Method and system for user information verification
First Claim
Patent Images
1. A method of authenticating a user comprising:
- receiving a request for information from a user, receiving personal information associated with said user, said personal information including an address, sending a permission request to said address, said permission request including a request for permission to provide information to said user, receiving permission in response to said permission request, and sending information to said user in response to said request for information.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for authenticating users based on personal information. The personal information may include age-related data where the users are interested in receiving age-restricted content. The personal information may include an address and a permission request is sent to the address. Biometric information may also be associated with the personal information.
78 Citations
39 Claims
-
1. A method of authenticating a user comprising:
-
receiving a request for information from a user, receiving personal information associated with said user, said personal information including an address, sending a permission request to said address, said permission request including a request for permission to provide information to said user, receiving permission in response to said permission request, and sending information to said user in response to said request for information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 19, 20)
-
-
18. A method of authenticating the age of a user over a client/server network wherein said server has content restricted to users older than a particular age, said method comprising the steps of said client:
-
storing age data representative of said user'"'"'s age on a client of said network, after said step of said storing, sending a request to said server for access to said content, receiving a request for said age data in response to the request for access to said content, providing the age data in response to said request for said age data, gaining access or being denied access to said content dependant upon whether said age data indicates that said user is older than said particular age.
-
-
21. A method of authenticating a user over a client/server network wherein said server has content restricted to users older than a particular age, said method comprising the steps of said server:
-
receiving a request from said user for access to said content, receiving personal information regarding said user, said personal information including age data representative of said user'"'"'s age and an e-mail address on said network, if said age data indicates that said user is older than said particular age, then sending an e-mail to said address indicating said request was received, sending said content to said user if permission is received in response to said e-mail. - View Dependent Claims (22, 24, 25, 26, 28, 29, 30, 31, 32)
-
-
23. A method of authenticating a user comprising:
-
storing personal information regarding said user, said personal information including an e-mail address and a value associated with a personal characteristic, sending a request for access to content restricted to users based on a cut-off associated with said personal characteristic, sending said personal information to the provider of said content, receiving at said e-mail address a request to permit access to said content, said step of receiving being dependant upon a comparison of the value stored in said personal information and said cut-off, and sending the requested content dependant upon whether another user replies to said request to permit access.
-
-
27. The method of claim ______ wherein said steps of sending and receiving are implemented by a client in a client/server network.
-
33. A method of authenticating the age of a user comprising:
-
storing personal information regarding said user, said personal information including a value associated with a personal characteristic, said personal information further associated with biometric information of said user, inputting biometric information, sending a request for access to content restricted to users based on a cut-off associated with said personal characteristic, sending said personal information to the provider of said content if said inputted biometric information matches the biometric information contained in said personal information, and receiving said content. - View Dependent Claims (34, 36, 37, 38)
-
-
35. A system of authenticating a user comprising:
-
a processor, a set of instructions executable by said processor, said instructions including;
receiving a request for information from a user;
receiving user information associated with said user, said user information including an address;
sending a permission request to said address, said permission request including a request for permission to provide information to said user;
receiving permission in response to said permission request; and
sending information to said user in response to said request for information.
-
-
39. A system of authenticating a user comprising:
-
a processor for executing instructions, a biometric input device for obtaining information about a user, instructions, said instructions including;
storing personal information regarding said user, said personal information including a value associated with a personal characteristic, said personal information further associated with biometric information of said user;
inputting biometric information;
sending a request for access to content restricted to users based on a cut-off associated with said personal characteristic;
sending said personal information to the provider of said content if said inputted biometric information matches the biometric information contained in said personal information; and
receiving said content.
-
Specification