Verifying User Information
First Claim
1. A system for verifying user information, the system comprising one or more computers configured toreceive a request for access from a device associated with a user requesting access,request a single still image or video stream comprising a first image of the user and an image of an identity document associated with the user requesting access in response to receiving the request for access,receive the single still image or video stream comprising the first image of the user and the image of the identity document,extract the first image of the user from the single still image or the video stream,extract a second image of the user from the image of the identity document in the single still image or the video stream, anddetermine whether the request for access is to be granted or denied by comparing the first image of the user to the second image of the user to determine if the user is shown in the identity document.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer is configured to impose an access restriction based upon user-provided information, such as a user'"'"'s birthdate. In order to enforce such a restriction, the computer requests from a user an image of a valid identity document associated with the user, such as a valid driver'"'"'s license. In response to receiving such an image from the user, the computer performs an image analysis on the image to extract user information. The computer might extract the user'"'"'s name, address, birthdate, driver'"'"'s license number, and/or other information from the image for instance. The computer may utilize the extracted information to determine whether the user should be granted access. The computer may determine based upon the extracted information, for instance, whether the age of the user is greater than a minimum age required to access the computer. The computer may be configured to restrict access to a Web site in this manner.
-
Citations
20 Claims
-
1. A system for verifying user information, the system comprising one or more computers configured to
receive a request for access from a device associated with a user requesting access, request a single still image or video stream comprising a first image of the user and an image of an identity document associated with the user requesting access in response to receiving the request for access, receive the single still image or video stream comprising the first image of the user and the image of the identity document, extract the first image of the user from the single still image or the video stream, extract a second image of the user from the image of the identity document in the single still image or the video stream, and determine whether the request for access is to be granted or denied by comparing the first image of the user to the second image of the user to determine if the user is shown in the identity document.
-
8. A non-transitory computer-readable storage medium having computer-executable instructions stored thereupon which, when executed by a computer, cause the computer to:
-
receive a request for access from a device associated with a user; request a single still image or video stream comprising a first image of the user and an image of an identity document associated with the user in response to receiving the request for access; receive the single still image or video stream comprising the first image of the user and the image of the identity document; extract the first image of the user from the single still image or the video stream; extract a second image of the user from the image of the identity document in the single still image or the video stream; compare the first image of the user to the second image of the user to determine if the user is shown in the identity document; and determine whether the request for access is to be granted or denied based upon results of the comparison. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method for granting or denying a request for access, comprising:
-
receiving a request for access from a device associated with a user; receiving a single still image or video stream comprising a first image of the user and an image of an identity document associated with the user; extracting the first image of the user from the single still image or the video stream; extracting a second image of the user from the image of the identity document in the single still image or the video stream; and granting or denying the request for access based upon a comparison of the first image of the user and the second image of the user. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification