SYSTEMS AND METHODS FOR UNIVERSAL ENHANCED LOG-IN, IDENTITY DOCUMENT VERIFICATION, AND DEDICATED SURVEY PARTICIPATION
First Claim
1. A computer implemented method for controlling access via a computer network to a subscriber server, comprising:
- receiving, at a log-in server, a query to connect a computer through the computer network to the subscriber server;
receiving, from the computer, registrant identification data;
receiving, from the subscriber server, subscriber server identification data;
evaluating at least one of the registrant identification data and the subscriber identification data; and
establishing a first session between the computer, the log-in server, and the subscriber server to provide, based in part on the registrant identification data and the subscriber identification data, access from the computer to at least a portion of a website associated with the subscriber server.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for controlling access via a computer network to a subscriber server. A log-in server receives a query to connect through the computer network to the subscriber server, and the log-in server receives registrant identification data. A first session is established between the log-in server and the subscriber server to validate the registrant identification data, and to generate a session password. A second session is established between the log-in server and the subscriber server. The second session is configured to authorize, based in part on the registrant identification data, access to at least a portion of a website associated with the subscriber server.
132 Citations
20 Claims
-
1. A computer implemented method for controlling access via a computer network to a subscriber server, comprising:
-
receiving, at a log-in server, a query to connect a computer through the computer network to the subscriber server; receiving, from the computer, registrant identification data; receiving, from the subscriber server, subscriber server identification data; evaluating at least one of the registrant identification data and the subscriber identification data; and establishing a first session between the computer, the log-in server, and the subscriber server to provide, based in part on the registrant identification data and the subscriber identification data, access from the computer to at least a portion of a website associated with the subscriber server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. In a computer network, an access control system, comprising:
-
a subscriber server and a log-in server; the log-in server configured to receive a query to connect a computer to the subscriber server; the log-in server configured to receive registrant identification data; the log-in server configured to receive subscriber server identification data; the log-in server configured to evaluate at least one of the registrant identification data and the subscriber server identification data; and the log-in server configured to establish a first session between the computer and at least one of the subscriber server and the log-in server in response to the query to provide access from the computer to content associated with at least one of the subscriber server and the log-in server. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer implemented method for identifying potentially improper use of an identity document, comprising:
-
receiving from a first subscriber information related to the identity document; storing the information related to the identity document in a database; comparing the information related to the identity document with prior activity data received from a second subscriber, the prior activity data stored in the database; identifying, based on the comparison, at least one instance of potential identity document misuse; and informing the first subscriber of data identifying potential identity document misuse. - View Dependent Claims (18)
-
-
19. A computer implemented method for providing a plurality of potential survey participants, comprising:
-
receiving a request from a subscriber to be included in a survey pool; receiving personal data associated with the subscriber; validating the personal data; creating a subscriber profile; storing the subscriber profile in a database; receiving a survey request from a survey commissioner, wherein the survey request includes survey criteria; identifying the subscriber as a potential survey participant based at least in part on a comparison of the subscriber profile and the survey criteria; and generating a survey recipient list responsive to the survey request, the survey recipient list including the potential survey participant. - View Dependent Claims (20)
-
Specification