Sign In to Follow Application
View All Documents & Correspondence

Uscaptcha

Abstract: The present invention provides a system (100) for generating and validating human-only interaction using dynamic ciphered outputs. The system (100) includes a user device (104) associated with a user, configured to display a CAPTCHA challenge and receive a user response, and a processing module (102) operably connected to the user device (104). The processing module (102) generates a ciphered output dynamically based on at least one of user-provided input, system-defined variables, or constant variables, such as date, time, day of the week or day number of the year or a publicly known variable or combinations thereof. The processing module (102) provides the dynamically generated ciphered output to the user device (104) for display, along with multiple selectable options that include the ciphered output and one or more distractor options. The processing module (102) receives a user response corresponding to the ciphered output and validates it by comparing it with the generated ciphered output, confirming human interaction. The selectable options are randomized to resist automated recognition. [Figure 1]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
19 December 2023
Publication Number
27/2025
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

Gaurav Sharma
FC – 95, Tagore Garden, New Delhi – 110027

Inventors

1. Gaurav Sharma
FC – 95, Tagore Garden, New Delhi – 110027

Specification

DESC:FORM 2
THE PATENTS ACT 1970
(39 of 1970)
&
THE PATENTS RULES, 2003
[See section 10 and rule 13]
SYSTEM AND METHOD FOR GENERATING AND VALIDATING
HUMAN-ONLY INTERACTION USING DYNAMIC CIPHERED OUTPUTS
I, Gaurav Sharma, an Indian citizen, resident of FC – 95, Tagore Garden,
New Delhi – 110027, India.
The following specification particularly describes the invention and the
manner in which it is to be performed.
2
FIELD OF THE INVENTION
The present invention relates to the field of human verification systems
for distinguishing between human users and automated systems, and more
particularly, to a system and method for generating and validating human5 only interaction using dynamic ciphered outputs.
BACKGROUND OF THE INVENTION
In today’s digital age, distinguishing between human users and
automated systems has become a critical necessity for ensuring the
security, privacy, and integrity of online interactions. As automated bots
10 continue to grow more sophisticated, the need to verify that interactions on
websites, mobile applications, and other digital platforms are initiated by real
human users has become increasingly important. This verification is
essential to prevent fraudulent activities, unauthorized access, spamming,
and misuse of digital resources.
15 Existing solutions to this problem primarily include CAPTCHA
technologies, which are designed to present challenges that human users
can solve but supposedly automated systems cannot. These solutions
include distorted text recognition, image selection tasks, simple
mathematical problems, and pattern-based challenges. CAPTCHAs often
20 utilize static or dynamically generated puzzles that are displayed to users,
requiring them to provide correct responses in order to gain access or
complete specific actions. Some implementations have also attempted to
integrate context-based validation using user-provided inputs like dates,
times, or system-generated prompts to enhance complexity.
25 However, these existing CAPTCHA solutions have several
shortcomings that hinder their effectiveness and usability. Many modern
CAPTCHA challenges are overly complex for human users, particularly for
individuals with disabilities, elderly users, or children, leading to frustration
3
and failed interactions. Furthermore, advancements in artificial intelligence
and machine learning have enabled automated systems to solve traditional
CAPTCHA challenges with increasing accuracy, undermining their reliability
as a security measure. Additionally, some CAPTCHA implementations
5 exploit user efforts for unintended purposes, such as training machine
learning models, raising concerns about user privacy and ethical use of
human input. This wholly defeats the very purpose for which the CAPTCHA
technologies were created in the first place.
In light of these deficiencies, there is a clear need for a system and
10 method for generating and validating human-only interaction using dynamic
ciphered outputs. Such a solution must address the limitations of existing
CAPTCHA technologies by providing a method that is easy for humans to
use, resistant to automated systems, and adaptable to diverse applications
while respecting user privacy and security.
15 SUMMARY OF THE INVENTION
According to one aspect of the invention, there is provided a system for
generating and validating human-only interaction using dynamic ciphered
physical outputs. The system comprises a user device configured to display
a CAPTCHA challenge and receive a user response, and a processing
20 module operably connected with the user device. The processing module
generates a ciphered output dynamically based on at least one of userprovided input, system-defined variables, or constant variables selected
from date, time, day of the week or day number of the year or a publicly
known variable, or combinations thereof. The processing module provides
25 the dynamically generated ciphered output to the user device for display,
along with multiple selectable options, which include the ciphered output
and one or more distractor options. The processing module receives a
response from the user device corresponding to the ciphered output and
validates the received response by comparing it with the generated ciphered
4
output. Successful validation confirms human interaction. Additionally, the
selectable options are randomized in presentation to prevent recognition by
automated systems, and the ciphered output is designed to be humanrecognizable while resistant to automated processing.
5 In accordance with an embodiment of the present invention, the
ciphered output comprises at least one of, but not limited to, alphanumeric
text, symbols, color-coded tiles, graphical elements, icons, or a combination
thereof.
In accordance with an embodiment of the present invention, the
10 processing module generates the ciphered output based on user-provided
input combined with system-defined variables selected from date, time, day
of the week or day number of the year or a publicly known variable or a
dynamically generated random value.
In accordance with an embodiment of the present invention, the
15 selectable options include distractor options that are visually or contextually
similar to the ciphered output but do not match it, thereby preventing
automated systems from reliably identifying the correct option.
In accordance with an embodiment of the present invention, the
processing module randomizes the display order of selectable options and
20 the format or presentation of the ciphered output on the user device.
In accordance with an embodiment of the present invention, the
ciphered output requires the user to perform a specific action selected from,
but not limited to, selecting the correct output from a list of options, typing
the correct output into an input field, or matching the correct output with a
25 visual or graphical reference.
In accordance with an embodiment of the present invention, the
processing module generates the ciphered output in a dynamic grid format
5
comprising rows and columns, wherein the number of rows and columns
are determined based on the application or security level of the CAPTCHA
challenge.
In accordance with an embodiment of the present invention, the
5 processing module generates a secondary ciphered output derived from a
first ciphered output. The generation includes dynamically transforming the
first ciphered output using a predefined transformation logic, where the
transformation logic applies at least one of, but not limited to, substitution,
mapping, encryption, or relational association. The processing module
10 provides the secondary ciphered output to the user device for further
validation.
Further, the secondary ciphered output is contextually linked to user
input selected from a username or password. The system requires the user
to select or input the secondary ciphered output from dynamically displayed
15 options or match the secondary ciphered output with associated visual or
textual elements displayed on the user device, thereby enabling multi-step
validation to prevent automated systems from recognizing or solving the
CAPTCHA challenge.
In accordance with an embodiment of the present invention, the
20 secondary ciphered output is generated by applying transformation logic to
the first ciphered output. The transformation logic substitutes one or more
elements of the first ciphered output with corresponding symbols, text,
numbers, colors, or graphical representations or maps the first ciphered
output to a predefined set of relational outputs such that only a human user
25 can interpret the relationship and identify the correct secondary ciphered
output.
In accordance with an embodiment of the present invention, the
secondary ciphered output is generated in response to user inputs selected
from any user input field(s), say, a username and password. The secondary
6
ciphered output is displayed on the user device in a format requiring the
user to select or input the secondary ciphered output derived from the first
ciphered output associated with the username or the password.
Additionally, the secondary ciphered outputs for the username and
5 password are presented either separately or in a combined format, such as
a text-color pair, symbol-number pair, or other relational representations,
requiring user identification or selection.
According to another aspect of the invention, there is provided a
method for generating and validating human-only interaction using dynamic
10 ciphered outputs. The method comprises generating, by a processing
module, a ciphered output dynamically based on at least one of userprovided input, system-defined variables, or constant variables selected
from date, time, day of the week or day number of the year or a publicly
known variable or combinations thereof. The processing module provides
15 the dynamically generated ciphered output to a user device for display,
along with multiple selectable options, which include the ciphered output
and one or more distractor options. The processing module receives a user
response corresponding to the ciphered output from the user device and
validates the user response by comparing it with the generated ciphered
20 output, where successful validation confirms human interaction.
In accordance with an embodiment of the present invention, the step of
generating the ciphered output includes formatting the output as at least one
of, but not limited to, alphanumeric text, symbols, color-coded tiles,
graphical elements, icons, or a combination thereof.
25 In accordance with an embodiment of the present invention, the
ciphered output is generated by combining user-provided input with systemdefined variables selected from current date, time, day of the week or day
number of the year or a publicly known variable or a dynamically generated
random value.
7
In accordance with an embodiment of the present invention, the
selectable options include distractor options that are contextually or visually
similar to the ciphered output but do not match the ciphered output, thereby
preventing recognition by automated systems.
5 In accordance with an embodiment of the present invention, the
method further comprises randomizing the display order of selectable
options and the presentation format of the ciphered output to prevent
automated systems from identifying patterns.
In accordance with an embodiment of the present invention, validating
10 the user response includes requiring the user to perform a specific action
selected from, but not limited to, selecting the correct output from displayed
options, typing the correct output into an input field, or matching the correct
output with a corresponding visual or textual reference.
In accordance with an embodiment of the present invention, the step of
15 providing the dynamically generated ciphered output includes displaying the
output within a dynamic grid format comprising rows and columns, wherein
the grid size or shape is determined based on the application or security
level of the challenge.
In accordance with an embodiment of the present invention, the
20 method further comprises generating a secondary ciphered output by
transforming a first ciphered output using a predefined transformation logic,
where the transformation logic applies at least one of, but not limited to,
substitution, mapping, encryption, or relational association. The method
includes presenting the secondary ciphered output to the user device for
25 further validation.
Additionally, the secondary ciphered output is generated in response
to user inputs selected from a username and password, and the secondary
ciphered output is presented in a format requiring the user to identify or input
8
the secondary ciphered output associated with the username or the
password.
Further, validating the secondary ciphered output includes receiving
the user response corresponding to the secondary ciphered output and
5 comparing the response with the dynamically generated secondary
ciphered output to confirm human interaction.
BRIEF DESCRIPTION OF THE DRAWINGS
So that how the above-recited features of the present invention can be
understood in detail, a more particular description of the invention, briefly
10 summarized above, may be had by reference to embodiments, some of
which are illustrated in the appended drawings. It is to be noted, however,
that the appended drawings illustrate only typical embodiments of this
invention and are therefore not to be considered limiting of its scope, the
invention may admit to other equally effective embodiments. These and
15 other features, benefits, and advantages of the present invention will
become apparent by reference to the following text figure, with like
reference numbers referring to like structures across the views, wherein:
Fig. 1 illustrates a system for generating and validating human-only
interaction using dynamic ciphered outputs, in accordance with an
20 embodiment of the present invention;
Fig. 2 illustrates a method for generating and validating human-only
interaction using dynamic ciphered outputs, in accordance with an
embodiment of the present invention; and
Figs. 3-27 illustrates exemplary scenarios of the implementation of the
25 system and method of Figure 1 and 2, in accordance with an embodiment
of the present invention.
DETAILED DESCRIPTION OF THE DRAWINGS
9
While the present invention is described herein by way of example
using embodiments and illustrative drawings, those skilled in the art will
recognize that the invention is not limited to the embodiments of drawing or
drawings described and is not intended to represent the scale of the various
5 components. Further, some components that may form a part of the
invention may not be illustrated in certain figures, for ease of illustration, and
such omissions do not limit the embodiments outlined in any way. It should
be understood that the drawings and detailed description thereto are not
intended to limit the invention to the particular form disclosed. Still, on the
10 contrary, the invention is to cover all modifications, equivalents, and
alternatives falling within the scope of the present invention as defined by
the appended claims. As used throughout this description, the word "may"
is used in a permissive sense (i.e., meaning having the potential to), rather
than the mandatory sense, (i.e., meaning must). Further, the words "a" or
15 "an" mean "at least one” and the word “plurality” means “one or more” unless
otherwise mentioned. Furthermore, the terminology and phraseology used
herein are solely used for descriptive purposes and should not be construed
as limiting in scope. Language such as "including," "comprising," "having,"
"containing," or "involving," and variations thereof, is intended to be broad
20 and encompass the subject matter listed after that, equivalents, and
additional subject matter not recited, and is not intended to exclude other
additives, components, integers or steps. Likewise, the term "comprising" is
considered synonymous with the terms "including" or "containing" for
applicable legal purposes. Any discussion of documents, acts, materials,
25 devices, articles, and the like is included in the specification solely to provide
a context for the present invention. It is not suggested or represented that
any or all of these matters form part of the prior art base or were common
general knowledge in the field relevant to the present invention.
In this disclosure, whenever a composition or an element or a group of
30 elements is preceded with the transitional phrase “comprising”, it is
10
understood that we also contemplate the same composition, element, or
group of elements with transitional phrases “consisting of”, “consisting”,
“selected from the group of consisting of, “including”, or “is” preceding the
recitation of the composition, element or group of elements and vice versa.
5 The present invention is described hereinafter by various embodiments
with reference to the accompanying drawing, wherein reference numerals
used in the accompanying drawing correspond to the like elements
throughout the description. This invention may, however, be embodied in
many different forms and should not be construed as limited to the
10 embodiment set forth herein. Rather, the embodiment is provided so that
this disclosure will be thorough and complete and will fully convey the scope
of the invention to those skilled in the art. In the following detailed
description, numeric values and ranges are provided for various aspects of
the implementations described. These values and ranges are to be treated
15 as examples only and are not intended to limit the scope of the claims. In
addition, a number of materials are identified as suitable for various facets
of the implementations. These materials are to be treated as exemplary and
are not intended to limit the scope of the invention.
The present invention generally provides a system and method
20 designed to ensure that online interactions are performed by human users,
rather than automated systems or bots. It introduces an innovative approach
to generating and validating challenges that are easy for humans to solve
but difficult for machines to interpret. Unlike conventional CAPTCHAs,
which often rely on distorted text, image recognition, or simple puzzles, this
25 invention dynamically generates ciphered outputs that are contextually
linked to user-provided inputs or system-defined variables, such as
usernames, passwords, dates, or times or any other user-input fields. These
outputs are presented in various formats, including text, symbols, numbers,
color tiles, and graphical elements, and require user actions such as
30 selection, typing, or matching to verify human interaction.
11
A key feature of the invention is its ability to introduce multi-step
validation through secondary ciphered outputs derived from initial outputs,
creating an additional layer of security that resists automated solving. By
randomizing the presentation of outputs and distractor options, the invention
5 ensures that no predictable patterns emerge for machine learning systems
to exploit. This system (100) is adaptable to various applications, including
secure logins, financial transactions, and general online interactions, while
prioritizing user experience by making the challenges intuitive, accessible,
and non-intrusive. The invention ultimately enhances cybersecurity,
10 protects user privacy, and ensures seamless verification for genuine human
users.
The present invention will now be explained in reference to the
accompanying drawings:
In the accompanying drawings, Fig. 1 illustrates a system (100) for
15 generating and validating human-only interaction using dynamic ciphered
outputs, in accordance with an embodiment of the present invention. The
system (100) comprises a user device (104) and a processing module (102),
interconnected via a communication network (110).
The user device (104) can be any computing device that enables users
20 to interact with the system (100), including but not limited to smartphones,
laptops, desktop computers, tablets, wearable devices, or embedded
systems. The user device (104) may include hardware components such as
a display unit, input interfaces (e.g., keyboard, touchscreen, or mouse),
communication interfaces (e.g., Wi-Fi, Bluetooth, or cellular connectivity
25 modules), and a processing unit for basic input/output operations.
The processing module (102) is the core hardware component of the
system (100) and acts as the central administrator for managing the
operations of the invention. The processing module (102) comprises at
least, a processor (1024). The processor (1024) may be a microprocessor,
12
microcontroller, application-specific integrated circuit (ASIC), or a fieldprogrammable gate array (FPGA), depending on the implementation
requirements. The processor (1024) performs all computation and logical
operations required to manage and validate the dynamic ciphered outputs.
5 Additionally, the processing module (102) includes a memory unit
(1022) operably connected with the processor (1024). The memory unit
(1022) may include random access memory (RAM), read-only memory
(ROM), or non-volatile storage devices such as solid-state drives (SSDs)
and hard disk drives (HDDs). The memory unit (1022) stores data, such as
10 system parameters, user data, ciphered output values, and other metadata
required for system operation.
Additionally, there may be a communication module (not shown)
disposed in the processing module(102). The communication module is
configured to enable the processing module (102) to connect to the network
15 (110) and exchange data with the user device (104). The communication
module may include hardware components for wired or wireless
communication, such as Ethernet ports, Wi-Fi modules, Bluetooth modules,
or cellular network interfaces (e.g., 4G/5G). Encryption hardware or
software can be integrated into the communication module to ensure secure
20 data transmission.
The network (110) provides connectivity between the user device (104)
and the processing module (102). The network may include wired
communication systems, such as Ethernet, or wireless communication
systems, such as Wi-Fi, cellular networks (e.g., 4G/5G), or satellite
25 communication systems. The network infrastructure facilitates reliable and
secure communication for system operation.
The processing module (102) may be implemented on various
platforms, including:
13
? Dedicated Hardware Servers: Configured with high-performance
processors, large-capacity memory, and communication interfaces to
manage large-scale deployments.
? Cloud-Based Infrastructure: Where the processing module is deployed on
5 virtual machines or containers hosted in public, private, or hybrid cloud
environments, ensuring scalability and availability.
? Edge Devices: Implemented on localized hardware close to the user device,
such as edge servers, gateways, or on-premise hardware solutions, to
reduce latency and improve response times.
10? Embedded Systems: Where the processing module is integrated within
specialized hardware for specific applications, such as IoT devices or
secure access terminals.
The processing module (102) may also be part of a distributed system,
where its operations are shared across multiple servers or nodes to provide
15 fault tolerance, load balancing, and scalability for large-scale applications.
Each hardware node in the distributed system can include its own
processor, memory unit, and communication module to facilitate
independent operations.
The system (100) may further include a data repository (108)
20 connected to the processing module (106) for storing and managing critical
data required for system operation. The data repository (108) may be
implemented as a local storage unit, such as a solid-state drive (SSD), hard
disk drive (HDD), or as part of a distributed database system. Alternatively,
it can reside in a cloud-based storage infrastructure or be integrated with
25 existing database systems like SQL databases, NoSQL databases (e.g.,
MongoDB, Cassandra), or in-memory data stores such as Redis or
Memcached to enable fast access to stored data.
14
The data repository (108) is used to store a variety of data, including
but not limited to:
? System Configuration Data: Parameters and settings for generating and
validating dynamic ciphered outputs.
5? User-Specific Data: Metadata associated with user inputs, such as
identifiers for usernames, passwords, or session tokens.
? Challenge Data: Generated ciphered outputs, distractor options, and
associated validation data for real-time comparisons.
? Audit Logs: Historical records of user interactions, responses, and
10 validations, which can be used for monitoring, auditing, and improving
system performance.
? Security Keys and Encryption Data: Cryptographic keys, hashing
parameters, or other security-related information required to ensure secure
storage and communication.
15 The data repository (108) may also support redundancy and fault
tolerance through data replication or backup mechanisms to ensure
reliability and availability. It can be implemented in a centralized or
distributed architecture, depending on the scalability and performance
requirements of the system. This allows the system to manage large
20 volumes of user interactions efficiently while maintaining robust data
integrity and security.
The user device (104), processing module (102), data repository (108)
and network (110) together form a versatile and scalable architecture that
can be implemented across a variety of platforms, including web
25 applications, mobile applications, and browser-based systems. The
system’s hardware design ensures compatibility with modern networked
environments while enabling efficient and secure operations.
15
Method of Operation:
The present invention provides a computer-implemented method (200)
for generating and validating human-only interaction using dynamic
ciphered outputs, as illustrated in FIG. 2. The method (200), outlined
5 through steps (202) to (208), ensures secure and human-only validation in
digital interactions by dynamically generating and validating outputs that are
resistant to automated systems.
Commencing with Step 202, the method (200) begins by generating,
by a processing module (102), a ciphered output dynamically. The
10 generation is based on at least one of the following inputs:
1. User-Provided Inputs: Data provided by the user, such as a username,
password, or other interaction-specific inputs or voice or file upload
based inputs through specific interaction interfaces.
2. System-Defined Variables: Values dynamically generated by the
15 system, such as random strings, numbers, or context-driven values.
3. Constant Variables: Predefined static inputs like current date, time, day
of the week or day number of the year or a publicly known variable or a
combination thereof.
The generated ciphered output may take various formats, including
20 alphanumeric text, symbols, numbers, color tiles, or graphical elements.
The dynamic generation ensures that the output is unique for each
interaction, making it resistant to machine learning or automated attacks.
In Step 204, the method (200) involves providing, by the processing
module (102), the dynamically generated ciphered output to a user device
25 (104) for display. The processing module (102) transmits the ciphered
output along with multiple selectable options, including the correct output
and distractor options. These distractor options are designed to appear
contextually valid or visually similar but do not match the correct ciphered
16
output. The display may include randomized presentation of options to
further prevent recognition by automated systems.
Next, in Step 206, the method (200) involves receiving, by the
processing module (102), a user response corresponding to the displayed
5 ciphered output. The user response can include ( but not limited to as
options ) :
1. Selecting the Correct Output from a list of options.
2. Typing the Correct Output into designated fields, such as an "Enter Number"
or "Enter Alpha" field.
103. Matching Outputs with visual or contextual references presented on the user
device.
4. Filling in the blanks of a defined alpha / numeric / alphanumeric string
The processing module (102) validates the user response by
comparing it with the dynamically generated ciphered output. In one
15 embodiment, the ciphered output is displayed in a grid format comprising
rows (X) and columns (Y), where the grid may be dynamically randomized
or truncated to enhance complexity.
In accordance with an embodiment of the present invention, the
method (200) may further comprise the generation of a secondary ciphered
20 output in addition to the first output. The secondary output is derived by
transforming the first output using predefined transformation logic, such as
substitution, mapping, encryption, or relational association. For instance, a
first output like "Green" may generate a secondary output "Circle" through
a predefined rule.
25 The secondary ciphered output can be tied to user inputs such as a
username and password. For example, the secondary output "Circle" may
get derived from the first output "Green," based on the username "JohnDoe"
and password "1234." The secondary ciphered output can be presented to
17
the user as a combined relational representation, such as a text-color pair
or symbol-number pair.
In another embodiment, the method (200) includes displaying the
secondary ciphered output in dynamic or structured formats, requiring the
5 user to perform multi-step validation. For instance, the user may be required
to match outputs across multiple fields or complete a challenge sequence.
Finally, in Step 208, the processing module (102) may further validate
the user response to enable execution of secure actions, such as
authenticating financial transactions, including cross-border transactions,
10 using one or more verification codes. In this embodiment, the validated
output serves as a mechanism for securing transactions or performing
sensitive operations.
The method (200) ensures that the generated ciphered outputs,
randomized presentation, and multi-step validation processes are
15 comprehensible to human users while remaining resistant to automated
systems. By dynamically generating and validating outputs based on user
inputs and system-defined parameters, the invention provides a robust and
scalable solution for securing human-only interactions.
The invention will be better understood with reference to the following
20 exemplary implementations, which illustrate various embodiments of the
system and method for generating and validating human-only interaction
using dynamic ciphered outputs. These implementations are described with
reference to Figures 3 to 27 and demonstrate the flexibility, adaptability, and
diversity of the invention across different use cases and user interaction
25 scenarios. It should be noted that these examples are merely illustrative and
are not exhaustive or restrictive in any way. The invention can be limitlessly
implemented in various other forms, formats, and embodiments as required
for specific applications, without deviating from the spirit and scope of the
invention.
18
Exemplary Implementations
In Figure 3, the system (100) generates a dynamic ciphered output, for
example, "Cray," based on user-provided input. This output is displayed
alongside the user’s input field, and the system (100) presents four options
5 below the user interaction area, where one option corresponds to the correct
output and the others are distractors. The user must select the correct
output "Cray" from the list, and only a human user can correctly interpret the
instructions and identify the correct choice, as automated systems (100)
lack the contextual understanding to do so.
10 In Figure 4, the system (100) introduces the use of system-defined
variables, such as the current time, to generate the output dynamically.
Here, the output "Colden" is displayed alongside the user’s input area or the
current time, and six options (not limited to six) are shown below for
selection. Only a correct choice will be accepted, and this implementation
15 enhances randomness and complexity by incorporating system (100)-
defined or constant variables.
In Figure 5, the system (100) requires the user to physically type the
dynamically generated ciphered output "Colden" into the designated input
field, rather than selecting it. The output is generated based on the user’s
20 input, current time, or their combination, and although six options are
displayed below, manual typing ensures an additional layer of validation that
cannot be easily replicated by automated systems (100).
Similarly, Figure 6 demonstrates a scenario where the output, for
example, "Saha," is displayed alongside the input area and is derived from
25 one or more input fields. The user must correctly type the output into the
input field, which ensures that the challenge remains human-only, as
automated systems (100) typically fail to process contextual instructions and
perform accurate typing tasks.
19
Figure 7 introduces a multi-field validation scenario where the user
must type two distinct outputs into separate fields labeled "Enter Number"
and "Enter Alpha." For instance, the dynamically generated outputs "155"
(a number) and "SAFE" (a word) are displayed, and the system (100)
5 requires the user to input "155" in the numeric field and "SAFE" in the
alphabetic field. This structured approach ensures validation of both number
and text-based inputs, adding further complexity that automated systems
(100) cannot handle.
In Figure 8, the system (100) implements a multi-step validation
10 process by generating a second ciphered output "Maharashtra," which is
derived from a first ciphered output "Cray." The user is presented with six
options and must identify the correct secondary output. This derived
validation introduces an additional layer of difficulty for automated systems
(100) while remaining simple and comprehensible for human users.
15 Figure 9 also involves the generation of a second ciphered output, such
as "Goa," derived from the first output. However, instead of selecting from
options, the user must manually type the second output into a designated
field. This ensures a higher degree of interaction, as the validation process
now includes both derivation and manual input.
20 In Figure 10, the system (100) generates another second-level
ciphered output, for example, "10," based on the first-level output. The user
is presented with six options and is required to select the correct output,
reinforcing the multi-step nature of the challenge.
Figure 11 illustrates a similar approach where the secondary ciphered
25 output, such as "4," is generated and displayed alongside the input area.
The user must type this value into the designated field, ensuring that the
challenge remains context-specific and resistant to automation.
20
In Figure 12, the system (100) generates a highlighted single output,
for example, "Albattani 1," derived as a secondary ciphered output. The user
is required to type the output into designated fields, ensuring structured
validation that adds complexity to the challenge.
5 Figure 13 further expands on the disjointed nature of outputs, where
the system (100) generates "Uttarakhand" and "32" as two distinct values
derived from a first output. The user must type these values into separate
fields labeled "Enter Alpha" and "Enter Number," respectively. This
embodiment highlights the system (100)’s ability to validate multi-part
10 inputs, adding yet another layer of complexity.
In Figure 14, the system (100) challenges the user to select the correct
color tile corresponding to the dynamically generated output, such as "Red,"
from a group of displayed tiles. The visual nature of this challenge ensures
that it remains human-recognizable but difficult for bots to interpret.
15 In Figure 15, the system (100) reverses the challenge by asking the
user to select the correct color name corresponding to a displayed color tile.
For example, a red tile may be displayed, and the user must select "Red"
from the provided options.
Figures 16 and 17 introduce challenges based on visual recognition of
20 animals or birds. In Figure 16, the system (100) displays a name such as
"Lion," and the user must select the correct animal or bird image from the
provided options. In Figure 17, the user is required to match the correct
animal or bird image with its corresponding name, demonstrating the
system’s (100) flexibility in handling visual and contextual challenges.
25 Figure 18 involves a more contextually rich challenge, where the
system (100) displays the name of a well-known landmark, such as one of
the Seven Wonders of the World, and asks the user to select the
corresponding photograph.
21
Similarly, in Figure 19, the system (100) generates a geometric
challenge where the user must select the correct shape, such as a "Circle,"
based on the name displayed alongside the input field.
Figure 20 introduces a challenge involving medallion types, such as
5 Platinum, Gold, Silver, or Bronze, where the user must select the correct
medallion option dynamically generated by the system (100).
Figures 21 and 22 involve selecting color shapes with text, numbers,
or graphics. In these scenarios, the system (100) may present combinations
of colors and specific text or numbers, requiring the user to identify the
10 correct option.
In Figure 23, the system (100) challenges the user to select the correct
photo of a "thing”, such as a cup, airplane, or key, dynamically generated
based on user input.
Figures 24 and 25 demonstrate structured grid-based challenges,
15 where the user must select or type values like "M" or "1" from dynamically
generated alphabet and number grids. The grids can be randomized,
truncated, or sequentially displayed to add complexity.
Figure 26 expands on this by requiring the user to select both a correct
color tile (e.g., "Purple") and a corresponding number from dynamic grids,
20 where options change on each interaction.
In Figure 27, the system (100) generates an incomplete sequence or
word and challenges the user to fill in the blanks. This completion-based
challenge may include strings, numbers, or graphical representations,
adding flexibility to the validation process.
25 These exemplary implementations demonstrate the invention’s ability
to dynamically generate and validate challenges using ciphered outputs
across diverse interaction types, including selection, typing, and matching.
22
By leveraging multi-step outputs, visual recognition, structured grids, and
context-based challenges, the system ensures robust human-only
validation while remaining resistant to automated systems. These examples
highlight the adaptability, scalability, and innovative nature of the invention,
5 while making it clear that the described embodiments are illustrative and not
restrictive.
The present invention offers several significant advantages, making it
highly effective for ensuring secure, time-based, stateless client-server
communication. Some of the key advantages include:
101. Enhanced Security Against Automated Systems: The invention dynamically
generates ciphered outputs that are resistant to machine learning and
automated bots, ensuring that only human users can successfully complete
the validation process.
2. Dynamic and Multi-Step Validation: By introducing multi-step validation
15 through secondary ciphered outputs derived from first-level outputs, the
invention significantly increases the complexity for automated systems while
maintaining ease of use for humans.
3. Flexibility in Input Formats and Challenges: The invention supports diverse
formats for ciphered outputs, including text, symbols, numbers, color tiles,
20 images, and graphical representations. Challenges may involve selection,
typing, matching, or completing sequences, making the system adaptable
to various scenarios.
4. Context-Aware Validation: Ciphered outputs can be generated based on
user inputs, system-defined variables, or constant values such as date and
25 time, ensuring dynamic and context-specific challenges that enhance
unpredictability.
23
5. Randomized Presentation: The invention incorporates randomized
presentation of options, including distractor elements, preventing
automated systems from identifying patterns and exploiting them.
6. Improved User Experience: The challenges are designed to be intuitive,
5 user-friendly, and accessible, ensuring ease of understanding and solving
for genuine human users while reducing frustration.
7. Multi-Field Validation Capability: The invention supports structured
validation across multiple input fields, such as numbers and alphabets,
enabling more robust verification of user responses.
108. Scalability and Adaptability: The system is highly scalable and can be
implemented across platforms such as web applications, mobile
applications, browser-based systems, cloud infrastructures, and embedded
systems.
9. Resistance to Replay Attacks: By dynamically generating unique ciphered
15 outputs for each interaction, the invention prevents replay attacks, ensuring
that previously generated outputs cannot be reused.
10.Human-Only Interaction: The invention ensures that the validation process
relies on human cognitive abilities, such as interpreting relationships,
recognizing visual elements, and performing logical operations that
20 automated systems cannot replicate reliably.
11.Customizable and Context-Specific Challenges: The system allows
customization of challenges based on specific application requirements,
user groups, or security levels. For example, simplified challenges can be
presented to children or elderly users, while complex multi-step validations
25 can be applied in high-security environments.
12.Support for Visual and Graphical Challenges: The invention leverages
visual recognition challenges, such as selecting animals, landmarks,
24
shapes, or colored elements, which are inherently resistant to automated
processing and provide diversity in validation methods.
13.Improved Transaction Security: The system can validate user interactions
for sensitive operations, such as cross-border financial transactions, by
5 incorporating additional verification layers through dynamic ciphered
outputs.
14.Fault Tolerance and Robustness: The system is designed to operate reliably
across various platforms and network environments, ensuring minimal
latency and fault tolerance during real-time user validation.
1015.Reduced Frustration and Accessibility for All Users: Unlike conventional
CAPTCHA systems that often frustrate users with overly complex tasks, the
present invention ensures an intuitive and seamless experience for users of
all skill levels, including accessibility for people with disabilities. Further, the
elements may be provided as an audio feedback for visually challenged to
15 know what the challenge is or the audio feedback for visually nonchallenged is itself a mechanism for defeating automated scripts or bots.
16.Versatile Deployment: The system can be deployed in various
environments, including centralized servers, distributed architectures, cloud
infrastructures, edge devices, and embedded systems, enabling wide
20 applicability.
17.Auditable and Transparent Operation: The invention supports the logging of
user interactions and responses, enabling auditing, monitoring, and
analysis for performance improvement and compliance purposes.
18.Prevention of Overlapping with Prior Art: By incorporating dynamic multi25 step validation, secondary outputs, and structured challenges, the invention
overcomes limitations of prior CAPTCHA technologies and offers a novel
approach to human verification.
25
These advantages collectively ensure that the present invention
provides a robust, user-friendly, and highly secure system for human-only
validation, addressing the shortcomings of existing CAPTCHA technologies
while being adaptable to diverse applications and platforms.
5 In general, the word “module,” as used herein, refers to logic embodied
in hardware or firmware, or to a collection of software instructions, written in
a programming language, such as, for example, python R, C, C#, Java, or
assembly. One or more software instructions in the modules may be
embedded in firmware, such as an EPROM. It will be appreciated that
10 modules may comprise connected logic units, such as gates and flip-flops,
and may comprise programmable units, such as programmable gate arrays
or processors. The modules described herein may be implemented as either
software and/or hardware modules and may be stored in any type of
computer-readable medium or other computer storage device.
15 Further, while one or more operations have been described as being
performed by or otherwise related to certain modules, devices, or entities,
the operations may be performed by or otherwise related to any module,
device, or entity. As such, any function or operation that has been described
as being performed by a module could alternatively be performed by a
20 different server, by the cloud computing platform, or a combination thereof.
Various modifications to these embodiments are apparent to those
skilled in the art from the description and the accompanying drawings. The
principles associated with the various embodiments described herein may
be applied to other embodiments. Therefore, the description is not intended
25 to be limited to the embodiments shown along with the accompanying
drawings but is to provide the broadest scope consistent with the principles
and the novel and inventive features disclosed or suggested herein.
Accordingly, the invention is anticipated to hold on to all other such
alternatives, modifications, and variations that fall within the scope of the
30 present invention and the appended claims. ,CLAIMS:We Claim
1. A system (100) for generating and validating human-only interaction
using dynamic ciphered outputs, the system (100) comprising:
a user device (104) associated with a user, the user device (104)
5 configured to display a CAPTCHA challenge and receive a user
response;
a processing module (102) operably connected with the user device
(104), the processing module (102) being configured to:
generate a ciphered output dynamically based on at least one of:
10 (i) user-provided input,
(ii) system (100)-defined variables, or
(iii) constant variables including date, time, day of the week or day
number of the year or a publicly known variable or combinations thereof;
provide the dynamically generated ciphered output to the user device
15 (104) for display, along with multiple selectable options, wherein the
selectable options include the ciphered output and one or more
distractor options;
receive a response from the user device (104) corresponding to the
ciphered output; and
20 validate the received response by comparing it with the generated
ciphered output, wherein successful validation confirms human
interaction;
wherein the selectable options are randomized in presentation to
prevent recognition by automated systems, and the ciphered output is
25 designed to be human-recognizable while resistant to automated
processing.
2. The system (100) as claimed in claim 1, wherein the ciphered output
comprises at least one of:
30 alphanumeric text,
symbols,
27
color-coded tiles,
graphical elements,
icons,
audio feedback or
5 a combination thereof.
3. The system (100) as claimed in claim 1, wherein the processing module
(102) generates the ciphered output based on user-provided input
combined with system (100)-defined variables, selected from date, time,
day of the week or day number of the year or a publicly known variable
10 or a dynamically generated random value.
4. The system (100) as claimed in claim 1, wherein the selectable options
include distractor options that are visually or contextually similar to the
ciphered output but do not match it, thereby preventing automated
systems from reliably identifying the correct option.
15 5. The system (100) as claimed in claim 1, wherein the processing module
(102) randomizes:
the display order of selectable options, and
the format or presentation of the ciphered output on the user device
(104).
20 6. The system (100) as claimed in claim 1, wherein the ciphered output
requires the user to perform a specific action selected from:
selecting the correct output from a list of options,
typing the correct output into an input field, or
matching the correct output with a visual or graphical reference.
25 7. The system (100) as claimed in claim 1, wherein the processing module
(102) generates the ciphered output in a dynamic grid format comprising
rows (X) and columns (Y), wherein the number of rows and columns are
determined based on the application or security level of the CAPTCHA
challenge.
28
8. The system (100) as claimed in claim 1, wherein the processing module
(102) generates a secondary ciphered output derived from a first
ciphered output, the generation comprising:
dynamically transforming the first ciphered output using a
5 predefined transformation logic, wherein the transformation logic
applies at least one of substitution, mapping, encryption, or relational
association; and
providing the secondary ciphered output to the user device (104) for
further validation, wherein the secondary ciphered output is contextually
10 linked to the user input, selected from a username or password, and
requires the user to:
select or input the secondary ciphered output from dynamically
displayed options, or
match the secondary ciphered output with associated visual or
15 textual elements displayed on the user device (104), thereby enabling
multi-step validation to prevent automated systems from recognizing or
solving the CAPTCHA challenge.
9. The system (100) as claimed in claim 8, wherein the secondary
ciphered output is generated by applying a transformation logic to the
20 first ciphered output, wherein the transformation logic comprises:
substituting one or more elements of the first ciphered output with
corresponding symbols, text, numbers, colors, or graphical
representations, or
mapping the first ciphered output to a predefined set of relational
25 outputs, such that only a human user can interpret the relationship and
identify the correct secondary ciphered output.
10.The system (100) as claimed in claim 8, wherein the secondary
ciphered output is generated in response to user inputs selected from a
username and password, and the secondary ciphered output is
30 displayed on the user device (104) in a format requiring the user to:
29
select or input the secondary ciphered output derived from the first
ciphered output associated with the username;
select or input the secondary ciphered output derived from the first
ciphered output associated with the password;
5 wherein the secondary ciphered outputs for the username and
password are presented either separately or in a combined format,
selected from a text-color pair, symbol-number pair, or other relational
representations, requiring user identification or selection.
10 11.A method (200) for generating and validating human-only interaction
using dynamic ciphered outputs, the method (200) comprising:
generating (202), by a processing module (102), a ciphered output
dynamically based on at least one of:
(i) user-provided input,
15 (ii) system (100)-defined variables, or
(iii) constant variables including date, time, day of the week or
day number of the year or a publicly known variable or combinations
thereof;
providing (204), by the processing module (102), the dynamically
20 generated ciphered output to a user device (104) for display, along with
multiple selectable options, wherein the selectable options include the
ciphered output and one or more distractor options;
receiving (206), by the processing module (102), a user response
corresponding to the ciphered output from the user device (104); and
25 validating (208), by the processing module (102), the user response
by comparing it with the generated ciphered output, wherein successful
validation confirms human interaction.
12.The method (200) as claimed in claim 11, wherein the step of generating
the ciphered output includes formatting the output as at least one of:
30 alphanumeric text,
symbols,
30
color-coded tiles,
graphical elements,
icons,
audio feedback or
5 a combination thereof.
13.The method (200) as claimed in claim 11, wherein the ciphered output
is generated by combining user-provided input with system (100)-
defined variables, selected from current date, time, day of the week or
day number of the year or a publicly known variable or a dynamically
10 generated random value.
14.The method (200) as claimed in claim 11, wherein the selectable options
include distractor options that are contextually or visually similar to the
ciphered output but do not match the ciphered output, thereby
preventing recognition by automated systems.
15 15.The method (200) as claimed in claim 11, further comprising:
randomizing the display order of selectable options and the
presentation format of the ciphered output to prevent automated
systems from identifying patterns.
16.The method (200) as claimed in claim 11, wherein validating the user
20 response includes requiring the user to perform a specific action
selected from:
selecting the correct output from displayed options,
typing the correct output into an input field, or
matching the correct output with a corresponding visual or textual
25 reference.
17.The method (200) as claimed in claim 11, wherein the step of providing
the dynamically generated ciphered output includes displaying the
output within a dynamic grid format comprising rows (X) and columns
(Y), wherein the grid size is determined based on the application or
30 security level of the challenge.
18.The method (200) as claimed in claim 11, further comprising:
31
generating a secondary ciphered output by transforming a first
ciphered output using a predefined transformation logic, wherein the
transformation logic applies at least one of substitution, mapping,
encryption, or relational association; and
5 presenting the secondary ciphered output to the user device (104)
for further validation.
19.The method (200) as claimed in claim 18, wherein the secondary
ciphered output is generated in response to user inputs, selected from
a username and password, and the secondary ciphered output is
10 presented in a format requiring the user to:
identify or input the secondary ciphered output associated with the
username,
identify or input the secondary ciphered output associated with the
password,
15 wherein the secondary ciphered outputs are displayed either separately
or as a combined relational representation, selected from a text-color
pair or symbol-number pair.
20.The method (200) as claimed in claim 18, wherein validating the
secondary ciphered output comprises:
20 receiving the user response corresponding to the secondary
ciphered output, and
comparing the response with the dynamically generated secondary
ciphered output to confirm human interaction.

Documents

Application Documents

# Name Date
1 202311086675-PROVISIONAL SPECIFICATION [19-12-2023(online)].pdf 2023-12-19
2 202311086675-FORM 1 [19-12-2023(online)].pdf 2023-12-19
3 202311086675-DRAWING [19-12-2024(online)].pdf 2024-12-19
4 202311086675-COMPLETE SPECIFICATION [19-12-2024(online)].pdf 2024-12-19
5 202311086675-Covering Letter [05-05-2025(online)].pdf 2025-05-05
6 202311086675-FORM-26 [29-05-2025(online)].pdf 2025-05-29