Prevention of unauthorized scripts

Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing – Network resources access controlling

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000

Reexamination Certificate

active

07606915

ABSTRACT:
Methods and system of preventing unauthorized scripting. The invention includes providing one or more tests to a user for distinguishing the user from a machine when the user requests access to the server. By storing information on a correct solution to the test in a block of data and sending the block of data together with the test, the invention provides stateless operation. Moreover, maintaining a database of previously used correct responses prevents replay attacks. The invention also includes providing combinations of alternative tests, such as visually altered textual character strings, audible character strings, and computational puzzles. Other aspects of the invention are directed to computer-readable media for use with the methods and system.

REFERENCES:
patent: 5491749 (1996-02-01), Rogaway
patent: 6195698 (2001-02-01), Lillibridge et al.
patent: 6687401 (2004-02-01), Naoi et al.
patent: 6944765 (2005-09-01), Rose et al.
patent: 7197639 (2007-03-01), Juels et al.
patent: 2002/0032869 (2002-03-01), Lamberton et al.
patent: 2002/0194501 (2002-12-01), Wenocur et al.
patent: 2003/0093699 (2003-05-01), Banning et al.
patent: 2004/0030934 (2004-02-01), Mizoguchi et al.
patent: 2004/0093371 (2004-05-01), Burrows et al.
patent: 2004/0123160 (2004-06-01), Mizrah
patent: 2005/0027990 (2005-02-01), Ogawa
patent: 2005/0216771 (2005-09-01), Malcolm
D. Lopresti, C. Shih, and G. Kochanski, “Human interactive proofs for spoken language interfaces,” in Proc. of the Workshop on Human Interactive Proofs, Palo Alto, CA,. Jan. 2002.
Baird et al., “Human Interactive Proofs and Document Image Analysis,” Proceedings of the 5th IAPR International Workshop on Document Analysis Systems, Aug. 2002, 7 pages, Princeton, NJ, U.S.A.
Blank, “A Practical Turing Test for Detecting Adbots,” AI Update, Winter 2001, pp. 6-7, U.S.A.
Pinkas et al., “Securing Passwords Against Dictionary Attacks,” Nov. 18-22, 2002, pp. 161-170, ACM Press, New York, U.S.A.
Lin et al., “Three-party Encrypted Key Exchange; Attacks and A Solution,” ACM Operating Systems Review, Oct. 2000, pp. 12-20.
Matsumoto, “Human-Computer Cryptography: An Attempt,” 1996, pp. 68-75, ACM Press, New York, U.S.A.
Monrose et al., “Authentication via Keystroke Dynamics,” 1997, pp. 48-56, ACM Press, New York, U.S.A.
Deriche, R., Fast Algorithms for Low-Levil Vision, Jan. 1990, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 12. No. 1, pp. 78-87, IEEE Computer Society, U.S.A.
Simard et al., “Transformation Invariance in Pattern Recognition—Tangent Distance and Tangent Propagation,” In Neural Networks: Tricks of the Trade, Chapter 12, 1998, 40 pages, Springer, U.S.A.
Turing, “Mind A Quarterly Review of Psychology and Philosophy,” vol. LIX, No. 236, Oct. 1950, pp. 433-460, Oxford University Press, U.S.A.
Ahn et al., “Telling Humans and Computers Apart (Automatically) or How Lazy Cryptographers do AI,” pp. 1-11, Pennsylvania, U.S.A.
Workshop on Human Interactive Proofs, Jan. 9-11, 2002, California, U.S.A.
LeCun et al., “Gradient-Based Learning Applied to Document Recognition,” Proceedings of the IEEE, 1998, pp. 1-46, U.S.A.
Bengio et al., “LeRec: A NN/HMM Hybrid for On-Line Handwriting Recognition,” Neural Computation, vol. 7, No. 5, 1995, pp. 1-14, U.S.A.
Levin et al., “Dynamic Planar Warping for Optical Character Recognition,” IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 3, Mar. 23-26, 1992, pp. III-149-III-152, U.S.A.
Viola et al., “Rapid Object Detection Using a Boosted Cascade of Simple Features,” Accepted Conference on Computer Vision and Pattern Recognition, 2001, pp. 1-9, U.S.A.
Wolberg, “Digital Image Warping,” IEEE Computer Society Press, 1990, California, U.S.A.
Spice, “Robot Solves Internet Robot Problem,” Pittsburgh Post-Gazette, Oct. 21, 2001, 2 pages, Pennsylvania, U.S.A.
Pinkas, et al., “Securing Passwords Against Dictionary Attacks,” Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002, pp. 161-170, ACM Press, New York, U.S.A.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Prevention of unauthorized scripts does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Prevention of unauthorized scripts, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Prevention of unauthorized scripts will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4071445

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.