Modification of the hidden log-in-data
First Claim
Patent Images
1. A method of providing anonymity to a network user through the dynamic allocation of log-in data to users comprising the steps of:
- storing a hidden set of first log-in data in a network accessing device during a temporary communication with an access service connected to the network; and
storing a modified set of hidden second log-in data in said network accessing device when the user, during a subsequent network log-in attempt, is denied access because another user is presently using said first log-in data.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention comprises a method of and apparatus for simplifying the process of access to a network for a roaming computer user, divides the responsibility of servicing a given user wanting to access the network between multiple parties and minimizes the possibility of improper dissemination of email header data as well as improper use of network resources (including server systems) by non-clients.
-
Citations
4 Claims
-
1. A method of providing anonymity to a network user through the dynamic allocation of log-in data to users comprising the steps of:
-
storing a hidden set of first log-in data in a network accessing device during a temporary communication with an access service connected to the network; and
storing a modified set of hidden second log-in data in said network accessing device when the user, during a subsequent network log-in attempt, is denied access because another user is presently using said first log-in data.
-
-
2. A method of obtaining anonymity on a network comprising the steps of:
-
accessing the network via an available network service provider (NSP) using a previously provided set of log-in data;
obtaining a presently unused set of network access data from an access service databank;
modifying said previously provided set of log-in data with the presently unused set of network access data; and
using the last modified set of log-in data when next re-accessing the network via a given NSP.
-
-
3. A method of obtaining a set of network access data comprising the steps of:
-
modifying stored network access data using new data downloaded from an access provider connected to said network; and
reaccessing the network via given network service provider (NSP) using the modified network access data.
-
-
4. A method of connecting a user to a network comprising the steps of:
-
determining whether a predefined telephone number is to be used;
upon a determination that a predefined telephone number is to be used, connecting the user to the network via the predefined telephone number;
upon a determination that a predefined telephone number is not to be used, performing the substeps of;
determining a telephone access number of an ISP that provides the highest reliable service to the user; and
connecting the user to the network via the telephone access number.
-
Specification