Systems and methods for determining an authorization threshold

ABSTRACT

Systems and methods are described that determine a threshold value for an authorization check, such as an age verification, that is performed at a point of sale or other point of access control where access to a product, service, location, event, or the like, is restricted to individuals who meet an authorization threshold. In embodiments associated with purchases that comprise a variety of items for purchase and a variety of associated age-related authorization thresholds, systems and methods are described for determining an age-related authorization threshold for the purchase as a whole that will authorize the purchase of the items. In embodiments in which a purchaser&#39;s authorization is checked with respect to a determined threshold value, a record of the authorization check can be stored and can subsequently be retrieved to verify that an authorization check for the encounter was carried out using the determined threshold value.

This application is a continuation of U.S. patent application Ser. No.10/387,045 filed on Mar. 11, 2003 now Pat. No. 6,755,344, which claimsthe benefit of priority under 35 U.S.C. § 119(e) of U.S. provisionalapplication No. 60/363,888 filed on Mar. 12, 2002 and entitled SYSTEMSAND METHODS OF CALCULATING AGE AT A POINT OF SALE DEVICE, the entiretyof which are hereby incorporated herein by reference.

REFERENCE TO RELATED APPLICATIONS

The present application is a member of the set of related, co-pending,and commonly owned U.S. patent applications having the following titles,application nos. and filing dates:

application Ser. Title No. Filing Date Systems And Methods For Verifying10/387,042 Mar. 11, 2003 Authorization Systems And Methods For10/387,044 Mar. 11, 2003 Determining A Need For Authorization SystemsAnd Methods For 10/387,045 Mar. 11, 2003 Determining An AuthorizationThreshold Systems And Methods For Verifying 10/387,012 Mar. 11, 2003Authorization For Electronic Commerce Systems And Methods For 10/387,015Mar. 11, 2003 Determining An Authorization Threshold For ElectronicCommerce

Each of the above referenced patent applications is incorporated hereinby reference in its entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The invention relates to systems and methods for retrievably storing theresults of an age calculation or other authorization determination.

2. Description of the Related Art

Many situations exist in which a merchant or other businessperson islegally obligated to control the sale of certain goods or services byensuring that customers meet a minimum age limit or are otherwiseauthorized to purchase the good or service. For example, clerkstypically verify the age of customers who wish to purchase alcohol ortobacco products. Other products, such as fireworks, firearms, lotterytickets, adult-content literature, and other products, may also beage-controlled. In addition, merchants may be legally required torestrict the age of customers in other situations, such as at theentrance to a bar, casino, adult-entertainment establishment, orage-controlled movie. In many jurisdictions, merchants who do notfulfill their legal obligations to restrict access to age-controlledgoods and services may be subject to fines, the loss of their license todo business, or other penalties.

However, in many situations where an authorization check may beindicated for some transactions, other transactions occur for which nocheck of authorization is needed. Furthermore, one transaction maycomprise items with varying authorization thresholds. For example, adesired rental at a video rental store may comprise three movies, eachassociated with a different age-related authorization threshold,depending on the rating assigned to the movie. Similarly, grocery storesthat sell alcohol and tobacco products, which can be associated withvarious age threshold restrictions, typically also sell other productsthat are not associated with any minimum age threshold.

Performing an authorization check that complies with legal and otherrequirements entails knowing a correct authorization threshold for atransaction that comprises one or more items, each of which mayindividually be associated with a different authorization threshold. Insome current systems, determination of a correct authorization thresholdfor a transaction that comprises items associated with one or moreindividual authorization thresholds is carried out mentally by a clerkassociated with the transaction. In such situations, correctdetermination of an appropriate authorization threshold can be subjectto inaccuracies caused at least in part by stresses inherent in a pointof sale setting as well as by lack of skill or care exercised by theclerk.

Furthermore, current systems that determine authorization, such as anauthorization based on age, at a point of access control to a restricteditem typically do not provide documentation of the age calculation orother authorization check associated with a given transaction, althoughsuch documentation could become very useful if a business establishmentis accused of failing to comply with authorization regulations. Forexample, consider the situation in which an eighteen-year old customeruses false identification to purchase several items, includingcigarettes and alcohol, and is subsequently apprehended by the law. Ifthe customer prefers not to surrender the false identification used, butto claim instead that his or her true identification card was deemed bythe clerk to be sufficient for the purchase, the merchant may be accusedof selling the alcohol illegally. Without a record of the transactionand the associated identification check, the merchant may havedifficulty establishing his or her compliance with the law.

Other forms of authorization requirements unrelated to age may also bemandated by law at a point of sale or other point of control for accessto a product, a service, a location, an event, or the like. For example,in some jurisdictions, felons may be restricted from purchasingfirearms. Additionally, even if age-checking or other authorization isnot mandated by law, some products and situations exist for which amerchant may voluntarily wish to verify that customers' authorizationhas been checked, such as for insurance or other internal managementpurposes.

Hence, it will be appreciated from the foregoing that there is a needfor authorization verification systems and methods that determine anauthorization threshold that will authorize access to the items of atransaction. There is a further need for authorization verificationssystems and methods that provide a retrievable record of the fact that apoint-of-access-control authorization determination was performed fortransactions requiring age-based or other types of authorization.

SUMMARY OF THE INVENTION

Systems and methods are described that determine a threshold value foran authorization check, such as an age verification, that is performedat a point of sale or other point of access control where access to aproduct, service, location, event, or the like, is restricted toindividuals who meet an authorization threshold. In embodimentsassociated with purchases that comprise a variety of items for purchaseand a variety of associated age-related authorization thresholds,systems and methods are described for determining an age-relatedauthorization threshold for the purchase as a whole that will authorizethe purchase of the items. In embodiments in which a purchaser'sauthorization is checked with respect to a determined threshold value, arecord of the authorization check can be stored and can subsequently beretrieved to verify that an authorization check for the encounter wascarried out using the determined threshold value.

In various embodiments, the system uses a criterion other than age todetermine that an individual is authorized to make a purchase or tootherwise participate in a transaction, and retains a record of thedetermination for subsequent retrieval.

An embodiment of a process is described for determining an age-relatedauthorization threshold for a purchase comprising at least one item. Theprocess comprises the acts of: (i) identifying an item that a purchaseris attempting to purchase; (ii) identifying an age-related authorizationthreshold associated with the item; (iii) repeating acts (i) and (ii)for the items of a purchase; (iv) selecting an authorization thresholdto be the authorization threshold for the purchase; (v) calculating theage of the purchaser; and (vi) storing in a memory a record indicativeof the purchase and of the calculated age of the purchaser.

An embodiment of a point of sale device is described for determining anage-related authorization threshold for a purchase that comprises aplurality of items. The point of sale device comprises an itemidentifier apparatus that is configured to identify items that apurchaser is attempting to purchase. The point of sale device comprisesfurther a computer memory that is configured to store a database ofage-related authorization information regarding items that are availablefor purchase, wherein the information comprises identificationinformation for the items and age-related authorization thresholdsassociated with the items. The point of sale device further comprises acomputer processor configured to receive a plurality of signals from theitem identifier apparatus that identify the plurality of items of thepurchase. The computer processor is further configured to use thereceived item identifier signals to access the database of age-relatedauthorization information in the computer memory. The computer processoris further configured to determine, based at least in part on theage-related authorization information, an age-related authorizationthreshold that authorizes the purchase of the items.

An embodiment of a computerized system is described for determining anage-related authorization threshold for a purchase that comprises aplurality of items. The system comprises: means for obtaining electronicidentifiers for a plurality of items that a purchaser is attempting topurchase; means for using the electronic identifiers to access adatabase of age-related authorization information associated with theitems; and means for determining, based at least in part on theage-related authorization information, an age-related authorizationthreshold that authorizes the purchase of the items.

An embodiment of a software module is described. The software modulegives a device the capability to obtain electronic identifiers for aplurality items that a purchaser is attempting to purchase; to use theelectronic identifiers to access a database of age-related authorizationinformation associated with the items; and to determine, based at leastin part on the age-related authorization information, an age-relatedauthorization threshold that authorizes the purchase of the items.

An embodiment of a computerized process is described for determining anage-related authorization threshold for a purchase comprising aplurality of items. The process comprises the acts of: obtainingelectronic identifiers for a plurality items that a purchaser isattempting to purchase; using the electronic identifiers to access adatabase of age-related authorization information associated with theitems; and determining, based at least in part on the age-relatedauthorization information, an age-related authorization threshold thatauthorizes the purchase of the items.

An embodiment of a point-of-sale device is described for determining anage-related authorization threshold for a purchase that comprises atleast one item. The point-of-sale device comprises: an item identifierapparatus that is configured to transmit identifying electronic signalsassociated with items that a purchaser wishes to purchase; a database ofage-related authorization threshold information for items that areavailable for purchase; a table of electronically stored records thatare associated with age calculations performed in association withpurchases. The point-of-sale device further comprises a computerprocessor that is configured to receive the item-identifying signalsfrom the item identifier apparatus, to use the item-identifying signalsto access age-related authorization threshold information in thedatabase that is related to the items in the purchase, and to select oneof the accessed age-related authorization thresholds to be theage-related authorization threshold for the purchase. The computerprocessor is further configured to calculate the age of the purchaserand to store in the table a record indicative of the purchase and of thecalculated age of the purchaser.

An embodiment of a process for determining an authorization thresholdfor a purchase comprising at least one item is described. The processcomprises the acts of: (i) identifying an item associated with apurchase; (ii) accessing stored information about the item that isindicative of an authorization threshold associated with the item; (iii)repeating steps (i) and (ii) for each of the items in the purchase; and(iv) selecting one of the thresholds to be the authorization thresholdfor the purchase.

For purposes of summarizing the invention, certain aspects, advantagesand novel features of the invention have been described herein. It is tobe understood that not necessarily all such advantages may be achievedin accordance with any particular embodiment of the invention. Thus, theinvention may be embodied or carried out in a manner that achieves oroptimizes one advantage or group of advantages as taught herein withoutnecessarily achieving other advantages as may be taught or suggestedherein.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A depicts one embodiment of a point-of-sale terminal that can beused with the authorization verification systems and methods.

FIG. 1B depicts one embodiment of a local computer that can be used withthe authorization verification systems and methods.

FIG. 2A is a block diagram that depicts one embodiment of anauthorization verification system.

FIG. 2B is a block diagram that depicts one embodiment of anauthorization verification system for electronic commerce.

FIG. 3 is a flow chart that depicts one embodiment of a transactionprocess that can comprise a verification of authorization based on age.

FIG. 4 is a flow chart that depicts one embodiment of a process tocalculate, display, and store a record of an authorization based on age.

FIG. 5A depicts a sample embodiment of a products database.

FIG. 5B depicts a first sample embodiment of a record of agecalculations performed.

FIG. 5C depicts a second sample embodiment of a record of agecalculations performed.

FIG. 6 depicts a sample embodiment of a sales receipt comprisingcalculated age information.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Systems and methods for determining authorization at a point of sale orother point of access control to a purchase, a service, a location, anevent, information, or the like are described, wherein, in variousembodiments, a need for authorization is determined, an authorizationthreshold is determined, authorization, or the lack thereof, isdetermined with respect to the authorization threshold, and aretrievable record of the authorization determination is stored so thatperformance of the authorization determination may subsequently beverified. In one embodiment, the systems and methods are used inconjunction with a purchase of items at a point of sale, wherein theitems desired for purchase comprise at least one item that is associatedwith an age-related authorization threshold. For example, in a purchaseof items at a grocery store, items containing alcohol or tobacco may beassociated with age-related authorization thresholds, and sale of theitems may not be permitted to a customer whose age is below theage-related threshold determined for the purchase.

Detailed embodiments of the present invention are disclosed herein.However, it is to be understood that the disclosed embodiments aremerely exemplary of the authorization verification systems and methods,which may be embodied in various forms. Therefore, specific structuraland functional details disclosed herein are not to be interpreted aslimiting, but merely as a basis for the claims and as a representativebasis for teaching one skilled in the art to variously employ themethods in a wide variety of implementations.

For example, although embodiments of the authorization systems andmethods are described herein as being implemented in conjunction with asystem that uses age as an authorization requirement, other embodimentsexist in which authorization is based on other requirements, including,but not limited to, citizenship, residence, membership, weight, securityclearance level, or other authorizing characteristics. Furthermore,although some embodiments described herein refer to a minimum authorizedage, such as a minimum authorized age for the purchase of tobacco oralcohol, other embodiments exist that refer to a maximum authorized age,such as a maximum age for which “child rates” for air travel or othertickets are authorized, or refer to an authorized range of ages.

Similarly, embodiments of the authorization verification systems andmethods may be implemented in situations where criteria other than ageare used to authorize an individual's participation in a controlledtransaction or activity. For example, entry to a community center orpermission to vote in a local election may be restricted to individualsresiding within certain zip codes, and a purchase of firearms may berestricted non-felons. Storing a record that verifies that authorizationwas checked may be desirable in these situations.

Furthermore, although some embodiments of the authorization systems andmethods are described herein as being implemented in conjunction with apurchase at a merchant's point-of-sale terminal, the systems and methodscan also be implemented in other point of access control situationsand/or locations where age calculation, or other type of authorization,is desirable. For example, in some embodiments, the systems and methodsare utilized in conjunction with an electronic (e-commerce) transactionthat may be initiated at a local or personal computer. Furthermore, thesystems and methods may be utilized at other types of points-of-controlthat are not associated with a financial transaction. Therefore, the useof the terms “clerk,” “merchant,” “merchant representative,” and thelike are not meant to be limiting, but are intended to refer to aperson, if any exists, who is facilitating the authorization process. Inembodiments in which the systems and methods are automated, thefunctions of the “clerk” may be executed by suitably configured computersoftware and/or hardware. Likewise, the terms “customer,” “purchaser,”and “user” are intended to refer to a person whose authorization isbeing determined by the systems and methods described herein, withoutimplying that the systems and methods must be associated with a purchaseor other business transaction. The term “point of sale” is intended torefer to a point of control where access to a product, event, location,service, or the like can be granted or denied. The terms “product,”“offering,” and “item” are not intended to be limited to physicalobjects available for purchase, but, as has been described, may alsorefer to a service, information, event, location, or other like to whichaccess may be limited according to a measure of authorization.Similarly, the terms “purchase,” “transaction,” and “encounter” mayrefer to an event in which authorization is determined for access.

Referring to the drawings in more detail:

FIG. 1A depicts one embodiment of a point-of-sale terminal 130 with anassociated magnetic-stripe reading device 120, a bar code scanner 160,and a variety of additional displays that can implement embodiments ofthe authorization verification systems and methods. The embodiment shownin FIG. 1A can be used, for example, in conjunction with a point-of-salepurchase of age-controlled products and with an authorization that isbased on an age threshold that is performed in association with thepurchase.

In the embodiment shown in FIG. 1A, the magnetic-stripe reading device120 allows for the input of personal information regarding an individualfrom an appropriately configured magnetic stripe on a driver's license,credit card, or other identification card 110. The personal informationread from the magnetic stripe may comprise the individual's birth date,citizenship, or other legally identifying features. In some embodiments,having the individual's birth date allows for the calculation of theindividual's current age.

In some embodiments, the personal information may not comprise theindividual's birth date, but may provide access to stored birth dateinformation for the individual. For example, biometric input, such as afingerprint, a palm print, an iris or retina scan, a facial pattern, ora voice sample, may be used, in embodiments with other input devices, aspersonal information that allows the system to link to other availabledata, such as a database of stored personal information, wherein thestored personal information does comprise the individual's birth date.In some embodiments, personal information comprising the individual'sbirth date may be input using, by way of example, a smart card, a barcode, a transponder, a cell phone, a personal digital assistant, otherwireless device, a security key, a computer “cookie” file or other file,manual keyboard input, or other device or method for communicating data.

In some embodiments, as an addition or an alternative to personalinformation that is entered electronically, personal information canalso be entered to the system manually (as when a clerk types in a birthdate read from an identification card), orally (as when the clerk speaksthe birth date into a suitable input device), or by any of a variety ofother methods.

In the embodiment shown in FIG. 1A, the bar code reader 160 allows forthe input of identifying information regarding products that comprisethe purchase. In some embodiments, the identifying information about theproducts allows for access to additional stored information about theproducts, as is described in greater detail with reference to the sampleproducts database in FIG. 5A. In some embodiments, the additional storedinformation about the products may comprise information indicative ofwhether the purchase of a product requires authorization, such as averification of the purchaser's age, before the purchase can becompleted.

In some embodiments, input of information regarding the products and/orservices associated with the transaction is implemented by using adifferent type of bar code reader, by manually keying in identifyinginformation, or by another method of information input.

In some embodiments, the age calculation and verification systems andmethods may be implemented as one or more software modules that areeasily implemented on existing equipment at a point of sale. Thepoint-of-sale terminal 130, the magnetic-stripe reading device 120, thebar code reader 160, and the additional display 140 are items that maycommonly exist at a point of sale, thereby illustrating the fact thatthe systems and methods may, in some embodiments, be implemented at apoint of sale without the need for additional hardware. In someembodiments, the point-of-sale terminal 130, the magnetic-stripe-readingdevice 120, the bar code reader 160, and/or the additional display 140are connected by way of a computer network to additional computerstorage and processor hardware.

In the embodiment shown in FIG. 1A, software for performing the agecalculation and verification may be executed, for example, by aprocessor or other circuitry located within the point-of-sale terminal130, by a computer device networked to the point-of-sale terminal 130,and may alternatively or additionally be executed by a processor orother circuitry located within the associated magnetic-stripe-readingdevice 120 or other peripheral device. The processors may comprise, byway of example, personal computers (PCs), mainframe computers, otherprocessors, program logic, or other substrate configurationsrepresenting data and instructions, which operate as described herein.In other embodiments, the processors may comprise controller circuitry,processor circuitry, processors, general purpose single-chip ormulti-chip microprocessors, digital signal processors, embeddedmicroprocessors, microcontrollers and the like.

As illustrated in FIG. 1A, several options exist for displaying theresults of an age calculation authorization. For example, the results,such as a calculated age or other appropriate message, can be displayedin the LCD or other display window of the magnetic-stripe-reading device120. The results may additionally or alternatively be displayed in adisplay window associated with the point-of-sale terminal 130 or with anadditional display 140 at the point of sale or at another appropriatelocation. Age calculation results may also be printed on a sales receipt150 associated with a given transaction, as will be described in greaterdetail with reference to the sample receipt of FIG. 6.

In some embodiments in which the authorization is based on age, theresults of an age calculation may be displayed in numeric form, where anumber represents the individual's age in years. In some embodiments,the age calculation results may comprise additional information. Forexample, in one embodiment, to emphasize the fact that the agecalculation system is not configured to authenticate an identificationcard or to guarantee an individual's age, the age calculation resultsmay be displayed in a format similar to the following:

In one embodiment, the results of an age calculation may beelectronically stored along with other data in a transaction record inthe point-of-sale terminal 130. In other embodiments, a record of theage calculation may be stored in the magnetic-stripe-reading device 120or other peripheral device. In yet other embodiments, a record of theage calculation may be stored in a computer memory that is accessible tothe point-of-sale terminal 130 by way of a computer network.

FIG. 1B depicts one embodiment of a local computer 170, such as apersonal computer (PC), which can implement embodiments of theauthorization verification systems and methods. In one embodiment, theindividual may use the local computer 170 in order to participate in anelectronic commerce (e-commerce) transaction, for example a purchase ofage-controlled goods and/or services over a communication network, suchas the Internet. In one embodiment, the individual may use the computer170 to participate in a game with other individuals, for which an agethreshold or other authorization requirement is enforced. In otherembodiments, the local computer 170 may be used to access goods,services, and/or information, or for another type of interaction forwhich authorization verification is desirable.

In these and other embodiments, the local computer 170 may serve as a“point of sale” or as a “point of access control,” although the localcomputer 170 may be situated, for example, at the individual's home,office, or automobile.

The local computer 170 may be embodied in forms other than a PC, as willbe described in greater detail with reference to FIG. 2B below.

As portrayed in FIG. 1B, the local computer 170 may be configured toreceive input from a magnetic stripe reader 180. The magnetic stripereader 180 or other input device may be configured to extract personalinformation about the individual from the magnetic stripe of a driver'slicense, credit card, frequent flyer card, smart card, or from anothersuitably configured card or device. The personal information read fromthe magnetic stripe may comprise the individual's birth date,citizenship, or other legally identifying features. In some embodiments,having the individual's birth date allows for the calculation of theindividual's current age.

In one embodiment, the magnetic stripe reader 180 may be constructed toform an integral part of the local computer 170, such as, for example, apart of the computer keyboard. In some embodiments, the magnetic stripereader 180 or other input device may be implemented as a stand-aloneperipheral device. In other embodiments, the computer keyboard itselfserves as an input device for inputting personal information related toauthorization and other information about a desired transaction.

As is further portrayed in the embodiment of FIG. 1B, the local computer170 is configured to receive input from a fingerpad 190 device, whichcan accept biometric input, such as a fingerprint, and can transmit anelectronic version of the input to the local computer 170 for use by theauthorization verification systems and methods. In other embodiments,other methods are used for transmitting other forms of biometric dataabout the individual to the local computer 170, as was described withreference to FIG. 1A. In some embodiments, biometric data, from afingerpad 190, camera, microphone, scanner, or other suitable device,can be used to identify the individual and to access additional storedinformation about the individual that may be relevant to apoint-of-access-control authorization for an e-commerce transaction.

In other embodiments, other devices and methods may be used to inputpersonal and other information for the authorization verificationsystems and methods. For example, in one embodiment, a bar code or otherscanner, touch screen, or microphone may be configured as a peripheralto the local computer 170 and may transmit information about productsassociated with a transaction to the local computer 170 for use by theauthorization verification systems and methods. In other embodimentsassociated with online or e-commerce transactions, information for useby embodiments of the authorization verification systems and methods maybe input using, by way of example, a smart card, a bar code, atransponder, a cell phone, a personal digital assistant, other wirelessdevice, a security key, a computer “cookie” file or other file, manualkeyboard input, or other device or method for communicating data.

In some embodiments, as an addition or an alternative to informationthat is entered electronically, personal information can also be enteredto the system manually (as when an individual types in a birth date),orally (as when the individual speaks the birth date into a suitableinput device), or by any of a variety of other methods.

As was the case with the embodiment shown in FIG. 1A, the authorizationverification systems and methods may store a retrievable record of anauthorization determination performed. In one embodiment, the record isstored within computer memory resident in the local computer 170. In oneembodiment, the record is stored by a remote server that is incommunication with the local computer, as will be described in greaterdetail with reference to FIG. 2B. In other embodiments, other methodsand locations are used for storing a record of an authorization checkperformed in conjunction with a transaction.

FIG. 2A is a block diagram that depicts a broad overview of oneembodiment of an authorization verification system, in whichauthorization is based on an age calculation.

As shown in FIG. 2A, authorization software 200 is executed on aprocessor 205 in a host device 210. The host device 210 may be embodiedin a variety of forms. For example, the host device 210 may be apoint-of-sale terminal or other computerized cash register as wasdepicted in FIG. 1A. Alternatively, the host device 210 may be aninteractive kiosk or other stand-alone device for determiningauthorization at a point of sale or other point of control. The hostdevice 210 may also be embodied in other forms.

The processor 205 may comprise, by way of example, program logic, orother substrate configurations representing data and instructions, whichoperate as described herein. In other embodiments, the processor maycomprise controller circuitry, processor circuitry, one or more generalpurpose single-chip or multi-chip microprocessors, digital signalprocessor, embedded microprocessor, microcontroller and the like.

In one embodiment, the authorization software 290 comprises programlogic that may advantageously be implemented as one or more modules. Themodules may advantageously be configured to execute on one or moreprocessors. The modules may comprise, but are not limited to, any of thefollowing: software or hardware components such as softwareobject-oriented software components, class components and taskcomponents, processes methods, functions, attributes, procedures,subroutines, segments of program code, drivers, firmware, microcode,circuitry, data, databases, data structures, tables, arrays, orvariables.

As shown in FIG. 2A, information about the current date and/or time 230is available to the host device 210. In one embodiment, the date/timeinformation 230 is provided by an internal clock or other component thatresides within the host device 210. In one embodiment, the date/timeinformation 230 is received by the host device 210 and the processor 205from a source external to the host. In some embodiments, the date/timeinformation 230 is available as a measurement of time that can be usedto calculate a date. In other embodiments, the date/time information 230is available in other formats that allow for identification of thecurrent date. In embodiments where authorization is determined bymeasures other than age, other types of auxiliary information may beused by the authorization verification systems and methods.

The host device 210 also receives personal information 220 about anindividual as input. In one embodiment, the personal information 220 maytake the form of identification information, comprising a birth date,which can be retrieved from a magnetic stripe on the individual'sdriver's license or other identification card when the card is swipedthrough a suitable input device or is otherwise made available forreading by a merchant representative or by the individual.

Alternatively, the personal information 220 may be embodied as a birthdate that is keyed in manually, input orally, or otherwise entered by amerchant representative or by the individual. The personal information220 may also take the form of other identifying information that may notcomprise a birth date, but that can be used as a link to available,stored information about the individual, wherein the stored informationcomprises birth date information for the individual. Personalinformation 220 that comprises birth date information or a link to birthdate information may also be input using any of a variety of methods,including, but not limited to, a smart card, a bar code, a transponder,a cell phone, a personal digital assistant, a security key, a computer“cookie” file or other file, biometric input, or some other device ormethod for communicating data.

As will be described in greater detail with reference to FIG. 4, in someembodiments the personal information 220 may also comprise informationabout the validity of the source of personal information 220. Forexample, if the personal information 220 is being received from anindividual's driver's license, the personal information 220 mayadditionally comprise expiration date information for the driver'slicense.

In some embodiments, the personal information 220 received may notcomprise sufficient information about the individual to allow fordetermining authorization, but may provide access to additionalinformation. For example, when age is used a basis for determiningauthorization, the personal information 220 received may not comprise abirth date for the individual, but may provide a link to stored personalinformation 260 that does comprise the individual's birth date. Thestored personal information 260 may be stored externally to the hostdevice 210, as is shown in FIG. 2A, and may be accessed by the hostdevice via local or remote computer network, or by other communicationsystems and methods. In other embodiments, the stored personalinformation 260 may be stored internally to the host device 210.

In the embodiment shown in FIG. 2A, using the date/time information 230and the personal information 220 received, the authorization software200 calculates the current age of the individual, or otherwisedetermines the authorization or lack thereof of the individual. The hostdevice 210 may send the age information to a display 240 that can beembodied in a variety of forms. For example, several types of displayare described with reference to FIG. 1A, including, as one example, amessage that is printed on a receipt or other record of the transaction.

The host device 210 can, additionally or alternatively, send a copy ofthe authorization determination results to be stored as a retrievablerecord in a transaction storage repository 250 that can be external tothe host device 210, as depicted in the FIG. 2A example, and/or can beinternal to the host device 210. In some embodiments, the authorizationinformation can be associated with other relevant information forstorage.

For example, in one embodiment where authorization is used forage-controlled purchases, the authorization verification system keeps anaudit report of each age calculation record, wherein each recordcomprises the time of the calculation and the age calculated. In otherembodiments, the audit report, transaction log, or other retrievablerecord of the calculation may comprise some, all, or none of thefollowing information: customer's driver's license or otheridentification number, clerk's name and/or identification, amount ofpurchase, items purchased, types of items purchased, and any otherrelevant information, as permitted by law. Information stored in thetransaction storage 250 of one example embodiment is described ingreater detail with reference to FIGS. 5B and 5C below.

In some embodiments, the authorization record is stored in thetransaction storage 250 for a limited period of time, such as for oneday or for one month, after which time the record is purged from thetransaction storage 250. In one embodiment, new authorization recordsare stored in the transaction storage 250, and as storage capacitywithin the transaction storage 250 becomes limited, older records aredeleted to make room for the new. In other embodiments, other storagesystems and methods are employed, as will be familiar to one of ordinaryskill in the art.

The record of the authorization determination that is stored in thetransaction storage 250 can be subsequently retrieved and reviewed inorder to verify whether an authorization determination was performed inconjunction with a given transaction. In various embodiments, dependingon the content of the record and the length of time for which it isstored, verification that an authorization was performed for a giventransaction, for a given individual, or for some other criteria, maylater be carried out.

FIG. 2B is a block diagram that depicts a broad overview of oneembodiment of an authorization verification system in whichauthorization is determined in association with an e-commercetransaction. For example, as was described with reference to FIG. 1B,the system may be used in conjunction with an online purchase, withaccess to online information or entertainment, or with othercomputer-accessed or electronically-accessed products, services, andactivities.

As shown in FIG. 2B, a local computer 270 is a device that allows a userto interact with a remote server 280 using a communications network 275.In one embodiment, the local computer 270 is a conventional computerthat is equipped with a conventional modem. In other embodiments, thelocal computer 270 can be any device that allows an individual using thelocal computer 270 to interact with the authorization verificationsystem, such as, for example, a computer workstation, a local areanetwork of individual computers, a kiosk, a personal digital assistant,an interactive wireless communications device, an interactivetelevision, a transponder, or the like.

As shown in FIG. 2B, the local computer 270 communicates via acommunications network 275 with a remote server 280. In one embodiment,the communications network 275 is a global network of computers, such asthe Internet. In other embodiments, the communications network 275 canbe any communication system including by way of example, dedicatedcommunication lines, telephone networks, wireless data transmissionsystems, two-way cable systems, customized computer networks,interactive kiosk networks, automatic teller machine networks,interactive television networks, intranets, and the like.

In one embodiment, the remote server 280 operates one or more websiteson the World Wide Web. In other embodiments the remote server 280 can beany device that interacts with or provides data to the local computer270, including by way of example, any internet site, private network,network server, video delivery system, audio-visual media provider,television programming provider, telephone switching network, tellernetwork, wireless communication center and the like.

In one embodiment, the remote server 280 is associated with one or moreweb pages that offer age-controlled products or services for purchasevia the Internet. In one embodiment, the remote server 280 is associatedwith a web site that offers age-controlled participation in games orother online events. In one embodiment, the remote server 280 offersauthorization verification services to other e-commerce sites thatdesire to have a record of authorizations performed for their e-commercetransactions. In other embodiments, the remote server 280 performsauthorization determination and verification associated with the localcomputer 270 for other reasons.

As further shown in FIG. 2B, a personal information input device 265 canbe used to input personal information useful for an authorizationdetermination to the local computer 270. In one embodiment, the personalinformation input device 265 is a magnetic stripe reader 180 as wasdepicted in FIG. 1B. In one embodiment, the personal information inputdevice 265 is a fingerpad 190, or other biometric input device, as wasalso depicted in FIG. 1B. In one embodiment, the input device is ascanner with optical character recognition capabilities that can readinformation printed on a suitable information medium. In otherembodiments, other types of information input devices 265 may also beused in conjunction with the authorization verification systems andmethods described. Personal information may also be input using any of avariety of methods, including, but not limited to, a smart card, a barcode, a transponder, a cell phone, a personal digital assistant, asecurity key, a computer “cookie” file or other file, a microphone,computer keyboard, touchscreen, or other device or method forcommunicating data.

In one embodiment, personal information useful to the authorizationverification systems and methods may be previously stored in the localcomputer 270 and may be accessed by the local computer 270 for thatpurpose with or without a need for input from a personal informationinput device 265.

In the embodiment shown in FIG. 2B, the local computer 270 communicatesinformation received from the personal information input device 265 tothe remote server 280 via the communications network 275 for purposes ofauthorization verification associated with an e-commerce transaction.

In one embodiment, determining the authorization, or lack thereof, of anindividual associated with the local computer 270 is performed byauthorization software 290 used by the remote server 280.

In one embodiment, the authorization software 290 comprises programlogic that may advantageously be implemented as one or more modules. Themodules may advantageously be configured to execute on one or moreprocessors. The modules may comprise, but are not limited to, any of thefollowing: software or hardware components such as softwareobject-oriented software components, class components and taskcomponents, processes methods, functions, attributes, procedures,subroutines, segments of program code, drivers, firmware, microcode,circuitry, data, databases, data structures, tables, arrays, orvariables.

In embodiments where authorization is based on age, the authorizationsoftware 200 may calculate the current age of the individual usinginformation about the current date and/or time along with the personalinformation received from the local computer 270.

In some embodiments, the personal information received from the localcomputer 270 may not comprise sufficient information about theindividual to allow for determining authorization, but may provideaccess to additional information. For example, when age is used a basisfor determining authorization, the personal information received may notcomprise a birth date for the individual, but may provide a link tostored personal information 298 that does comprise the individual'sbirth date. The stored personal information 298 may be stored externallyto the remote server 280, as is shown in FIG. 2B, and may be accessed bythe remote server 280 via local or remote computer network, or by othercommunication systems and methods. In other embodiments, the storedpersonal information 298 may be stored internally to the remote server280.

As shown in FIG. 2B, information about the current date and/or time 285is available to the authorization software 290 in the remote server 280.In one embodiment, as depicted in FIG. 2B, the date/time information 285is provided by an internal clock or other component that resides withinthe remote server 280. In one embodiment, the date/time information 230is accessed by the remote server 280 via computer network from a sourceexternal to the server 280. In another embodiment, date and/or timeinformation 285 from a source within the local computer 270 may be used.In some embodiments, the date/time information 285 is available as ameasurement of time that can be used to calculate a date. In otherembodiments, the date/time information 230 is available in other formatsthat allow for identification of the current date.

In some embodiments in which authorization is based on age, and in whichcurrent age is determined based in part on output from acomputer-resident clock, it may be desirable to use a clock that isinternal to the remote server 280 rather than a clock resident in thelocal computer 270, because of inconsistency in the accuracy ofcomputer-resident clocks in local computers 270.

Using the date/time information 285 and the personal informationreceived from the local computer 270, the authorization software 290calculates the current age of the individual, or otherwise determinesthe authorization or lack thereof of the individual whose personalinformation was entered.

Once an authorization determination is made, in one embodiment, theremote server 280 may send a message informing the user of the localcomputer 270 of the authorization results. In one embodiment, where theremote server 280 is executing the authorization verification on behalfof another web site, web server, or other entity, the remote server 280may send a message informing the entity of the authorization results.

The remote server 280 can additionally, or alternatively, send a copy ofthe authorization determination results to be stored as a retrievablerecord in a transaction storage repository 295 that can be internal tothe remote server 280, as depicted in the FIG. 2B example, and/or can beexternal to the remote server 280. In some embodiments, theauthorization information can be associated with other relevantinformation for storage.

As was described with reference to the embodiment depicted in FIG. 2A,in one embodiment where authorization is used for age-controlledpurchases, the authorization verification system keeps an audit reportof each age calculation record, wherein each record comprises the timeof the calculation and the age calculated. In other embodiments, theaudit report, transaction log, or other retrievable record of thecalculation may comprise some, all, or none of the followinginformation: customer's driver's license or other identification number,Internet address or other identifier for the local computer 270, amountof purchase, items purchased, types of items purchased, and any otherrelevant information, as permitted by law. Information stored in thetransaction storage 295 of one example embodiment is described ingreater detail with reference to FIGS. 5B and 5C below.

In one embodiment, the authorization record is stored in the transactionstorage 295 for a limited period of time, such as for one day or for onemonth, after which time the record is purged from the transactionstorage 295. In one embodiment, new authorization records are stored inthe transaction storage 295, and as storage capacity within thetransaction storage 295 becomes limited, older records are deleted tomake room for the new. In other embodiments, other storage systems andmethods are employed, as will be familiar to one of ordinary skill inthe art.

FIG. 3 is a flow chart that depicts one embodiment of a process 300 forconducting a sales transaction that comprises an authorization by agecalculation for a minimum authorized age. By way of example, the process300 is described as being implemented at a point-of-sale terminal with ascanning device that is configured to read scannable codes, such as barcodes, affixed to products desired for purchase by a customer. However,the process 300, with modifications familiar to one of ordinary skill inthe art, can also be implemented in conjunction with an e-commercetransaction. For example, in most e-commerce transactions, automatedprocesses carry out functions that are described in the FIG. 3 flowchartas being executed by a point of sale clerk. As will further be familiarto one of ordinary skill in the art, the process 300 can also beimplemented in other point of access control situations in whichauthorization determination and verification is desirable.

The process 300 begins at state 305, where a sales transaction isinitiated. From state 305, the process 300 moves to state 310, where aclerk or purchaser identifies items to be purchased. In one embodiment,items to be purchased are identified by scanning a bar code affixed tothe items.

Moving on to state 315, the process 300 determines whether to perform anauthorization check. In one embodiment, an authorization check isperformed whenever any of the identified items are among those for whichage restrictions are imposed on purchasers. A practitioner reasonablyskilled in the art will appreciate that this determination may beimplemented and executed by any one of a number of methods withoutdeparting from the spirit of the invention. As one example, look-uptables that allow access to relevant restriction information based onidentifiers associated with the scanned items may advantageously beused. One example of a product database that can fulfill this look-uptable role is depicted in FIG. 5A below.

In other embodiments, authorization checks may not be performed everytime an item associated with a restriction is identified as beingamongst the items to be purchased. For example, in one embodiment,authorization checks are performed randomly for purchases comprisingrestricted items. In one embodiment, authorization checks are performedwhen restricted items, or combinations of restricted items, that havebeen previously identified as being amongst those that are mostfrequently associated with attempted unauthorized purchases are includedin the current purchase. In other embodiments, other considerations mayaffect the decision whether to perform an authorization check for thecurrent purchase transaction.

If the process determines in state 315 either that no restricted itemsexist amongst the purchase items, or that for other reasons, anauthorization check need not be carried out, the process 300 proceeds tostate 340, where the sales transaction is completed normally.

If, in state 315, the process 300 determines that an authorization checkwill be carried out, the process 300 moves to state 320 where theprocess 300 determines the authorization threshold value, such as, byway of example, a minimum authorized age, for the set of scanned items.For example, in one embodiment, a set of scanned items that includes oneitem with a minimum age threshold of eighteen and one item with minimumage of twenty-one may determine an overall minimum age threshold oftwenty-one for the set of scanned items, since twenty-one is the minimumage that satisfies the authorization threshold for all items of thesets. As was described with reference to state 310, a practitionerreasonably skilled in the art will appreciate that this determinationmay be implemented and executed by any one of a number of methods,without departing from the spirit of the invention. In other situations,it may be desirable to select the lowest threshold to be the thresholdfor the set. In still other situations, it may be desirable toconstruct, from the age thresholds of the items in a purchase, a rangeof acceptable ages that are authorized to allow the purchase

In state 325, the process 300 calculates the age or other authorizationmeasure of the customer, as will be described in greater detail withreference to FIG. 4. In the embodiment described in FIG. 4, execution ofthe age calculation process comprises storing a retrievable record ofthe age calculation.

In state 330, the process 300 compares the customer age calculated instate 325 with the authorized threshold age that was identified in state320, and determines whether the customer wishing to purchase the scanneditems is legally authorized to do so. If the process 300 determines thatthe customer authorized to make the desired purchase, the process 300moves to state 340, where the transaction is completed normally, and theprocess 300 ends in state 380.

If, in state 330, the process determines that the customer is notauthorized to make the desired purchase, the process 300 moves to state345, where the transaction is aborted and finally ends in state 380. Inother embodiments, if in state 330, the process determines that thecustomer is not authorized to purchase the set of scanned items, theprocess 300 may allow the transaction to be completed if theage-controlled items for which the customer is not authorized topurchase are removed from the transaction. For example, in oneembodiment where items are added to a purchase receipt during scanning,an item is not added to the receipt until the customer's authorizationto purchase the item is verified. In still other embodiments, when adetermination is made that the customer is not authorized to make thedesired purchase, control of the transaction may be transferred to aclerk or other merchant representative associated with the transactionso that the situation may be resolved.

As will be apparent to one of ordinary skill in the art, the variousstates of process 300 may be configured and carried out in any one of avariety of ways without departing from the spirit of the invention. Forexample, in one embodiment, the customer's age is determined prior toscanning the items, and as each item is scanned, a determination is maderegarding the customer's authorization to purchase the item, such that avisual, audible, printed or other form of notification may be made bythe system, either at the time of scanning or at the end of scanning, orboth, notifying the clerk of the customer's lack of authorization topurchase the item. Other embodiments of the process 300 are alsoenvisioned.

As was stated with reference to state 315 above, in some embodiments,age calculation or other authorization determination is carried out forevery transaction. In some embodiments, age calculation or otherauthorization determination may be triggered automatically by thepresence of an item or situation requiring authorization. In someembodiments, age calculation or other authorization determination may beinitiated by a determination on the part of an associated clerk thatsuch an authorization determination is warranted. These and otherembodiments will be recognized by one of ordinary skill in the art asreasonable variations of the systems and methods described herein.

FIG. 4 is a flow chart that describes one embodiment of a process 400 todetermine authorization by calculating the age of a person on apoint-of-sale device and to display and store a record of theauthorization determination. The process 400 described in FIG. 4 is oneembodiment of the age calculation process mentioned with reference tostate 325 from FIG. 3. Although the process 400 is described as takingplace at a point-of-sale device, one of ordinary skill in the art willrecognize that the process 400 could be implemented in an e-commerce orother suitable setting with familiar modifications that need not requireundue experimentation.

Referring now to the process 400 as it is depicted in FIG. 4, from astart state, the process 400 begins in state 410 where identifyingpersonal information about a person is input into a point-of-saledevice. In state 420, the person's birth date is obtained. The person'sbirth date can be captured either directly from the personal informationthat was input in state 410 or indirectly, using the personalinformation from state 420 as a link to a stored copy of the person'sbirth date. In the embodiment shown in FIG. 4, an expiration date for anidentity card used as a source of personal information can also becaptured by the process 400 in state 420. In other embodiments, anexpiration date for an identity card used as a source of personalinformation is not be captured by the process 400, or is captured forcertain types of personal information sources, or is captured only whenavailable.

In state 430, the process 400 verifies that the read-in of the personalinformation and the capture of the birth date and expiration date havebeen accomplished successfully. If the information is determined not tobe valid, the process moves to state 440 where a “re-try” message can bedisplayed to prompt the clerk or the individual to re-enter the personalinformation, and the process 400 returns to state 410. As will be clearto one of reasonable skill in the art, in some embodiments, thevalidation step of states 430 and 440 may be omitted or may be executedat a different point in the process 400 without departing from thespirit of the age calculation verification system. Similarly, in someembodiments, an input validation step may be implemented in a differentmanner. For example, in one embodiment, an identification of an invalidread-in in state 430 causes the process 400 to be aborted or to bereferred to a clerk who is facilitating the process 400.

If, in state 430, the process 400 verifies that the read-in of thepersonal information and the capture of the birth date and expirationdate have been accomplished successfully, the process 400 moves to state450, where the process 400 retrieves and/or calculates the current date.In one embodiment, the current date is calculated using informationreceived from an internal clock. In other embodiments, the current datecan be determined using other methods.

In state 310, the person's birth date is captured, either directly fromthe personal information that was input in state 305, or indirectly,using the personal information as a link to stored informationcomprising the person's birth date.

Moving on to state 451, the process 400 verifies the validity of thesource of the personal information. For example, in one embodiment, theprocess 400 compares the expiration date of the identity card with thecalculated current date. In state 452, the process 400 determineswhether the expiration date has passed. If the expiration date haspassed, the process 400 moves on to state 453 where an “expired” messageis displayed to the clerk and/or to the individual, and, in oneembodiment, the process ends in state 495.

A practitioner of ordinary skill in the art will appreciate that states451-453, in which the expiration date is checked, may reasonably beomitted in some embodiments of the authorization verification system.

If, in state 452, the process 400 determines that the identity card hasnot expired, the process 400 moves on to state 460 where the process 400compares the person's birth date with the current date and calculatesthe person's current age.

In state 470, the process 400 can, in some embodiments, display theindividual's age in a visual display and/or in a printed display, as ona paper receipt 150, as is exemplified in FIG. 1A and FIG. 6, or in someother manner.

In state 480, the process 400 stores the age information along withassociated transaction data in a transaction storage location 250. Forexample, in one embodiment, the process 400 may record the calculatedage together with a timestamp indicative of the time at which the agewas calculated. FIG. 5B below depicts in greater detail one example ofthe types of data that may be stored with respect to an age calculation.The storage of age calculation data in state 480 allows for a subsequentretrieval of the data and for verification that age calculationprocedures or other authorization determination procedures were executedfor a given transaction or encounter.

From state 480, the process 400 to calculate age at a point-of-saledevice next moves on to state 495 and ends.

In some embodiments, age calculation data that is stored in thetransaction storage location 250 may be stored on a temporary basis. Inone embodiment, the information is stored as a log of age calculationactivity and is purged daily. In other embodiments, the log of agecalculation activity can be purged weekly, or at other intervals, or asdeemed desirable. Still other embodiments provide for the storage of agecalculation information as part of a normally saved record that isstored for every sales transaction.

In one embodiment, the age calculation process 400 may advantageously beimplemented as one or more modules that can be configured to execute onone or more processors. The modules may comprise, but are not limitedto, any of the following: software or hardware components such assoftware object-oriented software components, class components and taskcomponents, processes methods, functions, attributes, procedures,subroutines, segments of program code, drivers, firmware, microcode,circuitry, data, databases, data structures, tables, arrays, orvariables.

FIG. 5A depicts one example of a products database 500 that can be usedto identify items that are associated with an authorization threshold.The sample database 500 of FIG. 5A comprises records 505-509 for itemsavailable for purchase, the records 505-509 comprising at least fourfields 501-504. In the embodiment depicted, the records 505-509 areindexed according to bar code symbols and bar code numbers which arestored in the bar code field 501 if each record 505-509. Thus, inembodiments configured to receive input from bar code scanners, records505-509 associated with items that have been scanned at the point ofsale are easy to locate in the products database 500.

As depicted in FIG. 5A, the products database 500 comprises other fieldsof information useful to the normal operation of a point of sale. Forexample, a retail price field 502 stores information that is indicativeof a retail price 502 associated with each item. A taxable field 503stores information indicative of whether the item is taxable. Otherfields of information may also be included in the products database 500without detracting from the spirit of the authorization verificationsystems and methods described herein.

As depicted in FIG. 5A, the products database 500 further comprises anauthorization threshold field 504 that indicates an age threshold, ifany exists, that is associated with each item. As depicted in FIG. 5A,two records 506, 507 indicate no authorization threshold for theassociated items, two records 505, 509 indicate an authorizationthreshold of age eighteen for the associated items, and one record 508indicates an authorization threshold of age twenty-one for theassociated items. Thus, in the embodiment shown in FIG. 5A, theauthorization threshold field 504 provides information about bothwhether an age-restriction is associated with an item and, if so, aboutthe value of the age-related authorization threshold itself.

In the embodiment depicted in FIG. 5A, no numeric value is listed in theauthorization threshold field 504 of records 506, 507 for which noauthorization restriction exists. In other embodiments, the lack of anauthorization restriction for an item associated with a given record maybe indicated in other ways, as, for example, by a numeric value in theauthorization threshold field 504. For example, a product with nominimum age restriction may have an authorization threshold value of agezero. In other embodiments, information in the authorization thresholdfield 504 may be configured in various other ways, as will be familiarto one of ordinary skill in the art.

Furthermore, in some embodiments, such as in the embodiment of FIG. 5A,the threshold field 504 may provide information about a threshold thatis a numeric value that can be used to delimit individuals who areauthorized from individuals who are not authorized, such as with aminimum age limit or a maximum age limit. In other embodiments, thethreshold field 504 may provide information about a threshold thatdefines a range of numeric values, such as the case in which residentswithin a range of zip codes are authorized to take advantage of aspecial offer. Similarly, a plurality of individual zip codes maycomprise an authorization threshold that authorizes access to anoffering, and authorization thresholds are envisioned in which theauthorization threshold is defined in terms that are alphabetic orotherwise categorized in a scheme that is not directly numeric. As willbe familiar to one of ordinary skill in the art, various otherconfigurations of authorization thresholds are possible withoutdeparting from the spirit of the authorization verification systems andmethods described herein.

As depicted in FIG. 5A, the information stored about individual items inthe products database 500 can be used to determine the authorizationthreshold value for a given purchase transaction as a whole. Forexample, if a purchase comprises the five items associated with the fiverecords 505-509 of the database 500, and if authorization for thepurchase is based on a minimum age limit, then it can be easilyascertained that the minimum authorized age for making the five-itempurchase is twenty-one, the threshold age associated with record 508. Inother words, the highest age threshold associated with any of therecords 505-509 is the minimum authorized age for making the purchase.

In other embodiments of the authorization verification systems andmethods, other processes may be used to determine an authorizationthreshold for a transaction from the authorization thresholds accessedfor the individual items of the transaction. Similarly, embodiments of athreshold determination process may variously define a range of valuesthat authorize a transaction, such as a range that encompasses all ofthe individual thresholds or a range that is the intersection of all ofthe individual thresholds or a range that is defined in another way.Other processes may also be used to determine a threshold value orthreshold range or threshold ranges that authorize a purchase or othertransaction.

As will be familiar to one of ordinary skill in the art, theconfiguration and contents of the products database 500 shown in FIG. 5Aare only one example of data that may be used by the authorizationverification systems and methods. Other configurations and types of dataare also envisioned as being used without departing from the systems andmethods described herein.

FIG. 5B depicts one example of a report 520 that can be generated inassociation with the age verification systems and methods describedherein. This example is an age calculation report 520 based on data thatis stored in association with an age calculation at a point-of-saletransaction. The sample report 520 depicted in FIG. 5B comprises sixfields of information 510-515. A date field 510 lists the date of agiven transaction. For example, the date fields 510 of the report 505 ofFIG. 5B indicate that the transactions recorded therein all took placeon Sep. 4, 2002. A time field 511 lists the time that a transaction tookplace. In some embodiments, the date field 510 and time field 511 areused to uniquely or near-uniquely identify a given transaction. Inembodiments where age calculation records are purged on a daily basis, atime field 511 alone may be sufficient to uniquely or near-uniquelyidentify a given transaction.

In FIG. 5B, a transaction identification field 512 records a uniqueidentifier for each transaction. A customer identification field 513 canoptionally store a number, code, or other identification indicatorassociated with the source of personal identifying information 220 for acustomer in transaction. For example, the customer identification field513 may store the number of a driver's license offered by a customer asa source of birth date information. Customer identification informationstored as part of a transaction record may be useful for a variety ofpurposes, but privacy protection legislation or business practices maypreclude the storage of customer identification information 513 in somesituations.

As further depicted in FIG. 5B, an item types field 514 may storeinformation about the types of age-controlled items that a givenpurchase transaction comprised. In one embodiment, items are categorizedinto types that are relevant to authorization thresholds associated withthe items. In one embodiment, items are categorized into types thatconform to the existing business practices of the merchant offering theitems for sale. In other embodiments, items are categorized into othertype classifications. Such information may be relevant to determiningwhether a customer's calculated age was sufficient to allow for a givenpurchase, because different minimum authorized ages may be associatedwith different age-controlled items. For example, in some locations, acustomer may purchase tobacco products at age eighteen or older, butmust be twenty-one years of age or older in order to purchase liquorproducts. The example code depicted in the item types field 514 of FIG.5B employs a binary code to indicate which types of products werepurchased in a given transaction, where the columns of the code, readingfrom left to right indicate: tobacco, alcohol, adult-content, andgambling (lottery) products, respectively. In any given column, a “1”indicates that a product of the associated type was included is thepurchase, while a “0” indicates that no product of the associated typewas included in the purchase. Thus, a code of “1000” can be used toindicate that tobacco products were the only age-controlled products inthe given transaction, so that a customer aged eighteen or older may beallowed to make the purchase. Using the same system, a code of “0101”can be used to indicate that the customer purchased both an alcoholicbeverage and a lottery ticket, requiring a minimum age of twenty-one forthe combined purchase.

An age field 515 stores the age that was calculated by the agecalculation process 400 in association with a given transaction.

FIG. 5C depicts a second example of a report 550 that can be generatedbased on data that is stored in association with an age calculation at apoint-of-sale transaction. The sample report depicted in FIG. 5Ccomprises five fields of information 560-564. This report 550 uses thesame code for the item types field 563 as was described with referenceto the item types field 514 in FIG. 5B. In the embodiment depicted inFIG. 5C, personal information to identify the customer is not stored inthe age calculation report 550. However, information identifying thedate 560, time 561, and transaction number 562 for a given transactionare stored, along with information about the types of items 563 in thetransaction for which authorization is desired, and the age 564 of thecustomer participating in the transaction. Thus, a retrievable record ismade of an authorization determination at a point-of-sale transactionthat can be used to subsequently verify that the authorization tookplace for the given transaction.

As will be obvious to one of ordinary skill in the art, some, all, ornone of these and/or other types of data may be stored as a record of anauthorization determination procedure that is performed for a giventransaction, depending on the given situation in which it is performed.For example, in some embodiments, as was shown in FIGS. 5B and 5C, anactual age or other authorization parameter may be included in a reportor written record of an authorization determination. In otherembodiments, a flag, symbol, or other indicia communicates thesuccessful authorization (or lack thereof) for a given encounter. Forexample, in one embodiment, the transactions log comprises transactionrecords, each of which comprise a transaction identifier and anauthorization indicator of “OK” or “FAIL.” Such an authorizationindicator can also be displayed on a sales receipt associated with anauthorization determination. In one embodiment where authorization isbased on age, the transactions log comprises records, each of whichcomprise a transaction date and time and an age. In some embodiments,the transaction storage 250 comprises a record for each transaction; insome embodiments, the transaction storage 250 comprises a record foreach transaction for which an authorization determination was performed.In some embodiments, the record in the transaction storage 250 comprisesinformation about the authorization threshold determined to beappropriate for the transaction associated with the record. In someembodiments, the record in the transaction storage 250 comprisesidentifying information about the point-of-sale device, the localcomputer 270, or other device used in conjunction with the authorizationverification systems and methods.

FIG. 6 depicts an example of a sales receipt 600 printed in conjunctionwith a sales transaction for which an age calculation was performed. Inthe sample sales receipt 600 of FIG. 6, a printed record of thecustomer's calculated age 610 is printed at the bottom of the salesreceipt 600. Such a receipt 600 provides a written indication that anage calculation, as may be mandated by law, was carried out for thesales transaction.

An authorization verification system has been described herein withparticular applications associated with point-of-sale and e-commercetransactions. However, it is foreseen that the techniques described willhave wider applications. Therefore, while certain embodiments of theinventions have been described, these embodiments have been presented byway of example only, and are not intended to limit the scope of theinventions to the specific forms, arrangement of parts, sequence ofsteps, or particular applications described and shown. Indeed, the novelmethods and systems described herein may be embodied in a variety ofother forms. Furthermore, various omissions, substitutions, and changesin the form of the methods and systems described herein may be madewithout departing from the spirit of the invention. The accompanyingclaims and their equivalents are intended to cover such forms ormodifications as would fall within the scope and spirit of theinvention.

1. A method of determining an authorization threshold associated withthe purchase of multiple items comprising: identifying a first item thata purchaser desires to purchase; identifying a first authorizationthreshold associated with the purchase of the first item offering;identifying a second item that the purchaser desires to purchase;identifying at least a second authorization threshold associated withthe second offering, wherein the second authorization threshold isdifferent than the first authorization threshold; and determining athird authorization threshold associated with the purchase of the firstand second items wherein the third authorization threshold based atleast in part on the first and second authorization thresholds.
 2. Themethod of claim 1 wherein the third authorization threshold is morerestrictive than either the first or second authorization threshold. 3.The method of claim 1 wherein the third authorization threshold is lessrestrictive than either the first or second authorization threshold. 4.The method of claim 1 wherein the third authorization threshold is thefirst authorization threshold.
 5. The method of claim 1 wherein thethird authorization threshold is the second authorization threshold. 6.A method of determining an authorization threshold comprising:identifying at least a first authorization threshold associated with afirst offering; identifying at least a second authorization thresholdassociated with a second offering, wherein the second authorizationthreshold is different than the first authorization threshold; anddetermining a third authorization threshold based at least in part onthe first and second authorization thresholds.
 7. The method of claim 6wherein the third authorization threshold is more restrictive thaneither the first or second authorization threshold.
 8. The method ofclaim 6 wherein the third authorization threshold is less restrictivethan either the first or second authorization threshold.
 9. The methodof claim 6 wherein the third authorization threshold is the firstauthorization threshold.
 10. The method of claim 6 wherein the thirdauthorization threshold is the second authorization threshold.
 11. Themethod of claim 6 wherein the first offering comprises an item orservice.
 12. The method of claim 6 wherein the second offering comprisesan item or service.
 13. The method of claim 6 wherein the firstauthorization threshold is not age related.
 14. The method of claim 6wherein the second authorization threshold is not age related.
 15. Themethod of claim 6 wherein the third authorization threshold is not agerelated.
 16. The method of claim 6 wherein identifying at least thefirst authorization threshold comprises receiving an electronicidentifier signal associated with the first offering, to access storedinformation associated with the offering.
 17. The method of claim 6wherein identifying at least the first offering comprises receiving anelectronic identifier signal associated with the first offering, andwherein identifying the first authorization threshold comprises usingthe electronic identifier to access stored information associated withthe first offering.
 18. The method of claim 6 wherein determining thethird authorization threshold comprises selecting at least one of thefirst or second authorization thresholds.
 19. The method of claim 6wherein the third authorization threshold is related to at least one ofthe set consisting of: citizenship, residential address, zip code,security clearance level, education level, weight, legal status,criminal status, and membership.
 20. The method of claim 6 whereinobtaining identification information about at least the first offeringcomprises receiving information from scanning in, readingelectronically, keying in manually, and inputting orally.
 21. The methodof claim 6 further comprising obtaining authorization identificationinformation about a purchaser by obtaining information from at least oneof: magnetically encoded information on an identification card, adriver's license, a smart card, a bar code, a transponder, a cell phone,a personal digital assistant, a security key, a computer file, afingerprint of the purchaser, an iris scan of the purchaser, a voicesample of the purchaser, and other biometric information available fromthe purchaser.
 22. The method of claim 6 further comprising obtainingauthorization identification information about the purchaser byobtaining information that allows access to a stored record associatedwith the purchaser.
 23. The method of claim 6 further comprising storinga transaction identifier and at least one of: the time of thetransaction, the date of the transaction, and a numeric identifier forthe transaction.
 24. The method of claim 6 further comprisingdetermining authorization value for the purchaser and comparing theauthorization value with the third authorization threshold.
 25. Themethod of claim 6 further comprising: determining an authorization valuefor a purchaser; comparing the authorization value with the thirdauthorization threshold; and not allowing a purchase to be completed ifthe purchaser is not authorized to make the purchase.
 26. The method ofclaim 6 further comprising displaying the third authorization thresholdto a clerk associated with a purchase.
 27. An apparatus that determinesan authorization threshold for a plurality of offerings, the apparatuscomprising: computer processor circuitry in communication with anoffering identifier apparatus, the computer process configured toreceive identification information regarding at least a first offeringand a second offering, wherein the computer processor circuitry isfurther configured to determine at least a first authorization thresholdassociated with the first offering and at least a second authorizationthreshold associated with the second offering, and wherein the computerprocessor circuitry is further configured to determine a thirdauthorization threshold based at least in part on the first and secondauthorization thresholds.
 28. The apparatus of claim 27 wherein theapparatus is a point of sale device.
 29. The apparatus of claim 27wherein the first and second offerings are part of a purchasetransaction.
 30. The apparatus of claim 27 wherein the thirdauthorization threshold is more restrictive than either the first orsecond authorization threshold.
 31. The apparatus of claim 27 whereinthe third authorization threshold is less restrictive than either thefirst or second authorization threshold.
 32. The apparatus of claim 27wherein the third authorization threshold is the first authorizationthreshold.
 33. The apparatus of claim 27 wherein the third authorizationthreshold is the second authorization threshold.
 34. The apparatus ofclaim 27 wherein the first offering comprises an item or service. 35.The apparatus of claim 27 wherein the second offering comprises an itemor service.
 36. The apparatus of claim 27 wherein the firstauthorization threshold is not age related.
 37. The apparatus of claim27 wherein the second authorization threshold is not age related. 38.The apparatus of claim 27 wherein the third authorization threshold isnot age related.
 39. The apparatus of claim 27 wherein the computerprocessor circuitry is further configured to receive information about apurchaser of the first and second offering.
 40. The apparatus of claim27 wherein information about the purchaser is obtained from at least oneof: magnetically encoded information on an identification card, adriver's license, a smart card, a bar code, a transponder, a cell phone,a personal digital assistant, a security key, a computer file, afingerprint of the purchaser, an iris scan of the purchaser, a voicesample of the purchaser, and other biometric information available fromthe purchaser.
 41. The apparatus of claim 27 wherein the computerprocessor circuitry is further configured to compare authorizationinformation about a purchaser with the third authorization threshold todetermine whether the purchaser is authorized to purchase the offerings.42. The apparatus of claim 41 wherein the computer processor is furtherconfigured to store in a computer memory a record of the purchase thatcomprises an identifier for the purchase and a record of the purchaser'sauthorization information.
 43. The apparatus of claim 41 wherein thecomputer processor circuitry is further configured to not allow thepurchase to be completed if the computer processor circuitry determinesthat the purchaser is not authorized to make the purchase.
 44. Theapparatus of claim 27 further comprising a display that is configured todisplay the third authorization threshold.
 45. A computerized systemthat determines an authorization threshold for a plurality of offerings,the system comprising: means for obtaining electronic identifiers for aplurality of offerings; means for using the electronic identifiers toaccess a database of authorization information to determine at least afirst authorization threshold for a first offering and a secondauthorization threshold for a second offering; and means for determininga third authorization threshold based at least in part on the first andsecond authorization thresholds.
 46. The system of claim 45 furthercomprising means for obtaining electronic identifiers that identify theofferings.
 47. The system of claim 45 further comprising means to obtainauthorization information about a purchaser of the offerings.
 48. Thesystem of claim 47 further comprising means for comparing theauthorization information about a purchaser with the third authorizationthreshold to determine whether the purchaser is authorized to purchasethe offerings.
 49. The system of claim 48 further comprising means forstoring a record of the purchase that comprises an identifier for thepurchase and a record of the authorization information about thepurchaser.
 50. The system of claim 45 further comprising a display meansfor displaying the third authorization threshold.
 51. A software modulestored on a computer accessible storage medium, the software modulecomprising: program instructions that are configured to receiveelectronic identifiers for a plurality offerings; program instructionsthat are configured to determine at least a first authorizationthreshold for a first offering and a second authorization threshold fora second offering; and program instructions that are configured todetermine a third authorization threshold based at least in part on thefirst and second authorization thresholds.
 52. The software module ofclaim 51 wherein the third authorization threshold is more restrictivethan either the first or second authorization threshold.
 53. Thesoftware module of claim 51 wherein the third authorization threshold isless restrictive than either the first or second authorizationthreshold.
 54. The software module of claim 51 wherein the thirdauthorization threshold is the first authorization threshold.
 55. Thesoftware module of claim 51 wherein the third authorization threshold isthe second authorization threshold.
 56. The software module of claim 51wherein the first offering comprises a good or service.
 57. The softwaremodule of claim 51 wherein the second offering comprises a good orservice.
 58. The software module of claim 51 wherein the firstauthorization threshold is not age related.
 59. The software module ofclaim 51 wherein the second authorization threshold is not age related.60. The software module of claim 51 wherein the third authorizationthreshold is not age related.
 61. The software module of claim 51wherein the third authorization threshold is related to at least one ofthe set consisting of: citizenship, residential address, zip code,security clearance level, education level, weight, legal status,criminal status, and membership.