US20080134287A1 - Method and system for user information verification - Google Patents

Method and system for user information verification Download PDF

Info

Publication number
US20080134287A1
US20080134287A1 US12/006,670 US667008A US2008134287A1 US 20080134287 A1 US20080134287 A1 US 20080134287A1 US 667008 A US667008 A US 667008A US 2008134287 A1 US2008134287 A1 US 2008134287A1
Authority
US
United States
Prior art keywords
user
information
age
request
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/006,670
Inventor
Gregory D. Gudorf
Brian M. Siegel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sony Corp
Sony Electronics Inc
Original Assignee
Sony Corp
Sony Electronics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Corp, Sony Electronics Inc filed Critical Sony Corp
Priority to US12/006,670 priority Critical patent/US20080134287A1/en
Publication of US20080134287A1 publication Critical patent/US20080134287A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Definitions

  • the present invention provides a system and method of authenticating a user. It includes receiving a request for information from a user and receiving personal information associated with the user which includes an address. A permission request is sent to the address, and the permission request includes a request for permission to provide information to the user. Permission is received, and information is sent to the user in response to the request for information.
  • Another aspect of the invention involves a system and method of authenticating the age of a user over a client/server network, wherein the server has content restricted to users older than a particular age.
  • the method includes: storing age data representative of the user's age on a client of the network; after the step of the storing, sending a request to the server for access to the content; receiving a request for the age data in response to the request for access to the content; providing the age data in response to the request for the age data; and gaining access or being denied access to the content dependant upon whether the age data indicates that the user is older than the particular age.
  • Yet another aspect of the invention is a system and method involving: receiving a request from the user for access to the content; receiving personal information regarding the user, the personal information including age data representative of the user's age and an e-mail address on the network; if the age data indicates that the user is older than the particular age, then sending an e-mail to the address indicating the request was received; and sending the content to the user if permission is received in response to the e-mail.
  • a further aspect of the invention associates and uses biometric information associated with the personal information.
  • FIG. 1 is a functional diagram of a system of an embodiment of the invention.
  • FIG. 2 is a functional diagram of a verification program, and its relationship to other components of the system, in accordance with an embodiment of the invention.
  • FIGS. 3A-3C are flowcharts of an embodiment of the invention.
  • FIG. 4 is biometric-enabled peripheral which may be used in accordance with an embodiment of the invention.
  • a system 50 in accordance with one embodiment of the invention comprises a network of computers such as end user personal computer 60 which communicates with web sites 70 - 72 via Internet 80 .
  • end user computer 60 is a general purpose computer having all the internal components normally found in a personal computer such as, for example, central processing unit 61 , display 62 , CD-ROM 63 , hard-drive 64 , mouse 65 , keyboard 66 , speakers 67 , microphone 68 , modem 69 and all of the components used for connecting these elements to one another.
  • End user computer 60 communicates with the Internet 60 via modem 69 .
  • End user computer 60 may comprise any device capable of processing instructions and transmitting data to and from humans and other computers, including but not limited to PDA's with wireless connectivity and Internet user terminals.
  • CPU 61 is shown as a single processor, the instructions may actually be distributed to a number of different components or processors for execution.
  • Web site 70 may reside on any server or other computer capable of connecting with other computers over a network, such as a web server connected to the Internet.
  • a program containing data and functions in accordance with the present invention is stored in end user computer 60 .
  • verification program 100 is stored on hard-drive 64 and executed by processor 61 .
  • personal information 110 includes user name 111 , password 112 , birth date 113 , user e-mail address 114 , parent e-mail address 115 and credit card information 116 . As explained in more detail below, all of this information is provided by the end user of computer 60 .
  • Verification program 100 also maintains and manipulates data which is not directly provided by the end user even though the values may depend upon events initiated by the user.
  • internal data 120 includes first time flag 121 , parent confirmation 122 and age cutoff 123 .
  • personal information 110 and internal data 120 are stored in encrypted form.
  • Functionality block 130 contains the routines and procedures which manipulate personal information 110 and internal data 120 . These procedures are discussed in more detail below in connection with the operation of the embodiment.
  • the verification program 100 preferably takes the form of an executable entity such as a JAVA applet.
  • a JAVA applet has the advantage of being executable by various processors on different computer platforms.
  • An applet is conducive to internet-related applications because, among other things, it can be conveniently distributed over the Internet to multiple classes of users.
  • the applet may also be preloaded on a computer before sale to the end user.
  • JAVA applets are also good vehicles for hiding or exposing data, functions and methods.
  • encapsulation also provides the advantage of maintaining the integrity of the data because the data contained in the verification program may only be modified by calling the functions and procedures of such program. This prevents outside programs or entities from making unauthorized or inadvertent changes to the data.
  • the verification program 100 and its data structures are opaque, meaning that external entities do not have knowledge of how data is stored within the verification program. This enables the verification program 100 to protect the sensitive data it contains, such as credit card information 116 .
  • Verification program 100 is also, preferably, a plug-in to internet browsers such as Microsoft Internet Explorer or Netscape Navigator. Accordingly, the verification program 100 , as is typical with plug-ins, begins execution upon receipt of information from the Internet which is identified (such as by file name extension) as being intended for the verification program.
  • end user computer 60 logs onto a web site 70 selling age-restricted content (action 310 ).
  • the web site may be a video retailer selling R-rated movies.
  • web site 70 transmits a file to end user computer 60 via internet 80 (action 312 ).
  • the file may have the extension “.VER” or the like to indicate that it is a file intended for use by a verification program in accordance with the present invention.
  • the file may contain only a single field, namely how old a person must be in order to view additional pages at web site 70 or to transact business with the web site.
  • verification program 100 is a JAVA applet functioning as a plug-in to the user's web browser, the verification program 100 will automatically launch in response to the arrival of the file (action 314 ).
  • functionality block 130 checks to see whether this is the first time the verification program has been executed since its installation (action 316 ). The program performs this check by calling the CheckFirstTime procedure upon launch of the program.
  • the CheckFirstTime procedure checks the boolean value stored in first time flag 121 of Internal Data 120 . If first time flag 121 is set to false, the program proceeds to action 326 . If first time flag 121 is set to its default value of true (the value assigned upon installation), the CheckFirstTime procedure calls the GetPersonalInfo procedure.
  • verification program 100 asks the end user to input some personal information.
  • the GetPersonalInfo procedure displays a form on monitor 62 which requests the end user's name, password, birth date, e-mail address, and, if any, credit card information (action 318 ).
  • This information is stored in personal information data 110 , namely user name 111 , password 112 , birth date 113 , user e-mail address 114 , and credit card info 116 respectively. Once stored, the information cannot be changed without the password.
  • the GetPersonalInfo procedure computes the user's age based upon their birth date and the current date (which is typically available on common operating systems) and compares that age against the age cutoff data 123 contained in internal data 120 of verification program 100 (action 320 ). If the end user is under the age cutoff, then the GetPersonalInfo procedure requests that the user input the e-mail address of the user's parent. Alternatively, if the e-mail address of the parent is preloaded on the computer, then this information may be automatically filled in. This information is stored in parent e-mail address 115 . The GetPersonalInfo procedure then sets first time flag 121 to false.
  • verification program 100 next transmits a file to web site 70 containing all of the data in personal information data 110 except credit card info 116 (action 330 ).
  • web site 70 determines whether the user is above or below the web site's age cutoff (action 332 ). If the user is above the site's age cutoff, i.e., the user is old enough, then the user is provided further access to the web site (action 332 ).
  • web site 70 will check its records based on the user name and determine whether this particular user has been to the site before (action 334 ). If it is the user's first visit to the site, then web site 70 will send an e-mail to the parent e-mail address 115 provided by verification program 100 (action 336 ). The e-mail will explain that the person having user name 111 has attempted to access content on web site 70 , that that content is restricted to users of a particular age, and will ask the parent to permit or deny further access to the web site. Confirmation or denial of permission may be provided in any number of ways.
  • permission may be granted by simply replying to the e-mail, and upon receipt of the e-mail the user name will be extracted from the e-mail so the web site's records can be updated.
  • the e-mail could contain a URL and a special code associated with the child's user name, and the parent must log onto the web site and provide the code in order to grant permission.
  • the user will be notified that: parental permission has been requested; further access to the web site 70 is temporarily denied; and the user should try again later after parental permission has been sent (action 340 ).
  • the site will know that the user has been to the site before (action 334 ) and will check if permission was received (action 338 ). If permission was not received, then web site 70 will repeat the action of transmitting an e-mail to the parent's address requesting permission for the child to access the web site (action 336 ). In addition, the user will again be directed to a web page stating that further access is denied until permission has been received (action 340 ).
  • the present invention has the further benefit of facilitating electronic commerce. If web site 70 is configured for electronic transactions, there will be no need for the user to key in his or her credit card information in order to complete a transaction. Rather, because web site 70 knows that the user has installed the verification program 100 , it will not provide the user with a form for filling in credit card information. Instead, as shown by action 333 of FIG. 3C , web site 70 will send a request to verification program 100 (located on end user computer 60 ) for credit card information 116 . In response to this request, functionality block 130 will call the PromptCreditDisc procedure. This procedure prompts the user for permission to disclose the credit card information stored in personal information data 110 .
  • PromptCrediDisc may request such permission is to display a dialog box on monitor 62 which lists the credit card info (such as the type of credit card, credit card number and expiration date) and provide the user with three choices: “Send”, “Don't Send”, and “Edit” (action 346 ). If the user clicks “Edit”, then the program will call the GetPersonalInfo procedure again and provide the user with an opportunity to change the credit information (action 348 ). After the information is edited, the user will be prompted with the same dialog box as before (action 346 ).
  • the credit card info such as the type of credit card, credit card number and expiration date
  • functionality block 130 will call the TransmitPersonalInfo procedure again, but this time credit card info 116 will be included with the information sent to web site 70 .
  • functionality block 130 will call the TransmitPersonalInfo procedure again, but this time it will send a code indicating that the user has refused to provide his or her credit information.
  • web site 70 Upon receipt of that notification, web site 70 will send the user to the site's standard web page containing a credit card entry form (action 352 ).
  • the present invention provides numerous advantages. It allows parents to restrict in the browsing habits of children without knowing in advance which sites the child is logging on to. Moreover, it allows parents to see what sort of web sites their children are visiting and permit (or deny) access to web sites before the child can proceed further. Indeed, the verification program may prevent the browser from browsing sites which do not support the aforementioned process. In addition, the invention alleviates the need for a user to constantly put in the same information over and over again. To the contrary, personal information is conveyed automatically and credit information is conveyed with a click of a single button.
  • the present invention has the further advantage of permitting any number of variations in its implementation.
  • verification program 100 may request personal information 110 as soon as the installation is complete (action 318 ) rather than waiting for the first time the program is executed (action 316 ). That way, the parent is ensured that the correct information (especially the user's birth date and parent's e-mail address) is being provided.
  • the verification program may also store a list of all web sites which asked the program for the user's personal information. Thus, even if the child terminated the process before an email was sent to the parent, the parent would be able to see a list of the age-restricted sites the child tried to access.
  • Age Cutoff Data 123 could be set by the parent rather than simply relying on a default value. Thus, a parent could adjust the cutoff age upward or downward to reflect the child's maturity.
  • the Age Cutoff Data 123 may also include more than a single numeric value.
  • the Age Cutoff Data may have different ages for different classes of information. For example, with respect to web sites that sell movies, the Age Cutoff Data is usually 13 years old for PG-13 rated movies and 17 years old for R-rated movies. However, some children may be ready to watch PG-13 rated movies at 11 years of age and R-rated movies at 15 years of age.
  • One manner of storing such information in Age Cutoff Data 123 would be to use an XML (Extended Markup Language) document that provides different ages for different classes. As long as both the verification program 100 and the web site 70 are using the same syntax for how the XML document is formatted, they can pass more than one age based on more than one criteria.
  • XML Extended Markup Language
  • the value contained in Age Cutoff Data 70 may be a string having the value “ ⁇ movies> ⁇ R-rated> 15 ⁇ /R-rated > ⁇ PG-13> 11 ⁇ /PG-13> ⁇ /movies>.”
  • This information would be sent to the web site in action 330 of FIG. 3B , so that the web site can compare the contents of the web page to be accessed (such as a web page allowing the purchase of R-rated movies) with the appropriate value of the XML document in the Age Cutoff Data (in this case, the age at which the user is permitted to buy R-Rated movies, i.e., 15 years old). Based on whether or not the age of the child exceeds that value, the child will either be allowed or prevented from purchasing the movie.
  • access is not based on age but, rather, some other personal characteristic which can be represented by a value.
  • the verification program may store XML information indicating that the user is not entitled to receive certain categories of content, such as violent movies regardless of the child's age, without parental permission. If so, step 312 would involve the web site transmitting a statement that the site contains violent content, step 330 would involve the verification program indicating that the user cannot review violent content without parental permission and the rest of the process would solicit and check for that permission.
  • the value of personal characteristic can accordingly be any type of value, be it numeric as in the case of age or true/false in the case of the ability to receive violent content (false could also be indicated by failing to mention the characteristic at all in the verification program).
  • each user of a particular end user computer 60 will have a separate set of personal information 110 .
  • the user will have to log in with his or her name and password when the browser is launched.
  • each person will have their own personal information, including birth date 113 .
  • birth date 113 an adult will be able to access age-restricted web sites without encountering the permission-gathering mechanisms confronted by a child.
  • each child will obtain access based on their own age.
  • the name of the web site and whether permission is granted may also be stored in parent confirmation data 122 .
  • the parent enters his or her confirmation directly into the verification program, which is stored in internal data 120 . This information is sent to web site 170 during action 334 . If the site determines (based on parent confirmation data 122 ) that permission has been granted, then the user will be permitted further access (action 342 ).
  • the end user computer 60 identifies the user and their associated personal information 110 based on their fingerprint or other biometric information.
  • mouse 410 contains an area 416 for reading the fingerprint of the person using the mouse.
  • the fingerprint information is used by functionality block 130 to match the personal information 110 with the person operating the mouse.
  • functionality block 130 will only send information about that person, and no one else, to the web sites 70 .
  • Fingerprint reader 416 may also be placed on other parts of the mouse such as buttons 412 or 414 .

Abstract

A system and method for authenticating users based on personal information. The personal information may include age-related data where the users are interested in receiving age-restricted content. The personal information may include an address and a permission request is sent to the address. Biometric information may also be associated with the personal information.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • The present application is a continuation of U.S. patent application Ser. No. 11/487,879 filed on Jul. 17, 2006 which is a continuation of U.S. patent application Ser. No. 09/805,555 filed on Mar. 13, 2001 which application claims the benefit of the U.S. Provisional Application No. 60/220,869 filed on Jul. 26, 2000, the disclosures of which are hereby incorporated herein by reference.
  • BACKGROUND OF INVENTION
  • Many people are concerned about a child's ability to receive inappropriate content over the Internet. For example, many web sites display or sell pictures and videos that may not be distributed to minors. Other web sites carry content that, although it may be legally displayed to minors, would still be considered objectionable to many parents.
  • To prevent unauthorized access, many web site providers have instituted individual mechanisms to ensure that its web site visitors are of a proper age. For example, many web sites request credit card and birth date information to verify the age of the end user. However, the lack of consistency among such web sites has disadvantaged both content providers and consumers alike. To the extent the web sites request the same information, users find themselves keying in the same information over and over again. To the extent the web sites request different information, the user is plagued with remembering which site requires a particular item of information or deciding whether to disclose such information.
  • Moreover, most of these sites are only interested in the visitor's age and are not concerned with whether a parent would or would not give their children permission to visit the site.
  • Accordingly, there is a need for a method and system which controls access to web sites by minors, promotes consistency without requiring entry of repetitive information, and which allows parents to participate in the process.
  • SUMMARY OF THE INVENTION
  • The present invention provides a system and method of authenticating a user. It includes receiving a request for information from a user and receiving personal information associated with the user which includes an address. A permission request is sent to the address, and the permission request includes a request for permission to provide information to the user. Permission is received, and information is sent to the user in response to the request for information.
  • Another aspect of the invention involves a system and method of authenticating the age of a user over a client/server network, wherein the server has content restricted to users older than a particular age. The method includes: storing age data representative of the user's age on a client of the network; after the step of the storing, sending a request to the server for access to the content; receiving a request for the age data in response to the request for access to the content; providing the age data in response to the request for the age data; and gaining access or being denied access to the content dependant upon whether the age data indicates that the user is older than the particular age.
  • Yet another aspect of the invention is a system and method involving: receiving a request from the user for access to the content; receiving personal information regarding the user, the personal information including age data representative of the user's age and an e-mail address on the network; if the age data indicates that the user is older than the particular age, then sending an e-mail to the address indicating the request was received; and sending the content to the user if permission is received in response to the e-mail.
  • A further aspect of the invention associates and uses biometric information associated with the personal information.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a functional diagram of a system of an embodiment of the invention.
  • FIG. 2 is a functional diagram of a verification program, and its relationship to other components of the system, in accordance with an embodiment of the invention.
  • FIGS. 3A-3C are flowcharts of an embodiment of the invention.
  • FIG. 4 is biometric-enabled peripheral which may be used in accordance with an embodiment of the invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • As shown in FIG. 1, a system 50 in accordance with one embodiment of the invention comprises a network of computers such as end user personal computer 60 which communicates with web sites 70-72 via Internet 80. Although only a few computers are depicted in FIG. 1, it should be appreciated that a typical system can include a large number of connected computers. Preferably, end user computer 60 is a general purpose computer having all the internal components normally found in a personal computer such as, for example, central processing unit 61, display 62, CD-ROM 63, hard-drive 64, mouse 65, keyboard 66, speakers 67, microphone 68, modem 69 and all of the components used for connecting these elements to one another. End user computer 60 communicates with the Internet 60 via modem 69. End user computer 60 may comprise any device capable of processing instructions and transmitting data to and from humans and other computers, including but not limited to PDA's with wireless connectivity and Internet user terminals. Although CPU 61 is shown as a single processor, the instructions may actually be distributed to a number of different components or processors for execution.
  • Web site 70 may reside on any server or other computer capable of connecting with other computers over a network, such as a web server connected to the Internet.
  • A program containing data and functions in accordance with the present invention is stored in end user computer 60. Specifically, verification program 100 is stored on hard-drive 64 and executed by processor 61.
  • As shown in FIG. 2, some of the data maintained and manipulated by verification program 100 includes personal information 110. Personal information 110 includes user name 111, password 112, birth date 113, user e-mail address 114, parent e-mail address 115 and credit card information 116. As explained in more detail below, all of this information is provided by the end user of computer 60.
  • Verification program 100 also maintains and manipulates data which is not directly provided by the end user even though the values may depend upon events initiated by the user. Specifically, internal data 120 includes first time flag 121, parent confirmation 122 and age cutoff 123. Preferably, personal information 110 and internal data 120 are stored in encrypted form.
  • Functionality block 130 contains the routines and procedures which manipulate personal information 110 and internal data 120. These procedures are discussed in more detail below in connection with the operation of the embodiment.
  • The verification program 100 preferably takes the form of an executable entity such as a JAVA applet. A JAVA applet has the advantage of being executable by various processors on different computer platforms. An applet is conducive to internet-related applications because, among other things, it can be conveniently distributed over the Internet to multiple classes of users. The applet may also be preloaded on a computer before sale to the end user. JAVA applets are also good vehicles for hiding or exposing data, functions and methods. When an executable JAVA applet is transmitted in object code form, it can encapsulate its data, i.e., the data contained in the verification program 100 cannot be accessed by external programs unless the program itself grants access to the data. Thus, encapsulation also provides the advantage of maintaining the integrity of the data because the data contained in the verification program may only be modified by calling the functions and procedures of such program. This prevents outside programs or entities from making unauthorized or inadvertent changes to the data. Moreover, the verification program 100 and its data structures are opaque, meaning that external entities do not have knowledge of how data is stored within the verification program. This enables the verification program 100 to protect the sensitive data it contains, such as credit card information 116.
  • Verification program 100 is also, preferably, a plug-in to internet browsers such as Microsoft Internet Explorer or Netscape Navigator. Accordingly, the verification program 100, as is typical with plug-ins, begins execution upon receipt of information from the Internet which is identified (such as by file name extension) as being intended for the verification program.
  • One possible operation of the foregoing embodiment is shown in the flow charts illustrated in FIGS. 3A-C. Initially, end user computer 60 logs onto a web site 70 selling age-restricted content (action 310). For example, the web site may be a video retailer selling R-rated movies. In response to receiving a new visitor, web site 70 transmits a file to end user computer 60 via internet 80 (action 312). The file may have the extension “.VER” or the like to indicate that it is a file intended for use by a verification program in accordance with the present invention. The file may contain only a single field, namely how old a person must be in order to view additional pages at web site 70 or to transact business with the web site.
  • Because verification program 100 is a JAVA applet functioning as a plug-in to the user's web browser, the verification program 100 will automatically launch in response to the arrival of the file (action 314). Upon activation of the verification program, functionality block 130 checks to see whether this is the first time the verification program has been executed since its installation (action 316). The program performs this check by calling the CheckFirstTime procedure upon launch of the program. The CheckFirstTime procedure checks the boolean value stored in first time flag 121 of Internal Data 120. If first time flag 121 is set to false, the program proceeds to action 326. If first time flag 121 is set to its default value of true (the value assigned upon installation), the CheckFirstTime procedure calls the GetPersonalInfo procedure.
  • If the verification program 100 is being executed for the first time, then verification program 100 asks the end user to input some personal information. Specifically, the GetPersonalInfo procedure displays a form on monitor 62 which requests the end user's name, password, birth date, e-mail address, and, if any, credit card information (action 318). This information is stored in personal information data 110, namely user name 111, password 112, birth date 113, user e-mail address 114, and credit card info 116 respectively. Once stored, the information cannot be changed without the password.
  • Once this information is entered, the GetPersonalInfo procedure computes the user's age based upon their birth date and the current date (which is typically available on common operating systems) and compares that age against the age cutoff data 123 contained in internal data 120 of verification program 100 (action 320). If the end user is under the age cutoff, then the GetPersonalInfo procedure requests that the user input the e-mail address of the user's parent. Alternatively, if the e-mail address of the parent is preloaded on the computer, then this information may be automatically filled in. This information is stored in parent e-mail address 115. The GetPersonalInfo procedure then sets first time flag 121 to false.
  • As shown in FIG. 3B, verification program 100 next transmits a file to web site 70 containing all of the data in personal information data 110 except credit card info 116 (action 330).
  • Based on the birth date transmitted by verification program 100, web site 70 determines whether the user is above or below the web site's age cutoff (action 332). If the user is above the site's age cutoff, i.e., the user is old enough, then the user is provided further access to the web site (action 332).
  • On the other hand, if the user's age is below the age cutoff, then web site 70 will check its records based on the user name and determine whether this particular user has been to the site before (action 334). If it is the user's first visit to the site, then web site 70 will send an e-mail to the parent e-mail address 115 provided by verification program 100 (action 336). The e-mail will explain that the person having user name 111 has attempted to access content on web site 70, that that content is restricted to users of a particular age, and will ask the parent to permit or deny further access to the web site. Confirmation or denial of permission may be provided in any number of ways. By way of example only, permission may be granted by simply replying to the e-mail, and upon receipt of the e-mail the user name will be extracted from the e-mail so the web site's records can be updated. Alternatively, the e-mail could contain a URL and a special code associated with the child's user name, and the parent must log onto the web site and provide the code in order to grant permission. Regardless of the method of permission confirmation, after the e-mail is sent to the parent's e-mail address, the user will be notified that: parental permission has been requested; further access to the web site 70 is temporarily denied; and the user should try again later after parental permission has been sent (action 340).
  • The next time the user accesses the site, the site will know that the user has been to the site before (action 334) and will check if permission was received (action 338). If permission was not received, then web site 70 will repeat the action of transmitting an e-mail to the parent's address requesting permission for the child to access the web site (action 336). In addition, the user will again be directed to a web page stating that further access is denied until permission has been received (action 340).
  • If permission was received, then further access will be provided to the web site (action 342).
  • The present invention has the further benefit of facilitating electronic commerce. If web site 70 is configured for electronic transactions, there will be no need for the user to key in his or her credit card information in order to complete a transaction. Rather, because web site 70 knows that the user has installed the verification program 100, it will not provide the user with a form for filling in credit card information. Instead, as shown by action 333 of FIG. 3C, web site 70 will send a request to verification program 100 (located on end user computer 60) for credit card information 116. In response to this request, functionality block 130 will call the PromptCreditDisc procedure. This procedure prompts the user for permission to disclose the credit card information stored in personal information data 110. One manner in which PromptCrediDisc may request such permission is to display a dialog box on monitor 62 which lists the credit card info (such as the type of credit card, credit card number and expiration date) and provide the user with three choices: “Send”, “Don't Send”, and “Edit” (action 346). If the user clicks “Edit”, then the program will call the GetPersonalInfo procedure again and provide the user with an opportunity to change the credit information (action 348). After the information is edited, the user will be prompted with the same dialog box as before (action 346).
  • If the user clicks “Send”, then functionality block 130 will call the TransmitPersonalInfo procedure again, but this time credit card info 116 will be included with the information sent to web site 70.
  • If the user clicks “Don't Send,” then functionality block 130 will call the TransmitPersonalInfo procedure again, but this time it will send a code indicating that the user has refused to provide his or her credit information. Upon receipt of that notification, web site 70 will send the user to the site's standard web page containing a credit card entry form (action 352).
  • The present invention provides numerous advantages. It allows parents to restrict in the browsing habits of children without knowing in advance which sites the child is logging on to. Moreover, it allows parents to see what sort of web sites their children are visiting and permit (or deny) access to web sites before the child can proceed further. Indeed, the verification program may prevent the browser from browsing sites which do not support the aforementioned process. In addition, the invention alleviates the need for a user to constantly put in the same information over and over again. To the contrary, personal information is conveyed automatically and credit information is conveyed with a click of a single button.
  • The present invention has the further advantage of permitting any number of variations in its implementation. For example, because the program is likely to be installed by a parent on a family computer, verification program 100 may request personal information 110 as soon as the installation is complete (action 318) rather than waiting for the first time the program is executed (action 316). That way, the parent is ensured that the correct information (especially the user's birth date and parent's e-mail address) is being provided. The verification program may also store a list of all web sites which asked the program for the user's personal information. Thus, even if the child terminated the process before an email was sent to the parent, the parent would be able to see a list of the age-restricted sites the child tried to access.
  • In addition, Age Cutoff Data 123 could be set by the parent rather than simply relying on a default value. Thus, a parent could adjust the cutoff age upward or downward to reflect the child's maturity.
  • The Age Cutoff Data 123 may also include more than a single numeric value. The Age Cutoff Data may have different ages for different classes of information. For example, with respect to web sites that sell movies, the Age Cutoff Data is usually 13 years old for PG-13 rated movies and 17 years old for R-rated movies. However, some children may be ready to watch PG-13 rated movies at 11 years of age and R-rated movies at 15 years of age. One manner of storing such information in Age Cutoff Data 123 would be to use an XML (Extended Markup Language) document that provides different ages for different classes. As long as both the verification program 100 and the web site 70 are using the same syntax for how the XML document is formatted, they can pass more than one age based on more than one criteria. Using the foregoing example, the value contained in Age Cutoff Data 70 may be a string having the value “<movies> <R-rated> 15 </R-rated > <PG-13> 11 </PG-13> </movies>.” This information would be sent to the web site in action 330 of FIG. 3B, so that the web site can compare the contents of the web page to be accessed (such as a web page allowing the purchase of R-rated movies) with the appropriate value of the XML document in the Age Cutoff Data (in this case, the age at which the user is permitted to buy R-Rated movies, i.e., 15 years old). Based on whether or not the age of the child exceeds that value, the child will either be allowed or prevented from purchasing the movie.
  • In yet another aspect of the invention, access is not based on age but, rather, some other personal characteristic which can be represented by a value. For example, the verification program may store XML information indicating that the user is not entitled to receive certain categories of content, such as violent movies regardless of the child's age, without parental permission. If so, step 312 would involve the web site transmitting a statement that the site contains violent content, step 330 would involve the verification program indicating that the user cannot review violent content without parental permission and the rest of the process would solicit and check for that permission. The value of personal characteristic can accordingly be any type of value, be it numeric as in the case of age or true/false in the case of the ability to receive violent content (false could also be indicated by failing to mention the characteristic at all in the verification program).
  • In another embodiment of the present invention, each user of a particular end user computer 60 will have a separate set of personal information 110. In such a case, the user will have to log in with his or her name and password when the browser is launched. The advantage of such a system in that each person will have their own personal information, including birth date 113. Thus, an adult will be able to access age-restricted web sites without encountering the permission-gathering mechanisms confronted by a child. Moreover, because different children typically have different ages, each child will obtain access based on their own age.
  • Instead of each web site maintaining its own log of parental permissions, the name of the web site and whether permission is granted may also be stored in parent confirmation data 122. In this embodiment, the parent enters his or her confirmation directly into the verification program, which is stored in internal data 120. This information is sent to web site 170 during action 334. If the site determines (based on parent confirmation data 122) that permission has been granted, then the user will be permitted further access (action 342).
  • Preferably, rather than having each user input a user name and password, the end user computer 60 identifies the user and their associated personal information 110 based on their fingerprint or other biometric information. As shown in FIG. 4, mouse 410 contains an area 416 for reading the fingerprint of the person using the mouse. The fingerprint information is used by functionality block 130 to match the personal information 110 with the person operating the mouse. Thus, functionality block 130 will only send information about that person, and no one else, to the web sites 70. The advantage of using such a device is both security, i.e. preventing a child from pretending to be an adult, and ease of use, i.e. the user does not have to input their name and password. Fingerprint reader 416 may also be placed on other parts of the mouse such as buttons 412 or 414.
  • Unless stated to the contrary, use of the word “included” herein or any variation thereof, means “including without limitation” and shall not be construed to limit any general statement that it follows to the specific or similar items or matters immediately following it.
  • Most of the foregoing alternative embodiments are not mutually exclusive, but may be implemented in various combinations to achieve unique advantages. As these and other variations and combinations of the features discussed above can be utilized without departing from the invention as defined by the claims, the foregoing description of the embodiments should be taken by way of illustration rather than by way of limitation of the invention as defined by the claims.

Claims (21)

1. A method of authenticating a user comprising:
receiving a request for information from a user of a processing device,
receiving with at least one processor, personal information associated with said user, said personal information including an address and age information, the personal information having been pre-stored in the processing device of the user for use in multiple authentications, wherein the age information includes a period of time or date that is a function of the user's age;
sending a permission request to said address, said permission request including a request for permission to provide information to said user,
receiving permission in response to said permission request, and
sending information to said user of the processing device in response to said request for information,
whereby an authentication is performed.
2. The method of claim 1 wherein said age information includes data representative of said user's date of birth.
3. The method of claim 1 wherein said personal information includes a user name.
4. The method of claim 1 wherein said personal information includes a category of information which said user is entitled to receive.
5. The method of claim 1 wherein said address comprises an e-mail address.
6. The method of claim 5 wherein said address is not the e-mail address of said user.
7. The method of claim 6 wherein said user is a child and said e-mail address is the child's parent's e-mail address.
8. The method of claim 1 wherein said personal information includes credit card information.
9. The method of claim 8 further comprising the steps of sending said credit card information back to said user and requesting verification of the accuracy of said credit card information.
10. The method of claim 8 further comprising prompting said user to provide credit card information if said user does not verify the accuracy of said credit card information.
11. The method of claim 8 wherein said user has the option of not including said credit card information in the personal information received during said step of receiving said personal information.
12. The method of claim 11 further comprising prompting said user to provide credit card information if said user opted not to include said credit card information in the personal information received during said step of receiving said personal information.
13. The method of claim 1 wherein said information is restricted to users based on a cut-off value, and further comprising the step of comparing the age information with said cut-off value.
14. A method of authenticating the age of a user over a client/server network wherein said server has content restricted to users older than a particular age, said method comprising the steps of said client:
storing age data representative of said user's age on a client of said network for use in multiple authentications,
after said step of said storing, sending a request to said server for access to said content,
receiving a request for said age data in response to the request for access to said content,
automatically providing the stored age data in response to said request for said age data,
gaining access or being denied access to said content dependant upon whether said age data indicates that said user is older than said particular age,
wherein the age data are data other than a credit card.
15. The method of claim 14 wherein said steps are executed on a processor in a computer operated by said user.
16. The method of claim 14 further comprising maintaining a log of each request for content.
17. A method of authenticating a user over a client/server network wherein said server has content restricted to users older than a particular age, said method comprising the steps of said server:
receiving a request for access to said content from the user of a client of the network,
receiving pre-stored personal information regarding said user, said pre-stored personal information including age data representative of said user's age and an e-mail address on said network, the pre-stored personal information being previously stored with the client of the network for use in multiple authentications,
if said age data indicates that said user is older than said particular age, then sending an e-mail to said address indicating said request was received,
sending said content to said user if a permission response is received in response to said e-mail,
wherein the age data includes a period of time or date that is a function of the user's age.
18. A system of authenticating a user comprising:
a processor,
a set of instructions executable by said processor, said instructions controlling said processor to perform: receiving a request for information from a user of a remote processing device, the remote processing device having access to pre-stored user information associated with said user, said pre-stored user information including an address and age data; receiving the pre-stored user information associated with said user; sending a permission request to said address to authenticate the user, said permission request including a request for permission to provide information to said user; receiving permission in response to said permission request; and sending information to said user of the remote processing device in response to said request for information,
wherein the age data is information other than a credit card.
19. The system of claim 18 wherein said processor and instructions are contained in web server.
20. The system of claim 19 wherein said set of instructions is a JAVA applet.
21. A method of authenticating a user comprising:
receiving a request for information from a user of a processing device,
receiving with at least one processor, personal information associated with said user, said personal information including an address and age data, the personal information having been pre-stored by the processing device of the user for use in multiple authentications;
sending a permission request to said address to authenticate the user, said permission request including a request for permission to provide information to said user,
receiving permission in response to said permission request, and
sending information to said user of the processing device in response to said request for information,
wherein the age data represents information other than a credit card.
US12/006,670 2000-07-26 2008-01-04 Method and system for user information verification Abandoned US20080134287A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/006,670 US20080134287A1 (en) 2000-07-26 2008-01-04 Method and system for user information verification

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US22086900P 2000-07-26 2000-07-26
US09/805,555 US7140045B2 (en) 2000-07-26 2001-03-13 Method and system for user information verification
US11/487,879 US7373671B2 (en) 2000-07-26 2006-07-17 Method and system for user information verification
US12/006,670 US20080134287A1 (en) 2000-07-26 2008-01-04 Method and system for user information verification

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/487,879 Continuation US7373671B2 (en) 2000-07-26 2006-07-17 Method and system for user information verification

Publications (1)

Publication Number Publication Date
US20080134287A1 true US20080134287A1 (en) 2008-06-05

Family

ID=26915260

Family Applications (4)

Application Number Title Priority Date Filing Date
US09/805,555 Expired - Fee Related US7140045B2 (en) 2000-07-26 2001-03-13 Method and system for user information verification
US11/487,879 Expired - Fee Related US7373671B2 (en) 2000-07-26 2006-07-17 Method and system for user information verification
US11/540,231 Expired - Fee Related US8037316B2 (en) 2000-07-26 2006-09-28 Method and system for user information verification
US12/006,670 Abandoned US20080134287A1 (en) 2000-07-26 2008-01-04 Method and system for user information verification

Family Applications Before (3)

Application Number Title Priority Date Filing Date
US09/805,555 Expired - Fee Related US7140045B2 (en) 2000-07-26 2001-03-13 Method and system for user information verification
US11/487,879 Expired - Fee Related US7373671B2 (en) 2000-07-26 2006-07-17 Method and system for user information verification
US11/540,231 Expired - Fee Related US8037316B2 (en) 2000-07-26 2006-09-28 Method and system for user information verification

Country Status (1)

Country Link
US (4) US7140045B2 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050177844A1 (en) * 2004-01-07 2005-08-11 Ron Levi Managed affiliate system and method
US20070033295A1 (en) * 2004-10-25 2007-02-08 Apple Computer, Inc. Host configured for interoperation with coupled portable media player device
US20070166683A1 (en) * 2006-01-05 2007-07-19 Apple Computer, Inc. Dynamic lyrics display for portable media devices
US20070273714A1 (en) * 2006-05-23 2007-11-29 Apple Computer, Inc. Portable media device with power-managed display
US7729791B2 (en) 2006-09-11 2010-06-01 Apple Inc. Portable media playback device including user interface event passthrough to non-media-playback processing
US7831199B2 (en) * 2006-01-03 2010-11-09 Apple Inc. Media data exchange, transfer or delivery for portable electronic devices
US7848527B2 (en) 2006-02-27 2010-12-07 Apple Inc. Dynamic power management in a portable media delivery system
US7856564B2 (en) 2005-01-07 2010-12-21 Apple Inc. Techniques for preserving media play mode information on media devices during power cycling
US8044795B2 (en) 2007-02-28 2011-10-25 Apple Inc. Event recorder for portable media device
US8090130B2 (en) 2006-09-11 2012-01-03 Apple Inc. Highly portable media devices
US8151259B2 (en) 2006-01-03 2012-04-03 Apple Inc. Remote content updates for portable media devices
US8255640B2 (en) 2006-01-03 2012-08-28 Apple Inc. Media device with intelligent cache utilization
US8300841B2 (en) 2005-06-03 2012-10-30 Apple Inc. Techniques for presenting sound effects on a portable media player
US8341524B2 (en) 2006-09-11 2012-12-25 Apple Inc. Portable electronic device with local search capabilities
US8396948B2 (en) 2005-10-19 2013-03-12 Apple Inc. Remotely configured media device
US9747248B2 (en) 2006-06-20 2017-08-29 Apple Inc. Wireless communication system

Families Citing this family (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002056139A2 (en) * 2000-10-26 2002-07-18 Digimarc Corporation Method and system for internet access
US7925703B2 (en) * 2000-12-26 2011-04-12 Numedeon, Inc. Graphical interactive interface for immersive online communities
US7571466B2 (en) * 2001-02-23 2009-08-04 Microsoft Corporation Parental consent service
US20060253784A1 (en) * 2001-05-03 2006-11-09 Bower James M Multi-tiered safety control system and methods for online communities
SE521037C2 (en) * 2001-09-18 2003-09-23 Bluegrid Ab Method, systems and computer programs for electronic identification
US7305442B1 (en) * 2001-10-12 2007-12-04 Sprint Spectrum L.P. Asynchronous user-authorized advertising
US20030212582A1 (en) * 2002-05-13 2003-11-13 Taschner Dana B. Automated consumer claim evaluation and networked database system, with automated electronic consumer contracting of meritorious legal claims and automated consumer rejection and malpractice avoidance system for non-meritorious legal claims
US7325140B2 (en) * 2003-06-13 2008-01-29 Engedi Technologies, Inc. Secure management access control for computers, embedded and card embodiment
AU2003276819A1 (en) 2002-06-13 2003-12-31 Engedi Technologies, Inc. Out-of-band remote management station
US20070239614A1 (en) * 2002-07-10 2007-10-11 Union Beach, L.P. System and method for the storage of data in association with financial accounts
DE60325644D1 (en) * 2002-12-30 2009-02-12 Koninkl Philips Electronics Nv USER ACCESS CONTROL TO SERVER CONTAINING AN INFORMATION PACKER
US8582764B2 (en) 2003-03-24 2013-11-12 The Western Union Company Device and method for concealing customer information from a customer service representative
US7444518B1 (en) * 2003-06-16 2008-10-28 Microsoft Corporation Method and apparatus for communicating authorization data
KR100539547B1 (en) * 2003-08-20 2005-12-29 엘지전자 주식회사 System and Control Method for Assent Internet Connection
US7519826B2 (en) * 2003-10-01 2009-04-14 Engedi Technologies, Inc. Near real-time multi-party task authorization access control
US6959861B1 (en) * 2003-12-02 2005-11-01 Metro Innovations, Inc. Method of age verification for electronic media
US8391677B2 (en) * 2004-01-09 2013-03-05 Panasonic Corporation Recording medium, reproduction device, program, reproduction method
DE102004014437A1 (en) * 2004-03-24 2005-11-10 Siemens Ag A method of enabling a service and / or retrieving content from an application server of a content / service provider over a telecommunications network
US7467401B2 (en) * 2004-08-12 2008-12-16 Avatier Corporation User authentication without prior user enrollment
US20060053297A1 (en) * 2004-09-03 2006-03-09 Huang Chien C System and method for protecting equipment data
WO2006067543A1 (en) * 2004-12-23 2006-06-29 Nokia Corporation Content control
GB0503972D0 (en) * 2005-02-25 2005-04-06 Firstondemand Ltd Identification systems
US20080307339A1 (en) * 2006-03-20 2008-12-11 Kidzui, Inc. Child-oriented computing system
US7464219B2 (en) * 2005-08-01 2008-12-09 International Business Machines Corporation Apparatus, system, and storage medium for data protection by a storage device
US7734779B1 (en) * 2005-08-25 2010-06-08 Gregory Alexander Piccionelli Password protection system and method
US7924989B1 (en) 2005-10-14 2011-04-12 Aol Inc. Intelligent link telephone communications
US7941835B2 (en) 2006-01-13 2011-05-10 Authenticor Identity Protection Services, Inc. Multi-mode credential authorization
US8131763B2 (en) * 2006-05-03 2012-03-06 Cellco Partnership Age verification and content filtering systems and methods
EP1860659A1 (en) * 2006-05-22 2007-11-28 Deutsche Thomson-Brandt Gmbh Method, apparatus, and recording medium for recording multimedia content
US8434133B2 (en) * 2006-10-06 2013-04-30 Fmr Llc Single-party, secure multi-channel authentication
US8671444B2 (en) * 2006-10-06 2014-03-11 Fmr Llc Single-party, secure multi-channel authentication for access to a resource
US8474028B2 (en) * 2006-10-06 2013-06-25 Fmr Llc Multi-party, secure multi-channel authentication
US20080104128A1 (en) * 2006-10-24 2008-05-01 Drayer Jay A system and method for secure, anonymous, and pertinent reposting of private blog posting, etc.
US20080115192A1 (en) * 2006-11-07 2008-05-15 Rajandra Laxman Kulkarni Customizable authentication for service provisioning
US8145573B2 (en) * 2007-10-17 2012-03-27 Bank Of America Corporation Conducting financial transactions
US20090133034A1 (en) * 2007-11-15 2009-05-21 Microsoft Corporation Screened participant class notification for public networks
US20090144824A1 (en) * 2007-12-03 2009-06-04 Mr. Jeffrey L. Rinek Integrated Protection Service Configured to Protect Minors
JP5145914B2 (en) * 2007-12-14 2013-02-20 ソニー株式会社 Content viewing management apparatus, content viewing management method, program, and content viewing management system
US8443106B2 (en) 2007-12-21 2013-05-14 Gary Stephen Shuster Content restriction compliance using reverse DNS lookup
US20090173786A1 (en) * 2008-01-07 2009-07-09 Turtle Pond Publications Coppa-compliant web services
US20090183259A1 (en) * 2008-01-11 2009-07-16 Rinek Jeffrey L Integrated Protection Service System Defining Risk Profiles for Minors
US8868741B2 (en) 2008-03-03 2014-10-21 Leapfrog Enterprises, Inc. Method and apparatus for custodial monitoring, filtering, and approving of content
US20090228581A1 (en) * 2008-03-06 2009-09-10 Cairn Associates, Inc. System and Method for Enabling Virtual Playdates between Children
US20100005022A1 (en) * 2008-07-02 2010-01-07 Automated Equity Finance Markets, Inc. Hierarchical trading accounts for clearing and non-clearing members
US20100058440A1 (en) * 2008-08-27 2010-03-04 Yahoo! Inc. Interaction with desktop and online corpus
US8509944B1 (en) 2008-10-20 2013-08-13 Hold It Right There, Inc. Self-storage kiosk
US20100146109A1 (en) * 2008-12-05 2010-06-10 Electronics And Telecommunications Research Institute System and method for network virtualization
US20100162342A1 (en) * 2008-12-22 2010-06-24 At&T Intellectual Property I, L.P. Parental controls for multiple devices
US9449195B2 (en) * 2009-01-23 2016-09-20 Avow Networks Incorporated Method and apparatus to perform online credential reporting
US20110047265A1 (en) * 2009-08-23 2011-02-24 Parental Options Computer Implemented Method for Identifying Risk Levels for Minors
CA2772396A1 (en) * 2009-09-03 2011-03-10 Virtual Piggy, Inc. System and method for verifying the age of an internet user
US8812395B2 (en) 2009-09-03 2014-08-19 Virtual Piggy, Inc. System and method for virtual piggybank
EP2473943A2 (en) * 2009-09-03 2012-07-11 Virtual Piggy, Inc. Parent match
EP2473962A4 (en) * 2009-09-03 2013-05-22 Virtual Piggy Inc System and method for virtual piggy bank
US8424069B2 (en) * 2009-11-20 2013-04-16 Disney Enterprises, Inc. Method and system for authenticating subaccount users
US8762230B2 (en) 2011-11-02 2014-06-24 Virtual Piggy, Inc. System and method for virtual piggy bank wish-list
US9760785B2 (en) 2013-05-08 2017-09-12 Jpmorgan Chase Bank, N.A. Systems and methods for high fidelity multi-modal out-of-band biometric authentication
US10235508B2 (en) * 2013-05-08 2019-03-19 Jpmorgan Chase Bank, N.A. Systems and methods for high fidelity multi-modal out-of-band biometric authentication with human cross-checking
US9721175B2 (en) 2013-05-08 2017-08-01 Jpmorgan Chase Bank, N.A. Systems and methods for high fidelity multi-modal out-of-band biometric authentication through vector-based multi-profile storage
US8955060B2 (en) * 2013-05-10 2015-02-10 Verizon Patent And Licensing Inc. Collaborative parental control of streaming media
US9223586B1 (en) * 2013-06-27 2015-12-29 Amazon Technologies, Inc. Run-time limitations of software applications based on user characteristics
US9304667B2 (en) * 2013-07-12 2016-04-05 Felix Houston Petitt, JR. System, devices, and platform for education, entertainment
US9923855B2 (en) 2013-08-01 2018-03-20 Jpmorgan Chase Bank, N.A. Systems and methods for electronic message prioritization
US9892576B2 (en) 2013-08-02 2018-02-13 Jpmorgan Chase Bank, N.A. Biometrics identification module and personal wearable electronics network based authentication and transaction processing
US20150073998A1 (en) 2013-09-09 2015-03-12 Apple Inc. Use of a Biometric Image in Online Commerce
US9578500B1 (en) * 2013-09-20 2017-02-21 Amazon Technologies, Inc. Authentication via mobile telephone
US20150220931A1 (en) * 2014-01-31 2015-08-06 Apple Inc. Use of a Biometric Image for Authorization
CN105337928B (en) 2014-06-24 2019-09-13 阿里巴巴集团控股有限公司 Method for identifying ID, safety protection problem generation method and device
US11652819B2 (en) * 2018-07-16 2023-05-16 Google Llc Secure methods, systems, and media for generating and verifying user credentials
US11526562B2 (en) * 2019-12-16 2022-12-13 Motorola Solutions, Inc. Device, system and method for controlling document access using hierarchical paths
US11425121B2 (en) 2020-12-15 2022-08-23 International Business Machines Corporation Generating an evaluation-mask for multi-factor authentication

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5848412A (en) * 1996-11-19 1998-12-08 Ncr Corporation User controlled browser identification disclosing mechanism
US6006333A (en) * 1996-03-13 1999-12-21 Sun Microsystems, Inc. Password helper using a client-side master password which automatically presents the appropriate server-side password to a particular remote server
US6167435A (en) * 1998-10-30 2000-12-26 Netcreations, Inc. Double opt-in™ method and system for verifying subscriptions to information distribution services
US6341169B1 (en) * 1999-02-08 2002-01-22 Pulse Systems, Inc. System and method for evaluating a document and creating a record of the evaluation process and an associated transaction
US20020019828A1 (en) * 2000-06-09 2002-02-14 Mortl William M. Computer-implemented method and apparatus for obtaining permission based data
US6484263B1 (en) * 1999-01-28 2002-11-19 International Business Machines Corporation Security profile for web browser
US6522772B1 (en) * 1998-09-30 2003-02-18 Ncr Corporation Self-service checkout terminal having a biometric sensing device for verifying identity of a user and associated method
US6523741B1 (en) * 1997-09-05 2003-02-25 Dimaria Peter C. Apparatus for controlling the rental and sale of age-controlled merchandise and for controlling access to age-controlled services
US6589290B1 (en) * 1999-10-29 2003-07-08 America Online, Inc. Method and apparatus for populating a form with data
US6651090B1 (en) * 1997-10-14 2003-11-18 Sony Corporation Information processing apparatus, information processing method, and transmitting medium
US6775775B1 (en) * 1999-01-27 2004-08-10 Hitachi, Ltd. Method of physical individual authentication and system using the same
US6829711B1 (en) * 1999-01-26 2004-12-07 International Business Machines Corporation Personal website for electronic commerce on a smart java card with multiple security check points
US6845448B1 (en) * 2000-01-07 2005-01-18 Pennar Software Corporation Online repository for personal information
US6959861B1 (en) * 2003-12-02 2005-11-01 Metro Innovations, Inc. Method of age verification for electronic media
US20050274797A1 (en) * 2002-03-12 2005-12-15 Cassandra Mollett Systems and methods for determining an authorization

Family Cites Families (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4879747A (en) * 1988-03-21 1989-11-07 Leighton Frank T Method and system for personal identification
US5488409A (en) * 1991-08-19 1996-01-30 Yuen; Henry C. Apparatus and method for tracking the playing of VCR programs
US5649099A (en) * 1993-06-04 1997-07-15 Xerox Corporation Method for delegating access rights through executable access control program without delegating access rights not in a specification to any intermediary nor comprising server security
US5708422A (en) * 1995-05-31 1998-01-13 At&T Transaction authorization and alert system
JPH0981519A (en) * 1995-09-08 1997-03-28 Kiyadeitsukusu:Kk Authentication method on network
US5757917A (en) * 1995-11-01 1998-05-26 First Virtual Holdings Incorporated Computerized payment system for purchasing goods and services on the internet
US5963915A (en) * 1996-02-21 1999-10-05 Infoseek Corporation Secure, convenient and efficient system and method of performing trans-internet purchase transactions
US6311211B1 (en) * 1996-04-19 2001-10-30 Juno Online Services, Inc. Method and apparatus for delivering electronic advocacy messages
AU4341597A (en) * 1996-09-11 1998-04-02 Yang Li Embeddable module for fingerprint capture and matching
US5907831A (en) * 1997-04-04 1999-05-25 Lotvin; Mikhail Computer apparatus and methods supporting different categories of users
US6178510B1 (en) * 1997-09-04 2001-01-23 Gtech Rhode Island Corporation Technique for secure network transactions
US6101482A (en) * 1997-09-15 2000-08-08 International Business Machines Corporation Universal web shopping cart and method of on-line transaction processing
JP3274393B2 (en) * 1997-09-22 2002-04-15 株式会社ディジタル・ビジョン・ラボラトリーズ Network system, data distribution method, and computer-readable recording medium recording distribution data
US6047268A (en) * 1997-11-04 2000-04-04 A.T.&T. Corporation Method and apparatus for billing for transactions conducted over the internet
US6330610B1 (en) * 1997-12-04 2001-12-11 Eric E. Docter Multi-stage data filtering system employing multiple filtering criteria
US6100811A (en) * 1997-12-22 2000-08-08 Trw Inc. Fingerprint actuation of customized vehicle features
US6597770B2 (en) * 1998-03-06 2003-07-22 Walker Digital, Llc Method and system for authorization of account-based transactions
US6101485A (en) * 1998-03-26 2000-08-08 International Business Machines Corporation Electronic solicitations for internet commerce
US6167382A (en) * 1998-06-01 2000-12-26 F.A.C. Services Group, L.P. Design and production of print advertising and commercial display materials over the Internet
WO2000016210A1 (en) * 1998-09-17 2000-03-23 Nexchange Corporation Affiliate commerce system and method
US6480850B1 (en) * 1998-10-02 2002-11-12 Ncr Corporation System and method for managing data privacy in a database management system including a dependently connected privacy data mart
US6580356B1 (en) * 1998-11-05 2003-06-17 Eckhard Alt Advanced personal identification systems and techniques
US6173269B1 (en) * 1998-12-16 2001-01-09 Zowi.Com, Inc Method and apparatus for executing electronic commercial transactions with minors
NO986118L (en) * 1998-12-23 2000-06-26 Multimedia Capital As Procedure for interactive distribution of messages
AU4230300A (en) * 1999-04-12 2000-11-14 Reciprocal, Inc. System and method for data rights management
US6393464B1 (en) * 1999-05-10 2002-05-21 Unbound Communications, Inc. Method for controlling the delivery of electronic mail messages
AU6349800A (en) * 1999-07-16 2001-02-05 E-Dialog, Inc. Direct response e-mail
US6525747B1 (en) * 1999-08-02 2003-02-25 Amazon.Com, Inc. Method and system for conducting a discussion relating to an item
US7257714B1 (en) * 1999-10-19 2007-08-14 Super Talent Electronics, Inc. Electronic data storage medium with fingerprint verification capability
US6356633B1 (en) * 1999-08-19 2002-03-12 Mci Worldcom, Inc. Electronic mail message processing and routing for call center response to same
US6688891B1 (en) * 1999-08-27 2004-02-10 Inter-Tares, Llc Method and apparatus for an electronic collaborative education process model
US6725381B1 (en) * 1999-08-31 2004-04-20 Tumbleweed Communications Corp. Solicited authentication of a specific user
TW480325B (en) * 1999-12-01 2002-03-21 Shell Int Research Plant for liquefying natural gas
US6704787B1 (en) * 1999-12-03 2004-03-09 Intercard Payments, Inc. Date of birth authentication system and method using demographic and/or geographic data supplied by a subscriber that is verified by a third party
US6581059B1 (en) * 2000-01-24 2003-06-17 International Business Machines Corporation Digital persona for providing access to personal information
US20030001016A1 (en) * 2000-01-28 2003-01-02 Israel Fraier Apparatus and method for accessng multimedia content
US20010033297A1 (en) * 2000-02-22 2001-10-25 Shastri Venkatram R. Internet conduit providing a safe and secure environment
US6718328B1 (en) * 2000-02-28 2004-04-06 Akamai Technologies, Inc. System and method for providing controlled and secured access to network resources
US6383078B1 (en) * 2000-03-17 2002-05-07 Elottery, Inc. On-line lottery game system
US6658415B1 (en) * 2000-04-28 2003-12-02 International Business Machines Corporation Monitoring and managing user access to content via a universally accessible database
AU2001286397A1 (en) * 2000-07-18 2002-01-30 Learningsoft Corporation Adaptive content delivery system and method
US20020049907A1 (en) * 2000-08-16 2002-04-25 Woods Christopher E. Permission based data exchange
US20020138326A1 (en) * 2001-03-22 2002-09-26 Leo Parker System and method for group scheduling using a wireless device
US20030028427A1 (en) * 2001-08-02 2003-02-06 International Business Machines Corporation User control of electronic personal information while browsing the Web
US20030061111A1 (en) * 2001-09-26 2003-03-27 International Business Machines Corporation Method and system for parent controlled e-commerce
US7254548B1 (en) * 2002-07-10 2007-08-07 Union Beach, L.P. System and method for the administration of financial accounts using profiles

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6006333A (en) * 1996-03-13 1999-12-21 Sun Microsystems, Inc. Password helper using a client-side master password which automatically presents the appropriate server-side password to a particular remote server
US5848412A (en) * 1996-11-19 1998-12-08 Ncr Corporation User controlled browser identification disclosing mechanism
US6523741B1 (en) * 1997-09-05 2003-02-25 Dimaria Peter C. Apparatus for controlling the rental and sale of age-controlled merchandise and for controlling access to age-controlled services
US6651090B1 (en) * 1997-10-14 2003-11-18 Sony Corporation Information processing apparatus, information processing method, and transmitting medium
US6522772B1 (en) * 1998-09-30 2003-02-18 Ncr Corporation Self-service checkout terminal having a biometric sensing device for verifying identity of a user and associated method
US6167435A (en) * 1998-10-30 2000-12-26 Netcreations, Inc. Double opt-in™ method and system for verifying subscriptions to information distribution services
US6829711B1 (en) * 1999-01-26 2004-12-07 International Business Machines Corporation Personal website for electronic commerce on a smart java card with multiple security check points
US6775775B1 (en) * 1999-01-27 2004-08-10 Hitachi, Ltd. Method of physical individual authentication and system using the same
US6484263B1 (en) * 1999-01-28 2002-11-19 International Business Machines Corporation Security profile for web browser
US6341169B1 (en) * 1999-02-08 2002-01-22 Pulse Systems, Inc. System and method for evaluating a document and creating a record of the evaluation process and an associated transaction
US6589290B1 (en) * 1999-10-29 2003-07-08 America Online, Inc. Method and apparatus for populating a form with data
US6845448B1 (en) * 2000-01-07 2005-01-18 Pennar Software Corporation Online repository for personal information
US20020019828A1 (en) * 2000-06-09 2002-02-14 Mortl William M. Computer-implemented method and apparatus for obtaining permission based data
US20050274797A1 (en) * 2002-03-12 2005-12-15 Cassandra Mollett Systems and methods for determining an authorization
US6959861B1 (en) * 2003-12-02 2005-11-01 Metro Innovations, Inc. Method of age verification for electronic media

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9084089B2 (en) 2003-04-25 2015-07-14 Apple Inc. Media data exchange transfer or delivery for portable electronic devices
US7720961B2 (en) * 2004-01-07 2010-05-18 Xweb, Inc. Managed affiliate system and method
US20050177844A1 (en) * 2004-01-07 2005-08-11 Ron Levi Managed affiliate system and method
US7706637B2 (en) 2004-10-25 2010-04-27 Apple Inc. Host configured for interoperation with coupled portable media player device
US20070033295A1 (en) * 2004-10-25 2007-02-08 Apple Computer, Inc. Host configured for interoperation with coupled portable media player device
US8259444B2 (en) 2005-01-07 2012-09-04 Apple Inc. Highly portable media device
US10534452B2 (en) 2005-01-07 2020-01-14 Apple Inc. Highly portable media device
US7856564B2 (en) 2005-01-07 2010-12-21 Apple Inc. Techniques for preserving media play mode information on media devices during power cycling
US7865745B2 (en) 2005-01-07 2011-01-04 Apple Inc. Techniques for improved playlist processing on media devices
US7889497B2 (en) 2005-01-07 2011-02-15 Apple Inc. Highly portable media device
US11442563B2 (en) 2005-01-07 2022-09-13 Apple Inc. Status indicators for an electronic device
US10750284B2 (en) 2005-06-03 2020-08-18 Apple Inc. Techniques for presenting sound effects on a portable media player
US9602929B2 (en) 2005-06-03 2017-03-21 Apple Inc. Techniques for presenting sound effects on a portable media player
US8300841B2 (en) 2005-06-03 2012-10-30 Apple Inc. Techniques for presenting sound effects on a portable media player
US10536336B2 (en) 2005-10-19 2020-01-14 Apple Inc. Remotely configured media device
US8396948B2 (en) 2005-10-19 2013-03-12 Apple Inc. Remotely configured media device
US8694024B2 (en) 2006-01-03 2014-04-08 Apple Inc. Media data exchange, transfer or delivery for portable electronic devices
US8151259B2 (en) 2006-01-03 2012-04-03 Apple Inc. Remote content updates for portable media devices
US8688928B2 (en) 2006-01-03 2014-04-01 Apple Inc. Media device with intelligent cache utilization
US7831199B2 (en) * 2006-01-03 2010-11-09 Apple Inc. Media data exchange, transfer or delivery for portable electronic devices
US8966470B2 (en) 2006-01-03 2015-02-24 Apple Inc. Remote content updates for portable media devices
US8255640B2 (en) 2006-01-03 2012-08-28 Apple Inc. Media device with intelligent cache utilization
US20070166683A1 (en) * 2006-01-05 2007-07-19 Apple Computer, Inc. Dynamic lyrics display for portable media devices
US7848527B2 (en) 2006-02-27 2010-12-07 Apple Inc. Dynamic power management in a portable media delivery system
US8615089B2 (en) 2006-02-27 2013-12-24 Apple Inc. Dynamic power management in a portable media delivery system
US8358273B2 (en) 2006-05-23 2013-01-22 Apple Inc. Portable media device with power-managed display
US20070273714A1 (en) * 2006-05-23 2007-11-29 Apple Computer, Inc. Portable media device with power-managed display
US9747248B2 (en) 2006-06-20 2017-08-29 Apple Inc. Wireless communication system
US9063697B2 (en) 2006-09-11 2015-06-23 Apple Inc. Highly portable media devices
US8090130B2 (en) 2006-09-11 2012-01-03 Apple Inc. Highly portable media devices
US7729791B2 (en) 2006-09-11 2010-06-01 Apple Inc. Portable media playback device including user interface event passthrough to non-media-playback processing
US8473082B2 (en) 2006-09-11 2013-06-25 Apple Inc. Portable media playback device including user interface event passthrough to non-media-playback processing
US8341524B2 (en) 2006-09-11 2012-12-25 Apple Inc. Portable electronic device with local search capabilities
US8044795B2 (en) 2007-02-28 2011-10-25 Apple Inc. Event recorder for portable media device

Also Published As

Publication number Publication date
US20070028309A1 (en) 2007-02-01
US20020133708A1 (en) 2002-09-19
US20060259778A1 (en) 2006-11-16
US7140045B2 (en) 2006-11-21
US7373671B2 (en) 2008-05-13
US8037316B2 (en) 2011-10-11

Similar Documents

Publication Publication Date Title
US7373671B2 (en) Method and system for user information verification
US20170339125A1 (en) Method and system for transmitting authentication context information
JP4803627B2 (en) User information management device
US8151343B1 (en) Method and system for providing authentication credentials
CN101663671B (en) Authorization for access to web service resources
US7571466B2 (en) Parental consent service
EP1394698A2 (en) Method and system for enforcing online identity consent policies
US20020019828A1 (en) Computer-implemented method and apparatus for obtaining permission based data
US20030004897A1 (en) Method and system for communicating user specific information
CA2438075C (en) Systems for selectively enabling and disabling access to software applications over a network and methods for using same
US20020166066A1 (en) Method of restricting viewing web page and server
US20030018910A1 (en) System and methods for providing multi-level security in a network at the application level
JP4718917B2 (en) Authentication method and system
US20030065789A1 (en) Seamless and authenticated transfer of a user from an e-business website to an affiliated e-business website
US20150066766A1 (en) Secure Generation of a User Account in a Service Server
US20090199267A1 (en) Internet filtering utility using consumer-governed internet web site ratings, governor voting system and vote validation process
US6996619B2 (en) Network service
US20020184100A1 (en) Casual access application with context sensitive pin authentication
KR100449863B1 (en) Method for protecting an adult web site
JP2005250776A (en) Automatic user information entry method using fingerprint identification technique
Ramasubramanian et al. An active rule based approach to database security in e-commerce systems using temporal constraints
CA2276235A1 (en) Authentication process for protected accesses in a networked data processing system
EP1582959A1 (en) Systems for selectively enabling and disabling access to software applications over a network and methods for using same
JP2006053937A (en) Network service method and client server system for implementing the same

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION