Method and system for maintaining login preference information of users in a network-based transaction facility
First Claim
1. A method residing as executable instruction in a non-transitory medium for execution on a processor, the executable instructions when executed by the processing performing the method, comprising:
- receiving, on the processor, a selection for a feature of a network facility from a user, the feature related to sell activities, chat activities, or feedback activities for the network facility; and
determining, by the processor, whether to request a password from the user for access to the feature based on prior user-configured preference information for that feature.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to various aspects for maintaining and utilizing login preference information of users of a network-based transaction facility. In one embodiment, user interface information is communicated to a client via a communications network. The user interface information includes information concerning a plurality of features within the network-based transaction facility. The user interface information also specifies a login interface that facilitates user input of login preference information pertaining to each of the plurality of features. Further, the login preference information is received from the client via the communications network and utilized to control user access to any of the plurality of features within the network-based transaction facility via the communications network.
-
Citations
20 Claims
-
1. A method residing as executable instruction in a non-transitory medium for execution on a processor, the executable instructions when executed by the processing performing the method, comprising:
-
receiving, on the processor, a selection for a feature of a network facility from a user, the feature related to sell activities, chat activities, or feedback activities for the network facility; and determining, by the processor, whether to request a password from the user for access to the feature based on prior user-configured preference information for that feature. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method residing as executable instruction in a non-transitory medium for execution on a processor, the executable instructions when executed by the processing performing the method, comprising:
-
authenticating, on the processor, a user for access to a network facility; presenting, by the processor, an interface to the user for the user to custom-define preference information for features of the network facility, the features related to sell activities, chat activities, and feedback activities for the network facility; and retaining, by the processor, the preference information for subsequent sessions between the user and the network facility. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method residing as executable instruction in a non-transitory medium for execution on a processor, the executable instructions when executed by the processing performing the method, comprising:
-
obtaining, on the processor, preference information for a user that logs into a network facility; and managing, by the processor, a session between the user and the network facility based on the preference information, wherein how a particular network feature processes during the session is controlled by a portion of the preference information, the particular network feature relates to sell activities, chat activities, or feedback activities for the network facility. - View Dependent Claims (18, 19, 20)
-
Specification