Acknowledgment authentication system and method

ABSTRACT

The present invention is a method of and a system for enabling an initiating party to capture, store, and retrieve a video image of at least one acknowledging party performing an acknowledgement requested by the initiating party where the acknowledging party(s) may be remotely located from the initiating party.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of patent application Ser. No.14/291,139, filed May 30, 2014, which claims priority to provisionalapplication 61/829,702, filed May 31, 2013. All of the aboveapplications are incorporated by reference in their entirety as if fullyrecited herein.

BACKGROUND AND SUMMARY OF THE INVENTION

Exemplary embodiments of the present invention relate generally to asystem and method for verifying the identity of a party acknowledging adocument or other agreement.

Known methods of verifying the identity of a person acknowledging adocument generally consist of a system of witnesses, such as the use ofa notary public. With the increasing amount of business transactionsoccurring remotely over the internet, a method is needed to verify theidentity of the person signing or assenting to an agreement when thesigning or assenting takes place remotely to available witnesses.

When conducting business over the internet or other type of remotetransaction, accepting the terms and conditions of an agreement may beaccomplished by any of several methods. Examples of these methods mayinclude; selecting a checkbox, clicking on an “I agree” or similarbutton, typing the user's name as a signature, or using a mouse, finger,or stylus as a signature or acknowledgment. While methods such as thesehave generally been found adequate to assent to the terms of anagreement, the methods themselves don't perform any significant level ofauthentication and may leave a party to the transaction susceptible toclaims that the other party did not perform the claimed authentication.

Known methods of authentication of internet or other types of remotetransactions and agreements generally involve a user enrolling for anauthentication service by selecting a user name and password. Certainknown authentication methods may require the user to provide additionalinformation such as email addresses, physical addresses, or telephonenumbers. When using such a method to authenticate a user, that usergenerally must log onto the system and enter a username and password.The system may then use a method of encrypting the information from theconnection between the user and the recipient of the system to insurethat at least the computing device connected to the system was caused tobe connected by someone previously identified. Despite the requiredinformation, the person or organization asking for an acknowledgement isnot able to authenticate that the person enrolling for the service isactually who he says he is. The present invention provides a system andmethod for visual authentication of the person who is accepting theterms of an agreement by “signing” or other methods as describedearlier.

In an embodiment of the invention, a computing device may be configuredto authenticate a person or persons acknowledging an agreement bycapturing images, using a digital image capture device, of such personor persons as they perform the acknowledgement. Such an image device maybe configured to capture single images or a continuous stream of imagesthat result in a video recording. In another embodiment of theinvention, a first computing device, such as a computer server,connected via a network to a second computing device may be configuredto send instructions to the second computing device. Those instructionsmay configure the second computing device to capture images to be usedto authenticate a person or persons acknowledging an agreement. Inanother embodiment of the invention, a computing device may beconfigured to restrict the time during which a user is permitted toacknowledge an agreement. In another embodiment of the invention, acomputing device may be configured to generate random codes which arethen provided to a user as part of a user authentication process. Inanother embodiment of the invention, a computing device may be placed inelectronic communication with a device for recording biometricinformation from the user. The computing device may be configured tostore this biometric information along with other types ofauthentication information recorded during the acknowledgment process toallow for further user authentication capabilities. In anotherembodiment of the invention, a computing device may be configured toperform the above described image capture functions when the computingdevice is not connected to an external data network. In this embodiment,the computing device may store images and other information related toan acknowledgement process for later delivery to an external server orcomputing device. In another embodiment of the invention, a firstcomputing device may be configured to provide information related to anacknowledgment directly to a second computing device, without therequirement of a server to receive and store the information. In otherembodiments of the invention, a computing device used in theauthentication process may be authenticated by a second computer deviceor computer server to confirm that the first computer device isassociated with the person or entity performing the acknowledgment. Incertain embodiments of the invention a person or party wishing to usethe invention to acknowledge an agreement or other document may berequired to provide additional evidence of their identity through theuse of an identification document containing a photographic image. Insuch a manner, a party or organization that wishes to authenticate theacknowledging party may compare the provided identification document toimages recorded during the acknowledgement process in order to confirmthe identity of the authenticator. In some embodiments of the invention,the location from which a computer device is used to perform anacknowledgement may be restricted to certain predetermined locations.Alternatively, certain locations may be expressly excluded. For example,a party or organization may be restricted from authentication outside acertain state, region, or country in order to comply with legalrequirements applicable to a particular agreement to be authenticated.

In addition to the novel features and advantages mentioned above, otherbenefits will be readily apparent from the following descriptions of thedrawings and exemplary embodiments.

BRIEF DESCRIPTION OF THE DRAWINGS

In addition to the features mentioned above, other aspects of thepresent invention will be readily apparent from the followingdescriptions of the drawings and exemplary embodiments, wherein likereference numerals across the several views refer to identical orequivalent features, and wherein:

FIG. 1 is a diagram of a computing device used in an embodiment of theinvention;

FIG. 2 is a diagram of a user interacting with an embodiment of theinvention;

FIG. 3 is a diagram of a user interacting with an embodiment of theinvention that comprises a second user computing device;

FIGS. 4a-4c are flow charts of an acknowledgment process used by anembodiment of the invention;

FIG. 5 is a screen shot of an embodiment of the invention;

FIG. 6 is a screen shot of an embodiment of the invention;

FIG. 7 is a screen shot of an embodiment of the invention;

FIG. 8 is a screen shot of an embodiment of the invention;

FIG. 9 is a screen shot of an embodiment of the invention;

FIG. 10 is a screen shot of an embodiment of the invention; and

FIG. 11 is a flow chart of the process used to limit acknowledgmentsfrom undesired locations.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENT(S)

Various embodiments of the present invention will now be described indetail with reference to the accompanying drawings. In the followingdescription, specific details such as detailed configuration andcomponents are merely provided to assist the reader's overallunderstanding of these embodiments. Therefore, it should be apparent toone skilled in the art that various changes and modifications of theembodiments described herein can be made without departing from thescope and spirit of the present invention. In addition, descriptions ofwell-known functions and constructions may be omitted for clarity andconciseness.

As used herein, the term “agreement” is used to refer to an agreement,contract, offer, terms and conditions, or other writings that representthe intent of a party or parties to a transaction or other type ofunderstanding. It should be understood that the use of “agreement” isnot intended to restrict the use or applicability of the invention tocontracts or other written agreements. For example, a party enteringinformation into an electronic database may be authenticated using anembodiment of the invention.

As used herein, the term “user” is defined as a party who wishes toassent to an agreement and uses the method or system described herein todo so.

As used herein, the term “initiator” is defined as a party who uses anembodiment of the invention to authenticate the signature or othermethod of assenting to an agreement by a user.

As used herein, the term “image” may represent a single image or mayrepresent a series of images which form a video representation of thesubject of the images.

Exemplary embodiments of the present invention are directed to a methodand apparatus for authenticating a user's assent to an agreement.Particularly, a method and apparatus for authenticating a user's assentto an agreement that may be performed using a computing device.Computing devices may include, but are not limited to, desktopcomputers, laptop computers, smart phones, tablet computers, networkedcomputer servers, and other computerized devices which may be equippedwith image capture hardware. Hereinafter, it is assumed that a methodand apparatus for authenticating a user's assent to an agreementaccording to the present invention are applied to a computing device.

FIG. 1 is a block diagram illustrating a computing device according toan embodiment of the present invention. Referring to FIG. 1, a computingdevice 100 may comprise a processor 102, a memory 104, a display device106, a storage device such as a disk drive 108, input devices 110 and112, a communications interface 114, a biometric data receiving device115, an image capture device 116, an operating system 118, and at leastone software program 120. In embodiments in which the computing deviceis a smart phone, tablet, or other such device, the user input devicesmay be touch sensitive display devices or integral keyboards. Asillustrated in FIG. 2, embodiments of the invention may comprise atleast one computer server 200, which may be located remotely from acomputing device 100 with which a user 204 interacts. In such anembodiment, the computer server 200 may be in communication with thecomputing device through a network 206. Such a network may be comprisedof a plurality of networks connected together to form a wide areanetwork such as the Internet 208. These networks also may comprisewireless components such as cellular data and Wi-Fi networks. Asillustrated in FIG. 3, other embodiments of the invention may comprise afirst computer device 100 which is in communication with a secondcomputer device 101 using a network 206. Such a network may be comprisedof a plurality of connected networks as described above for FIG. 2. FIG.3 illustrates that embodiments of the invention need not comprise aserver component but instead may consist of two or more computer devicesas illustrated. In addition to what is shown in FIGS. 2 and 3, otherembodiments of the invention may be comprised of additional computerdevices such that a plurality of users may be authenticated for aparticular agreement without requiring each user to perform theauthentication process on the same computer device. In such a manner,users may be authenticated from a plurality of different locations forone or more agreements.

In certain embodiments of the invention, software may be installed onthe user's computing device when the device is initially configured toperform according to an embodiment of the invention. In otherembodiments, such software may be communicated from a computer server tothe computing device on an “on-demand” basis each time the computingdevice is caused to be in communication with the computer server. Insome embodiments, software may be installed on a computing device whenthe device is initially configured to perform according to suchembodiments of the invention where such software performs only a portionof the invention where such portion configures the computer device toreceive additional software instructions from a computer server when thecomputing device is used to perform an embodiment of the invention.

FIGS. 4a-4c are a flow chart of the main steps in an algorithm whichfunctions to perform an embodiment of the invention. One skilled in theart will realize that not all steps need to be taken and that not allsteps need be performed in the order shown for one to practice certainembodiments of the invention. In addition, some of the steps illustratedmay be optional depending upon how the initiating party or organization(the initiator) wishes to control or limit the authentication process.

An initiator may wish to have an acknowledgement authenticated. In sucha circumstance, the initiator may utilize an embodiment of the inventionto facilitate the authentication. In an embodiment of the invention, theinitiator may communicate the desire of authenticating anacknowledgement to an embodiment of the invention as illustrated in FIG.2 by logging into a server 200. As is shown in step 402 of FIG. 4a , thesystem may receive such request from the initiator. Upon receipt of therequest, the system may determine whether the person or entity that theinitiator wishes to have authenticated has an account on the system 404.If the system determines that there is no user account, the system maycommunicate 406 to the initiator, the person or entity that theinitiator wishes to have authenticated, or both. The person or entitythat the initiator wishes to have authenticated may then create anaccount and install any software required on their computing device. Aswill be described herein, various methods may be used to verify theidentity of the person or entity when creating an account. Once anaccount is created 408, the person or entity being requested toauthenticate an agreement may be considered to be a “user” as definedherein. The system may then communicate the authentication request tothe user 410. Such a request may be communicated through such knownmethods as email, text, telephone, and other methods of communication towhich a user may have access. In some embodiments of the invention, thesystem may communicate the request using the computing device 100 withwhich the authentication process is conducted. In such embodiments, amessage or some other notification may be displayed by the computerdevice. As the result of this request, the computing device may thenreceive a connection or login request from the user. Alternatively, auser may be contacted by the initiator who requests the user to log intoan embodiment of the invention. In either case, the user may attempt tolog into a computer device 100 to begin the authentication process 412.An algorithm of the invention may determine if the user has previouslyregistered the computing device that the user is using to perform theauthentication process. If the user has not previously registered, thecomputing device may prompt the user to install any required softwareand authenticate the computer device if required by the embodiment ofthe invention. Embodiments of the invention may also prompt the user toenter additional identifying information such as address, email address,and telephone number. Such information may be used in embodiments of theinvention to further identify the user through such methods as a twostep authentication and also allow the initiated or an administrator ofthe system to contact the user should additional information berequired. After registering, or if the user had previously registered,the algorithm may prompt the user to enter a user name and password.Upon receiving the user's input, an algorithm may verify that theinformation is correct before allowing the user to continue. An examplelogon screen is illustrated in FIG. 5. In step 414, a welcome screen maybe displayed following a successful logon. An exemplary embodiment ofsuch a welcome screen is illustrated in FIG. 6. As is shown, a user maybe presented with a list of pending requests for acknowledgment activity602 and also recent or past acknowledgment activity 604. If a userselects an activity, the algorithm may receive the user's input 416 andcause the selected activity to be displayed in a user interface of acomputing device. Selecting a pending activity may allow the user toperform the requested authentication activity. Selecting a recent orpast activity may allow the user to view detail of that activity.

FIG. 7 illustrates a user interface showing an example agreement 702displayed on a tablet computer. In the illustrated example, thesignature page of an agreement is shown. Embodiments of the inventionmay be configured to allow a user to scroll through the agreement forreview. Referring again to FIG. 4a , step 418 represents the user beingpresented with an agreement for review. When the user is ready toacknowledge the agreement, the algorithm may receive an input from theuser signifying that the user is ready to proceed with theacknowledgement process. The algorithm may initiate an image capturefunction using an image capture device 116 in electronic communicationwith the computing device 100. Such an image device may be integratedwithin the computing device, as is common in tablet and smart phonedevices, or may be located externally as shown in FIGS. 2 and 3. Asillustrated in the exemplary user interface shown in FIG. 8, thecaptured images may be displayed in a portion 802 of the user interface,allowing the user to view the image. An input field 804 may also bedisplayed in which an embodiment of the invention may receive anacknowledgment from the user. An area for a drawn or written signatureis illustrated in FIG. 8 but such an acknowledgment may be receivedusing other methods, including, but not limited to, a typed signature, aselectable checkbox, a simulated pushbutton, or a recording of a verbalacknowledgement.

In certain embodiments of the invention, the initiator may wish to havea record of a secondary image of the user to allow a viewer of theauthentication data to easily determine that the user captured by theimage capture device 116 is who they claim to be. One method ofcapturing such a secondary image may be through the use of a photoidentification document such as a passport or driver's license. As isillustrated at step 420, if an initiator requests such a secondaryimage, an embodiment of the invention may check to see if the user haspreviously added a secondary image to their account. If not, a photoimage may be uploaded 422 or in certain embodiments of the invention,captured using the image capture device 116.

In certain embodiments of the invention, during the process of sending arequest for an acknowledgement to a user, an initiator may designate adate and time, at which point the initiator's offer to the user toacknowledge the sent item expires. Such a designation may have theeffect of limiting the period of time during which a user mayacknowledge or accept an offer described by the agreement.

In certain embodiments of the invention, an initiator may request that auser be allowed only a predetermined amount of time in which toacknowledge the agreement once the user starts the acknowledgmentprocess. The acknowledgment process is a subset of the period of timethat the user has to review, consider, and acknowledge the agreement.The acknowledgment process means that the user may have reviewed theitem to be acknowledged and has actually started to perform the act ofacknowledgment itself. For example, in an embodiment of the invention inwhich acknowledgement is accomplished by the entry of a signature by theuser, the acknowledgment process may consist of an indication such asselecting a “start” button, using a finger or stylus to sign a touchsensitive input device, and pressing a “submit” button to cause theinvention to store the signature and images captured by the imagecapture device 116. The predetermined time limitation may preventfraudulent activity by requiring the user to perform the acknowledgementact within the predetermined timeframe. In embodiments which requirethat the acknowledgement process be completed within a predeterminedtime, the system may check to determine if the acknowledgement wasactually completed within the predetermined time period 440. If the userdid not successfully complete the acknowledgement process within thepredetermined time, the system may restart the acknowledgement processat 424.

In certain embodiments of the invention, the initiator may requirefurther verification that the acknowledgement process has been completedwithin the designated time frame. In such an embodiment, when the userbegins the acknowledgement process, a time stamp may be captured on theuser's device and sent to the initiator or a third party. When theacknowledgement process is completed, the acknowledgement record,including the captured verification records, may be sent to theinitiator or third party for verification that the amount of time fromwhen the acknowledgement process started until the time theacknowledgement record was transmitted to the initiator or third partydoes not exceed the amount of time designated by the initiator when therequest for acknowledgement was sent.

To facilitate a limitation on the amount of time that a user has toperform the acknowledgement activity, in the example above, the entry ofa signature, an embodiment of the invention may communicate to the userthat there is a limited amount of time in which to act 424. Anembodiment of the invention may capture a time stamp representing thestart of the acknowledgement process 426. After the acknowledgementprocess is complete, such an embodiment may check to determine whetherthe process was completed within a predetermined period of time 440. Ifthe acknowledgement was not completed within the predetermined time,such an embodiment of the invention may notify the user and start theprocess again. Certain embodiments of the invention may be configured toallow only a limited number of attempts at verification.

To prevent a user from providing a pre-recorded authentication, theinitiator may also require further verification that the user is the onewho is acknowledging the agreement. An example of this furtherverification may be the generation of codes (either provided by theInitiator or randomly generated by the system) and receipt ofconfirmation of these codes from the user at the beginning of theacknowledgement activity, at the end of the acknowledgement activity, orboth. In step 436 the algorithm may prompt the user to enter the code inthe form of characters entered from an input device 110. In such anembodiment, incorrect codes may result in an additional request to entera code at step 432. In certain embodiments, a user may enter such a codeverbally 434 while being recorded by the image capture device 116 tocapture the verbalization of the code. When the user verbally enters thecode, an embodiment of the invention may receive the acknowledgementinput from the user before, during or after capturing images of the userentering the code and performing the requested acknowledgement activity(signing, selecting a checkbox, etc.) 438. The determination of whethercodes are entered verbally or by use of a keyboard device, touch screenor other input device may be determined by the Initiator. However, insome embodiments of the invention, the Initiator may also have theoption of allowing the user to make that decision at the time ofproviding confirmation of the codes.

If the initiator has requested that the user enter a confirmation codeafter the user performs the acknowledgement activity, an embodiment ofthe invention may generate a second random or initiator-defined code andprompt the user to enter that code 442. As with a code entered prior toan acknowledgment, a second code may be entered verbally 444 or enteredusing an input device 110 such as keyboard or other alpha numeric method446. The entered code may be confirmed 448 to make sure that it matcheswhat the user was prompted to enter. When an embodiment of the inventionreceives the acknowledgement from the user and any required codeentries, the invention may store acknowledgement and authentication data450 comprising the recorded images or videos, entered codes, and timestamps in a storage device 108, on a server 200 or some other storagemedium for later retrieval. In an exemplary embodiment of the invention,such stored information may be communicated to the initiator or enablethe user access to receive a good or service according to theacknowledged agreement.

In order to further identify the user, an embodiment of the inventionmay retrieve a unique identifier from the computer device used toperform the authentication process. Such an identifier may be, but isnot limited to, a system serial number or network interface adapternumber 428. Such an embodiment may require that a computer device bevalidated along with a user's account 430. Embodiments of the inventionmay organize and store acknowledgement and authentication data in adatabase to allow for later retrieval by an initiator, a user, or otherinterested parties who have been granted access to the data. Suchembodiments may allow these parties to sort and retrieve the data toallow for rapid retrieval of acknowledgement data in order to identifyan agreement or other acknowledged instrument and quickly accessauthentication data to confirm the identity of the user should there bea dispute over the authenticity of the acknowledgement.

A summary of the completed acknowledgement transaction may be providedshould the initiator or another authorized party request authenticationdata. An example transaction summary to the initiator is shown in FIG.9. A transaction summary may be provided via email or othercommunication method to the initiator and may include an image or video902 of the user acknowledging the agreement. The communication may alsoinclude images of the acknowledgment 904. As is illustrated in FIG. 9,an embodiment of the invention may be configured to allow or require theuser to acknowledge an agreement in multiple places 906, 908, 910, 912,and 914. For example, there may be a requirement that the user sign orinitial each page of an agreement. In such a situation, an embodiment ofthe invention may generate a list of acknowledgments required andpresent that list using a user interface similar to FIG. 6 for eachrequired acknowledgement. Alternately, an embodiment may present a userinterface similar to FIG. 7 with a list of each additional sectionrequiring acknowledgement. In such an embodiment, a user may bepermitted to select from the list to authenticate the various sections.Embodiments may be configured to display an indication of those sectionswhich require authentication and those for which authentication has beenprovided. In such embodiments, a user may be alerted if there areunacknowledged sections remaining when that user attempts to completethe acknowledgement process.

If the initiator requires that the user perform the acknowledgmentactivity within a certain time period and that time period has elapsed,the algorithm may notify the user that the predetermined time toacknowledge has expired and prompt the user to try again 440. In theevent that a user is prompted to try again, the algorithm may configurethe computing device to redisplay the agreement as shown in FIG. 7.Embodiments of the invention may be configured to limit the number ofattempts by a user to perform the acknowledgment.

Being able to observe their recorded image as well as the acknowledgmentmay assist the user in the acknowledgment process. As illustrated inFIG. 10, an embodiment of the invention may display a user interfacewhich shows the captured user image 802, acknowledgment 804, and timestamp information 1002. Such a user interface may be displayed to theuser while that user acknowledges the agreement in order to assist thatuser in the acknowledgment process. In certain embodiments of theinvention, a similar user interface may be displayed to permit theinitiator to observe the user's activities during the acknowledgmentprocess.

In addition to functioning as a method of confirming the identity of asingle user, embodiments of the invention may function to confirm theidentity of a plurality of users. In such an embodiment, one or morecomputing devices may be configured to accept input from more than oneuser and combine all inputs into a communication to the initiator. Insuch embodiments, each user may be prompted to perform anacknowledgement activity as described in the flow chart of FIGS. 4a-4c .A communication to the initiator as the result of such an embodiment isillustrated as one or more acknowledgements 916 from a second user asshown in FIG. 9. One skilled in the art will realize that an embodimentof the invention may be configured such that the initiator is at least asecond user. Such an embodiment may allow the initiator to acknowledgean agreement in conjunction with at least a first user's acknowledgment.

Off-Line Operation

In addition to configurations in which a computing device 100 isconnected to a computer server 200, embodiments of the invention may beconfigured such that a computing device may receive agreement data andrequirements from a computer server or second computing device at anearlier point in time during which the computer device is incommunication with the computer server or second computer device. Insuch an embodiment, the computer device may perform the acknowledgmentfunction at a later point in time without requiring a connection to acomputer server or second computing device. Agreement and requirementsdata may be received using methods such as email, file transfer protocol(FTP), DropBox (DropBox.com), or other methods of receiving informationremotely that are known to those ordinarily skilled in the art. Anembodiment of the invention may execute an algorithm that configures acomputing device to store acknowledgment information from the useraccording to requirements set forth in received agreement data. When theuser has completed the acknowledgement process, the computing device maybe configured to store the acknowledgment information. Such storedacknowledgement information may comprise an image or images, time stampinformation, and a record of the method of acknowledgment including, butnot limited to, an electronically captured signature, checkbox, “accept”pushbutton, or entered characters. Such stored information may beencrypted or otherwise protected to prevent a user or other party fromtampering with the stored information. The computing device may also beconfigured to transmit the stored acknowledgment information to acomputer server or second computer when a connection to the computerserver or second computer becomes available.

Non-Login Operation

Creating a log-in profile in order to use a service such as describedherein can be time consuming and result in frustration to those who wishto only occasionally use the service. The result may be that rather thancreating the log-in, a potential customer may choose to seek goods orservices elsewhere. In order to prevent the loss of a potentialcustomer, an embodiment of the invention may be configured to allow acustomer to acknowledge an agreement without registering or requiring auser log-in process. Such a customer may be considered to be anunregistered user. Referring to FIG. 4a , in such a configuration, theacknowledgment process may start at step 414. In such an embodiment, theinvention may display a welcome screen, present an unregistered userwith an agreement and request that the unregistered user acknowledgethat agreement while images are captured of the acknowledgement. If anacknowledgement action is received from an unregistered user, anembodiment of the invention may be configured to allow the unregistereduser to continue with a process of using a service or purchasing goods.In such an embodiment, data captured during the acknowledgment processcomprising time stamps, images, device ID number, device location, andacknowledgment actions may be transmitted to a computer server or secondcomputing device for use by a party providing services or goods thatrequire authentication before a customer is allowed to access theservices or goods.

Computer to Computer

In circumstances in which a computer server is not desirable, anembodiment of the invention may be configured to allow a first computingdevice to interact with a second computing device where each computingdevice may be executing a software embodiment of the invention. Such anembodiment is illustrated in FIG. 3. As is illustrated, a secondcomputing device 101 may be operated by an initiator 205 and thatcomputing device may receive instructions from the initiator that causethe second computing device to transmit a request for an acknowledgmentto at least a first computing device 100. In certain embodiments, theprocess may also be reversed wherein the user sends a request to theinitiator. As a result of a request for acknowledgment, the firstcomputing device may then prompt a user 204 operating the firstcomputing device to acknowledge an agreement. The first computing devicemay then receive such an acknowledgment from the user as if the firstcomputing device were in electronic communication with a computer serveras in other embodiments of the invention. Acknowledgment data may betransmitted from the first computing device to the second computingdevice for use by the initiator.

Video Acknowledgment

In addition to methods of acknowledgement comprising signatures, text,or selection of a button or checkbox, an embodiment of the invention maybe configured to provide instructions to a user to verbally acknowledgean agreement. In such an embodiment, a computing device may beconfigured to instruct a user to verbally acknowledge an agreement whilean image capture device records a video image and audio recording of theacknowledgment. These recordings may be transmitted to a computer serverconnected to the computing device where they can be used as a record ofa user's acknowledgment in a manner similar to signatures, text,selection of a button, or checkbox used as a record of a user'sacknowledgment in other embodiments of the invention. In embodiments ofthe invention which do not require a connection to a computer server orother computing device to perform the authentication function, therecording of the acknowledgment may be stored by the user's computerdevice for later transmission.

Location Restrictions

An initiator may wish to restrict access to the acknowledgment processto certain geographic locations. Such restrictions may enable theinitiator to prevent a user from acknowledging or accepting an agreementfrom a geographic location from which the initiator does not wish toaccept such an acknowledgment. An example of this may be a condition inwhich the user wishes to agree to the terms and conditions of a sportswagering web site. Use of such a web site may be prohibited in certainlocations. An embodiment of the invention may be configured to preventusers who are located in such locations from performing theacknowledging process, thus helping to prevent a violation of theprohibition. As shown in the flow chart of FIG. 11, an initiator mayselect to limit acknowledgment from certain locations 1102. When a userconnects a computing device to a server and attempts to start theacknowledgment process, the computing device may be configured totransmit the location of the computing device to the server 1104. Instep 1106, the computer server may be configured to compare thetransmitted location to a list of prohibited locations. If the locationis found on the list of prohibited locations, the server may cause amessage to be displayed on the user's computing device 1108, informingthe user that accepting or assenting to the agreement is prohibited fromthat user's location. In such an embodiment, if the location is notprohibited, the user may be allowed to continue with the acknowledgmentprocess 1110.

Device Validation

In an embodiment of the invention, an initiator may wish to controlaccess to the acknowledgment process. One method of controlling thataccess may be performed by limiting the computing devices 100 used tothose which have been previously authenticated. Authentication of thecomputing device may be performed during a user enrollment process.During such a process, a user may be required to perform the enrollmentusing the computing device that is to be authenticated. During theenrollment process, the computing device 100 may be configured totransmit information that uniquely identifies the user's computingdevice to a computer server 200 or other computing device. An example ofinformation that uniquely identifies a computing device may be a serialnumber associated with the communications interface circuitry 114 of thecomputing device. In an embodiment of the invention, when a userattempts to perform the authentication process, the computing device maybe instructed to allow a second computing device or computer server toread the unique identification number associated with the computingdevice. If the unique identification number does not match that what haspreviously been validated, the user may be prevented from performing theauthentication process.

“Offer Valid” Time

In an embodiment of the invention, an initiator may wish to limit thetime that a user has to accept or otherwise affirm an agreement. Thisdiffers from the time period to perform the acknowledgment processpreviously described in that a time to perform the acknowledgmentprocess limits the amount of time that a user has to complete theacknowledgment once started, whereas a limit on the time a user has toaccept or affirm may cause the agreement to expire if the user has notaccepted or acknowledged the agreement within the time limit. In such anembodiment, the initiator may choose a time period beginning when therequest for acknowledgement is initially sent, during which theagreement may be accepted. When a user initiates the acknowledgmentprocess, an algorithm may check to see if there is a predetermined limiton the time which an agreement may be acknowledged. If the time periodhas elapsed or has not yet started, the algorithm may display a messageto the user informing that user that the agreement is not available tobe accepted.

Biometric Authentication

Additional methods of authenticating the user may be employed inembodiments of the invention. One such method may be the use ofbiometric information. In such embodiments of the invention, sensorssuch as a fingerprint reader may be placed in electronic communicationwith a computing device configured to perform the inventive algorithm.The fingerprint reader may be configured by a software algorithm torecord the fingerprint from a user as that user acknowledges the termsof an agreement. In such an embodiment, the user's fingerprint may bestored in a storage device 108 along with other acknowledgment recordssuch as time stamps, user images, and signature or other acknowledgmentrecords. As additional biometric measurement technology becomes morewidely available and cost effective, such functions as retina scanningor DNA sampling may also be implemented in embodiments of the invention.

Facial Recognition Authentication

Another additional method of authenticating a user in embodiments of theinvention may employ facial recognition technology. In such anembodiment, images of the user captured during the acknowledgmentprocess may be compared to previous images of the user using facialrecognition software. Such previous images of the user may compriseimages from a registration or enrollment process or may be imagesobtained from sources including, but not limited to, public records,employment data, social media, and operator's license images.

Any embodiment of the present invention may include any of the optionalor preferred features of the other embodiments of the present invention.The exemplary embodiments herein disclosed are not intended to beexhaustive or to unnecessarily limit the scope of the invention. Theexemplary embodiments were chosen and described in order to explain theprinciples of the present invention so that others skilled in the artmay practice the invention. Having shown and described exemplaryembodiments of the present invention, those skilled in the art willrealize that many variations and modifications may be made to thedescribed invention. Many of those variations and modifications willprovide the same result and fall within the spirit of the claimedinvention. It is the intention, therefore, to limit the invention onlyas indicated by the scope of the claims.

What is claimed is:
 1. A computerized method of authenticating theelectronic acknowledgement of an item comprising the steps of:displaying at least one item to be electronically acknowledged on adisplay device of a first computerized device; configuring an inputdevice of the first computerized device to receive an input from a user;receiving from the user, using an input device of the first computerizeddevice, an input representing the user's electronic acknowledgement ofthe displayed item; capturing, using an image capture device of thefirst computerized device, at least one image of the user performing theacknowledgement during the process of receiving the input representingthe user's electronic acknowledgement of the displayed item where theimage itself does not represent the acknowledgment and is in addition tothe received input; and storing a data record on the first computerizeddevice comprising the user's electronic acknowledgement, a reference tothe displayed item to be acknowledged, and the at least one capturedimage.
 2. The computerized method of claim 1, further comprising thestep of displaying at a computerized device, the at least one capturedimage and a representation of user's electronic acknowledgment.
 3. Thecomputerized method of claim 1, further comprising the steps of:transmitting from the first computerized device to a second computerizeddevice, the stored record.
 4. The computerized method of claim 3,further comprising the steps of: displaying at the second computerizeddevice, the at least one captured image; and displaying at the secondcomputerized device, a representation of user's electronicacknowledgment.
 5. The computerized method of claim 3, furthercomprising the steps of: transmitting from the second computerizeddevice to the first computerized device, data representing at least oneitem to be acknowledged; monitoring a time period beginning when the oneitem to be acknowledged is transmitted from the second computerizeddevice until the receipt from the user of an input representing theuser's acknowledgment; and generating a notification when the monitoredtime period exceeds a predefined time limit.
 6. The computerized methodof claim 3, further comprising the steps of: transmitting from thesecond computerized device to the first computerized device, datarepresenting at least one item to be acknowledged; receiving at thesecond computerized device, the stored record; monitoring a time periodbeginning when the one item to be acknowledged is transmitted from thesecond computerized device until the stored record is transmitted fromthe first computerized device; and generating a notification when themonitored time period exceeds a predefined first time limit.
 7. Thecomputerized method of claim 3, further comprising the step oftransmitting data identifying the first computerized device to thesecond computerized device.
 8. The computerized method of claim 1,further comprising the steps of: monitoring the time period that a userexpends from the time that the user initiates the acknowledgementprocess to the time the user completes the acknowledgement process; andnotifying the user if the time expended exceeds a predefined second timelimit.
 9. The computerized method of claim 1, further comprising thesteps of: presenting to the user using the display device, prior toreceiving the user's acknowledgement, a first code; receiving from theuser, prior to receiving the user's acknowledgement, the presented firstcode; and storing in the data record, the presented first code receivedfrom the user.
 10. The computerized method of claim 1, furthercomprising the steps of: presenting to the user using the displaydevice, after receiving the user's acknowledgement, a second code; andreceiving from the user, the presented second code; and storing in thedata record, the presented second code received from the user.
 11. Thecomputerized method of claim 1, further comprising the steps of:receiving biometric identification information from the user using abiometric data receiving device; and storing the received biometricinformation in the stored record.
 12. The computerized method of claim1, further comprising the steps of: receiving, using the computerizeddevice, user identification data comprising an image of a documentcomprising a photograph of the user and textual information identifyingthe user.
 13. A computerized method of authenticating the electronicacknowledgement of an item comprising the steps of: presenting to a useron a display device of a first computerized device, data representing atleast one item to be acknowledged; receiving data identifying theapproximate physical location of the computerized device; comparing thereceived physical location data against a list of predeterminedauthorized locations; configuring an input device of the firstcomputerized device to receive an input from a user; capturing, using animage capture device of the first computerized device, at least oneimage which is in addition to the received input where the inputrepresents the user's electronic acknowledgment of the displayed itemand where such image illustrates the user performing the step ofproviding the input representing the acknowledgement; and storing a datarecord on the first computerized device comprising the user's electronicacknowledgment, a reference to the displayed item, and the at least onecaptured image; and transmitting from the first computerized device to asecond computerized device, the stored data record.
 14. The computerizedmethod of claim 13, further comprising the steps of: displaying at thesecond computerized device, the at least one captured image; anddisplaying at the second computerized device, a representation of user'selectronic acknowledgment.
 15. The computerized method of claim 13,further comprising the steps of: transmitting from a second computerizeddevice to a first computerized device, data representing at least oneitem to be acknowledged; monitoring a time period beginning when the oneitem to be acknowledged is transmitted from the second computerizeddevice until the receipt from the user of an input representing theuser's acknowledgment; and generating a notification when the monitoredtime period exceeds a predefined first time limit.
 16. The computerizedmethod of claim 13, further comprising the steps of: transmitting from asecond computerized device to a first computerized device, datarepresenting at least one item to be acknowledged; receiving at thesecond computerized device, the stored record; monitoring a time periodbeginning when the one item to be acknowledged is transmitted from thesecond computerized device until the stored record is transmitted fromthe first computerized device; and generating a notification when themonitored time period exceeds a predefined first time limit.
 17. Thecomputerized method of claim 13, further comprising the step oftransmitting data identifying the first computerized device to thesecond computerized device.
 18. The computerized method of claim 13,further comprising the steps of: monitoring the time period that a userexpends from the time that the user initiates the acknowledgementprocess to the time the user completes the acknowledgement process; andnotifying the user if the time expended exceeds a predefined time limit.19. The computerized method of claim 13, further comprising the stepsof: presenting to the user using the display device, prior to receivingthe user's acknowledgement, a first code; receiving from the user, priorto receiving the user's acknowledgement, the presented first code; andstoring in the data record, the presented first code received from theuser.
 20. The computerized method of claim 19, further comprising thesteps of: presenting to the user using the display device, afterreceiving the user's acknowledgement, a second code; and receiving fromthe user, the presented second code; and storing in the data record, thesecond code received from the user.
 21. The computerized method of claim13, further comprising the steps of: receiving biometric identificationinformation from the user using a biometric data receiving device; andstoring the received biometric information in the stored record.
 22. Thecomputerized method of claim 13, further comprising the step ofreceiving, using the first computerized device, user identification datacomprising an image of a document comprising a photograph of the userand textual information identifying the user.
 23. A computerized systemfor authenticating the acknowledgement of an item comprised of: softwareinstructions that when executed by a processor of a first computerdevice: configures a display device of the first computer device todisplay at least one item to be acknowledged; configures a user inputdevice of the first computer device to receive a user acknowledgment;configures an image capture device of the first computer device tocapture at least one image of the user performing the acknowledgement ofthe at least one displayed item where said image itself does notrepresent the acknowledgement; stores a data record in a storage deviceof the first computer device comprising the item to be acknowledged, thereceived user acknowledgement, and at least one image of the useracknowledging the displayed item to be acknowledged; causes the firstcomputer device to transmit the data record to a second computer device;and software instructions that when executed by a processor of thesecond computer device: cause the second computer device to receive thetransmitted data record; cause the second computer device to displaycontents of the data record comprising the user's electronicacknowledgement, a reference to the displayed item to be acknowledged,and the at least one image of the user acknowledging the displayed itemto be acknowledged; and cause the second computer device to receive aninput representing a verification that the displayed captured imagerepresents an authorized acknowledger.
 24. The computerized system ofclaim 23, further comprising software instructions that when executed bya processor of the second computer device, configure the secondcomputerized device to receive data identifying the first computerdevice.
 25. The computerized system of claim 23, further comprisingsoftware instructions that when executed by the processor of the firstcomputerized device, configure the first computerized device to limitthe amount of time that the user interface device will capture anacknowledgement instruction to a predetermined amount of time after theuser initiates the acknowledgement process.
 26. The computerized systemof claim 23, further comprising software instructions that when executedby the processor of the first computerized device: configure the firstcomputerized device to display a first code; and configure the firstcomputerized device to receive the first code from the user prior to theentry of an acknowledgement instruction.
 27. The computerized system ofclaim 23, further comprising software instructions that when executed bythe processor of the first computerized device: configure the firstcomputerized device to display a code after entry of a useracknowledgement; and configure the first computerized device to receivea code entered using the user input device to receive the entered code.28. The computerized system of claim 23, further comprising softwareinstructions that when executed by the processor of the firstcomputerized device: configure the first computerized device to receivebiometric data from a device for receiving biometric data in electroniccommunication with the first computerized device; and configure thefirst computerized device to store the received biometric data whenstoring the received user acknowledgement.
 29. The computerized systemof claim 23, further comprising software instructions that when executedby the processor of the first computerized device: configure the firstcomputerized device to receive data representing an identificationarticle that comprises the user's name and image; and configure thefirst computerized device to store the received data representing theidentification article.
 30. The computerized system of claim 23, furthercomprising software instructions which: configure the first computerizeddevice to determine its physical location; and display a message thatthe location is unauthorized when the physical location has beenpredetermined to be in a prohibited location.