摘要 |
A computing device-implemented method includes providing a presentable visual challenge for determining if access should be granted. The visual challenge includes presenting obscured text wherein the manner in which the text is obscured changes over a period of time. The method also includes determining if a received response substantially matches the text to determine if access should be granted.
|