Method and system for user information verification
First Claim
Patent Images
1. A method of authenticating a user comprising:
- receiving a request for information from a user of a processing device,receiving with at least one processor, personal information associated with said user, said personal information including an address and age information, the personal information having been pre-stored by the processing device of the user;
sending a permission request to said address, said permission request including a request for permission to provide information to said user,receiving permission in response to said permission request, andsending information to said user of the processing device in response to said request for information,wherein said personal information includes a second address associated with said user, said method further including the step of notifying said user at said second address if said permission was received in response to said permission request.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for authenticating users based on personal information. The personal information may include age-related data where the users are interested in receiving age-restricted content. The personal information may include an address and a permission request is sent to the address. Biometric information may also be associated with the personal information.
76 Citations
27 Claims
-
1. A method of authenticating a user comprising:
-
receiving a request for information from a user of a processing device, receiving with at least one processor, personal information associated with said user, said personal information including an address and age information, the personal information having been pre-stored by the processing device of the user; sending a permission request to said address, said permission request including a request for permission to provide information to said user, receiving permission in response to said permission request, and sending information to said user of the processing device in response to said request for information, wherein said personal information includes a second address associated with said user, said method further including the step of notifying said user at said second address if said permission was received in response to said permission request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of authenticating a user over a client/server network wherein said server has content restricted to users older than a particular age, said method comprising the steps of said server:
-
receiving a request for access to said content from the user of a client of the network, receiving pre-stored personal information regarding said user, said pre-stored personal information including age data representative of said user'"'"'s age and an e-mail address on said network, the pre-stored personal information being previously stored with the client of the network, if said age data indicates that said user is older than said particular age, then sending an e-mail to said address indicating said request was received, sending said content to said user if a permission response is received in response to said e-mail, wherein the response is an e-mail sent in reply.
-
-
18. A method of authenticating a user comprising:
-
pre-storing in a processing device, personal information regarding said user, said personal information including an e-mail address and a value indicating a personal characteristic, sending from the processing device a request for access to content restricted to users based on a cut-off associated with said personal characteristic, sending from the processing device said personal information to the provider of said content, receiving at said e-mail address a request to permit access to said content, said step of receiving being dependant upon a comparison of the value stored in said personal information and said cut-off, and sending the requested content to the processing device dependant upon whether another user replies to said request to permit access. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
-
26. A method of authenticating a user comprising:
-
pre-storing in a processing device, personal information regarding said user, said personal information including an e-mail address and a value associated with a personal characteristic, sending from the processing device a request for access to content restricted to users based on a cut-off associated with said personal characteristic, sending from the processing device said personal information to the provider of said content, receiving at said e-mail address a request to permit access to said content, said step of receiving being dependant upon a comparison of the value stored in said personal information and said cut-off, and sending the requested content to the processing device dependent upon whether another user replies to said request to permit access, wherein said step of storing personal information includes obtaining the age of said user and, if said age is below a particular age, then obtaining and storing said e-mail address. - View Dependent Claims (27)
-
Specification