Unlock instant, AI-driven research and patent intelligence for your innovation.

Human interactive proofs leveraging virtual techniques

A technology of human interaction and virtual scene, applied in special data processing applications, input/output process of data processing, instruments, etc.

Inactive Publication Date: 2012-07-04
MICROSOFT TECH LICENSING LLC
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, some traditional HIP techniques can no longer create successful barriers against malicious entities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Human interactive proofs leveraging virtual techniques
  • Human interactive proofs leveraging virtual techniques
  • Human interactive proofs leveraging virtual techniques

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] overview

[0014] This paper describes image-based Human Interaction Proof (HIP). These authentications are sometimes used when accessing resources using a client browser navigating to a web server. Before allowing access to these resources, the web server may challenge the client with virtual human interaction authentication, such as human interaction authentication using a virtual world.

[0015] Traditional "text-based" puzzles consist of images containing blurred text. In order to answer these puzzles, users need to demonstrate that they can decipher the blurred text (for example, by typing it). However, thanks to developments in optical character recognition, these challenges are becoming easier to answer automatically.

[0016] In addition to using traditional text-based puzzles, the technique described here uses verification using images obtained from a virtual environment. Some validations are configured to require input of a description of one or more obj...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Human interactive proofs that leverage virtual techniques are described. In one or more implementations, an object is inserted to be displayed as part of a virtual scene and the virtual scene having the object is exposed as a human interactive proof that includes a question that relates to the inserted object.

Description

Background technique [0001] Network providers have made a wide variety of web-based resources freely available to users via the Internet, such as e-mail accounts, search services, and instant messaging. Unfortunately, malicious entities can take advantage of these freely available resources and use them for illegal and undesirable purposes, such as spamming, network attacks, and virus distribution. Human Interaction Proof (HIP) has been used to help determine if a real user is attempting to access a resource in order to thwart the efforts of these malicious entities. In this way, a barrier is thus created against malicious entities who abuse or overuse these freely available resources with automated systems. [0002] One traditional technique for human interactive verification involves presenting a text-based puzzle. The technique includes challenging a computing device (eg, a client) with the text-based challenge when the computing device attempts to access a resource. Typ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/048H04L29/06H04L29/08
CPCG06F17/3087G06F17/30873G06F17/30241G06F16/29G06F16/9537G06F16/954
Inventor M.科斯蒂
Owner MICROSOFT TECH LICENSING LLC