Abstract: Technology for securing a user's access to enterprise information through a natural language interface is disclosed. A system for securing access includes computer structures working in concert to identify the user's access permissions based on the initial request, collect further information from the user as required to update or further determine the user's permissions, and to choose a response communication channel appropriate to the user's request. A method for securing access includes receiving a request from a user, determining the user's access permissions, formulating a response based on the user's permissions, choosing the appropriate communication channel for the response, and initiating transmission of the response.
Abstract: A system for generating secure documents includes a station for generating a plain document and a security image generator that generates a security image. The security image is then incorporated into the plain document. Each security image consists of a plurality of secure elements, each secure element being defined by two sets of parallel lines. Each secure element defines an alphanumeric character or other unique image that is visible under certain conditions, i.e., when inspected through a viewer. The technique can also be used to provide security images on a web page as a means of indicating that the web page is genuine.