WO2001075604A1 - Method of controlling access to personal resources - Google Patents

Method of controlling access to personal resources Download PDF

Info

Publication number
WO2001075604A1
WO2001075604A1 PCT/US2001/010715 US0110715W WO0175604A1 WO 2001075604 A1 WO2001075604 A1 WO 2001075604A1 US 0110715 W US0110715 W US 0110715W WO 0175604 A1 WO0175604 A1 WO 0175604A1
Authority
WO
WIPO (PCT)
Prior art keywords
provider
identifier
requester
access
personal
Prior art date
Application number
PCT/US2001/010715
Other languages
French (fr)
Inventor
Juergen Stark
Craig Goren
Original Assignee
Juergen Stark
Craig Goren
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Juergen Stark, Craig Goren filed Critical Juergen Stark
Priority to AU2001253098A priority Critical patent/AU2001253098A1/en
Publication of WO2001075604A1 publication Critical patent/WO2001075604A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Definitions

  • the present invention pertains to a method of semi-private security. More particularly, the present invention pertains to a method for restricting general access to an individual (or that individual's endpoints) or restricting general access to a web site, while allowing access to certain individuals having particular knowledge about the individual or the web site.
  • the present invention can be applied to any method or system of communication whereby all unsolicited communications are screened from the person.
  • users of the Internet wish to share their resources such as personal web pages, contact information, and configuration information with third parties also using the Internet.
  • third parties include friends, family, and business colleagues.
  • users do not want to share this information with the many other users that are accessing the
  • the present invention allows for protection of all types of user communication resources but eliminates the need for knowledge of a particular password or key that typically allows limited access or full entry to the resources. It is therefore primary aspect ofthe present invention to provide a method of controlling access to at least one personal resource of a provider, which is being requested.
  • the provider establishes an identifier or password and certain attributes or questions that relate to that identifier, which are commonly known only by a select group of requesters.
  • the provider then stores the identifier and the attributes to which the identifier is to be applied.
  • the requester Upon receiving a request to access the provider's personal resource, the requester is asked to provide the identifier based on the attributes related to that identifier. If the correct identifier is transmitted, the requester can gain entry to the personal resource.
  • a second attribute or question is displayed.
  • the second attribute may include a suggestion or clue related to the identifier, along with a second demand for the password. If the requester transmits the correct identifier after the second attribute is displayed, the requester can gain access to the provider's personal resources but at a different access level.
  • Another aspect of the invention is to generate a third attribute if the second demand for the password is responded to incorrectly. A correct response to the third attribute allows even further restricted access. Many levels can be created as long as there are further attributes or clues generated.
  • Another aspect ofthe invention is to generate an allowance message that indicates to the requester that the identifier has been successfully matched and that access to the provider devices will be provided.
  • Another aspect ofthe invention to provide a security system for use in a personal resource that is one of devices selected from the group consisting of a wired telephone, pager, wireless telephone, facsimile machine, personal digital assistant, personal web portal, email address, individual data file, and an Internet resource.
  • Figure 1 is a block diagram representing the relationship among objects within the shared environment ofthe present invention.
  • Figures 2 through 4 represent a flow chart ofthe method of operation ofthe present invention
  • Figure 5 is an example of a first input demand dialogue box through which a requester may enter the resources ofthe provider.
  • Figure 6 is an example of a second input demand dialogue box through which a requester is provided a suggestive clue to assist entering the resources ofthe provider.
  • Figure 1 shows a block diagram representing the present invention.
  • the provider or the individual, corporation or party attempting to create and use a semi-private security system, may have a plurality of different personal resources or endpoints 10, for which protection is needed from others (requesters) attempting to contact the provider. These requesters can be family members, friends, business associates or unknown individuals.
  • These personal resources or endpoints 10 may include, among others, facsimile machines, pagers, wired telephones, wireless telephones, personal digital assistants, personal web portals, email addresses, individual data files, or Internet resources.
  • a requester who might happen to be a telephone solicitor maybe prevented from gaining automatic access to the provider through the home telephone ofthe provider.
  • a requester may be attempting to communicate with the provider through one ofthe same type of devices or endpoints 12 that the provider is trying to protect from access, as described above.
  • the specific type of device 12 with which the requester is attempting to reach the provider will control the mechanism that is used for either denying or allowing access to the provider.
  • Figures 2 through 4 show a flow chart for either denying or allowing the requester to access the provider.
  • the provider begins the process by first creating an identifier or password 40.
  • the provider may use the name of his dog as the identifier.
  • the identifier becomes associated with each endpoint 10, and requires a prompt to be correctly entered prior to access being given to the requester to access the provider's personal resources.
  • the identifier 40 is stored 44 in a data storage device 14, which is linked to a processor 16.
  • the processor ⁇ 6 can be of several platforms, like a web server, a personal computer that is connected to a modem and phone line, or to a platform such as that available through an XML Messaging platform of which Centerpost is an example, and which is described in patent applications entitled Individual XML Message Processing Platform and Method And System For Content Driven Electronic Messaging, both applications filed concurrently herewith, and are incorporated herein by reference.
  • a requester When a requester is using a device like his email address to reach the - provider, he would send an email message to the provider.
  • the email message is received by the processor 16 as an input request signal 50. With any input request signal 50, the processor will generate a first response signal or attribute 60 which is transmitted back to the requester at the particular device he is using to try to gain access to the provider. In this case, his email address.
  • the first response signal 60 may comprise two parts, the first part 62 being an input demand that requires the requester to enter the provider's identifier 40 that has been stored in the data storage device 14.
  • the second part 64 ofthe first response signal may be a message signal that indicates whether the identifier entered by the requester matched the identifier in storage 44.
  • Figure 5 illustrates one ofthe methods.
  • the first response signal 60 has a message signal 64 which appears on the screen ofthe device 12 ofthe requester (in this case the computer screen displaying his email account) requesting him
  • the response signal may, among other things, contain three keys to which the requester can enter a response.
  • the first key 63 is the Quit key and depression of this key will automatically disconnect the requester from the connection to the processor and end the request to access.
  • the second key 65 is the Clear key and it is provided to allow a requester to clear an identifier input if he misspells it or if he feels he mistakenly entered the wrong identifier. Use of key 65 does not break the connection with the processor.
  • the last key is the Enter key 67 that is used after the requester enters his identifier choice into the input area 69. Once key 67 is depressed, the input demand ofthe first response signal is transmitted to the device 12 ofthe requester. If the requester transmits the proper key value (identifier), which matches the identifier 40, then authentication is established and access is granted.
  • a message 71 is generated and transmitted to the requester, indicating that the identifier has been successfully matched.
  • the processor establishes access 90 to the provider device 10 and then communication can take place between the requester and the provider.
  • a second input request signal 70 can then be generated and transmitted to the requester through device 12.
  • the second response signal 70 would also comprise two parts, the first part 72 being a second input demand requiring the requester to again enter an identifier 40 in an attempt to match the provider's identifier.
  • the second response signal 70 is shown in Figure 6.
  • the second response signal also is provided with the same keys 63, 65 and 67 as the keys ofthe first response signal, although there are many different ways this can be accomplished.
  • the second part 74 ofthe second input request signal 70 is a message signal that provides the requester with a suggestive clue relating to the identifier 40.
  • the input demand might be a response to a simple question that has to be correctly answered.
  • the second input demand or attribute might be related to something personal pertaining to the provider. For instance the question might be "What is my dog's name?" and the key value would be "Spot", the name ofthe provider's dog. Thus, the key value is the identifier. If the proper identifier 40 is entered in response to the second input demand or attribute, then authentication is established and access is granted. The message 76 is then generated and transmitted to the requester, indicating that the identifier has been successfully matched. At that point, the processor 16 establishes access 90 to the provider device 10 and then communication can take place between the requester and the provider.
  • an additional message 78 is generated and transmitted to the requester, indicating that a match was not maid and that access will be denied.
  • an additional level or levels of suggestive clues related to the same identifier it is possible to add an additional level or levels of suggestive clues related to the same identifier to help a requester correctly match the indicator.
  • different levels of access to the personal resource can be set up and then accessible depending on how many attributes must be shown to the requester before the correct identifier is transmitted. For example, if a requester enters a correct identifier on the first try, then the requester may obtain access to a certain level ofthe provider's personal resource 10, i.e., a particular web page or a telephone call that rings through to the provider. If a correct identifier is entered only after two attributes or questions are transmitted, the requester may only obtain access to a lower level of the resource 10, i.e., a lower-level web page (with no access to the higher level pages), or the provider's voice-mail (instead of actually reaching the provider).
  • a lower level of the resource i.e., a lower-level web page (with no access to the higher level pages), or the provider's voice-mail (instead of actually reaching the provider).
  • the present invention obviates the need for a key to be distributed since the identifier is not a randomly generated and shared password. Rather, the identifier can relate to a personal fact or an event that certain knowledgeable individuals would know and thus be allowed access to the personal resource.
  • the security platform ofthe present invention enables a requester to send a message to one ofthe provider's endpoints 10 using the security method described above. However, the message would not go directly to the subscriber's intended endpoint, but instead, if the requester knew the identifier, based
  • the message would be delivered to the provider at the endpoint that the provider selected.
  • the provider may want anyone who knows the identifier based on the attribute to be able to reach the provider at his home telephone.
  • the requester would be transferred to the provider's home phone, whereas a requester that could not provide the correct identifier would have to leave a message on the provider's work voice-mail.
  • the requester would input the identifier through the alphanumerical key pad on the telephone, as is common practice with many messaging systems known today.
  • the use ofthe pound sign could be used as the step necessary to initiate the transmission ofthe identifier.

Abstract

The present invention relates to a semi-private security method and system that enables certain individuals (12) to access a person or provider's personal resource or endpoint (10) without the need for a shared password. The invention prevents the general public or those not having specific knowledge of the provider (10) from accessing the personal resource. The access to the resource is controlled through an identifier that relates to and can be understood from attributes or clues that only certain individuals (12) would have knowledge about.

Description

METHOD OF CONTROLLING ACCESS TO PERSONAL RESOURCES
This non-provisional application is based on the provisional patent application Serial No.60/194,254, entitled Consumer XML Message Processing Platform, filed on April 3, 2000. Cross reference is made to a related invention disclosed in U.S. patent application entitled Individual XML Message Processing Platform, filed concurrently, the subject matter of which is owned by the present applicants and the teachings of which are incorporated herein by reference.
Cross reference is also made to a related invention disclosed in U.S. patent application entitled Method and System for Content Driven Electronic Messaging, filed concurrently, the subject matter of which is owned by the present applicants and the teachings of which are incorporated herein by reference.
Background Of The Invention
The present invention pertains to a method of semi-private security. More particularly, the present invention pertains to a method for restricting general access to an individual (or that individual's endpoints) or restricting general access to a web site, while allowing access to certain individuals having particular knowledge about the individual or the web site. The present invention can be applied to any method or system of communication whereby all unsolicited communications are screened from the person.
Whether it is in a work environment or for personal use, users of the Internet wish to share their resources such as personal web pages, contact information, and configuration information with third parties also using the Internet. These third parties include friends, family, and business colleagues. However, for obvious reasons, users do not want to share this information with the many other users that are accessing the
Internet. Moreover, most Internet users that receive electronic mail or e-mail do not want to receive unsolicited electronic messages, otherwise known as spam. Likewise, web site owners are willing to share documents or files associated with their web site,
- 1 - T U 01/10715
and to share this information on a limited basis, while having some sort of security mechanism that will prevent the general public from accessing the same information.
Currently, the prior art provides only a few widely known techniques for facilitating a shared-file or shared-document environment. One of them is a type of multi-user software sold by Xerox as their Global View software product, which provides a concept of shared file drawers. Access to the drawers is either limited to a read-only basis or is limited to those users who have been given an icon to enter the drawer. A systems administrator is in charge ofthe icon distribution. A similar system, offered by Novell, provides a concept of a shared network drive where access is available to every file in the drive. The systems administrator controls access to the drive. A system that is applicable to web site applications, shares files or documents through hypertext or other links to a home page. These applications provide the necessary security, or access to some or all ofthe documents or files pertaining to that web site, by utilizing a password, which may be controlled by a web master. Another method of controlling access to a particular resource involves cryptographic authentication algorithms that rely on public and private keys to authenticate access to the resource. One of downsides of he cryptographic authentication algorithm approach is that the keys need to be generated and then distributed to the individuals that need access to the information. For example, if a web site is protected in such a manner, the user would have to distribute the keys to potentially hundreds of friends, family members and business associates to whom the user would like to invite access. Likewise, if all of these friends, family members and business associates had their own web sites that were also protected, they too would have to distribute similar keys to allow access to their information. Obviously, this type of distribution can be inefficient and problematic. As a result, most web sites are not protected from access by using security measures.
It can be appreciated that there exists a need for a shared data environment, which overcomes the above-mentioned drawbacks. Summary Of The Invention
The present invention allows for protection of all types of user communication resources but eliminates the need for knowledge of a particular password or key that typically allows limited access or full entry to the resources. It is therefore primary aspect ofthe present invention to provide a method of controlling access to at least one personal resource of a provider, which is being requested.
The provider establishes an identifier or password and certain attributes or questions that relate to that identifier, which are commonly known only by a select group of requesters. The provider then stores the identifier and the attributes to which the identifier is to be applied. Upon receiving a request to access the provider's personal resource, the requester is asked to provide the identifier based on the attributes related to that identifier. If the correct identifier is transmitted, the requester can gain entry to the personal resource.
It is another aspect ofthe invention that if an incorrect identifier is transmitted, a second attribute or question is displayed. The second attribute may include a suggestion or clue related to the identifier, along with a second demand for the password. If the requester transmits the correct identifier after the second attribute is displayed, the requester can gain access to the provider's personal resources but at a different access level. Another aspect of the invention is to generate a third attribute if the second demand for the password is responded to incorrectly. A correct response to the third attribute allows even further restricted access. Many levels can be created as long as there are further attributes or clues generated.
Another aspect ofthe invention is to generate an allowance message that indicates to the requester that the identifier has been successfully matched and that access to the provider devices will be provided.
Another aspect ofthe invention to provide a security system for use in a personal resource that is one of devices selected from the group consisting of a wired telephone, pager, wireless telephone, facsimile machine, personal digital assistant, personal web portal, email address, individual data file, and an Internet resource. Detailed Description Of The Drawings
Figure 1 is a block diagram representing the relationship among objects within the shared environment ofthe present invention;
Figures 2 through 4 represent a flow chart ofthe method of operation ofthe present invention;
Figure 5 is an example of a first input demand dialogue box through which a requester may enter the resources ofthe provider; and
Figure 6 is an example of a second input demand dialogue box through which a requester is provided a suggestive clue to assist entering the resources ofthe provider.
Detailed Description Of A Preferred Embodiment
Turning now to the drawing figures, the security system ofthe present invention will be explained in greater detail. In order to understand the scope ofthe present invention, attention is first directed to Figure 1, which shows a block diagram representing the present invention. The provider, or the individual, corporation or party attempting to create and use a semi-private security system, may have a plurality of different personal resources or endpoints 10, for which protection is needed from others (requesters) attempting to contact the provider. These requesters can be family members, friends, business associates or unknown individuals. These personal resources or endpoints 10 may include, among others, facsimile machines, pagers, wired telephones, wireless telephones, personal digital assistants, personal web portals, email addresses, individual data files, or Internet resources.
It can be appreciated that with the present invention, a requester who might happen to be a telephone solicitor, maybe prevented from gaining automatic access to the provider through the home telephone ofthe provider. Similarly, it should be understood that a requester may be attempting to communicate with the provider through one ofthe same type of devices or endpoints 12 that the provider is trying to protect from access, as described above. The specific type of device 12 with which the requester is attempting to reach the provider, will control the mechanism that is used for either denying or allowing access to the provider. Figures 2 through 4 show a flow chart for either denying or allowing the requester to access the provider. To protect his personal resources, the provider begins the process by first creating an identifier or password 40. This is done by selecting key value(s) that are generally known to a desired requester, but not known by the general public. For example, the provider may use the name of his dog as the identifier. The identifier becomes associated with each endpoint 10, and requires a prompt to be correctly entered prior to access being given to the requester to access the provider's personal resources.
The identifier 40 is stored 44 in a data storage device 14, which is linked to a processor 16. The processor ϊ 6 can be of several platforms, like a web server, a personal computer that is connected to a modem and phone line, or to a platform such as that available through an XML Messaging platform of which Centerpost is an example, and which is described in patent applications entitled Individual XML Message Processing Platform and Method And System For Content Driven Electronic Messaging, both applications filed concurrently herewith, and are incorporated herein by reference. When a requester is using a device like his email address to reach the - provider, he would send an email message to the provider. The email message is received by the processor 16 as an input request signal 50. With any input request signal 50, the processor will generate a first response signal or attribute 60 which is transmitted back to the requester at the particular device he is using to try to gain access to the provider. In this case, his email address.
The first response signal 60 may comprise two parts, the first part 62 being an input demand that requires the requester to enter the provider's identifier 40 that has been stored in the data storage device 14. The second part 64 ofthe first response signal may be a message signal that indicates whether the identifier entered by the requester matched the identifier in storage 44.
Although there are many different ways in which to effect the request aspect of the present invention, Figure 5 illustrates one ofthe methods. The first response signal 60 has a message signal 64 which appears on the screen ofthe device 12 ofthe requester (in this case the computer screen displaying his email account) requesting him
- 5 - to input an identifier. The response signal may, among other things, contain three keys to which the requester can enter a response.
The first key 63 is the Quit key and depression of this key will automatically disconnect the requester from the connection to the processor and end the request to access. The second key 65 is the Clear key and it is provided to allow a requester to clear an identifier input if he misspells it or if he feels he mistakenly entered the wrong identifier. Use of key 65 does not break the connection with the processor. The last key is the Enter key 67 that is used after the requester enters his identifier choice into the input area 69. Once key 67 is depressed, the input demand ofthe first response signal is transmitted to the device 12 ofthe requester. If the requester transmits the proper key value (identifier), which matches the identifier 40, then authentication is established and access is granted.
A message 71 is generated and transmitted to the requester, indicating that the identifier has been successfully matched. At that point, the processor establishes access 90 to the provider device 10 and then communication can take place between the requester and the provider.
If the requester enters an incorrect identifier 40, then a message 68 is generated and transmitted to the requester, indicating that a match was not maid and that access will be denied. A second input request signal 70 can then be generated and transmitted to the requester through device 12. The second response signal 70 would also comprise two parts, the first part 72 being a second input demand requiring the requester to again enter an identifier 40 in an attempt to match the provider's identifier. The second response signal 70 is shown in Figure 6. The second response signal also is provided with the same keys 63, 65 and 67 as the keys ofthe first response signal, although there are many different ways this can be accomplished.
The second part 74 ofthe second input request signal 70 is a message signal that provides the requester with a suggestive clue relating to the identifier 40. The input demand might be a response to a simple question that has to be correctly answered. For example, the second input demand or attribute might be related to something personal pertaining to the provider. For instance the question might be "What is my dog's name?" and the key value would be "Spot", the name ofthe provider's dog. Thus, the key value is the identifier. If the proper identifier 40 is entered in response to the second input demand or attribute, then authentication is established and access is granted. The message 76 is then generated and transmitted to the requester, indicating that the identifier has been successfully matched. At that point, the processor 16 establishes access 90 to the provider device 10 and then communication can take place between the requester and the provider.
If the identifier that was entered upon the second input demand does not match the identifier 40, then an additional message 78 is generated and transmitted to the requester, indicating that a match was not maid and that access will be denied. Of course, it is possible to add an additional level or levels of suggestive clues related to the same identifier to help a requester correctly match the indicator.
Further, different levels of access to the personal resource can be set up and then accessible depending on how many attributes must be shown to the requester before the correct identifier is transmitted. For example, if a requester enters a correct identifier on the first try, then the requester may obtain access to a certain level ofthe provider's personal resource 10, i.e., a particular web page or a telephone call that rings through to the provider. If a correct identifier is entered only after two attributes or questions are transmitted, the requester may only obtain access to a lower level of the resource 10, i.e., a lower-level web page (with no access to the higher level pages), or the provider's voice-mail (instead of actually reaching the provider).
The present invention obviates the need for a key to be distributed since the identifier is not a randomly generated and shared password. Rather, the identifier can relate to a personal fact or an event that certain knowledgeable individuals would know and thus be allowed access to the personal resource.
In another example, the security platform ofthe present invention enables a requester to send a message to one ofthe provider's endpoints 10 using the security method described above. However, the message would not go directly to the subscriber's intended endpoint, but instead, if the requester knew the identifier, based
- 7 - on the attribute, the message would be delivered to the provider at the endpoint that the provider selected.
In this embodiment, the provider may want anyone who knows the identifier based on the attribute to be able to reach the provider at his home telephone. Thus if a requester called the provider at work, and received an attribute or question that he could answer, the requester would be transferred to the provider's home phone, whereas a requester that could not provide the correct identifier would have to leave a message on the provider's work voice-mail.
In this example, instead ofthe input screens shown in Figures 5 and 6, the requester would input the identifier through the alphanumerical key pad on the telephone, as is common practice with many messaging systems known today. The use ofthe pound sign could be used as the step necessary to initiate the transmission ofthe identifier.
While the invention has been described with reference to a particular embodiment, those of skill in the art will recognize modifications to structure and methods that still fall within the scope ofthe invention and which is described in the following claims.

Claims

T U 01/10715WE CLAIM:
1. An apparatus for providing security for at least one personal resource of a provider, comprising: at least one provider personal resource capable of receiving a request signal from a requester, said requester requesting access to the at least one personal resource ofthe provider, a memory device for storing an identifier and at least one attribute, said attribute being related to said identifier, wherein the attribute is generated and transmitted to said requester upon receiving said request signal; and a processor used in association with the personal resource, said processor capable of receiving a transmission from said requester and comparing said transmission to said identifier.
2. The apparatus of claim 1, wherein said processor allows access to said at least one personal resource upon receiving a transmission from said requester that is the same as said identifier.
3. The apparatus of claim 2, wherein upon receiving a transmission from said requester that is not the same as the identifier, the processor transmits a second attribute to said requester.
4. The apparatus of claim 3, wherein said requester sends said transmission via a communication device, the communication device selected from the group consisting of a wired telephone, pager, wireless telephone, facsimile machine, email address, personal digital assistant, web site.
5. The apparatus of claim 4, wherein the personal resource is one of resources selected from the group consisting of a wired telephone, pager, wireless telephone, facsimile machine, email address, personal digital assistant, web site.
6. The apparatus of claim 2, wherein the first response signal comprises an input demand and response, said input demand requiring the requester to provide an identifier ofthe provider, the response being a signal indicating one of approval or disapproval to access the personal resource ofthe provider.
7. A method of controlling access to at least one personal resource of a provider that is being requested access thereto by a requester, comprising: prompting the provider to establish an identifier, the identifier having a personal attribute that is commonly known only by a select group of requesters; storing the identifier and associating at least one personal resource to which the identifier is to be applied; receiving an input request signal from a requester to access the at least one personal resource of the provider; generating a first response signal which informs the requester of one of approval and disapproval for access to the personal resource ofthe provider.
8. The method of claim 7, wherein the first response signal is comprised of an input demand and response, the input demand requiring the requester to provide an identifier ofthe provider, the response being a signal indicating one of approval and disapproval to access.
9. The method of claim 8, further comprising generating a second response signal if the input demand ofthe first response signal is a non-match, the second response signal comprising a suggestive clue related to the identifier ofthe provider and a second input demand to provide the identifier of the provider based upon the attribute.
10. The method of claim 9, further comprising generating a third response signal if the second input demand o the second response signal is a disapproval, the third response signal comprising a denial of access to the personal resource ofthe provider.
11. The method of claim 10, further comprising generating an approval message that indicates to the requester that the identifier has been successfully matched and that access to the provider devices will be provided.
12. The method of claim 8, wherein the input request signal is transmitted through a communication device, the communication device selected from the group consisting of a wired telephone, pager, wireless telephone, facsimile machine, email address, personal digital assistant, web site.
13. The method of claim 9, wherein the personal resource of the provider is a communication device selected from the group consisting of a wired telephone, pager, wireless telephone, facsimile machine, email address, personal digital assistant, web site.
PCT/US2001/010715 2000-04-03 2001-04-02 Method of controlling access to personal resources WO2001075604A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001253098A AU2001253098A1 (en) 2000-04-03 2001-04-02 Method of controlling access to personal resources

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US19425400P 2000-04-03 2000-04-03
US60/194,254 2000-04-03
US66150000A 2000-09-14 2000-09-14
US09/661,500 2000-09-14

Publications (1)

Publication Number Publication Date
WO2001075604A1 true WO2001075604A1 (en) 2001-10-11

Family

ID=26889830

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/010715 WO2001075604A1 (en) 2000-04-03 2001-04-02 Method of controlling access to personal resources

Country Status (2)

Country Link
AU (1) AU2001253098A1 (en)
WO (1) WO2001075604A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7062535B1 (en) 2000-04-03 2006-06-13 Centerpost Communications, Inc. Individual XML message processing platform
US7177909B2 (en) 2000-04-03 2007-02-13 Centerpost Communications, Inc. Method and system for content driven electronic messaging
US7984104B1 (en) 2000-04-03 2011-07-19 West Corporation Method and system for content driven electronic messaging

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0792044A2 (en) * 1996-02-23 1997-08-27 Fuji Xerox Co., Ltd. Device and method for authenticating user's access rights to resources according to the Challenge-Response principle
US5708780A (en) * 1995-06-07 1998-01-13 Open Market, Inc. Internet server access control and monitoring systems

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5708780A (en) * 1995-06-07 1998-01-13 Open Market, Inc. Internet server access control and monitoring systems
EP0792044A2 (en) * 1996-02-23 1997-08-27 Fuji Xerox Co., Ltd. Device and method for authenticating user's access rights to resources according to the Challenge-Response principle

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7062535B1 (en) 2000-04-03 2006-06-13 Centerpost Communications, Inc. Individual XML message processing platform
US7177909B2 (en) 2000-04-03 2007-02-13 Centerpost Communications, Inc. Method and system for content driven electronic messaging
US7533152B2 (en) 2000-04-03 2009-05-12 West Notifications Group, Inc. Method and system for content driven electronic messaging
US7711849B2 (en) 2000-04-03 2010-05-04 West Notifications Group, Inc. Individual XML message processing platform
US7809855B2 (en) 2000-04-03 2010-10-05 West Notifications Group, Inc. Individual XML message processing platform
US7984104B1 (en) 2000-04-03 2011-07-19 West Corporation Method and system for content driven electronic messaging
US8296371B2 (en) 2000-04-03 2012-10-23 West Corporation Individual XML message processing platform
US8326937B1 (en) 2000-04-03 2012-12-04 West Corporation Method and system for content driven electronic messaging
US8386569B2 (en) 2000-04-03 2013-02-26 West Corporation Individual XML message processing platform
US8655967B1 (en) 2000-04-03 2014-02-18 West Notifications, Inc. Individual XML message processing platform
US8706904B1 (en) 2000-04-03 2014-04-22 West Notifications, Inc. Individual XML message processing platform
US9083662B1 (en) 2000-04-03 2015-07-14 West Notifications, Inc. Method and system for content driven electronic messaging
US9300608B1 (en) 2000-04-03 2016-03-29 West Notifications, Inc. Individual XML message processing platform

Also Published As

Publication number Publication date
AU2001253098A1 (en) 2001-10-15

Similar Documents

Publication Publication Date Title
US10530727B2 (en) Electronic mail messaging system
EP1146701B1 (en) Method of transferring data being stored in a database
US5930479A (en) Communications addressing system
US7413085B2 (en) Techniques for displaying emails listed in an email inbox
JP4866640B2 (en) Access verification and management of access permission for referenced shared resources in network environment
US7487213B2 (en) Techniques for authenticating email
US6175831B1 (en) Method and apparatus for constructing a networking database and system
US6564327B1 (en) Method of and system for controlling internet access
US7120927B1 (en) System and method for e-mail alias registration
US7422115B2 (en) Techniques for to defeat phishing
US7912910B2 (en) Triggering a communication system to automatically reply to communications
US20070067406A1 (en) Source-specific electronic message addressing
US20040158613A1 (en) Method and system for automatically updating contact information within a contact database
US20020019852A1 (en) Method and system for confirming proper receipt of e-mail transmitted via a communications network
US6405319B1 (en) Verification system for information transfers over a computer network
WO2004054188A1 (en) Electronic mail system
US20130332544A1 (en) Method and System for Validating Email from an Internet Application or Website
HUE029848T2 (en) Method and equipment for establishing secure connection on a communication network
WO2001075604A1 (en) Method of controlling access to personal resources
US7574477B2 (en) Electronic mail distributing apparatus with email address registration or authentication features, electronic mail distributing method therefor, and storage medium storing a program for the apparatus
JP2008520022A (en) Method and system for preventing the reception of unwanted electronic messages such as spam mail
JP2008282284A (en) Access management device and access management method
CN106487785B (en) A kind of authentication identifying method and system based on mobile terminal
Foner Community formation via a distributed, privacy-protecting matchmaking system
GB2405004A (en) Electronic message filtering

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP