SYSTEM SECURITY PROCESS METHOD AND PROPERTIES OF HUMAN AUTHORIZATION MECHANISM

A system and method for automatically determining if a computer user is a human or an automated script. Human interactive proofs (HIPs) are currently used to deter automated registration for web services by automated computer scripts. Unfortunately, while every endeavor is made to obscure the HIPs f...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: GARSIDE, DEBBIE
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:A system and method for automatically determining if a computer user is a human or an automated script. Human interactive proofs (HIPs) are currently used to deter automated registration for web services by automated computer scripts. Unfortunately, while every endeavor is made to obscure the HIPs from such automated processes, the presentation of current HIPs leaves systems very much open to malicious attack from automated computer scripts and processes such as optical character readers (OCR). Those HIPs that have proven more successful in foiling malicious attacks have proved difficult for humans to decipher. The system and method of the invention in one embodiment provides a Pseudo-Isochromatic challenge or puzzle or any other visual illusion generated on the basis of Pseudo-Isochromatic imagery (PICPVI), to be employed within a challenge generator, the invention is created in such a way as to make it extremely difficult for an automated process to read, decipher or otherwise interpret the PICPVI but relatively easy for the human end user to successfully complete. In one embodiment the end user issues a request to a service provider for access to services, the service provider requests HIP by generating a PICPVI. The PICPVI is generated for the user and the response can be provided as the whole or part of the access to service request, making it extremely difficult for an automated process to access services unlawfully or maliciously.