Parental consent service
First Claim
1. A method of allowing a first party to provide or deny consent for a second party to access a network server that requires such consent prior to allowing the second party access thereto, the method comprising:
- creating a user profile for the second party, the user profile for the second party including consent information regarding second party access to the network server, wherein the consent information is information directed to an age of the first party or content of the network server;
receiving the consent information from the first party, the consent information providing or denying consent for the second party to access the network server, wherein the first and the second parties are individuals and potential accessors of the network server; and
storing the consent information in the user profile of the second party;
wherein the second party is allowed to access the network server if the consent information stored in the user profile of the second party shows that the first party individual has provided consent and wherein the second party is not allowed to access the network server if the consent information stored in the user profile of the second party shows that the first party individual has denied consent, andfurther wherein, prior to the first party providing consent information for the network server, the network server must register with an authentication server, providing authentication requirements to be used by the authentication server to determine whether to allow access to the network server when the first party or the second party request access to the network server.
2 Assignments
0 Petitions
Accused Products
Abstract
A user profile having consent information regarding a network server for a second party is created. Such consent information is received from a first party and stored in the user profile of the second party. The second party may access the network server if the consent information stored in the user profile of the second party shows that the first party has provided consent. The second party may not access the network server if the consent information stored in the user profile of the second party shows that the first party has denied consent.
-
Citations
23 Claims
-
1. A method of allowing a first party to provide or deny consent for a second party to access a network server that requires such consent prior to allowing the second party access thereto, the method comprising:
-
creating a user profile for the second party, the user profile for the second party including consent information regarding second party access to the network server, wherein the consent information is information directed to an age of the first party or content of the network server; receiving the consent information from the first party, the consent information providing or denying consent for the second party to access the network server, wherein the first and the second parties are individuals and potential accessors of the network server; and storing the consent information in the user profile of the second party; wherein the second party is allowed to access the network server if the consent information stored in the user profile of the second party shows that the first party individual has provided consent and wherein the second party is not allowed to access the network server if the consent information stored in the user profile of the second party shows that the first party individual has denied consent, and further wherein, prior to the first party providing consent information for the network server, the network server must register with an authentication server, providing authentication requirements to be used by the authentication server to determine whether to allow access to the network server when the first party or the second party request access to the network server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer readable medium having computer-executable instructions thereon for allowing a first party to provide or deny consent for a second party to access each of multiple network servers that each require such consent prior to allowing the second party access thereto, the instructions, when executed by a processor, cause the processor to perform:
-
creating a user profile for the second party, the user profile for the second party including verification that the second party is a child and including consent information regarding second party access to each of the network servers, wherein the consent information is directed to access, or partial access, to each of the network servers based upon a content of subject matter included thereon; receiving the consent information from the first party, the consent information providing or denying consent for the second party to access each of the network servers, wherein the first and the second parties are individuals and potential or actual accessors of the network server; and storing the consent information in the user profile of the second party; wherein the second party is allowed to access a respective network server if the consent information stored in the user profile of the second party shows that the first party individual has provided consent and wherein the second party is not allowed to access the network server if the consent information stored in the user profile of the second party shows that the first party individual has denied consent, and further wherein, prior to the first party providing consent information for the network server, the network server must register with an authentication server, providing authentication requirements to be used by the authentication server to determine whether to allow access to the network server when the first party or the second party request access to the network server. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. A method of allowing a first party to provide or deny consent for a second party to access each of multiple network servers that require such consent prior to allowing the second party access thereto, wherein the first party is an adult and the second party is a child, the method comprising:
-
creating a user profile for the second party, the user profile for the second party including consent information regarding second party access to the multiple network servers, wherein the consent information is information directed to an age of the first party or respective content of the multiple network servers; receiving the consent information from the first party, the consent information providing or denying consent for the second party to access each of the network servers, wherein the first and the second parties are individuals and potential accessors of the multiple network servers; receiving level of consent information from the first party, the level of consent information specifying the level of consent for the second party to access each of the multiple network servers; storing the consent information in the user profile of the second party; storing the level of consent information in the user profile of the second party; wherein the consent information in the user profile of the second party is first consent information and when modified consent information is received from the first party, the modified consent information providing or denying consent for the second party to access at least one of the multiple network servers, the method further comprises; replacing the first consent information in the user profile of the second party with the modified consent information, wherein only the first party can modify the consent information in the user profile of the second party, wherein when an attempt by the second party to access a second network server is detected, the second network server not having any corresponding consent information in the user profile of the second party providing or denying consent for the second party to access the second network server, the method further comprises; notifying the first party that the second party wishes to be provided with consent for the second party to access the second network server; receiving second consent information from the first party, the second consent information providing or denying consent for the second party to access the second network server; and storing the second consent information in the user profile of the second party, wherein the second party is allowed to access a particular one of the multiple network servers if the consent information stored in the user profile of the second party shows that the first party individual has provided consent for that particular network server, and wherein the second party is not allowed to access the particular network server if the consent information stored in the user profile of the second party shows that the first party individual has denied consent for that particular network server, and wherein the second party is allowed to access the particular network server in accordance with the level of consent information stored in the user profile of the second party, wherein, prior to the first party providing consent information for the network server, the network servers register respective authentication requirements with an authentication server, the authentication requirements for a particular network server to be used by the authentication server to determine whether to allow access to a particular network server when the first party or the second party request access to the particular network server, wherein the first party or the second party must comply with the authentication requirements in order to be granted access to the particular network server by the authentication server, wherein the authentication requirements comprise at least one of;
a maximum time allowed since the first party or second party entered authentication information to the authentication server by logging in to the authentication server, and a maximum time allowed since the first party or second party reentered a password without logging out of the authentication server;and wherein the authentication server requires the first party or second party to reenter authentication information to the authentication server by logging in again to the authentication server, or to reenter the password to the authentication server, respectively, after the respective maximum time allowed has elapsed, in order for the first party or second party to continue to be granted access to the network server.
-
Specification