METHOD AND APPARATUS FOR PROVIDING FUNGIBLE INTERCOURSE OVER A NETWORK
First Claim
Patent Images
1. A method of connecting a user to an NSP (Network Service Provider) comprising the steps of:
- providing to a user an initializing set of identification information;
establishing communication with an access SP (Service Provider) on the network through an initialization NSP using the initializing set of identification information;
receiving and storing a customized set of identification information from said access SP for a selected NSP;
breaking communication with said initialization NSP; and
re-establishing communication with the network through said selected NSP using the customized set of identification information.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention comprises a method of and apparatus for simplifying the process of access to a network for a roaming computer user, divides the responsibility of servicing a given user wanting to access the network between multiple parties and minimizes the possibility of improper dissemination of email header data as well as improper use of network resources (including server systems) by non-clients.
-
Citations
31 Claims
-
1. A method of connecting a user to an NSP (Network Service Provider) comprising the steps of:
-
providing to a user an initializing set of identification information;
establishing communication with an access SP (Service Provider) on the network through an initialization NSP using the initializing set of identification information;
receiving and storing a customized set of identification information from said access SP for a selected NSP;
breaking communication with said initialization NSP; and
re-establishing communication with the network through said selected NSP using the customized set of identification information.
-
-
2. A method of connecting a user to a given NSP (Network Service Provider) comprising the steps of:
-
providing a network device user with an initial use set of log-in information for initially communicating with an access SP via an available NSP;
storing in a database of the Internet device a hidden time shared set of log-in information supplied by said access service for accessing said given ISP; and
causing the network device to reestablish communication with the network via said given NSP using the hidden set of log-in information. - View Dependent Claims (3)
-
-
4. A method of modifying a software database in a computer connected to the network comprising, the steps of:
-
the program inserting data into a database of incorporating a program as part of a web page; and
the program inserting data into a database of the computer in response to accessing the web page. - View Dependent Claims (5, 6)
-
-
7. A method of displaying representations of advertising material on a computer screen comprising the steps of:
-
providing database responsive software as part of a network browser;
displaying a toolbar on a computer screen in accordance with data in said database;
incorporating a program as part of a web page whereby accessing the web page causes the program to insert data into said database of the computer accessing said web page;
refreshing the display on the computer screen to present a toolbar based upon inserted data in said database, said toolbar including representations of advertising material; and
maintaining the toolbar display until new data is inserted in said database.
-
-
8. A method of preventing a network user from unauthorized distribution of network access log-in data comprising the steps of:
-
supplying a user with initialization log-in data whereby a temporary communication with the network may be established between a network accessing device and an access service;
storing a hidden set of log-in data in said network accessing device obtained from said access service during the temporary communication with the network; and
causing said network accessing device to disconnect from the temporary communication with the network and to re-establish communication with the network using said hidden set of log-in data stored in said network accessing device.
-
-
9. A method of providing anonymity to a network user through the dynamic allocation of log-in data to users comprising the steps of:
-
storing a hidden set of first log-in data in a network accessing device during a temporary communication with an access service connected to the network; and
storing a modified set of hidden second log-in data in said network accessing device when the user, during a subsequent network log-in attempt, is denied access because another user is presently using said first log-in data.
-
-
10. A method of obtaining access to a network comprising the steps of:
-
accessing the network using a previously provided set of log-in data;
communicating with an access service;
storing a modified set of log-in data received from said access service;
disconnecting from the network; and
using said modified set of log-in data when next accessing the network.
-
-
11. A method of obtaining anonymity on a network comprising the steps of:
-
accessing the network using a previously provided set of log-in data;
obtaining a presently unused set of network access data from an access service databank;
modifying said previously provided set of log-in data with the presently unused set of network access data; and
using the last modified set of log-in data when next re-accessing the network. - View Dependent Claims (14, 15, 16, 17)
-
-
12. A method of obtaining a set of network access data comprising the steps of:
-
modifying stored network access data using new data downloaded from an access provider connected to said network; and
reaccessing the network using the modified network access data.
-
-
13. A method of securing the transmission of data over a network comprising the steps of:
-
sending data packets to a third party for retransmission to a final recipient;
informing the third party of the address of the final recipient; and
forwarding the data packets from the third party to the address of said final recipient.
-
-
18. Apparatus for securing the transmission of data over a network comprising:
-
sending party security means for sending data packets from a sending party to a third party for retransmission to a final recipient;
third party security means for obtaining the network address of the final recipient; and
third party means for forwarding the data packets to the network address of said final recipient.
-
-
19. Apparatus for providing anonymity relative the transmission of data over a network comprising:
-
sending party security means for, transparently to the sending party, modifying header information originating with the sending party, in data packets intended for transmission to a final recipient, by listing a third party as both the sending and receiving party;
means for making available to said third party from the sending party the address of the intended final recipient; and
means for sending the modified data packets from the sending party to said third party for later forwarding to the address of said final recipient.
-
-
20. A method of providing anonymity of a given network user in the transmission and reception of data comprising the steps of:
-
interacting over the network with a third party for both sending data packets to a final recipient and receiving data packets transmitted from another party;
transmitting outgoing data packets from said given network user to said third party with the third party listed in a header as both the TO and FROM parties;
transmitting incoming data packets to said given network user from said third party with the given network user being listed in a header by an alias, as both the TO and FROM parties; and
changing the alias used for said given network user in accordance with predetermined conditions. - View Dependent Claims (21)
-
-
22. A method of accessing a digital network comprising the steps of:
-
obtaining network access data from a first entity; and
contacting a network service provider second entity in accordance with data obtained from said first entity to obtain a temporarily assigned network address. - View Dependent Claims (23, 24, 27, 29)
-
-
25. Network access user apparatus for accessing a digital network comprising:
-
means for obtaining network service provider access data from a first entity; and
means for contacting a network service provider second entity in accordance with data obtained from said first entity to obtain a temporarily assigned network address.
-
-
26. A method of accessing a network comprising the steps of:
-
obtaining verification and network service provider access data from a first entity; and
contacting a network service provider second entity in accordance with data obtained from said first entity to obtain a temporarily assigned network address.
-
-
28. A method of accessing a network comprising the steps of:
-
receiving data from a service entity on the network and storing said data in at least one database of a terminal;
retrieving service provider specific data from said at least one database for use in accessing at least a portion of the network;
contacting said service provider through at least a portion of the network in accordance with the retrieved data to obtain a temporarily assigned network address;
accessing at least a portion of the network through said service provider; and
contacting said service entity and updating said at least one database with data received from said service entity.
-
-
30. A method of sending email over a network comprising the steps of:
-
composing an email message with at least one original recipient name in the TO portion of a readable header;
requesting at least one recipient alias address from a service provider;
placing at least a portion of the at least one original recipient name in an encrypted message body of the email; and
sending the encrypted email to the recipient alias address. - View Dependent Claims (31)
-
Specification