主权项 |
1. A method, comprising:
receiving, by a computing system from a user, a first request for accessing first specified functions executed by a specified software application; connecting, by said computing system, said specified software application to a computing apparatus; first executing, by said computing system in response to enabling a security manager software application, first security functions associated with said computing apparatus, wherein said first executing comprises:
presenting, by said computing system to said user, a request for submitting an age and occupation of said user;receiving, by said computing system from said user, data indicating said age and occupation of said user;temporarily blocking, by said computing system executing a security token, said user from accessing the Internet using said computing apparatus;presenting, by said computing system to said user, first specified questions associated with knowledge possessed by an individual that comprises a similar age and occupation to said age and occupation of said user;receiving, by said computing system from said user, answers to said specified questions;second determining, by said computing system, if said answers are associated with a first predetermined set of answers associated with said knowledge;determining, by said computing system, time periods between said presenting each of said first specified questions and said receiving each of said answers;determining, by said computing system, if any of said time periods exceed said predetermined time period; andgenerating, by said computing system, results of said comparing and results of said determining if any of said time periods exceed said predetermined time period; additionally determining, by said computing system, that said computing apparatus is located within a specified distance of additional computing apparatuses, wherein said specified distance comprises a distance allowing said user to physically access said additional computing apparatuses for accessing the Internet for retrieving said answers; second executing, by said computing system in response to said first executing and results of said additionally determining, second security functions associated with an Internet connection of said additional computing apparatuses; and first determining, by a processor of said computing system, if said user may access said first specified functions executed by said specified software application, wherein said first determining is based on results of said first executing and said second executing and said results of said comparing. |