Abstract:
Systems and methods of determining image characteristics are provided. More particularly, a first image having an unknown characteristic can be obtained. The first image can be provided to a plurality of user devices in a verification challenge. The verification challenge can include one or more instructions to be presented to a user of each user device. The instructions being determined based at least in part on the first image. User responses can be received, and an unknown characteristic of the first image can be determined based at least in part on the received responses. Subsequent to determining the unknown characteristic of the first image, one or more machine learning models can be trained based at least in part on the determined characteristic.
Abstract:
Computerized CAPTCHA systems using a direct connection with user computing devices are provided. An example computerized CAPTCHA system is configured to perform operations. The operations include receiving a request from a user computing device to engage in a verification process. The request is received independent of a resource provider from which the user computing device has requested a resource. The operations include providing a challenge to the user computing device at least in part in response to the request for engagement in the verification process and receiving a response to the challenge from the user computing device. The operations include determining whether the user computing device should be verified based at least in part on the response and providing a verification token to the user computing device when it is determined that the user computing device should be verified.
Abstract:
Systems and methods for generating and performing a three-dimensional audio CAPTCHA are provided. One exemplary system can include a decoy signal database storing a plurality of decoy signals. The system also can include a three-dimensional audio simulation engine for simulating the sounding of a target signal and at least one decoy signal in an acoustic environment and outputting a stereophonic audio signal based on the simulation. One exemplary method includes providing an audio prompt to a resource requesting entity. The audio prompt can have been generated based on a three-dimensional audio simulation of the sounding of a target signal containing an authentication key and at least one decoy signal in an acoustic environment. The method can include receiving a response to the audio prompt from the resource requesting entity and comparing the response to the authentication key.
Abstract:
Systems and methods of determining image characteristics are provided. More particularly, a first image having an unknown characteristic can be obtained. The first image can be provided to a plurality of user devices in a verification challenge. The verification challenge can include one or more instructions to be presented to a user of each user device. The instructions being determined based at least in part on the first image. User responses can be received, and an unknown characteristic of the first image can be determined based at least in part on the received responses. Subsequent to determining the unknown characteristic of the first image, one or more machine learning models can be trained based at least in part on the determined characteristic.
Abstract:
Systems and methods for verifying a user based on reputational information are provided. In particular, a computerized CAPTCHA system consisting of one or more computers can determine a trust score based on one or more reputation signals associated with a user computing device, select a challenge to provide to the user computing device based on the trust score, and determine whether to verify the user computing device based on a received response to the challenge and/or the trust score.
Abstract:
Systems and methods of determining image characteristics are provided. More particularly, a first image having an unknown characteristic can be obtained. The first image can be provided to a plurality of user devices in a verification challenge. The verification challenge can include one or more instructions to be presented to a user of each user device. The instructions being determined based at least in part on the first image. User responses can be received, and an unknown characteristic of the first image can be determined based at least in part on the received responses. Subsequent to determining the unknown characteristic of the first image, one or more machine learning models can be trained based at least in part on the determined characteristic.
Abstract:
Systems and methods of determining image characteristics are provided. More particularly, a first image having an unknown characteristic can be obtained. The first image can be provided to a plurality of user devices in a verification challenge. The verification challenge can include one or more instructions to be presented to a user of each user device. The instructions being determined based at least in part on the first image. User responses can be received, and an unknown characteristic of the first image can be determined based at least in part on the received responses. Subsequent to determining the unknown characteristic of the first image, one or more machine learning models can be trained based at least in part on the determined characteristic.
Abstract:
Systems and methods for generating and performing a three-dimensional audio CAPTCHA are provided. One exemplary system can include a decoy signal database storing a plurality of decoy signals. The system also can include a three-dimensional audio simulation engine for simulating the sounding of a target signal and at least one decoy signal in an acoustic environment and outputting a stereophonic audio signal based on the simulation. One exemplary method includes providing an audio prompt to a resource requesting entity. The audio prompt can have been generated based on a three-dimensional audio simulation of the sounding of a target signal containing an authentication key and at least one decoy signal in an acoustic environment. The method can include receiving a response to the audio prompt from the resource requesting entity and comparing the response to the authentication key.