SYSTEMS AND METHODS FOR ONLINE IDENTITY VERIFICATION
First Claim
1. A computerized method for administering a program to an individual over a computer network, the method comprising:
- receiving a request from a web browser or computer program launched by a computer used by the individual for access to a web page comprising program material;
obtaining a first image of the individual'"'"'s biometric data using a biometric reader;
providing the individual with access to program material over the network;
imaging the individual'"'"'s biometric data with the biometric reader while the individual is accessing the program and correlating the first image with the images obtained by imaging the individual'"'"'s biometric data;
inserting a value into a unique data field embedded in a web page wherein the value is an access value if the biometric reader is activated and wherein the value changes to a decline value if one or more of the images does not match the first image; and
terminating access to the program material as soon as one or more of the images obtained by imaging the individual'"'"'s biometric data does not match the first image.
5 Assignments
0 Petitions
Accused Products
Abstract
A system controlling online access to a study course verifies the identity of an individual taking a study course over a global computer network from a first computer at a node of the network. The first computer has a biometric identification program and communicates over the network with a second computer that is at a network node other than a node of the first computer. The second computer includes study program material. The first computer operates a biometric reader, which obtains a first set of biometric data from the individual and a second set of biometric data from the individual while access is granted to course material. The biometric identification program compares the first set of data with the second set of data to make a verification of the identity of the individual and communicates the verification to the second computer.
-
Citations
20 Claims
-
1. A computerized method for administering a program to an individual over a computer network, the method comprising:
-
receiving a request from a web browser or computer program launched by a computer used by the individual for access to a web page comprising program material; obtaining a first image of the individual'"'"'s biometric data using a biometric reader; providing the individual with access to program material over the network; imaging the individual'"'"'s biometric data with the biometric reader while the individual is accessing the program and correlating the first image with the images obtained by imaging the individual'"'"'s biometric data; inserting a value into a unique data field embedded in a web page wherein the value is an access value if the biometric reader is activated and wherein the value changes to a decline value if one or more of the images does not match the first image; and terminating access to the program material as soon as one or more of the images obtained by imaging the individual'"'"'s biometric data does not match the first image. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computerized method for administering a program to an individual over a computer network, the method comprising:
-
receiving a request from a web browser launched by a computer used by the individual for access to a web page comprising program material; providing the individual with access to program material over the network; obtaining, via a biometric reader, a first image of the individual'"'"'s biometric data while the individual is accessing the program material; obtaining, via a biometric reader, images of the individual'"'"'s biometric data while the individual is accessing the program material and correlating the first image with the images; receiving a value from the computer, the value inserted in a field embedded in the web page, wherein the value is an access value if a biometric reader that communicates with the first computer is activated and wherein the value changes to a decline value if one or more of the images does not match the first image; verifying that the value inserted into the imbedded field is an access value; and granting access to the program material only while the value remains an access value. - View Dependent Claims (14, 15, 16)
-
-
17. A program product comprising:
-
a computer-readable medium; and computer-executable instructions recorded on the computer-readable medium for performing a method comprising; receiving a request from a web browser launched by a computer used by an individual for access to a web page comprising program material; activating a biometric reader that communicates with the user'"'"'s computer; providing the individual with access to the program material; obtaining a first image of the individual'"'"'s biometric data while the individual is accessing the program material; obtaining images of the individual'"'"'s biometric data while the individual is accessing the program material and comparing the first image with the images; and terminating access to the program material if the comparison indicates that the first image does not match one or more of the images. - View Dependent Claims (18, 19, 20)
-
Specification