processor.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of advertising using an electronic processor authorization challenge. An advertisement is combined with an authorization key to form an image. An electronic processor disassembles the image and presents the disassembled image to a user by a graphical user interface as an authorization challenge. The authorization challenge can be successfully overcome by a human user reassembling the divided image, then recognizing the authorization key, and then responding to the authorization key. The authorization key is data configured to be inputted into an electronic processor by a human user or data corresponding to a command configured to be performed by a human user. The authorization key can be an advertisement, a feature of an advertisement, a coupon, a CAPTCHA, a Reverse Turing Test, a command, an image, a string of text, a number, a letter, a symbol, a combination of a number, a letter, or a symbol.
-
Citations
20 Claims
-
1. A method of an electronic processor determining that an applicant seeking access to said electronic processor is a human applicant, the method comprising the steps of:
-
selecting by said electronic processor an image comprising human-readable data, whereby, said human-readable data comprising; an advertisement; and
,an authorization key, whereby, said advertisement and said authorization key are oriented within said image; dividing by said electronic processor said image into a plurality of separated sub-images; presenting by said electronic processor said plurality of separated sub-images to said applicant by a graphical user interface, said graphical user interface allowing said human applicant to manipulate at least one of a position, an orientation, or a size of at least one of said plurality of separated sub-images, whereby, said plurality of separated sub-images forms a reassembled image, said reassembled image having human-readable data; said human applicant following the steps comprising of;
recognizing by said human applicant said authorization key, said human applicant responding to said authorization key by inputting said authorization key to said electronic processor to be authenticated;said electronic processor verifying that said applicant is said human applicant only if said applicant provides an input responsive to recognition of said authorization key; determining by said electronic processor that said applicant is said human applicant, whereby, if said response is correct to allow access to said electronic processor; and
,determining by said electronic processor that said applicant is said human applicant, whereby, if said response is incorrect to deny access to said electronic processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of authenticating a user as human, comprising the steps of:
-
providing a segmented image, said segmented image comprising; an advertisement; and
,an authorization key, whereby, said advertisement and said authorization key are oriented within said image; said segmented image having at least a first portion of said segmented image being positioned in a non-contacting position with a second portion, said first portion of said segmented image having a first portion boarder, said second portion of said segmented image having a second portion boarder, said first portion border is adapted to abut said second portion border by said user, thereby, orienting said first portion of said segmented image and said second portion of said segmented image at a juxtaposed location; an electronic processor presenting said segmented image to said user by a graphical user interface; configuring said segmented image to be assembled by said user within said graphical user interface, whereby, said first portion of said segmented image is adapted to be aligned in a non-overlapping orientation with said second portion of said segmented image by said user, whereby, at least one of said first portion of said segmented image and said second portion of said segmented image are adapted to be positioned by said user without said first portion of said segmented image overlapping said second portion of said segmented image, thereby creating a non-segmented image; identifying said authorization key within said non-segmented image by said user; requiring said user input of said authorization key; and
,authenticating said user as human, said authentication based on a comparison between said user input and said authorization key from said non-segmented image. - View Dependent Claims (16, 17)
-
-
18. An electronic processor authorization challenge, comprising the steps of:
-
said electronic processor providing an image, said image comprising; an advertisement; and
,an authorization key, whereby, said advertisement and said authorization key are oriented within said image by said electronic processor; said image comprising; at least two portions, said at least two portions connecting to form said image; said electronic processor separating at least one portion of said image from said image to form a disassembled image; presenting said disassembled image by a graphical user interface of said electronic processor to said user, said graphical user interface adapted for a human user to manipulate at least one of a position, an orientation, and a size of said at least one portion of said disassembled image, whereby, said manipulation of at least one portion of said disassembled image forms a reassembled image, said reassembled image having said authorization key; said human user recognizing said authorization key of said reassembled image; said human user responding to said authorization key; said electronic processor verifying that said user is said human user only if said user provides a response correctly corresponding to said authorization key; determining by said electronic processor that said user is said human user, whereby, if said response is correct to allow access to said electronic processor; and
,determining by said electronic processor that said user is said human user, whereby, if said response is incorrect to deny access to said electronic processor. - View Dependent Claims (19, 20)
-
Specification