Systems and methods for assessing security risk
First Claim
1. A computer-implemented method for analyzing responses to challenge graphics, comprising:
- monitoring, by a third party computer system, responses to a plurality of challenge graphics, the plurality of challenge graphics comprising a first challenge graphic requested by a first publisher computer system to determine whether to grant access to a first resource in connection with a first transaction on a first web site hosted by the first publisher computer system, the plurality of challenge graphics further comprising a second challenge graphic requested by a second publisher computer system to determine whether to grant access to a second resource in connection with a second transaction on a second web site hosted by the second publisher computer system, the second web site being different from the first web site;
associating each response with a same network address identifying at least one user computer system to which the plurality of challenge graphics are served;
measuring, by the third party computer system, at least one characteristic of the responses to identify a pattern, wherein;
the at least one characteristic relates to a duration of an event; and
the pattern relates to a number of responses for which the duration of the event is below a selected threshold; and
providing, by the third party computer system, based at least in part on the identified pattern, score information in association with the network address, the score information indicative of a level of trustworthiness of the at least one user computer system to which the plurality of challenge graphics are served.
6 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for providing identification tests. In some embodiments, a system and a method are provided for generating and serving to a user an animated challenge graphic comprising a challenge character set whose appearance may change over time. In some embodiments, marketing content may be incorporated into a challenge message for use in an identification test. The marketing content may be accompanied by randomly selected content to increase a level of security of the identification test. In some embodiments, a challenge message for use in an identification test may be provided based on information regarding a transaction for which the identification test is administered. For example, the transaction information may include a user identifier such as an IP address. In some embodiments, identification test results may be tracked and analyzed to identify a pattern of behavior associated with a user identifier. A score indicative of a level of trustworthiness may be computed for the user identifier.
98 Citations
23 Claims
-
1. A computer-implemented method for analyzing responses to challenge graphics, comprising:
-
monitoring, by a third party computer system, responses to a plurality of challenge graphics, the plurality of challenge graphics comprising a first challenge graphic requested by a first publisher computer system to determine whether to grant access to a first resource in connection with a first transaction on a first web site hosted by the first publisher computer system, the plurality of challenge graphics further comprising a second challenge graphic requested by a second publisher computer system to determine whether to grant access to a second resource in connection with a second transaction on a second web site hosted by the second publisher computer system, the second web site being different from the first web site; associating each response with a same network address identifying at least one user computer system to which the plurality of challenge graphics are served; measuring, by the third party computer system, at least one characteristic of the responses to identify a pattern, wherein; the at least one characteristic relates to a duration of an event; and the pattern relates to a number of responses for which the duration of the event is below a selected threshold; and providing, by the third party computer system, based at least in part on the identified pattern, score information in association with the network address, the score information indicative of a level of trustworthiness of the at least one user computer system to which the plurality of challenge graphics are served. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. At least one non-transitory computer-readable medium encoded with a plurality of instructions that, when executed by at least one processor, perform a method for analyzing responses to challenge graphics, the method comprising:
-
monitoring, by a third party computer system, responses to a plurality of challenge graphics, the plurality of challenge graphics comprising a first challenge graphic requested by a first publisher computer system to determine whether to grant access to a first resource in connection with a first transaction on a first web site hosted by the first publisher computer system, the plurality of challenge graphics further comprising a second challenge graphic requested by a second publisher computer system to determine whether to grant access to a second resource in connection with a second transaction on a second web site hosted by the second publisher computer system, the second web site being different from the first web site; associating each response with a same network address identifying at least one user computer system to which the plurality of challenge graphics are served; measuring, by the third party computer system, at least one characteristic of the responses to identify a pattern, wherein; the at least one characteristic relates to a duration of an event; and the pattern relates to a number of responses for which the duration of the event is below a selected threshold; and providing, by the third party computer system, based at least in part on the identified pattern, score information in association with the network address, the score information indicative of a level of trustworthiness of the at least one user computer system to which the plurality of challenge graphics are served. - View Dependent Claims (11)
-
-
12. A computer system for analyzing responses to challenge graphics, comprising at least one processor programmed to:
-
monitor responses to a plurality of challenge graphics, the plurality of challenge graphics comprising a first challenge graphic requested by a first publisher computer system to determine whether to grant access to a first resource in connection with a first transaction on a first web site hosted by the first publisher computer system, the plurality of challenge graphics further comprising a second challenge graphic requested by a second publisher computer system to determine whether to grant access to a second resource in connection with a second transaction on a second web site hosted by the second publisher computer system, the second web site being different from the first web site; associate each response with a same network address identifying at least one user computer system to which the plurality of challenge graphics are served; measure at least one characteristic of the responses to identify a pattern, wherein; the at least one characteristic relates to a duration of an event; and the pattern relates to a number of responses for which the duration of the event is below a selected threshold; and provide, based at least in part on the identified pattern, score information in association with the network address, the score information indicative of a level of trustworthiness of the at least one user computer system to which the plurality of challenge graphics are served. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
Specification