Systems and methods for verifying authorization

ABSTRACT

Authorization verification systems and methods are described that store a record of an authorization determination performed at a point of sale or other point of control. The system receives authorization information for an individual indicative of the individual&#39;s authorization to purchase a product or service, to enter a location, to attend an event, or to otherwise participate in an encounter whose access is limited to authorized individuals. In one embodiment, the authorization verification system receives information relating to the individual&#39;s age via an electronic scanning of a driver&#39;s license or other identification card, or by other methods, and uses the birth date information to calculate the customer&#39;s current age. The current age can be displayed on an existing display of a point-of-sale device or other display. A record of the authorization can be stored as part of a transaction record that can subsequently be retrieved to verify that an authorization determination for the encounter was carried out.

This application claims the benefit of priority under 35 U.S.C. §119(e)of U.S. Provisional Application No. 60/363,888 filed on Mar. 12, 2002and entitled SYSTEMS AND METHODS OF CALCULATING AGE AT A POINT OF SALEDEVICE, the entirety of which is incorporated herein by reference.

REFERENCE TO RELATED APPLICATIONS

The present application is a member of the set of related, co-pending,and commonly owned U.S. Patent applications having the following titles,each of which was filed on even date herewith:

-   1. SYSTEMS AND METHODS FOR VERIFYING AUTHORIZATION-   2. SYSTEMS AND METHODS FOR DETERMINING A NEED FOR AUTHORIZATION-   3. SYSTEMS AND METHODS FOR DETERMINING AN AUTHORIZATION THRESHOLD-   4. SYSTEMS AND METHODS FOR VERIFYING AUTHORIZATION FOR ELECTRONIC    COMMERCE-   5. SYSTEMS AND METHODS FOR DETERMINING AN AUTHORIZATION THRESHOLD    FOR ELECTRONIC COMMERCE

Each of the above referenced patent applications is incorporated hereinby reference in its entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The invention relates to systems and methods for retrievably storing theresults of an age calculation or other authorization determination.

2. Description of the Related Art

Many situations exist in which a merchant or other businessperson islegally obligated to control the sale of certain goods or services byensuring that customers meet a minimum age limit or are otherwiseauthorized to purchase the good or service. For example, clerkstypically verify the age of customers who wish to purchase alcohol ortobacco products. Other products, such as fireworks, firearms, lotterytickets, adult-content literature, and other products, may also beage-controlled. In addition, merchants may be legally required torestrict the age of customers in other situations, such as at theentrance to a bar, casino, adult-entertainment establishment, orage-controlled movie. In many jurisdictions, merchants who do notfulfill their legal obligations to restrict access to age-controlledgoods and services may be subject to fines, the loss of their license todo business, or other penalties.

Current systems that determine authorization, such as an authorizationbased on age, at a point of access control to a restricted itemtypically do not provide documentation of the age calculation or otherauthorization check associated with a given transaction, although suchdocumentation could become very useful if a business establishment isaccused of failing to comply with authorization regulations. Forexample, consider the situation in which an underage customer uses falseidentification to purchase an age-controlled product, such as alcohol,and is subsequently apprehended by the law. If the customer prefers notto surrender the false identification used, but to claim instead that noidentification, was requested for the purchase, the merchant may beaccused of selling the alcohol illegally. Without a record of thetransaction and the associated identification check, the merchant mayhave difficulty establishing his or her compliance with the law.

Other forms of authorization requirements unrelated to age may also bemandated by law at a point of sale or other point of control for accessto a product, a service, a location, an event, or the like. For example,in some jurisdictions, felons may be restricted from purchasingfirearms. Additionally, even if age-checking or other authorization isnot mandated by law, some products and situations exist for which amerchant may voluntarily wish to verify that customers' authorizationhas been checked, such as for insurance or other internal managementpurposes.

Hence, it will be appreciated from the foregoing that there is a needfor authorization verification systems and methods that provide aretrievable record of the fact that a point-of-access-controlauthorization determination was performed for transactions requiringage-based or other types of authorization.

SUMMARY OF THE INVENTION

Authorization verification systems and methods are described that check,at a point of purchase or other point of access control, theauthorization of an individual wishing to participate in a transactionor to otherwise gain access to a product, service, or the like, and thatstore a retrievable record of the authorization determination. Thesystem receives authorization information for an individual that isindicative of the individual's authorization to purchase a product orservice, to enter a location, to attend an event, or to otherwiseparticipate in an encounter whose access is limited to authorizedindividuals. In one embodiment, authorization for making a purchase islimited to individuals above an age threshold, and the authorizationverification system receives information relating to the individual'sage via an electronic scanning of a driver's license or otheridentification card, or by other methods, and uses the birth dateinformation to calculate the customer's current age. The current age canbe displayed on the existing display of a point-of-sale device or otherdisplay or on a sales receipt for the encounter. A record of theauthorization can be stored and can subsequently be retrieved to verifythat an authorization determination for the encounter was carried out.

In various embodiments, the system uses a criterion other than age todetermine that an individual is authorized to make a purchase or tootherwise participate in a transaction, and retains a record of thedetermination for subsequent retrieval.

An embodiment of a process is described for determining the ages ofpurchasers wishing to engage in purchases of one or more items and formaintaining a verifiable record that the ages of the purchasers werecalculated. The process comprises the acts of: (i) obtaining birth dateidentification information about a purchaser; (ii) obtaining informationabout the current date; (iii) calculating the age of the purchaser usingthe current date and the birth date identification information; (iv)storing in a memory a record indicative of the purchase and of the ageof the purchaser; and (v) repeating acts (i) through (iv) such that arecord is built that indicates that each purchase of an item that isassociated with an age threshold initiated an age calculation.

An embodiment of a software module for a point-of-sale device isdescribed that gives the device the capability to receive inputindicative of a birth date for a customer participating in atransaction; to receive a clock signal indicative of the current timeand date for the transaction; to calculate the customer's age based atleast in part on the birth date input and the clock signal; and to builda retrievable record indicative of at least the transaction and thecalculated age of the customer such that the results of the agecalculation can be verified by reference to the retrievable record.

An embodiment of a point-of-sale device is described for calculating theage of a customer associated with a transaction and for establishing arecord of the age of the customer. The device comprises an input devicethat allows the customer's birth date to be input; a clock that providesa clock signal indicative of the current time and date; a processor thatreceives a signal from the input device and the clock signal, whereinthe processor calculates the age of the customer from the input devicesignal and the clock signal; and a memory associated with the processorwherein the processor builds a retrievable record indicative of at leastan identifier for the transaction and the calculated age of the customersuch that the performance of the age calculation can be verified byreference to the retrievable record.

An embodiment of a computer system is described for calculating the ageof a customer associated with a transaction and for establishing arecord of the age of the customer. The system comprises: means forreceiving input that is indicative of a birth date for a customerparticipating in a transaction; means for receiving a clock signal thatis indicative of the current time and date for the transaction; meansfor calculating the customer's age based at least in part on the birthdate input and the clock signal; and means for building a retrievablerecord indicative of at least the transaction and the calculated age ofthe customer such that the results of the age calculation can beverified by reference to the retrievable record.

An embodiment of a point of sale device is described that comprises adisplay, a code reader, an input device, a processor, and a memory. Thecode reader is adapted to read codes attached to items associated with apurchase transaction and to provide a code signal that is indicative ofthe codes. The input device is adapted to allow personal informationabout a purchaser associated with the transaction to be input so as toproduce a birth date signal indicative of the personal information. Theprocessor is adapted to receive the code signal and the birth datesignal associated with a given transaction and to identify productshaving an age requirement for purchase and to display a signal to apoint of sale device operator requesting birth date information aboutthe purchaser via the input device and wherein the processor calculatesthe age of the purchaser using the birth date signal to determine if thepurchaser is within an authorized age range for purchasing the items ofthe transaction. The memory is adapted to receive signals from theprocessor allowing the processor to build a record indicative of each ofthe transactions that the processor has identified as requiring anauthorized age range and an indication that the age was verified.

An embodiment of a process to calculate the age of an individual on acomputerized, device is described. The process comprises using datareceived from an internal clock in a computerized device to calculate acurrent date; using personal information about an individual todetermine the individual's birth date; calculating the individual's age,based at least in part on the current date and the birth date;displaying the calculated age; and retrievably storing information aboutthe age calculation.

An embodiment of a process for verifying that a purchase authorizationdetermination has been performed at a point-of-sale transaction isdisclosed. In one embodiment, the process comprises identifying aproduct or service that a purchaser is attempting to purchase whose saleis authorized to a limited purchaser group, where the limitation isbased on a given authorization parameter. The process further comprises:obtaining information about the purchaser that reflects theauthorization parameter; determining, based at least in part on theauthorization parameter information, whether or not the purchaser isauthorized to make the purchase; and storing a record of the purchasethat comprises information indicative of the purchase authorizationdetermination and of identifying information for the given transaction.

For purposes of summarizing the invention, certain aspects, advantagesand novel features of the invention have been described herein. It is tobe understood that not necessarily all such advantages may be achievedin accordance with any particular embodiment of the invention. Thus, theinvention may be embodied or carried out in a manner that achieves oroptimizes one advantage or group of advantages as taught herein withoutnecessarily achieving other advantages as may be taught or suggestedherein.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A depicts one embodiment of a point-of-sale terminal that can beused with the authorization verification systems and methods.

FIG. 1B depicts one embodiment of a local computer that can be used withthe authorization verification systems and methods.

FIG. 2A is a block diagram that depicts one embodiment of anauthorization verification system.

FIG. 2B is a block diagram that depicts one embodiment of anauthorization verification system for electronic commerce.

FIG. 3 is a flow chart that depicts one embodiment of a transactionprocess that can comprise a verification of authorization based on age.

FIG. 4 is a flow chart that depicts one embodiment of a process tocalculate, display, and store a record of an authorization based on age.

FIG. 5A depicts a sample embodiment of a products database.

FIG. 5B depicts a first sample embodiment of a record of agecalculations performed.

FIG. 5C depicts a second sample embodiment of a record of agecalculations performed.

FIG. 6 depicts a sample embodiment of a sales receipt comprisingcalculated age, information.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Systems and methods for determining authorization at a point of sale orother point of access control to a purchase, a service, a location, anevent, information, or the like are described, wherein, in variousembodiments, a need for authorization is determined, an authorizationthreshold is determined, authorization, or the lack thereof, isdetermined with respect to the authorization threshold, and aretrievable record of the authorization determination is stored so thatperformance of the authorization determination may subsequently beverified. In one embodiment, the systems and methods are used inconjunction with a purchase of items at a point of sale, wherein theitems desired for purchase comprise at least one item that is associatedwith an age-related authorization threshold. For example, in a purchaseof items at a grocery store, items containing alcohol or tobacco may beassociated with age-related authorization thresholds, and sale of theitems may not be permitted to a customer whose age is below theage-related threshold determined for the purchase.

Detailed embodiments of the present invention are disclosed herein.However, it is to be understood that the disclosed embodiments aremerely exemplary of the authorization verification systems and methods,which may be embodied in various forms. Therefore, specific structuraland functional details disclosed herein are not to be interpreted aslimiting, but merely as a basis for the claims and as a representativebasis for teaching one skilled in the art to variously employ themethods in a wide variety of implementations.

For example, although embodiments of the authorization systems andmethods are described herein as being implemented in conjunction with asystem that uses age as an authorization requirement, other embodimentsexist in which authorization is based on other requirements, including,but not limited to, citizenship, residence, membership, weight, securityclearance level, or other authorizing characteristics. Furthermore,although some embodiments described herein refer to a minimum authorizedage, such as a minimum authorized age for the purchase of tobacco oralcohol, other embodiments exist that refer to a maximum authorized age,such as a maximum age for which “child rates” for air travel or othertickets are authorized, or refer to an authorized range of ages.

Similarly, embodiments of the authorization verification systems andmethods may be implemented in situations where criteria other than ageare used to authorize an individual's participation in a controlledtransaction or activity. For example, entry to a community center orpermission to vote in a local election may be restricted to individualsresiding within certain zip codes, and a purchase of firearms may berestricted non-felons. Storing a record that verifies that authorizationwas checked may be desirable in these situations.

Furthermore, although some embodiments of the authorization systems andmethods are described herein as being implemented in conjunction with apurchase at a merchant's point-of-sale terminal, the systems and methodscan also be implemented in other point of access control situationsand/or locations where age calculation, or other type of authorization,is desirable. For example, in some embodiments, the systems and methodsare utilized in conjunction with an electronic (e-commerce) transactionthat may be initiated at a local or personal computer. Furthermore, thesystems and methods may be utilized at other types of points-of-controlthat are not associated with a financial transaction. Therefore, the useof the terms “clerk,” “merchant,” “merchant representative,” and thelike are not meant to be limiting, but are intended to refer to aperson, if any exists, who is facilitating the authorization process. Inembodiments in which the systems and methods are automated, thefunctions of the “clerk” may be executed by suitably configured computersoftware and/or hardware. Likewise, the terms “customer,” “purchaser,”and “user” are intended to refer to a person whose authorization isbeing determined by the systems and methods described herein, withoutimplying that the systems and methods must be associated with a purchaseor other business transaction. The term “point of sale” is intended torefer to a point of control where access to a product, event, location,service, or the like can be granted or denied. The terms “product,”“offering,” and “item” are not intended to be limited to physicalobjects available for purchase, but, as has been described, may alsorefer to a service, information, event, location, or other like to whichaccess may be limited according to a measure of authorization.Similarly, the terms “purchase,” “transaction,” and “encounter” mayrefer to an event in which authorization is determined for access.

Referring to the drawings in more detail:

FIG. 1A depicts one embodiment of a point-of-sale terminal 130 with anassociated magnetic-stripe reading device 120, a bar code scanner 160,and a variety of additional displays that can implement embodiments ofthe authorization verification systems and methods. The embodiment shownin FIG. 1A can be used, for example, in conjunction with a point-of-salepurchase of age-controlled products and with an authorization that isbased on an age threshold that is performed in association with thepurchase.

In the embodiment shown in FIG. 1A, the magnetic-stripe reading device120 allows for the input of personal information regarding an individualfrom an appropriately configured magnetic stripe on a driver's license,credit card, or other identification card 110. The personal informationread from the magnetic stripe may comprise the individual's birth date,citizenship, or other legally identifying features. In some embodiments,having the individual's birth date allows for the calculation of theindividual's current age.

In some embodiments, the personal information may not comprise theindividual's birth date, but may provide access to stored birth dateinformation for the individual. For example, biometric input, such as afingerprint, a palm print, an iris or retina scan, a facial pattern, ora voice sample, may be used, in embodiments with other input devices, aspersonal information that allows the system to link to other availabledata, such as a database of stored personal information, wherein thestored personal information does comprise the individual's birth date.In some embodiments, personal information comprising the individual'sbirth date may be input using, by way of example, a smart card, a barcode, a transponder, a cell phone, a personal digital assistant, otherwireless device, a security key, a computer “cookie” file or other file,manual keyboard input, or other device or method for communicating data.

In some embodiments, as an addition or an alternative to personalinformation that is entered electronically, personal information canalso be entered to the system manually (as when a clerk types in a birthdate read from an identification card), orally (as when the clerk speaksthe birth date into a suitable input device), or by any of a variety ofother methods.

In the embodiment shown in FIG. 1A, the bar code reader 160 allows forthe input of identifying information regarding products that comprisethe purchase. In some embodiments, the identifying information about theproducts allows for access to additional stored information about theproducts, as is described in greater detail with reference to the sampleproducts database in FIG. 5A. In some embodiments, the additional storedinformation about the products may comprise information indicative ofwhether the purchase of a product requires authorization, such as averification of the purchaser's age, before the purchase can becompleted.

In some embodiments, input of information regarding the products and/orservices associated with the transaction is implemented by using adifferent type of bar code reader, by manually keying in identifyinginformation, or by another method of information input.

In some embodiments, the age calculation and verification systems andmethods may be implemented as one or more software modules that areeasily implemented on existing equipment at a point of sale. Thepoint-of-sale terminal 130, the magnetic-stripe reading device 120, thebar code reader 160, and the additional display 140 are items that maycommonly exist at a point of sale, thereby illustrating the fact thatthe systems and methods may, in some embodiments, be implemented at apoint of sale without the need for additional hardware. In someembodiments, the point-of-sale terminal 130, the magnetic-stripe-readingdevice 120, the bar code reader 160, and/or the additional display 140are connected by way of a computer network to additional computerstorage and processor hardware.

In the embodiment shown in FIG. 1A, software for performing the agecalculation and verification may be executed, for example, by aprocessor or other circuitry located within the point-of-sale terminal130, by a computer device networked to the point-of-sale terminal 130,and may alternatively or additionally be executed by a processor orother circuitry located within the associated magnetic-stripe readingdevice 120 or other peripheral device. The processors may comprise, byway of example, personal computers (PCs), mainframe computers, otherprocessors, program logic, or other substrate configurationsrepresenting data and instructions, which operate as described herein.In other embodiments, the processors may comprise controller circuitry,processor circuitry, processors, general purpose single-chip ormulti-chip microprocessors, digital signal processors, embeddedmicroprocessors, microcontrollers and the like.

As illustrated in FIG. 1A, several options exist for displaying theresults of an age calculation authorization. For example, the results,such as a calculated age or other appropriate message, can be displayedin the LCD or other display window of the magnetic-stripe-reading device120. The results may additionally or alternatively be displayed in adisplay window associated with the point-of-sale terminal 130 or with anadditional display 140 at the point of sale or at another appropriatelocation. Age calculation results may also be printed on a sales receipt150 associated with a given transaction, as will be described in greaterdetail with reference to the sample receipt of FIG. 6.

In some embodiments in which the authorization is based on age, theresults of an age calculation may be displayed in numeric form, where anumber represents the individual's age in years. In some embodiments,the age calculation results may comprise additional information. Forexample, in one embodiment, to emphasize the fact that the agecalculation system is not configured to authenticate an identificationcard or to guarantee an individual's age, the age calculation resultsmay be displayed in a format similar to the following:

If today is Jul. 5, 2002 and The consumer's birth date is Jan. 19, 1963The consumer's age is 39

In one embodiment, the results of an age calculation may beelectronically stored along with other data in a transaction record inthe point-of-sale terminal 130. In other embodiments, a record of theage calculation may be stored in the magnetic-stripe-reading device 120or other peripheral device. In yet other embodiments, a record of theage calculation may be stored in a computer memory that is accessible tothe point-of-sale terminal 130 by way of a computer network.

FIG. 1B depicts one embodiment of a local computer 170, such as apersonal computer (PC), which can implement embodiments of theauthorization verification systems and methods. In one embodiment, theindividual may use the local computer 170 in order to participate in anelectronic commerce (e-commerce) transaction, for example a purchase ofage-controlled goods and/or services over a communication network, suchas the Internet. In one embodiment, the individual may use the computer170 to participate in a game with other individuals, for which an agethreshold or other authorization requirement is enforced. In otherembodiments, the local computer 170 may be used to access goods,services, and/or information, or for another type of interaction forwhich authorization verification is desirable.

In these and other embodiments, the local computer 170 may serve as a“point of sale” or as a “point of access control,” although the localcomputer 170 may be situated, for example, at the individual's home,office, or automobile.

The local computer 170 may be embodied in forms other than a PC, as willbe described in greater detail with reference to FIG. 2B below.

As portrayed in FIG. 1B, the local computer 170 may be configured toreceive input from a magnetic stripe reader 180. The magnetic stripereader 180 or other input device may be configured to extract personalinformation about the individual from the magnetic stripe of a driver'slicense, credit card, frequent flyer card, smart card, or from anothersuitably configured card or device. The personal information read fromthe magnetic stripe may comprise the individual's birth date,citizenship, or other legally identifying features. In some embodiments,having the individual's birth date allows for the calculation of theindividual's current age.

In one embodiment, the magnetic stripe reader 180 may be constructed toform an integral part of the local computer 170, such as, for example, apart of the computer keyboard. In some embodiments, the magnetic stripereader 180 or other input device may be implemented as a stand-aloneperipheral device. In other embodiments, the computer keyboard itselfserves as an input device for inputting personal information related toauthorization and other information about a desired transaction.

As is further portrayed in the embodiment of FIG. 1B, the local computer170 is configured to receive input from a fingerpad 190 device, whichcan accept biometric input, such as a fingerprint, and can transmit anelectronic version of the input to the local computer 170 for use by theauthorization verification systems and methods. In other embodiments,other methods are used for transmitting other forms of biometric dataabout the individual to the local computer 170, as was described withreference to FIG. 1A. In some embodiments, biometric data, from afingerpad 190, camera, microphone, scanner, or other suitable device,can be used to identify the individual and to access additional storedinformation about the individual that may be relevant to apoint-of-access-control authorization for an e-commerce transaction.

In other embodiments, other devices and methods may be used to inputpersonal and other information for the authorization verificationsystems and methods. For example, in one embodiment, a bar code or otherscanner, touch screen, or microphone may be configured as a peripheralto the local computer 170 and may transmit information about productsassociated with a transaction to the local computer 170 for use by theauthorization verification systems and methods. In other embodimentsassociated with online or e-commerce transactions, information for useby embodiments of the authorization verification systems and methods maybe input using, by way of example, a smart card, a bar code, atransponder, a cell phone, a personal digital assistant, other wirelessdevice, a security key, a computer “cookie” file or other file, manualkeyboard input, or other device or method for communicating data.

In some embodiments, as an addition or an alternative to informationthat is entered electronically, personal information can also be enteredto the system manually (as when an individual types in a birth date),orally (as when the individual speaks the birth date into a suitableinput device), or by any of a variety of other methods.

As was the case with the embodiment shown in FIG. 1A, the authorizationverification systems and methods may store a retrievable record of anauthorization determination performed. In one embodiment, the record isstored within computer memory resident in the local computer 170. In oneembodiment, the record is stored by a remote server that is incommunication with the local computer, as will be described in greaterdetail with reference to FIG. 2B. In other embodiments, other methodsand locations are used for storing a record of an authorization checkperformed in conjunction with a transaction.

FIG. 2A is a block diagram that depicts a broad overview of oneembodiment of an authorization verification system, in whichauthorization is based on an age calculation.

As shown in FIG. 2A, authorization software 200 is executed on aprocessor 205 in a host device 210. The host device 210 may be embodiedin a variety of forms. For example, the host device 210 may be apoint-of-sale terminal or other computerized cash register as wasdepicted in FIG. 1A. Alternatively, the host device 210 may be aninteractive kiosk or other stand-alone device for determiningauthorization at a point of sale or other point of control. The hostdevice 210 may also be embodied in other forms.

The processor 205 may comprise, by way of example, program logic, orother substrate configurations representing data and instructions, whichoperate as described herein. In other embodiments, the processor maycomprise controller circuitry, processor circuitry, one or more generalpurpose single-chip or multi-chip microprocessors, digital signalprocessor, embedded microprocessor, microcontroller and the like.

In one embodiment, the authorization software 290 comprises programlogic that may advantageously be implemented as one or more modules. Themodules may advantageously be configured to execute on one or moreprocessors. The modules may comprise, but are not limited to, any of thefollowing: software or hardware components such as softwareobject-oriented software components, class components and taskcomponents, processes methods, functions, attributes, procedures,subroutines, segments of program code, drivers, firmware, microcode,circuitry, data, databases, data structures, tables, arrays, orvariables.

As shown in FIG. 2A, information about the current date and/or time 230is available to the host device 210. In one embodiment, the date/timeinformation 230 is provided by an internal clock or other component thatresides within the host device 210. In one embodiment, the date/timeinformation 230 is received by the host device 210 and the processor 205from a source external to the host. In some embodiments, the date/timeinformation 230 is available as a measurement of time that can be usedto calculate a date. In other embodiments, the date/time information 230is available in other formats that allow for identification of thecurrent date. In embodiments where authorization is determined bymeasures other than age, other types of auxiliary information may beused by the authorization verification systems and methods.

The host device 210 also receives personal information 220 about anindividual as input. In one embodiment, the personal information 220 maytake the form of identification information, comprising a birth date,which can be retrieved from a magnetic stripe on the individual'sdriver's license or other identification card when the card is swipedthrough a suitable input device or is otherwise made available forreading by a merchant representative or by the individual.

Alternatively, the personal information 220 may be embodied as a birthdate that is keyed in manually, input orally, or otherwise entered by amerchant representative or by the individual. The personal information220 may also take the form of other identifying information that may notcomprise a birth date, but that can be used as a link to available,stored information about the individual, wherein the stored informationcomprises birth date information for the individual. Personalinformation 220 that comprises birth date information or a link to birthdate information may also be input using any of a variety of methods,including, but not limited to, a smart card, a bar code, a transponder,a cell phone, a personal digital assistant, a security key, a computer“cookie” file or other file, biometric input, or some other device ormethod for communicating data.

As will be described in greater detail with reference to FIG. 4, in someembodiments the personal information 220 may also comprise informationabout the validity of the source of personal information 220. Forexample, if the personal information 220 is being received from anindividual's driver's license, the personal information 220 mayadditionally comprise expiration date information for the driver'slicense.

In some embodiments, the personal information 220 received may notcomprise sufficient information about the individual to allow fordetermining authorization, but may provide access to additionalinformation. For example, when age is used a basis for determiningauthorization, the personal information 220 received may not comprise abirth date for the individual, but may provide a link to stored personalinformation 260 that does comprise the individual's birth date. Thestored personal information 260 may be stored externally to the hostdevice 210, as is shown in FIG. 2A, and may be accessed by the hostdevice via local or remote computer network, or by other communicationsystems and methods. In other embodiments, the stored personalinformation 260 may be stored internally to the host device 210.

In the embodiment shown in FIG. 2A, using the date/time information 230and the personal information 220 received, the authorization software200 calculates the current age of the individual, or otherwisedetermines the authorization or lack thereof of the individual. The hostdevice 210, may send the age information to a display 240 that can beembodied in a variety of forms. For example, several types of displayare described with reference to FIG. 1A, including, as one example, amessage that is printed on a receipt or other record of the transaction.

The host device 210 can, additionally or alternatively, send a copy ofthe authorization determination results to be stored as a retrievablerecord in a transaction storage repository 250 that can be external tothe host device 210, as depicted in the FIG. 2A example, and/or can beinternal to the host device 210. In some embodiments, the authorizationinformation can be associated with other relevant information forstorage.

For example, in one embodiment where authorization is used forage-controlled purchases, the authorization verification system keeps anaudit report of each age calculation record, wherein each recordcomprises the time of the calculation and the age calculated. In otherembodiments, the audit report, transaction log, or other retrievablerecord of the calculation may comprise some, all, or none of thefollowing information: customer's driver's license or otheridentification number, clerk's name and/or identification, amount ofpurchase, items purchased, types of items purchased, and any otherrelevant information, as permitted by law. Information stored in thetransaction storage 250 of one example embodiment is described ingreater detail with reference to FIGS. 5B and 5C below.

In some embodiments, the authorization record is stored in thetransaction storage 250 for a limited period of time, such as for oneday or for one month, after which time the record is purged from thetransaction storage 250. In one embodiment, new authorization recordsare stored in the transaction storage 250, and as storage capacitywithin the transaction storage 250 becomes limited, older records aredeleted to make room for the new. In other embodiments, other storagesystems and methods are employed, as will be familiar to one of ordinaryskill in the art.

The record of the authorization determination that is stored in thetransaction storage 250 can be subsequently retrieved and reviewed inorder to verify whether an authorization determination was performed inconjunction with a given transaction. In various embodiments, dependingon the content of the record and the length of time for which it isstored, verification that an authorization was performed for a giventransaction, for a given individual, or for some other criteria, maylater be carried out.

FIG. 2B is a block diagram that depicts a broad overview of oneembodiment of an authorization verification system in whichauthorization is determined in association with an e-commercetransaction. For example, as was described with reference to FIG. 1B,the system may be used in conjunction with an online purchase, withaccess to online information or entertainment, or with othercomputer-accessed or electronically-accessed products, services, andactivities.

As shown in FIG. 2B, a local computer 270 is a device that allows a userto interact with a remote server 280 using a communications network 275.In one embodiment, the local computer 270 is a conventional computerthat is equipped with a conventional modem. In other embodiments, thelocal computer 270 can be any device that allows an individual using thelocal computer 270 to interact with the authorization verificationsystem, such as, for example, a computer workstation, a local areanetwork of individual computers, a kiosk, a personal digital assistant,an interactive wireless communications device, an interactivetelevision, a transponder, or the like.

As shown in FIG. 2B, the local computer 270 communicates via acommunications network 275 with a remote server 280. In one embodiment,the communications network 275 is a global network of computers, such asthe Internet. In other embodiments: the communications network 275 canbe any communication system including by way of example, dedicatedcommunication lines, telephone networks, wireless data transmissionsystems, two-way cable systems, customized computer networks,interactive kiosk networks, automatic teller machine networks,interactive television networks, intranets, and the like.

In one embodiment, the remote server 280 operates one or more websiteson the World Wide Web. In other embodiments the remote server 280 can beany device that interacts with or provides data to the local computer270, including by way of example, any internet site, private network,network server, video delivery system, audio-visual media provider,television programming provider, telephone switching network, tellernetwork, wireless communication center and the like.

In one embodiment, the remote server 280 is associated with one or moreweb pages that offer age-controlled products or services for purchasevia the Internet. In one embodiment, the remote server 280 is associatedwith a web site that offers age-controlled participation in games orother online events. In one embodiment, the remote server 280 offersauthorization verification services to other e-commerce sites thatdesire to have a record of authorizations performed for their e-commercetransactions. In other embodiments, the remote server 280 performsauthorization determination and verification associated with the localcomputer 270 for other reasons.

As further shown in FIG. 2B, a personal information input device 265 canbe used to input personal information useful for an authorizationdetermination to the local computer 270. In one embodiment, the personalinformation input device 265 is a magnetic stripe reader 180 as wasdepicted in FIG. 1B. In one embodiment, the personal information inputdevice 265 is a fingerpad 190, or other biometric input device, as wasalso depicted in FIG. 1B. In one embodiment, the input device is ascanner with optical character recognition capabilities that can readinformation printed on a suitable information medium. In otherembodiments, other types of information input devices 265 may also beused in conjunction with the authorization verification systems andmethods described. Personal information may also be input using any of avariety of methods, including, but not limited to, a smart card, a barcode, a transponder, a cell phone, a personal digital assistant, asecurity key, a computer “cookie” file or other file, a microphone,computer keyboard, touchscreen, or other device or method forcommunicating data.

In one embodiment, personal information useful to the authorizationverification systems and methods may be previously stored in the localcomputer 270 and may be accessed by the local computer 270 for thatpurpose with or without a need for input from a personal informationinput device 265.

In the embodiment shown in FIG. 2B, the local computer 270 communicatesinformation received from the personal information input device 265 tothe remote server 280 via the communications network 275 for purposes ofauthorization verification associated with an e-commerce transaction.

In one embodiment, determining the authorization, or lack thereof, of anindividual associated with the local computer 270 is performed byauthorization software 290 used by the remote server 280.

In one embodiment, the authorization software 290 comprises programlogic that may advantageously be implemented as one or more modules. Themodules may advantageously be configured to execute on one or moreprocessors. The modules may comprise, but are not limited to, any of thefollowing: software or hardware components such as softwareobject-oriented software components, class components and taskcomponents, processes methods, functions, attributes, procedures,subroutines, segments of program code, drivers, firmware, microcode,circuitry, data, databases, data structures, tables, arrays, orvariables.

In embodiments where authorization is based on age, the authorizationsoftware 200 may calculate the current age of the individual usinginformation about the current date and/or time along with the personalinformation received from the local computer 270.

In some embodiments, the personal information received from the localcomputer 270 may not comprise sufficient information about theindividual to allow for determining authorization, but may provideaccess to additional information. For example, when age is used a basisfor determining authorization, the personal information received may notcomprise a birth date for the individual, but may provide a link tostored personal information 298 that does comprise the individual'sbirth date. The stored personal information 298 may be stored externallyto the remote server 280, as is shown in FIG. 2B, and may be accessed bythe remote server 280 via local or remote computer network, or by othercommunication systems and methods. In other embodiments, the storedpersonal information 298 may be stored internally to the remote server280.

As shown in FIG. 2B, information about the current date and/or time 285is available to the authorization software 290 in the remote server 280.In one embodiment, as depicted in FIG. 2B, the date/time information 285is provided by an internal clock or other component that resides withinthe remote server 280. In one embodiment, the date/time information 230is accessed by the remote server 280 via computer network from a sourceexternal to the server 280. In another embodiment, date and/or timeinformation 285 from a source within the local computer 270 may be used.In some embodiments, the date/time information 285 is available as ameasurement of time that can be used to calculate a date. In otherembodiments, the date/time information 230 is available in other formatsthat allow for identification of the current date.

In some embodiments in which authorization is based on age, and in whichcurrent age is determined based in part on output from acomputer-resident clock, it may be desirable to use a clock that isinternal to the remote server 280 rather than a clock resident in thelocal computer 270, because of inconsistency in the accuracy ofcomputer-resident clocks in local computers 270.

Using the date/time information 285 and the personal informationreceived from the local computer 270, the authorization software 290calculates the current age of the individual, or otherwise determinesthe authorization or lack thereof of the individual whose personalinformation was entered.

Once an authorization determination is made, in one embodiment, theremote server 280 may send a message informing the user of the localcomputer 270 of the authorization results. In one embodiment, where theremote server 280 is executing the authorization verification on behalfof another web site, web server, or other entity, the remote server 280may send a message informing the entity of the authorization results.

The remote server 280 can additionally, or alternatively, send a copy ofthe authorization determination results to be stored as a retrievablerecord in a transaction storage repository 295 that can be internal tothe remote server 280, as depicted in the FIG. 2B example, and/or can beexternal to the remote server 280. In some embodiments, theauthorization information can be associated with other relevantinformation for storage.

As was described with reference to the embodiment depicted in FIG. 2A,in one embodiment where authorization is used for age-controlledpurchases, the authorization verification system keeps an audit reportof each age calculation record, wherein each record comprises the timeof the calculation and the age calculated. In other embodiments, theaudit report, transaction log, or other retrievable record of thecalculation may comprise some, all, or none of the followinginformation: customer's driver's license or other identification number,Internet address or other identifier for the local computer 270, amountof purchase, items purchased, types of items purchased, and any otherrelevant information, as permitted by law. Information stored in thetransaction storage 295 of one example embodiment is described ingreater detail with reference to FIGS. 5B and 5C below.

In one embodiment, the authorization record is stored in the transactionstorage 295 for a limited period of time, such as for one day or for onemonth, after which time the record is purged from the transactionstorage 295. In one embodiment, new authorization records are stored inthe transaction storage 295, and as storage capacity within thetransaction storage 295 becomes limited, older records are deleted tomake room for the new. In other embodiments, other storage systems andmethods are employed, as will be familiar to one of ordinary skill inthe art.

FIG. 3 is a flow chart that depicts one embodiment of a process 300 forconducting a sales transaction that comprises an authorization by agecalculation for a minimum authorized age. By way of example, the process300 is described as being implemented at a point-of-sale terminal with ascanning device that is configured to read scannable codes, such as barcodes, affixed to products desired for purchase by a customer. However,the process 300, with modifications familiar to one of ordinary skill inthe art, can also be implemented in conjunction with an e-commercetransaction. For example, in most e-commerce transactions, automatedprocesses carry out functions that are described in the FIG. 3 flowchartas being executed by a point of sale clerk. As will further be familiarto one of ordinary skill in the art, the process 300 can also beimplemented in other point of access control situations in whichauthorization determination and verification is desirable.

The process 300 begins at state 305, where a sales transaction isinitiated. From state 305, the process 300 moves to state 310, where aclerk or purchaser identifies items to be purchased. In one embodiment,items to be purchased are identified by scanning a bar code affixed tothe items.

Moving on to state 315, the process 300 determines whether to perform anauthorization check. In one embodiment, an authorization check isperformed whenever any of the identified items are among those for whichage restrictions are imposed on purchasers. A practitioner reasonablyskilled in the art will appreciate that this determination may beimplemented and executed by any one of a number of methods withoutdeparting from the spirit of the invention. As one example, look-uptables that allow access to relevant restriction information based onidentifiers associated with the scanned items may advantageously beused. One example of a product database that can fulfill this look-uptable role is depicted in FIG. 5A below.

In other embodiments, authorization checks may not be performed everytime an item associated with a restriction is identified as beingamongst the items to be purchased. For example, in one embodiment,authorization checks are performed randomly for purchases comprisingrestricted items. In one embodiment, authorization checks are performedwhen restricted items, or combinations of restricted items, that havebeen previously identified as being amongst those that are mostfrequently associated with attempted unauthorized purchases are includedin the current purchase. In other embodiments; other considerations mayaffect the decision whether to perform an authorization check for thecurrent purchase transaction.

If the process determines in state 315 either that no restricted itemsexist amongst the purchase items, or that for other reasons, anauthorization check need not be carried out, the process 300 proceeds tostate 340, where the sales transaction is completed normally.

If, in state 315, the process 300 determines that an authorization checkwill be carried out, the process 300 moves to state 320 where theprocess 300 determines the authorization threshold value, such as, byway of example, a minimum authorized age, for the set of scanned items.For example, in one embodiment, a set of scanned items that includes oneitem with a minimum age threshold of eighteen and one item with minimumage of twenty-one may determine an overall minimum age threshold oftwenty-one for the set of scanned items, since twenty-one is the minimumage that satisfies the authorization threshold for all items of thesets. As was described with reference to state 310, a practitionerreasonably skilled in the art will appreciate that this determinationmay be implemented and executed by any one of a number of methods,without departing from the spirit of the invention. In other situations,it may be desirable to select the lowest threshold to be the thresholdfor the set. In still other situations, it may be desirable toconstruct, from the age thresholds of the items in a purchase, a rangeof acceptable ages that are authorized to allow the purchase

In state 325, the process 300 calculates the age or other authorizationmeasure of the customer, as will be described in greater detail withreference to FIG. 4. In the embodiment described in FIG. 4, execution ofthe age calculation process comprises storing a retrievable record ofthe age calculation.

In state 330, the process 300 compares the customer age calculated instate 325 with the authorized threshold age that was identified in state320, and determines whether the customer wishing to purchase the scanneditems is legally authorized to do so. If the process 300 determines thatthe customer authorized to make the desired purchase, the process 300moves to state 340, where the transaction is completed normally, and theprocess 300 ends in state 380.

If, in state 330, the process determines that the customer is notauthorized to make the desired purchase, the process 300 moves to state345, where the transaction is aborted and finally ends in state 380. Inother embodiments, if in state 330, the process determines that thecustomer is not authorized to purchase the set of scanned items, theprocess 300 may allow the transaction to be completed if theage-controlled items for which the customer is not authorized topurchase are removed from the transaction. For example, in oneembodiment where items are added to a purchase receipt during scanning,an item is not added to the receipt until the customer's authorizationto purchase the item is verified. In still other embodiments, when adetermination is made that the customer is not authorized to make thedesired purchase, control of the transaction may be transferred to aclerk or other merchant representative associated with the transactionso that the situation may be resolved.

As will be apparent to one of ordinary skill in the art, the variousstates of process 300 may be configured and carried out in any one of avariety of ways without departing from the spirit of the invention. Forexample, in one embodiment, the customer's age is determined prior toscanning the items, and as each item is scanned, a determination is maderegarding the customer's authorization to purchase the item, such that avisual, audible, printed or other form of notification may be made bythe system, either at the time of scanning or at the end of scanning, orboth, notifying the clerk of the customer's lack of authorization topurchase the item. Other embodiments of the process 300 are alsoenvisioned.

As was stated with reference to state 315 above, in some embodiments,age calculation or other authorization determination is carried out forevery transaction. In some embodiments, age calculation or otherauthorization determination may be triggered automatically by thepresence of an item or situation requiring authorization. In someembodiments; age calculation or other authorization determination may beinitiated by a determination on the part of an associated clerk thatsuch an authorization determination is warranted. These and otherembodiments will be recognized by one of ordinary skill in the art asreasonable variations of the systems and methods described herein.

FIG. 4 is a flow chart that describes one embodiment of a process 400 todetermine authorization by calculating the age of a person on apoint-of-sale device and to display and store a record of theauthorization determination. The process 400 described in FIG. 4 is oneembodiment of the age calculation process mentioned with reference tostate 325 from FIG. 3. Although the process 400 is described as takingplace at a point-of-sale device, one of ordinary skill in the art willrecognize that the process 400 could be implemented in an e-commerce orother suitable setting with familiar modifications that need not requireundue experimentation.

Referring now to the process 400 as it is depicted in FIG. 4, from astart state, the process 400 begins in state 410 where identifyingpersonal information about a person is input into a point-of-saledevice. In state 420, the person's birth date is obtained. The person'sbirth date can be captured either directly from the personal informationthat was input in state 410 or indirectly, using the personalinformation from state 420 as a link to a stored copy of the person'sbirth date. In the embodiment shown in FIG. 4, an expiration date for anidentity card used as a source of personal information can also becaptured by the process 400 in state 420. In other embodiments, anexpiration date for an identity card used as a source of personalinformation is not be captured by the process 400, or is captured forcertain types of personal information sources, or is captured only whenavailable.

In state 430, the process 400 verifies that the read-in of the personalinformation and the capture of the birth date and expiration date havebeen accomplished successfully. If the information is determined not tobe valid, the process moves to state 440 where a “re-try” message can bedisplayed to prompt the clerk or the individual to re-enter the personalinformation, and the process 400 returns to state 410. As will be clearto one of reasonable skill in the art, in some embodiments, thevalidation step of states 430 and 440 may be omitted or may be executedat a different point in the process 400 without departing from thespirit of the age calculation verification system. Similarly, in someembodiments, an input validation step may be implemented in a differentmanner. For example, in one embodiment, an identification of an invalidread-in in state 430 causes the process 400 to be aborted or to bereferred to a clerk who is facilitating the process 400.

If, in state 430, the process 400 verifies that the read-in of thepersonal information and the capture of the birth date and expirationdate have been accomplished successfully, the process 400 moves to state450, where the process 400 retrieves and/or calculates the current date.In one embodiment, the current date is calculated using informationreceived from an internal clock. In other embodiments, the current datecan be determined using other methods.

In state 310, the person's birth date is captured, either directly fromthe personal information that was input in state 305, or indirectly,using the personal information as a link to stored informationcomprising the person's birth date.

Moving on to state 451, the process 400 verifies the validity of thesource of the personal information. For example, in one embodiment, theprocess 400 compares the expiration date of the identity card with thecalculated current date. In state 452, the process 400 determineswhether the expiration date has passed. If the expiration date haspassed, the process 400 moves on to state 453 where an “expired” messageis displayed to the clerk and/or to the individual, and, in oneembodiment, the process ends in state 495.

A practitioner of ordinary skill in the art will appreciate that states451-453, in which the expiration date is checked, may reasonably beomitted in some embodiments of the authorization verification system.

If, in state 452, the process 400 determines that the identity card hasnot expired, the process 400 moves on to state 460 where the process 400compares the person's birth date with the current date and calculatesthe person's current age.

In state 470, the process 400 can, in some embodiments, display theindividual's age in a visual display and/or in a printed display, as ona paper receipt 150, as is exemplified in FIG. 1A and FIG. 6, or in someother manner.

In state 480, the process 400 stores the age information along withassociated transaction data in a transaction storage location 250. Forexample, in one embodiment, the process 400 may record the calculatedage together with a timestamp indicative of the time at which the agewas calculated. FIG. 5B below depicts in greater detail one example ofthe types of data that may be stored with respect to an age calculation.The storage of age calculation data in state 480 allows for a subsequentretrieval of the data and for verification that age calculationprocedures or other authorization determination procedures were executedfor a given transaction or encounter.

From state 480, the process 400 to calculate age at a point-of-saledevice next moves on to state 495 and ends.

In some embodiments, age calculation data that is stored in thetransaction storage location 250 may be stored on a temporary basis. Inone embodiment, the information is stored as a log of age calculationactivity and is purged daily. In other embodiments, the log of agecalculation activity can be purged weekly, or at other intervals, or asdeemed desirable. Still other embodiments provide for the storage of agecalculation information as part of a normally saved record that isstored for every sales transaction.

In one embodiment, the age calculation process 400 may advantageously beimplemented as one or more modules that can be configured to execute onone or more processors. The modules may comprise, but are not limitedto, any of the following: software or hardware components such assoftware object-oriented software components, class components and taskcomponents, processes methods, functions, attributes, procedures,subroutines, segments of program code, drivers, firmware, microcode,circuitry, data, databases, data structures, tables, arrays, orvariables.

FIG. 5A depicts one example of a products database 500 that can be usedto identify items that are associated with an authorization threshold.The sample database 500 of FIG. 5A comprises records 505-509 for itemsavailable for purchase, the records 505-509 comprising at least fourfields 501-504. In the embodiment depicted, the records 505-509 areindexed according to bar code symbols and bar code numbers which arestored in the bar code field 501 if each record 505-509. Thus, inembodiments configured to receive input from bar code scanners, records505-509 associated with items that have been scanned at the point ofsale are easy to locate in the products database 500.

As depicted in FIG. 5A, the products database 500 comprises other fieldsof information useful to the normal operation of a point of sale. Forexample, a retail price field 502 stores information that is indicativeof a retail price 502 associated with each item. A taxable field 503stores information indicative of whether the item is taxable. Otherfields of information may also be included in the products database 500without detracting from the spirit of the authorization verificationsystems and methods described herein.

As depicted in FIG. 5A, the products database 500 further comprises anauthorization threshold field 504 that indicates an age threshold, ifany exists, that is associated with each item. As depicted in FIG. 5A,two records 506, 507 indicate no authorization threshold for theassociated items, two records 505, 509 indicate an authorizationthreshold of age eighteen for the associated items, and one record 508indicates an authorization threshold of age twenty-one for theassociated items. Thus, in the embodiment shown in FIG. 5A, theauthorization threshold field 504 provides information about bothwhether an age-restriction is associated with an item and, if so, aboutthe value of the age-related authorization threshold itself.

In the embodiment depicted in FIG. 5A, no numeric value is listed in theauthorization threshold field 504 of records 506, 507 for which noauthorization restriction exists. In other embodiments, the lack of anauthorization restriction for an item associated with a given record maybe indicated in other ways, as, for example, by a numeric value in theauthorization threshold field 504. For example, a product with nominimum age restriction may have an authorization threshold value of agezero. In other embodiments, information in the authorization thresholdfield 504 may be configured in various other ways, as will be familiarto one of ordinary skill in the art.

Furthermore, in some embodiments, such as in the embodiment of FIG. 5A,the threshold field 504 may provide information about a threshold thatis a numeric value that can be used to delimit individuals who areauthorized from individuals who are not authorized, such as with aminimum age limit or a maximum age limit. In other embodiments, thethreshold field 504 may provide information about a threshold thatdefines a range of numeric values, such as the case in which residentswithin a range of zip codes are authorized to take advantage of aspecial offer. Similarly, a plurality of individual zip codes maycomprise an authorization threshold that authorizes access to anoffering, and authorization thresholds are envisioned in which theauthorization threshold is defined in terms that are alphabetic, orotherwise categorized in a scheme that is not directly numeric. As willbe familiar to one of ordinary skill in the art, various otherconfigurations of authorization thresholds are possible withoutdeparting from the spirit of the authorization verification systems andmethods described herein.

As depicted in FIG. 5A, the information stored about individual items inthe products database 500 can be used to determine the authorizationthreshold value for a given purchase transaction as a whole. Forexample, if a purchase comprises the five items associated with the fiverecords 505-509 of the database 500, and if authorization for thepurchase is based on a minimum age limit, then it can be easilyascertained that the minimum authorized age for making the five-itempurchase is twenty-one, the threshold age associated with record 508. Inother words, the highest age threshold associated with any of therecords 505-509 is the minimum authorized age for making the purchase.

In other embodiments of the authorization verification systems andmethods, other processes may be used to determine an authorizationthreshold for a transaction from the authorization thresholds accessedfor the individual items of the transaction. Similarly, embodiments of athreshold determination process may variously define a range of valuesthat authorize a transaction, such as a range that encompasses all ofthe individual thresholds or a range that is the intersection of all ofthe individual thresholds or a range that is defined in another way.Other processes may also be used to determine a threshold value orthreshold range or threshold ranges that authorize a purchase or othertransaction.

As will be familiar to one of ordinary skill in the art, theconfiguration and contents of the products database 500 shown in FIG. 5Aare only one example of data that may be used by the authorizationverification systems and methods. Other configurations and types of dataare also envisioned as being used without departing from the systems andmethods described herein.

FIG. 5B depicts one example of a report 520 that can be generated inassociation with the age verification systems and methods describedherein. This example is an age calculation report 520 based on data thatis stored in association with an age calculation at a point-of-saletransaction. The sample report 520 depicted in FIG. 5B comprises sixfields of information 510-515. A date field 510 lists the date of agiven transaction. For example, the date fields 510 of the report 505 ofFIG. 5B indicate that the transactions recorded therein all took placeon Sep. 4, 2002. A time field 511 lists the time that transaction tookplace. In some embodiments, the date field 510 and time field 511 areused to uniquely or near-uniquely identify a given transaction. Inembodiments where age calculation records are purged on a daily basis, atime field 511 alone may be sufficient to uniquely or near-uniquelyidentify a given transaction.

In FIG. 5B, a transaction identification field 512 records a uniqueidentifier for each transaction. A customer identification field 513 canoptionally store a number, code, or other identification indicatorassociated with the source of personal identifying information 220 for acustomer in transaction. For example, the customer identification field513 may store the number of a driver's license offered by a customer asa source of birth date information. Customer identification informationstored as part of a transaction record may be useful for a variety ofpurposes, but privacy protection legislation or business practices maypreclude the storage of customer identification information 513 in somesituations.

As further depicted in FIG. 5B, an item types field 514 may storeinformation about the types of age-controlled items that a givenpurchase transaction comprised. In one embodiment, items are categorizedinto types that are relevant to authorization thresholds associated withthe items. In one embodiment, items are categorized into types thatconform to the existing business practices of the merchant offering theitems for sale. In other embodiments, items are categorized into othertype classifications. Such information may be relevant to determiningwhether a customer's calculated age was sufficient to allow for a givenpurchase, because different minimum authorized ages may be associatedwith different age-controlled items. For example, in some locations, acustomer may purchase tobacco products at age eighteen or older, butmust be twenty-one years of age or older in order to purchase liquorproducts. The example code depicted in the item types field 514 of FIG.5B employs a binary code to indicate which types of products werepurchased in a given transaction, where the columns of the code, readingfrom left to right indicate: tobacco, alcohol, adult-content, andgambling (lottery) products, respectively. In any given column, a “1”indicates that a product of the associated type was included is thepurchase, while a “0” indicates that no product of the associated typewas included in the purchase. Thus, a code of “1000” can be used toindicate that tobacco products were the only age-controlled products inthe given transaction, so that a customer aged eighteen or older may beallowed to make the purchase. Using the same system, a code of “0101”can be used to indicate that the customer purchased both an alcoholicbeverage and a lottery ticket, requiring a minimum age of twenty-one forthe combined purchase.

An age field 515 stores the age that was calculated by the agecalculation process 400 in association with a given transaction.

FIG. 5C depicts a second example of a report 550 that can be generatedbased on data that is stored in association with an age calculation at apoint-of-sale transaction. The sample report depicted in FIG. 5Ccomprises five fields of information 560-564. This report 550 uses thesame code for the item types field 563 as was described with referenceto the item types field 514 in FIG. 5B. In the embodiment depicted inFIG. 5C, personal information to identify the customer is not stored inthe age calculation report 550. However, information identifying thedate 560, time 561, and transaction number 562 for a given transactionare stored, along with information about the types of items 563 in thetransaction for which authorization is desired, and the age 564 of thecustomer participating in the transaction. Thus, a retrievable record ismade of an authorization determination at a point-of-sale transactionthat can be used to subsequently verify that the authorization tookplace for the given transaction.

As will be obvious to one of ordinary skill in the art, some, all, ornone of these and/or other types of data may be stored as a record of anauthorization determination procedure that is performed for a giventransaction, depending on the given situation in which it is performed.For example, in some embodiments, as was shown in FIGS. 5B and 5C, anactual age or other authorization parameter may be included in a reportor written record of an authorization determination. In otherembodiments, a flag, symbol, or other indicia communicates thesuccessful authorization (or lack thereof) for a given encounter. Forexample, in one embodiment, the transactions log comprises transactionrecords, each of which comprise a transaction identifier and anauthorization indicator of “OK” or “FAIL.” Such an authorizationindicator can also be displayed on a sales receipt associated with anauthorization determination. In one embodiment where authorization isbased on age, the transactions log comprises records, each of whichcomprise a transaction date and time and an age. In some embodiments,the transaction storage 250 comprises a record for each transaction; insome embodiments, the transaction storage 250 comprises a record foreach transaction for which an authorization determination was performed.In some embodiments, the record in the transaction storage 250 comprisesinformation about the authorization threshold determined to beappropriate for the transaction associated with the record. In someembodiments, the record in the transaction storage 250 comprisesidentifying information about the point-of-sale device, the localcomputer 270, or other device used in conjunction with the authorizationverification systems and methods.

FIG. 6 depicts an example of a sales receipt 600 printed in conjunctionwith a sales transaction for which an age calculation was performed. Inthe sample sales receipt 600 of FIG. 6, a printed record of thecustomer's calculated age 610 is printed at the bottom of the salesreceipt 600. Such a receipt 600 provides a written indication that anage calculation, as may be mandated by law, was carried out for thesales transaction.

An authorization verification system has been described herein withparticular applications associated with point-of-sale and e-commercetransactions. However, it is foreseen that the techniques described willhave wider applications. Therefore, while certain embodiments of theinventions have been described, these embodiments have been presented byway of example only, and are not intended to limit the scope of theinventions to the specific forms, arrangement of parts, sequence ofsteps, or particular applications described and shown. Indeed, the novelmethods and systems described herein may be embodied in a variety ofother forms. Furthermore, various omissions, substitutions, and changesin the form of the methods and systems described herein may be madewithout departing from the spirit of the invention. The accompanyingclaims and their equivalents are intended to cover such forms ormodifications as would fall within the scope and spirit of theinvention.

What is claimed is:
 1. A process for determining the ages of purchaserswishing to engage in purchase transactions of one or more items and formaintaining a verifiable set of records that the ages of the purchaserswere calculated, the process comprising: (i) obtaining with a hostcomputer system birth date identification information about a purchaser;(ii) obtaining with the host computer system information about thecurrent date; (iii) calculating with the host computer system the age ofthe purchaser using the current date and the birth date identificationinformation; (iv) storing in a memory with the host computer system arecord for a purchase transaction in the set of records, the recordindicative of the purchase transaction and a result of calculating theage of the purchaser; and (v) repeating acts (i) through (iv) for one ormore other purchase transactions with one or more other purchasers suchthat the set of records is built that includes a record of each purchasetransaction of an item that is associated with an age threshold and thatindicates that each purchase transaction of an item that is associatedwith an age threshold initiated an age calculation.
 2. The process ofclaim 1, further comprising identifying with the host computer system anitem that a purchaser is attempting to purchase that is associated withan age threshold.
 3. The process of claim 2, wherein identifying an itemthat is associated with an age threshold comprises: entering anidentifier associated with the item that is indicative of the type ofthe item; and using the identifier to access stored information aboutage thresholds associated with items.
 4. The process of claim 3, whereinentering an identifier comprises using a bar code scanner to scan a barcode attached to the item indicative of the type of item.
 5. The processof claim 1, wherein obtaining birth date identification informationabout the purchaser comprises scanning magnetically encoded informationon an identification card.
 6. The process of claim 5, wherein obtainingbirth date identification information comprises scanning magneticallyencoded information on a driver's license.
 7. The process of claim 5,further comprising verifying with the host computer system the validityof the identification card.
 8. The process of claim 1, wherein storing arecord of the purchase transaction in the set of records comprisesstoring an identifier for the purchase transaction.
 9. The process ofclaim 8, wherein storing an identifier for the purchase transactioncomprises recording the time of the purchase transaction.
 10. Theprocess of claim 9, wherein storing an identifier for the purchasetransaction further comprises recording a numeric identifier for thepurchase transaction.
 11. The process of claim 10, wherein storing arecord of the purchase transaction in the set of records comprisesstoring a customer identifier for the purchaser.
 12. The process ofclaim 11, wherein storing a record of the purchase transaction in theset of records comprises storing an indication of an item type for theitem that is associated with the age threshold.