EDUCATIONAL LOG-ON METHOD
First Claim
Patent Images
1. An educational method of accessing a computer, comprising:
- (a) receiving identification information from a user;
(b) receiving an answer to an educational query, the educational query based on the identification information; and
(c) limiting access to a computer based on the answer.
0 Assignments
0 Petitions
Accused Products
Abstract
An example method of accessing a computer includes receiving identification information from a user and receiving an answer to an educational query. The educational query is based on the identification information. The method limits access to a computer based on the answer, the time spend answering queries, or both.
-
Citations
22 Claims
-
1. An educational method of accessing a computer, comprising:
-
(a) receiving identification information from a user; (b) receiving an answer to an educational query, the educational query based on the identification information; and (c) limiting access to a computer based on the answer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of limiting access to a computer, comprising:
-
(a) receiving identification information from a user; (b) presenting an educational query based on the identification information; (c) receiving an answer to an educational query from the user; and (d) permitting access to the computer based on the answer. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer, comprising:
-
a display for communicating information to a user; at least one user profile; at least one educational query associated with said at least one user profile; and a user input device for receiving input from the user, wherein the user accesses recreational items through a computer after the user correctly answers the at least one educational query. - View Dependent Claims (19, 20, 21)
-
-
22. A computer readable medium storing instructions which, when executed by a computer, performs the steps of:
-
(a) receiving identification information from a user; (b) presenting an educational query based on the identification information; (c) receiving an answer to an educational query from the user; and (d) permitting access to the computer based on the answer.
-
Specification