Systems and methods for online identity verification
First Claim
1. A computerized method for administering a program to an individual over a computer network, the method comprising:
- configuring at least one processor(s) to perform steps of;
receiving a request from a web browser or computer program launched by a computer used by the individual for access to a web page comprising program material;
obtaining a first image of the individual'"'"'s biometric data using a biometric reader;
providing the individual with access to program material over the network prior to authenticating the individual;
imaging the individual'"'"'s biometric data with the biometric reader while the individual is accessing the program and correlating the first image with the images obtained by continuously or periodically imaging the individual'"'"'s biometric data;
inserting a value into a unique data field embedded in a web page wherein the value is an access value if the biometric reader is activated and wherein the value changes to a decline value if one or more of the images does not match the first image; and
terminating access to the program material once one or more of the images obtained by continuously or periodically imaging the individual'"'"'s biometric data does not match the first image.
4 Assignments
0 Petitions
Accused Products
Abstract
A system controlling online access to a study course verifies the identity of an individual taking a study course over a global computer network from a first computer at a node of the network. The first computer has a biometric identification program and communicates over the network with a second computer that is at a network node other than a node of the first computer. The second computer includes study program material. The first computer operates a biometric reader, which obtains a first set of biometric data from the individual and a second set of biometric data from the individual while access is granted to course material. The biometric identification program compares the first set of data with the second set of data to make a verification of the identity of the individual and communicates the verification to the second computer.
78 Citations
20 Claims
-
1. A computerized method for administering a program to an individual over a computer network, the method comprising:
-
configuring at least one processor(s) to perform steps of; receiving a request from a web browser or computer program launched by a computer used by the individual for access to a web page comprising program material; obtaining a first image of the individual'"'"'s biometric data using a biometric reader; providing the individual with access to program material over the network prior to authenticating the individual; imaging the individual'"'"'s biometric data with the biometric reader while the individual is accessing the program and correlating the first image with the images obtained by continuously or periodically imaging the individual'"'"'s biometric data; inserting a value into a unique data field embedded in a web page wherein the value is an access value if the biometric reader is activated and wherein the value changes to a decline value if one or more of the images does not match the first image; and terminating access to the program material once one or more of the images obtained by continuously or periodically imaging the individual'"'"'s biometric data does not match the first image. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computerized method for administering a program to an individual over a computer network, the method comprising:
-
configuring at least one processor(s) to perform steps of; receiving a request from a web browser launched by a computer used by the individual for access to a web page comprising program material; providing the individual with access to program material over the network prior to authenticating the individual; obtaining, via a biometric reader, a first image of the individual'"'"'s biometric data; obtaining, via a biometric reader, continuous or periodic images of the individual'"'"'s biometric data while the individual is accessing the program material and correlating the first image with said images; receiving a value from the computer, the value inserted in a field in the web page, wherein the value is an access value if a biometric reader that communicates with the first computer is activated and wherein the value changes to a decline value if one or more of said images does not match the first image; verifying that the value inserted into the imbedded field is an access value; and granting access to the program material only while the value remains an access value. - View Dependent Claims (14, 15, 16)
-
-
17. A computer program product embodied in a non-transitory computer-readable storage medium and having computer-executable instructions recorded on said storage medium for performing a method comprising:
-
receiving a request from a web browser or computer program launched by a computer used by an individual for access to a web page or computer program comprising program material; activating a biometric reader that communicates with the user'"'"'s computer; providing the individual with access to the program material; obtaining, by a biometric reader, a first image of the individual'"'"'s biometric data; obtaining continuous or periodic images of the individual'"'"'s biometric data with the biometric reader while the individual is accessing the program material and comparing the first image with said images; inserting a value corresponding to a result of said comparison into a unique data field in said web page; and terminating access to the program material if the comparison indicates that the first image does not match one or more of said images. - View Dependent Claims (18, 19, 20)
-
Specification