Claims
- 1. A method of controlling access to a service over a network, including the steps of:
automatically identifying a service user; and acquiring user information, thereby to control said access.
- 2. A method according to claim 1 wherein said network is an anonymous network.
- 3. A method according to claim 1 wherein said network is any one of the group comprising: a data network, a cellular data network, and the Internet.
- 4. A method according to claim 1 wherein said user information is “real-world” information.
- 5. A method according to claim 1 wherein said controlling is allowing or denying access.
- 6. A method according to claim 1 wherein said service is any one of the group comprising: e-mail service, electronic banking, financial service, and firewall.
- 7. A method according to claim 1 further including the step of sending said user information to a service provider.
- 8. A method according to claim 1 further including the step of associating said user information with control information.
- 9. A method according to claim 8 wherein said step of associating is performed by a service provider.
- 10. A method according to claim 1 further including the step of requesting information from said user.
- 11. A method of providing service over a network, wherein said service requires identification of a user, including the steps of:
automatically identifying said user; and associating said user with user information, thus enabling said service.
- 12. A method according to claim 11 wherein said network is an anonymous network.
- 13. A method according to claim 11 wherein said network is any one of the group comprising: a data network, a cellular data network, and the Internet.
- 14. A method according to claim 11 wherein said user information is “real-world” information.
- 15. A method according to claim 11 wherein said user is a service user.
- 16. A method according to claim 11 wherein said service is any one of the group comprising: caller identification, call management, financial transactions, and restricted services.
- 17. A method according to claim 16 wherein said method of providing financial transactions service further including the step of automatically providing user billing details.
- 18. A method according to claim 16 wherein said method of providing financial transactions service further including the step of sending said user information to a merchant.
- 19. A method according to claim 18 wherein said user information is a temporary user identification.
- 20. A method according to claim 16 wherein said method of providing financial transactions service further including the step of associating said user information with billing information.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application is related to U.S. Provisional Patent Application 60/179,017, filed Jan. 31, 2000 and entitled “System And Method For Conducting Credit Card Transactions Over An Insecure Network”, U.S. Provisional Patent Application 60/197,002, filed Apr. 13, 2000 and entitled “System And Method For Conducting Credit Card Transactions Over An Insecure Network”, and U.S. Provisional Patent Application 60/220,498, filed Jul. 25, 2000 and entitled “Applications Of Automatic Identification”, all of which are incorporated in their entirety herein by reference.
Provisional Applications (3)
|
Number |
Date |
Country |
|
60179017 |
Jan 2000 |
US |
|
60197002 |
Apr 2000 |
US |
|
60220498 |
Jul 2000 |
US |