Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing – Network resources access controlling
Reexamination Certificate
2003-02-25
2009-10-20
Mesfin, Yemane (Department: 2444)
Electrical computers and digital processing systems: multicomput
Computer-to-computer session/connection establishing
Network resources access controlling
C726S002000
Reexamination Certificate
active
07606915
ABSTRACT:
Methods and system of preventing unauthorized scripting. The invention includes providing one or more tests to a user for distinguishing the user from a machine when the user requests access to the server. By storing information on a correct solution to the test in a block of data and sending the block of data together with the test, the invention provides stateless operation. Moreover, maintaining a database of previously used correct responses prevents replay attacks. The invention also includes providing combinations of alternative tests, such as visually altered textual character strings, audible character strings, and computational puzzles. Other aspects of the invention are directed to computer-readable media for use with the methods and system.
REFERENCES:
patent: 5491749 (1996-02-01), Rogaway
patent: 6195698 (2001-02-01), Lillibridge et al.
patent: 6687401 (2004-02-01), Naoi et al.
patent: 6944765 (2005-09-01), Rose et al.
patent: 7197639 (2007-03-01), Juels et al.
patent: 2002/0032869 (2002-03-01), Lamberton et al.
patent: 2002/0194501 (2002-12-01), Wenocur et al.
patent: 2003/0093699 (2003-05-01), Banning et al.
patent: 2004/0030934 (2004-02-01), Mizoguchi et al.
patent: 2004/0093371 (2004-05-01), Burrows et al.
patent: 2004/0123160 (2004-06-01), Mizrah
patent: 2005/0027990 (2005-02-01), Ogawa
patent: 2005/0216771 (2005-09-01), Malcolm
D. Lopresti, C. Shih, and G. Kochanski, “Human interactive proofs for spoken language interfaces,” in Proc. of the Workshop on Human Interactive Proofs, Palo Alto, CA,. Jan. 2002.
Baird et al., “Human Interactive Proofs and Document Image Analysis,” Proceedings of the 5th IAPR International Workshop on Document Analysis Systems, Aug. 2002, 7 pages, Princeton, NJ, U.S.A.
Blank, “A Practical Turing Test for Detecting Adbots,” AI Update, Winter 2001, pp. 6-7, U.S.A.
Pinkas et al., “Securing Passwords Against Dictionary Attacks,” Nov. 18-22, 2002, pp. 161-170, ACM Press, New York, U.S.A.
Lin et al., “Three-party Encrypted Key Exchange; Attacks and A Solution,” ACM Operating Systems Review, Oct. 2000, pp. 12-20.
Matsumoto, “Human-Computer Cryptography: An Attempt,” 1996, pp. 68-75, ACM Press, New York, U.S.A.
Monrose et al., “Authentication via Keystroke Dynamics,” 1997, pp. 48-56, ACM Press, New York, U.S.A.
Deriche, R., Fast Algorithms for Low-Levil Vision, Jan. 1990, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 12. No. 1, pp. 78-87, IEEE Computer Society, U.S.A.
Simard et al., “Transformation Invariance in Pattern Recognition—Tangent Distance and Tangent Propagation,” In Neural Networks: Tricks of the Trade, Chapter 12, 1998, 40 pages, Springer, U.S.A.
Turing, “Mind A Quarterly Review of Psychology and Philosophy,” vol. LIX, No. 236, Oct. 1950, pp. 433-460, Oxford University Press, U.S.A.
Ahn et al., “Telling Humans and Computers Apart (Automatically) or How Lazy Cryptographers do AI,” pp. 1-11, Pennsylvania, U.S.A.
Workshop on Human Interactive Proofs, Jan. 9-11, 2002, California, U.S.A.
LeCun et al., “Gradient-Based Learning Applied to Document Recognition,” Proceedings of the IEEE, 1998, pp. 1-46, U.S.A.
Bengio et al., “LeRec: A NN/HMM Hybrid for On-Line Handwriting Recognition,” Neural Computation, vol. 7, No. 5, 1995, pp. 1-14, U.S.A.
Levin et al., “Dynamic Planar Warping for Optical Character Recognition,” IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 3, Mar. 23-26, 1992, pp. III-149-III-152, U.S.A.
Viola et al., “Rapid Object Detection Using a Boosted Cascade of Simple Features,” Accepted Conference on Computer Vision and Pattern Recognition, 2001, pp. 1-9, U.S.A.
Wolberg, “Digital Image Warping,” IEEE Computer Society Press, 1990, California, U.S.A.
Spice, “Robot Solves Internet Robot Problem,” Pittsburgh Post-Gazette, Oct. 21, 2001, 2 pages, Pennsylvania, U.S.A.
Pinkas, et al., “Securing Passwords Against Dictionary Attacks,” Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002, pp. 161-170, ACM Press, New York, U.S.A.
Benaloh Josh
Calinov Iulian D.
Couvreur Julien
Wilkins Jonathan
Zhang Danpo
Mesfin Yemane
Microsoft Corporation
Senniger Powers LLP
LandOfFree
Prevention of unauthorized scripts does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Prevention of unauthorized scripts, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Prevention of unauthorized scripts will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4071445