Systems and methods for online identity verification
First Claim
1. A step-wise computerized method for administering a study course to an individual over a computer network, the method comprising:
- receiving a request from a web browser or computer program launched by a computer used by the individual for access to a web page comprising study course material;
obtaining a first image of the individual'"'"'s face using a camera;
providing the individual with access to course material over the network prior to an authenticating the individual'"'"'s access;
continuously imaging the individual'"'"'s face with the camera while the individual is accessing the course and correlating the first image with the images obtained by continuously imaging the individual'"'"'s face;
inserting a value into a unique data field embedded in a web page wherein the value is an access value if the camera is activated and wherein the value chances to a decline value if one or more of the continuous images does not match the first image; and
terminating access to the study course material as soon as one or more of the images obtained by continuously imaging the individual'"'"'s face does not match the first image.
4 Assignments
0 Petitions
Accused Products
Abstract
A system controlling online access to a study course verifies the identity of an individual taking a study course over a global computer network from a first computer at a node of the network. The first computer has a biometric identification program and communicates over the network with a second computer that is at a network node other than a node of the first computer. The second computer includes study course material. The first computer operates a biometric reader, which obtains a first set of biometric data from the individual and a second set of biometric data from the individual while access is granted to course material. The biometric identification program compares the first set of data with the second set of data to make a verification of the identity of the individual and communicates the verification to the second computer.
125 Citations
26 Claims
-
1. A step-wise computerized method for administering a study course to an individual over a computer network, the method comprising:
-
receiving a request from a web browser or computer program launched by a computer used by the individual for access to a web page comprising study course material; obtaining a first image of the individual'"'"'s face using a camera; providing the individual with access to course material over the network prior to an authenticating the individual'"'"'s access; continuously imaging the individual'"'"'s face with the camera while the individual is accessing the course and correlating the first image with the images obtained by continuously imaging the individual'"'"'s face; inserting a value into a unique data field embedded in a web page wherein the value is an access value if the camera is activated and wherein the value chances to a decline value if one or more of the continuous images does not match the first image; and terminating access to the study course material as soon as one or more of the images obtained by continuously imaging the individual'"'"'s face does not match the first image. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computerized method for administering a study course to an individual over a computer network, the method comprising:
-
receiving a request from a web browser launched by a computer used by the individual for access to a web page comprising study course material; providing the individual with access to course material over the network prior to authenticating the individual'"'"'s access; obtaining, via a biometric reader, a first image of the individual'"'"'s face while the individual is accessing the course material; obtaining, via a biometric reader, continuous images of the individual'"'"'s face while the individual is accessing the course material and correlating the first image with the continuous images; receiving a value from the computer, the value inserted in a field embedded in the web page, wherein the value is an access value if a biometric reader that communicates with the first computer is activated and wherein the value changes to a decline value if one or more of the continuous does not match the first image; verifying that the value inserted into the imbedded field is an access value; and granting access to the course material only while the value remains an access value. - View Dependent Claims (14, 15, 16)
-
-
17. A program product comprising:
-
a computer-readable medium; and computer-executable instructions recorded on the computer-readable medium for performing a method comprising; receiving a request from a web browser launched by a computer used by an individual for access to a web page comprising study course material; activating a biometric reader that communicates with the user'"'"'s computer; providing the individual with access to the study course material prior to authenticating the individual'"'"'s access; searching for a unique data field, said data field imbedded in a web page of a remote computer, the remote computer comprising online study course material; obtaining a first image of the individual'"'"'s face while the individual is accessing the course material; obtaining continuous images of the individual'"'"'s face while the individual is accessing the study course material and comparing the first image with the continuous images; and inserting a value into the data field embedded in the web page, wherein the value is an access value if the biometric reader is activated; modifying the access value to a decline value if the comparison indicates that the first image does not match one or more of the continuous images. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26)
-
Specification