System and method for verifying the age and identity of individuals and limiting their access to appropriate material and situations
First Claim
1. A method of verifying the age and identity of an individual using a system to limit the provision of an access account to an in person age verified and identified adult, the steps comprising:
- applying online by the individual for an adult access account;
completing and signing an adult verification form that contains a computer server assigned application identification number;
appearing in person at one of a plurality of approved locations;
submitting in person completed and signed adult verification form;
validating information in the adult verification form, in the presence of the individual;
validating the individual'"'"'s age and identity, in the presence of the individual;
notifying the individual of newly opened adult access account in the individual'"'"'s name;
requiring an age verified and identified adult to assume responsibility for use of the adult access account by minors and others; and
empowering the individual to filter or block access to inappropriate content and entities.
0 Assignments
0 Petitions
Accused Products
Abstract
Limiting access to the Internet, intranets, computers, appliances, websites, individuals and/or other venues, for example, by providing an access account, to an “in person” and/or otherwise verified “adult” who assumes responsibility for such account'"'"'s use for accessing appropriate material, websites and/or individuals, while empowered by control of a “single access account” that filters inappropriate material, websites and/or individuals based on (1) profiles created by such adults and stored on provider'"'"'s “access server,” and/or elsewhere, and/or (2) “mandatory” provider imposed filtering. Further, helping “producers” comply with 18 U.S.C. 2257 by adopting the “verification process” to protect children.
101 Citations
51 Claims
-
1. A method of verifying the age and identity of an individual using a system to limit the provision of an access account to an in person age verified and identified adult, the steps comprising:
-
applying online by the individual for an adult access account;
completing and signing an adult verification form that contains a computer server assigned application identification number;
appearing in person at one of a plurality of approved locations;
submitting in person completed and signed adult verification form;
validating information in the adult verification form, in the presence of the individual;
validating the individual'"'"'s age and identity, in the presence of the individual;
notifying the individual of newly opened adult access account in the individual'"'"'s name;
requiring an age verified and identified adult to assume responsibility for use of the adult access account by minors and others; and
empowering the individual to filter or block access to inappropriate content and entities. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of verifying an individual'"'"'s age and identity for a variety of purposes, such as providing an access account, using a system to confirm an individual'"'"'s age and identity, the steps comprising:
-
obtaining from the individual a single number that the individual computes by applying a predetermined mathematical formula to the individual'"'"'s unique identification number, such as the individual'"'"'s social security number, credit card number, driver'"'"'s license number or any other unique identification number;
comparing other submitted personal data of the individual to personal data on file for the individual;
retrieving the individual'"'"'s unique identification number on file;
computing a single number from the retrieved unique identification number;
comparing the computed single number to the individual'"'"'s computed single number;
verifying the individual'"'"'s age from the individual'"'"'s date of birth; and
granting the individual an access account, if the individual is of majority age. - View Dependent Claims (14, 15)
-
-
16. A method of verifying the age and identity of a minor using a system to limit the minor'"'"'s use of a parent'"'"'s access account in a manner that enables the parent to limit the minor'"'"'s interaction to age appropriate content and individuals while using the parent'"'"'s access account, the steps comprising:
-
applying online by an adult for the minor'"'"'s use of the parent'"'"'s access account;
completing and signing a minor verification form;
appearing in person with the minor at one of a plurality of approved locations;
submitting in person a completed and signed minor verification form;
validating information in the completed and signed minor verification form, in the presence of the adult and the minor;
validating the adult'"'"'s and the minor'"'"'s age and identity, in the presence of the adult and the minor;
notifying the adult of an approval of the minor'"'"'s use of the parent'"'"'s access account;
requiring the adult to assume responsibility for access account use by the minor; and
empowering the adult to filter or block access to inappropriate content and individuals. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A method of creating a single access account with an access provider that will be used by at least one age verified and authenticated adult, and possibly minors and others, the steps comprising:
-
applying online by a prospective user for the single access account;
verifying the prospective user as being either an adult or a minor;
ending the application process if the prospective user is not an adult;
continuing the application process if the prospective user is verified as being an adult, wherein the single access account and a first user profile is created, and wherein the prospective user is now the single access account owner;
selecting a filtering profile for the first user profile;
ending the application process; and
activating filtering based on the selected filtering profile, wherein such filtering is always turned on and can only be turned off with the access provider'"'"'s permission. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
-
-
30. A method of accessing a single access account that has at least one user profile associated therewith, the at least one user profile having a predetermined level of access, wherein the single access account is maintained by an access provider on a server, the steps comprising:
-
initiating a user connection to the access provider'"'"'s server;
entering an account-ID and first password;
authenticating the account-ID and first password;
ending the connection process if the account-ID and first password are not authenticated;
continuing the connection process if the account-ID and first password are validated;
entering a profile-ID and second password;
authenticating the profile-ID and second password as being from amongst the at least one user profile associated with the single access account;
ending the connection process if the profile-ID and second password are not validated;
continuing the connection process, if the profile-ID and second password are validated;
applying the predetermined level of access based on the at least one user'"'"'s profile that is on record in the access provider'"'"'s database; and
beginning the at least one user'"'"'s first authenticated and filtered access. - View Dependent Claims (31, 32)
-
-
33. A method of filtering Internet content using a single access account, wherein the single access account is purchased from an access provider, the steps comprising:
-
determining the age and identity of an adult user, wherein the age and identity of the adult user is determined using an in person age and identity verification process;
capturing registration information relating to the adult user in an age-ID database and a profile-ID database that both reside on the access provider'"'"'s access server;
selecting a first set of filtering directives for the adult user, wherein the adult user selects the first set of filtering directives;
applying a second set of filtering directives, wherein the second set of filtering directives are selected by the access provider, and wherein the first and second set of filtering directives are associated with the profile-ID database; and
implementing Network Authentication and proxy based filtering that restricts the Internet access of the adult user based on the first and second set of filtering directives. - View Dependent Claims (34, 35, 36)
-
-
37. A method of verifying an identity of an entity, the steps comprising:
-
applying online for verification;
completing a verification, form that includes an assigned application identification number;
appearing at one of a plurality of approved locations, wherein this step is performed by an individual;
submitting a completed verification form;
validating information in the verification form;
validating the individual'"'"'s identity; and
establishing a certificate of verification. - View Dependent Claims (38, 39, 40, 41)
-
-
42. A method of restricting access of an entity using a verification process, before enabling the entity to interact with another entity, the steps comprising:
-
allowing the entity to attempt to access another entity;
determining if the entity has obtained a certificate of verification;
denying access if the entity has not obtained a certificate of verification;
confirming the identity of the entity using the certificate of verification; and
granting access if the identity of the entity is confirmed. - View Dependent Claims (44, 45, 46)
-
-
43. The method of claim 43 wherein access is granted if the identity of the entity is confirmed and if the entity meets the predetermined access requirements for interaction with the other entity.
-
47. A method of enabling a producer to verify the identity of a performer that might be available for portrayal in a visual depiction of actual sexually explicit conduct over the Internet, via a computer site and/or service, and/or accessible elsewhere, via any equipment, software and/or format, electronic and/or otherwise, the steps comprising:
-
allowing the producer to attempt to access the performer;
determining if the performer has an age-ID account;
denying access if the performer does not have an age-ID account;
confirming the age and identity of the performer if the performer has an age-ID account; and
granting access to the producer if the age and identity of the performer is verified. - View Dependent Claims (48, 49, 50, 51)
-
Specification