Network system, network server and terminal device

ABSTRACT

A network system, a network server and a terminal device, capable of easily and surely transmitting various information to a user being the destination of the information. The terminal device to be used by a user is recorded in the network server  22 . The network server  22  converts information to be transmitted to the terminal device used by the user into information conformed to the terminal device used by the user, or transmits a notice to the terminal device to the effect that there is information to be transmitted to said user. Thereby, the information can be easily and surely transmitted to the user who is the destination of the information.

This is a continuation of prior application Ser. No. 09/523,583 filedMar. 10, 2000 now U.S. Pat. No. 6,889,246.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to a network system, a network server anda terminal device, and is applicable to the network system, networkserver and terminal device with that plural users transfer informationvia the network.

2. Description of the Related Art

Heretofore, there is a system for transferring various informationbetween plural terminal devices via a network. In this network system, auser himself connects to the network using a terminal device to transferinformation with a user who operates another terminal device.

In this case, the information such as an e-mail sent from the user whooperates that other terminal device is temporary stored in a networkserver. The user being the destination can read out the e-mail from thesender by accessing to the network server from the terminal device beingthe destination of the above e-mail.

In the above network system, however, the user receives the informationsuch as e-mail stored in the network server by connecting the terminaldevice to the network. Accordingly, the user must confirm whether or notthere is the information such as e-mail directed to him, by connectingthe terminal device to the network every time.

SUMMARY OF THE INVENTION

In view of the foregoing, an object of this invention is to provide anetwork system, a network server and a terminal device that can easilyand surely transmit various information to a user being the destinationof the information.

The foregoing object and other objects of the invention have beenachieved by the following manner. A terminal device to be used by a useris recorded in a network server. The network server converts informationto be transmitted to the terminal device used by the user intoinformation conformed to the terminal device used by the user, or anotice is transmitted to the terminal device to the effect that there isinformation to be transmitted to said user. Thereby, the information canbe easily and surely transmitted to the user being the destination ofthe information.

Moreover, a group of plural users is formed, and information to betransferred in the above group is converted into information conformedto a terminal device used by each user who belongs to the group, or anotice is transmitted to the terminal device used by each user belongingto the group to the effect that there is information to be transmittedto said each user. Thereby, the information can be easily and surelytransferred in the group.

According to the present invention as described above, a terminal deviceto be used by a user is recorded in a network server. The network serverconverts information to be transmitted to the terminal device used bythe user into information conformed to the terminal device used by theuser, or transmits a notice to the terminal device to the effect thatthere is information to be transmitted to said user. Thereby, theinformation can be easily and surely transmitted to the user who is thedestination of the information.

Moreover, a group of plural users is formed, and the information to betransferred in the above group is converted into information conformedto a terminal device used by each user who belongs to the group, or anotice is transmitted to the terminal device used by each user belongingto the group to the effect that there is the information to betransmitted to said each user. Thereby, the information can be easilyand surely transferred in the group.

The nature, principle and utility of the invention will become moreapparent from the following detailed description when read inconjunction with the accompanying drawings in which like parts aredesignated by like reference numerals or characters.

BRIEF DESCRIPTION OF THE DRAWINGS

In the accompanying drawings:

FIG. 1 is a block diagram showing the entire structure of a networksystem according to the present invention;

FIG. 2 is a block diagram showing the configuration of a memory card;

FIG. 3 is a schematic diagram showing the memory map of the memory card;

FIG. 4 is a schematic diagram showing the internal format of the memorycard;

FIG. 5 is a block diagram showing the configuration of a television set;

FIG. 6 is a schematic diagram showing the authentication sequencebetween the television set and a server;

FIG. 7 is a block diagram showing the configuration of the networkserver;

FIG. 8 is a schematic diagram showing the sequence when the memory cardis ejected;

FIG. 9 is a block diagram showing the configuration of a cellular phone;

FIG. 10 is a block diagram showing the configuration of a personalcomputer;

FIG. 11 is a block diagram explaining a method of forming a group;

FIG. 12 is a schematic diagram showing the sequence of forming a group;

FIG. 13 is a block diagram explaining the operation to notify groupmembers a message;

FIG. 14 is a schematic diagram showing the procedure for transmitting amessage;

FIG. 15 is a block diagram explaining the operation for searching foruser's using terminal;

FIG. 16 is a schematic diagram showing the sequence of searching foruser's using terminal;

FIG. 17 is a block diagram explaining the operation for setting/updatingan access right;

FIG. 18 is a schematic diagram showing the sequence of setting/updatingthe access right;

FIG. 19 is a block diagram explaining the operation for access controlprocessing;

FIG. 20 is a schematic diagram showing the access control sequence; and

FIG. 21 is a schematic diagram showing the sending sequence in the ISDNand the PHS in another embodiment.

DETAILED DESCRIPTION OF THE EMBODIMENT

Preferred embodiments of the present invention will be described withreference to the accompanying drawings:

Referring to FIG. 1, 10 generally shows a network system. A networkserver 22 in the system is connected to a telephone line 15, a cellularphone line 33 and broadcast means 25 via a cable interface (INF) 23A, aradio interface 23B and a broadcast interface 23C.

A television set 13 which is a terminal device is connected to thetelephone line 15 via a modem. The television set 13 can access to thenetwork server 22 via the telephone line 15. On the other hand, acellular phone 31 is connected to the cellular phone line 33. Thecellular phone 31 can access to the network server 22 via the cellularphone line 33.

In addition to this, the network server 22 is connected to an internet41 via a router 23D. A personal computer 47 is connected to a network 45for example that is constructed by a local area network (LAN) in anoffice or the like and connected to the above internet 41 by a dedicatedline. Thereby, the personal computer 47 can access to the network server22 via the internet 41.

Here, each terminal device (television set 13, cellular phone 31 andpersonal computer 47) has a slot to insert a memory card 11 _(x), (11 ₁,11 ₂, 11 ₃, . . . ) being storage means. When operating these terminaldevices, the user inserts the memory card 11 _(x) (11 ₁, 11 ₂, 11 ₃, . .. ) that is individually owned by him in the above operating terminal.As shown in FIG. 2, the memory card 11 _(x) (11 ₁, 11 ₂, 11 ₃, . . . )is composed of a connector 11B to connect to the slot of each terminaldevice and a memory 11A that is connected to the above connector 11B viaa bus BUS.

The memory 11A stores various information particular to the user whoowns the above memory card 11 _(x) in an area designated by a memory mapshown in FIG. 3. That is, in the storage area of this memory 11A, afirst area AR11 is an area to store network connection information toconnect the terminal device to insert the memory card 11 _(x) to thenetwork. A user ID and a password to receive authentication from thenetwork server 22 and a password for user identification that has beenpreviously recorded by the user using the memory card 11 _(x) or thelike are stored in that area. The password for user identification isinformation that will be compared with a password that will be enteredby the user every time when he inserts the memory card 11 _(x) in theterminal device, and is used to determine whether or not the user atthis time is the regular user allowed to use the memory card 11 _(x).

A second area AR12 is an area to store additional information that willbe downloaded for example when receiving various services (informationprovision or the like) on the network from the network server 22 byusing the terminal device having the memory card 11 _(x).

A third area AR13 is an area to store information particular to the userowing the memory card 11 _(x), such as an address book or schedule dataor the like.

A fourth area AR 14 is an area to store information that can be used ineach terminal device having the memory card 11 _(x). For example, atelecast list or uniform resource locator (URL) information to see adescription of each television program on the world wide web (WWW) thatwill be used when the terminal device having it is the television set13, a sentence in editing or a screen or a program on development thatwill be read or written when the terminal device having the memory card11 _(x), is the personal computer 47, data of character mail servicetransmitted or received when the terminal device having the memory card11 _(x) is the cellular phone 31, etc., will be stored respectively.

And a fifth area AR15 is an area to store various data such as a staticimage or the like.

The above data stored in the memory 11A of the memory card 11 _(x) isstored in a type length value (TLV) format shown in FIG. 4, for example.This format is the format of the data to be stored in each area (AR11 toAR15) of the memory map described above with reference to FIG. 3. And itis composed of type information (TYPE) D11, data length information(LENGTH) D12 and content information (VALUE) D13 of the data to bestored, in each area (AR11 to AR15).

In this case, a code “00” which means network connection information isassigned as the type information D11 of the data in the first area AR11of the memory 11A, and information such as an authentication ID (userID) and a password or the like is stored as the content information D13in the above first area AR11. Then, a TLV format is further formed foreach authentication ID and password stored as the content informationD13. The content information D13 is composed of type information D13A,data length information D13B and content information D13C respectively.

In the second area AR12 of the memory 11A, a code “01” which means thenetwork additional information is assigned as the type information D11of the data, and information such as a group ID that is the additionalinformation that will be downloaded from the network server 22 whenreceiving various services (information provision or the like) on thenetwork and its password or the like is stored as the contentinformation in the above second area AR12. The group ID isidentification information to be used when a specific group of pluralusers who use a terminal is formed. Then, a TLV format is further formedfor each group ID and its password stored as the content informationD13. The content information D13 is composed of the type informationD13A, data length information D13B and content information D13Crespectively.

In the third area AR13 of the memory 11A, a code “02” which means thepersonal information is assigned as the type information D11 of thedata, and information such as a telephone directory, address book dataand personal schedule data or the like that are the information to bepeculiarly used by the user who owns the above memory card 11 _(x) isstored as the content information in the above third area AR13. Then, aTLV format is further formed for each telephone directory, address bookdata and personal schedule data stored as the content information D13.The content information D13 is composed of the type information D13A,data length information D13B and content information D13C respectively.

In the fourth area AR14 of the memory 11A, a code “03” which means theinformation on each terminal is assigned as the type information D11 ofthe data, and information such as various terminal attribute or the likethat will be used in each terminal device that is an object to insertthe above memory card 11 _(x) is stored as content information in theabove fourth area AR14. Then, a TLV format is further formed for eachinformation such as various terminal attribute or the like stored as thecontent information D13. The content information D13 is composed of thetype information D13A, data length information D13B and contentinformation D13C respectively.

And in the fifth area AR15 of the memory 11A, various data which will bearbitrary read or written is stored as the type information D11 of thedata. Then, a TLV format is further formed for each this various datastored as the content information D13. The content information D13 iscomposed of the type information D13A, data length information D13B andcontent information D13C respectively.

In this manner, in the memory card 11 _(x), peculiar information(authentication ID, password, etc.) to specify the user who owns theabove memory card 11 _(x) (user A, user B, user C, . . . ) and variousinformation to be individually used by said user (personal information,each terminal information, etc.) are stored. When operating eachterminal device, the user inserts the memory card 11 _(x) in theoperating terminal, and notifying the network connection information(authentication ID, password, etc.) which is peculiar information tospecify the user himself to the network server 22 via the operatingterminal. Thereby, a correspondence relationship between the terminaldevice operated by the user at this time and the user is recorded in thenetwork server 22.

As a first terminal device, as shown in FIG. 5, the television set 13has a configuration in which a CPU 13A, a memory 13B, a memory card (MC)interface (INF) 13C, an interface processor 13N, a communicationinterface (INF) 13D, a receiving circuit (RF) 13E and an output part 13Fare connected to a data bus BUS. The CPU 13A executes various operationsaccording to an operation program stored in the memory 13B andcontrolling each circuit based on the above operation.

The radio frequency (RF) part 13E receives television broadcast waveS_(RF) received with an antenna (not shown), and transmits a receivingsignal S13E obtained by the above receiving to the output part 13F. Theoutput part 13F generates a television video signal S_(TV) by subjectingintermediate frequency (IF) amplifying processing, video detectingprocessing or the like to the receiving signal S13E, and transmits thisto a cathode ray tube display (CRT) 13G. Thus, television broadcastingreceived by the RF part 13E is visibly displayed on the display screenof the CRT 13G.

Here, if for example the user A who is operating the television set 13inserts the memory card 11 ₁ owned by him into a memory card slot (notshown), the detecting contact of the memory card 11 is connected to thecontact of the memory card interface 13C, and the interface processor13N detects a change of a signal level for memory card detection (changefrom logic “L” level to logic “H” level). And an interrupt signal istransmitted to the CPU 13A and interrupt processing is performed.Thereby, the CPU 13A detects the insertion of the memory card 11 ₁. Inthis connection, the interface processor 13N is a processing block whichperforms protocol processing according to the interface specificationwhen in transferring data to the memory card 11 ₁. Therefore, theinterface processor 13N gets into a state where it can read theinformation peculiar to the user stored in the memory card 11 ₁.

The memory card interface 13C is formed by a serial interface, and hasat least three data lines. A first data line transmits a clock signal indata transmission, a second data line transmits a status signalnecessary for data transmission, and a third data line seriallytransmits data to be written in or read out from the memory card 11_(x).

The CPU 13A reads out data in the memory card 11 ₁ via the memory cardinterface 13C, and transmits this to the network server 22 via thecommunication interface 13D and the telephone line 15 (FIG. 1) toperform authentication request of the network server 22.

The sequence of this authentication request is shown in FIG. 6.Referring to FIG. 6, if for example the memory card 11 ₁ is inserted inthe television set 13, the CPU 13A detects the insertion state of thememory card 11 ₁ via the memory card interface 13C, and transmits asignal to the network server 22 via the telephone line. 15 to retain achannel.

Then, after performing an establishment of a session by point to pointprotocol (PPP) processing, the CPU 13A of the television set 13transmits an authentication request to the network server 22. Thisauthentication request data D21 is specifying information to specify auser and a terminal used by said user. As the above authenticationrequest data D21, the CPU 13A transmits, to the network server 22,information to specify the user that is composed of a user ID and apassword for authentication included in the network connectioninformation (FIG. 3) stored in the memory card 11 ₁, terminal type datapreviously stored in the memory 13B of the television set 13 (data meanstelevision set), information to specify sending means and acommunication form (wire telephone, wireless or internet, etc.) andinformation to specify the terminal that is composed of a callingtelephone number and various option data on the television set (subnet,internet protocol (IP) address, machine name, etc.) and terminal'sability (TCP/IP, wireless application protocol (WAP)), no datacommunication facility, etc.).

As shown in FIG. 7, the network server 22 receives the authenticationrequest data D21 transmitted from the television set 13 operated by theuser A at this time with a communication part 22A, and supplies theabove received authentication request data D21 to an authenticator 22B.

If the user ID (authentication ID) and password that are contained inthe authentication request data D21 coincide with the prerecorded dataof the regular user A, the authenticator 22B determines that the user Awho is operating the sender of the authentication request data D21 thatwas entered at this time (i.e., television set 13) is the regular user.The information to specify the user contained in the authenticationrequest data D21 (user ID and password or the like) and information forterminal specification that is to specify the terminal device operatedby the user A (television set 13) (terminal type data, information tospecify sending means and sending telephone number and various optiondata on the television set) are recorded in a database 22D as combineddata of the user and the operating terminal D23. At this time, whenexistent combined data has been stored in the database 22D, the database22D overwrites the new combined data D23 that is supplied from theauthenticator 22B at this time on the existent combined data andupdating.

Thereby, in the database 22D, at every time when the specified useroperates a different terminal device, the combination of the terminaldevice newly operated and said user will be recorded.

If such determination being the regular user is obtained with respect tothe authentication request in the authenticator 22B, the authenticator22B replies authentication response data D27 to the terminal deviceoperated by the user A at this time (television set 13) via thecommunication part 22A (FIG. 6).

Therefore, in the network server 22, the terminal device presently usedby the user A (television set 13) will be registered combined with saiduser A. The information thus recorded in the database 22D of the networkserver 22 remains in the database 22D even if the terminal device usedby the user is disconnected from the network server 22.

Note that, when the authentication request data D21 is transmitted fromthe television set 13 to the network server 22 as aforementioned withreference to FIG. 6, the authentication request data D21 may beenciphered for example by an encryption algorithm that generates one-wayrandom patterns called MD5 etc. By transmitting thus encipheredauthentication request data D21, an illegal use of the data necessaryfor authentication, such as user ID or password, can be prevented.

In this manner, when the user A uses the television set 13, he insertsthe memory card 11 ₁ owned by him in the slot of the above televisionset 13, and the paired peculiar information on the user A and thepeculiar information on the terminal device being used at this time(e.g., television set 13) is recorded in the network server 22. Thereby,the network server 22 can grasp a place where the user A is.

In this connection, in the state where the user A has inserted thememory card 11 ₁ in the television set 13, the user A performs aprescribed input operation, the CPU 13A of the television set 13 readsout the television program list or the URL information stored in thefourth area AR14 in the memory card 11 ₁ described above with referenceto FIGS. 3 and 4 based on the type information D11 and D13A on the datahaving the data structure of the TLV format, and displays them on theCRT 13G as the occasion demands. On the other hand, when the televisionprogram list or the information on URL or the like have not been storedin the above fourth area AR14, the CPU 13A sends a request to send (RS)to the network server 22, so that latest information that the networkserver 22 obtained from information provision means (service provider orthe like) via the network can be stored. As how to store thisinformation, the information may be periodically transmitted from thenetwork server 22 to the television set 13 without sending the RS fromthe television set 13 to the network server 22.

If the user A ejects the memory card 11 ₁ from the slot of thetelevision set 13, the detecting contact of the memory card 11 ₁ isdetached from the contact of the slot of the memory card interface 13C.The interface processor 13N detects a change of the signal level formemory card detection (change from logic “H” level to logic “L” level),and transmits an interrupt signal to the CPU 13A to perform interruptprocessing. Thereby, the CPU 13A detects the ejection of the memory card11 ₁.

At this time, as shown in FIG. 8, the CPU 13A transmits an erase requestwhich includes the user ID and the terminal type data (data means thetype the television set 13) to the network server 22. The authenticator22B of the network server 22 received this erases the combined data ofthe user A and the operating terminal (television set 13) recorded inthe database 22D, and replies an answer signal to the television set 13.Thereby, the television set 13 in which the memory card 11 ₁ was ejectedis deleted from a record as the user's present operating terminal device(his position) in the database 22D of the network server 22.

As a second terminal device, as shown in FIG. 9, the cellular phone 31has a configuration in which a CPU 31A, a memory 31B, a memory card (MC)interface (INF) 31C, an interface processor 31N, a transmitter-receivercircuit (RF) 31E for performing send/receive of a signal with a cellularphone line 33, a baseband processor 31D for converting a radio frequency(RF) signal received by the transmitter-receiver circuit 31E into abaseband signal and besides, for converting a transmitting basebandsignal into an RF signal, a man machine interface (MMI) 31F being aninterface for a microphone 31G and a speaker 31H, a display 31I and akeyboard 31J are connected to a data bus BUS.

The CPU 31A executes various operations according to operation programsstored in the memory 31B and controlling each circuit corresponding tothe above operation. Various processing contents by the CPU 31A will bedisplayed on the display 31I formed by a liquid crystal display panel orthe like as the occasion demands.

If the user enters a telephone number that he wants to call on thekeyboard 31J, data meaning the above telephone number is transmitted tothe CPU 31A. The CPU 31A transmits a call request to the other partydesignated by the telephone number entered by the user via thetransmitter-receiver circuit 31E. Then the line is connected via thecellular phone line 33 according to a response from the other party. Ifthe line is connected, the transmitter-receiver circuit 31E supplies anRF signal from the other party received via an antenna (not shown) tothe baseband processor 31D. Here the RF signal is converted into abaseband signal. The baseband processor 31D supplies the baseband signalobtained by the above conversion to the MMI 31F. Thus, a received speechsignal from the other party is outputted from the speaker 31H as avoice.

Besides, if the user enters a voice through the microphone 31G, the MMI31F supplies an input audio signal supplied from the microphone 31G tothe baseband processor 31D. Here the baseband signal is converted intoan RF signal. Then, the baseband processor 31D transmits the aboveconverted RF signal to the cellular phone line 33 via thetransmitter-receiver circuit 31E, and the above RF signal is transmittedto the other party connected by the line. Therefore, the user using thecellular phone 31 can speak or transfer various information with theother party.

Here, if the user B operating the cellular phone 31 inserts the memorycard 11 ₂ owned by him in a memory card slot of the cellular phone 31(not shown), the detection contact of the memory card 11 ₂ is connectedto the contact of the memory card interface 31C. The interface processor31N detects a change of the signal level for memory card detection(change from logic “L” level to logic “H” level), and transmits aninterrupt signal to the CPU 31A and performing interrupt processing.Thus the CPU 31A detects the insertion of the memory card 11 ₂. In thisconnection, the interface processor 31N is a processing block thatperforms protocol processing according to the interface specificationwhen in transferring data to the memory card 11 _(x). Thus, theinterface processor 31N gets into the state where it can read outinformation peculiar to the user stored in the memory card 11 ₂.

At this time, the CPU 31A reads out the data in the memory card 11 ₂ viathe memory card interface 31C, and transmits this to the network server22 via the transmitter-receiver circuit 31E and the cellular phone line33 (FIG. 1) and requesting an authentication of the network server 22.

As the sequence of this authentication request, if the memory card 11 ₂is inserted in the cellular phone 31, similarly to the authenticationrequest sequence in the television set 13 described above with referenceto FIG. 6, the CPU 31A detects the insertion state of the memory card 11₂ via the memory card interface 31C, and sends a signal to the networkserver 22 via the cellular phone line 33 to retain a channel.

The CPU 31A of the cellular phone 31 establishes a session by means ofinformation transmitting/receiving means built in the cellular phone 31that uses the point to point protocol (PPP) processing or the wirelessapplication protocol (WAP) or the like, and then transmits anauthentication request to the specified network server 22. In thisconnection, if the cellular phone 31 does not have such protocolfunction, PPP or WAP, line connection is performed with a protocol suchas the dual tone multiple frequency (DTMF) or the like.

Then, as the authentication request data D21, the CPU 31A transmits, tothe network server 22, information to specify the user B that iscomposed of a user ID and a password for authentication in the networkconnection information stored in the memory card 11 ₂ (FIG. 3), terminaltype data previously stored in the memory 31B of the cellular phone 31(data means cellular phone (personal digital cellular (PDC) phone),information to specify the sending means (PDC), the sending telephonenumber of the cellular phone 31, protocol information such as the WAPused in the connection and information to specify a terminal composed ofvarious option data.

The network server 22 receives the authentication request data D21 sentfrom the cellular phone 31 operated by the user B with the communicationpart 22A at this time as described above with reference to FIG. 7, andsupplies the above received authentication request data D21 to theauthenticator 22B.

If the user ID (authentication ID) or the password contained in theauthentication request data D21 coincide with the prerecorded data ofthe regular user B, the authenticator 22B determines that the user Boperating the sender of the authentication request data D21 entered atthis time (i.e., cellular phone 31) is the regular user. And theinformation to specify the user B contained in the authenticationrequest data D21 (user ID and password or the like), and information forterminal specification to specify the terminal device operated by theuser B (cellular phone 31) (terminal type data, information to specifythe sending means, and the sending telephone number and various optiondata on the cellular phone) are recorded in the database 22D as combineddata of the user and the operating terminal D23. At this time, if extentcombined data has been stored in the database 22D, the database 22Doverwrites the new combined data D23 that is supplied from theauthenticator 22B at this time on the existent combined data andupdating.

In this manner, in the database 22D, the use of the cellular phone 31 bythe user B is recorded at this time. This record will remain in thedatabase 22D even if the cellular phone 31 is disconnected from thenetwork server 22.

Note that, when the authentication request data D21 is transmitted fromthe cellular phone 31 to the specified network server 22, theauthentication request data D21 may be enciphered for example by theencryption algorithm that forms one-way random patterns called MD5 orthe like. By transmitting thus enciphered authentication request dataD21, illegal use of the data necessary for authentication such as userID or password can be prevented.

When the user B uses the cellular phone 31, he inserts the memory card11, in the slot of the above cellular phone 31. And the pairedinformation peculiar to the user and the information peculiar to theterminal device used at this time (cellular phone 31) are recorded inthe network server 22. Therefore, the network server 22 can grasp theplace where the user B is.

If the user B ejects the memory card 11 ₂ from the slot of the cellularphone 31, the detecting contact of the memory card 11 ₂ is detached fromthe contact of the memory card interface 31C, and the interfaceprocessor 31N detects a change of the signal level for memory carddetection (change from logic “H” level to logic “L” level). An interruptsignal is transmitted to the CPU 31A according to that, and interruptprocessing is performed. Thus, the CPU 31A detects the ejection of thememory card 11 ₂ was ejected.

At this time, similarly to the case of the television set 13 describedabove with reference to FIG. 8, the CPU 31A transmits an erase requestthat includes the user ID and the terminal type data (data means thetype the cellular phone 31) to the network server 22. The authenticator22B of the network server 22 received this erases the combined data ofthe user B and his operating terminal (cellular phone 31) recorded inthe database 22D, and replies a response signal to the cellular phone31. Thereby, the cellular phone 31 from which the memory card 11 ₂ hasejected is deleted from a record as the terminal device being operatedby the user B (his position) in the database 22D of the specifiednetwork server 22.

In this connection, if the user B performs a prescribed input operationin the state where the user B inserted the memory card 11 ₂ in thecellular phone 31, the CPU 31A of the cellular phone 31 reads outtelephone directory data and address book data or the like stored in thethird area AR13 in the memory card 11 ₂ described above with referenceto FIGS. 3 and 4 based on the type (TYPE) information D11 and D13A ofthe data having the data structure of the TLV format, and displays themon the display 31I as the occasion demands. On the other hand, if thetelephone directory data and the address book data or the like are notstored in the above third area AR13, the CPU 13A can store variousinformation in the above area by the input operation by the user B.

On the other hand, as a third terminal device, as shown in FIG. 10, thepersonal computer 47 has a configuration in which a CPU 47A, a memory47B, a memory card (MC) interface (INF) 47C, an interface processor 47N,a communication interface (INF) 47D and a display 47E are connected to adata bus BUS. The CPU 47A executes various operations according tooperation programs stored in the memory 47B. Each circuit is controlledbased on the above operation. The content of various processing by theCPU 47A will be displayed on the display 47E formed by a liquid crystaldisplay panel or the like.

If the user C who is operating the personal computer 47 inserts thememory card 11 ₃ owned by him in a memory card slot (not shown), thedetecting contact of the memory card 11 ₃ is connected to the contact ofthe memory card interface 47C. The interface processor 47N detects achange of the signal level for memory card detection (change from logic“L” level to logic “H” level). An interrupt signal is transmitted to theCPU 47A based on that, and interrupt processing is performed. Thereby,the CPU 47A detects the insertion of the memory card 11 ₃. In thisconnection, the interface processor 47N is a processing block whichperforms protocol processing according to the interface specificationwhen in transferring data to the memory card 11 ₃. Thus, the interfaceprocessor 47N gets into the state where it can read information peculiarto the user stored in the memory card 11 ₃.

At this time, the CPU 47A reads out data in the memory card 11 ₃ via thememory card interface 47C, and transmits this to the network server 22via the communication INF 47D, office network 45 and internet 41(FIG. 1) to request an authentication of the network server 22.

In this case, since the network 45 is connected to the internet 41 by adedicated line, the personal computer 47 connected to the above network45 is in the state where the session to the network server 22 is beingestablished. Therefore, if the user C inserts the memory card 11 ₃ inthe personal computer 47, it can enter authentication processingdirectly.

In this case, in the internet 41, the protocol has been determined tothe transmission control protocol/internet protocol (TCP/IP). Therefore,also the authentication request from the personal computer 47 to thenetwork server 22 is performed by the same protocol (TCP/IP).

On the other hand, if the network 45 is protected by a fire wall 46, itis needed to transmit authentication request data that includes theattribute information of the above fire wall 46 from the personalcomputer 47 to the network server 22. Accordingly, if the user C insertsthe memory card 11 ₃ in the personal computer 47, the personal computer47 transmits information to specify a user that is composed of a user IDand a password for authentication in the network connection information(FIG. 3) stored in the memory card 113, terminal type data prestored inthe memory of the personal computer 47 (data means personal computer),information to specify sending means (dedicated line), a fire wallattribute to maintain network security such as SOCKS, the internetprotocol (IP) address of the personal computer 47 and information forterminal specification composed of the name of the terminal and variousoption data, to the network server 22 as the authentication requestdata.

The network server 22 receives the authentication request data D21transmitted from the personal computer 47 that is being operated by theuser C at this time with the communication part 22A as described abovewith reference to FIG. 7. Thus received authentication request data D21is supplied to the authenticator 22B.

If a user ID (authentication ID) and a password or the like arecontained in the authentication request data D21 coincide withprerecorded data of the regular user C, the authenticator 22B determinesthat the user C who is operating the sender of the authenticationrequest data D21 entered at this time (i.e., the personal computer 47)is the regular user, and records the information to specify the user Ccontained in the authentication request data D21 (user ID and passwordor the like) and information for terminal specification to specify theterminal device operated by the user C (personal computer 47) in thedatabase 22D as combined data of the user C and his operating terminalD23. If existent combined data has been stored in the database 22D atthis time, the database 22D overwrites the new combined data D23 whichis supplied from the authenticator 22B at this time on the existentcombined data and updating.

Thereby, in the database 22D, the use of the personal computer 47 by theuser is recorded at this time.

Note that, when the authentication request data D21 is transmitted fromthe personal computer 47 to the network server 22, the authenticationrequest data D21 may be enciphered for example by the encryptionalgorithm that forms one-way random patterns called the MD5 or the like.By transmitting thus enciphered authentication request data D21, illegaluse of the data necessary for authentication such as the user ID or thepassword can be prevented.

When the user C uses the personal computer 47, the memory card 11 ₃ isinserted in the slot of the above personal computer 47 by him, and thepaired information of the information peculiar to the user and theinformation peculiar to the terminal device being used at this (personalcomputer 47) are recorded in the network server 22. Thus, the networkserver 22 can grasp his position.

If the user C ejects the memory card 11 ₃ from the slot of the personalcomputer 47, the detecting contact of the memory card 11 ₃ is detachedfrom the contact of the slot of the memory card interface 47C; theinterface processor 47N detects a change of the signal level for memorycard detection (change from logic “H” level to logic “L” level), andtransmits an interrupt signal to the CPU 47A and performing interruptprocessing. Thereby, the CPU 47A detects the ejection of the memory card11 ₃.

At this time, the CPU 47A transmits an erase request including the userID and the terminal type data (data means the type the personal computer47) to the network server 22, similarly to the case of the televisionset 13 described above with reference to FIG. 8. Receiving this, theauthenticator 22B of the network server 22 deletes the combined data ofthe user C and the operating terminal (personal computer 47) recorded inthe database 22D, and replies a response signal to the personal computer47. Thereby, the personal computer 47 from which the memory card 11 ₃has ejected is deleted from a record as the terminal device presentlyoperated by the user C (his position) in the database 22D of the networkserver 22.

In this manner, when the plural users (user A, user B and user C) userespective desired terminal device (television set 13, cellular phone 31or personal computer 47), they insert the memory card 11 _(x) owned byeach user in the terminal device that he is going to operate, and theauthentication request data is transmitted from each terminal device tothe network server 22. Thus, in the network server 22, the terminaldevice respectively used by the plural users (i.e., users' positions)can be recognized.

In this case, the network server 22 records the users and the terminaldevices used by said users in the database 22D. Therefore, even if theterminal device and the network server 22 become off-line after thecompletion of the authentication processing, the network server 22 cansearch for the terminal device used by the user (user's position)anytime.

In the state where the terminal devices respectively used by the pluralusers have been recorded in the network server 22 as the above, thenetwork system 10 can form a group in which users are specifiedaccording to a group forming request by the user.

As an example of this group forming processing, FIGS. 11 and 12 show thecase where the user A who operates the television set 13 forms a groupand the user B who operates the cellular phone 31 enters the aboveformed group. Referring to FIGS. 11 and 12, that is, after the user Asends a signal to the network server 22 by operating the television set13 and the session between the television set 13 and the network server22 is established, the user A transmits a group forming request D121 tothe network server 22. In this group forming request D121, the user IDof the user A, a group ID and its password set by the user A areincluded.

The network server 22 that received the group forming request D121 fromthe television set 13 operated by the user A confirms whether or not thecombination of the group ID and the password included in thus receivedgroup forming request D121 has already recorded in an applicationprocessor 22C. If the above combination is not recorded, the above groupID and its password, and the former of the above group (user A) arerecorded in the database 22D.

If the recording is completed, the network server 22 transmits the groupID (D122) to the television set 13 used by the user A who is the former,to notify the forming of the group according to the request by the userA. The television set 13 which received the above notice stores thegroup IF receiving from the network server 22 in the second area AR12(FIG. 3) of the memory card 11 ₁ that is being inserted at this time asthe network additional information. By storing the group ID and thepassword of the formed group in the memory card 11 ₁ peculiar to theuser A as the above, the above using terminal device is recognized bythe network server 22 as a device forming the group, also in the casewhere the user A inserts the above memory card 11 ₁ in another terminaldevice and uses this terminal device.

In this connection, the group ID and the password given to the abovegroup may be set at random in the network server 22 that formed thegroup according to the request by the user A. In this case, the aboveset group ID and password are transmitted to the user A (television set13).

In this manner, the group formed by the user A is recorded in thenetwork server 22. And if another user (e.g., user B) enters the aboveextent group recorded, the user B sends a signal from the cellular phone31 using at this time to the network server 22 to establish the sessionwith the network server 22.

Then, the user B transmits the group ID and the password of the groupformed by the user A to the network server 22 as a group entry recordingrequest D131. If receiving this, the network server 22 confirms whetheror not the above receiving combination of the group ID and password havebeen recorded in the database 22D. If it is found, the network server 22records the user B as a group member.

Then, if the entry of the user B is recorded, the network server 22transmits the group ID (D132) recorded to entry at this time to thecellular phone 31 being used by the user B, and notifying the completionto record the entry to the group according to the request by the user B.The cellular phone 31 that received the above notice stores the group IDreceiving from the network server 22 in the second area AR12 (FIG. 3) ofthe memory card 11 ₂ being inserted as the network additionalinformation. Since the group ID and the password of the group to whichthe entry has recorded are stored in the memory card 11 ₂ peculiar tothe user B, also in the case where the user B inserts the above memorycard 11 ₂ in another terminal device and uses the terminal device, theabove using terminal device will be recognized by the network server 22as a device forming the group.

By the way, when a group member left from the group that he is joiningin, the group member transmits a leaving request to the network server22. Thus the application processor 22C deletes the record in thedatabase 22D. Furthermore, disengagement (dissolution) of the group willbe performed by the user A who is the former of the above group. Thenetwork server 22 receives a disengagement request only from the user A.Thereby, disengagement of the group by the third party can be prevented.Besides, also with respect to leaving of a group member, performing theleaving processing may be permitted only to the user A who is the formerof the group.

Note that, FIGS. 11 and 12 have dealt with the case where the user Bjoined the group formed by the user A, however, also the user C whooperates the personal computer 47 can join in it. Each user canarbitrary perform forming a group and joining in a group using variousterminal devices.

Here, in the application processor 22C of the network server 22, noticeinformation (message information) such as electronic mails to aspecified user or the like sent from various terminal devices will bestored. In these notice information, if notice information sent to aspecified group or notice information or notice information to betransferred in a specified group arrives the network server 22, theapplication processor 22C searches the database 22D for the user who isthe destination of the above notice information and a group member, andtransmits the notice information to said group member.

That is, as shown in FIG. 13 in which the same reference numeral isadded to the corresponding part of FIG. 7, the network server 22 recordsthe specified users according to the group forming request D121 or theentry for group request D131 (user A, user B, user C, user D, . . . ) asthe group members of a group GP1, from among the combinations of usersand their operating terminals recorded in the database 22D by theauthentication request data D21. In the contents of this record, if theuser who is a member of the group GP1 changes a using terminal device(that is, if the user inserts the memory card 11 _(x) in anotherterminal device), the combination of said user and his operatingterminal is updated in the database 22D by the authentication processingdescribed above with reference to FIG. 6, so that also the combinationof the user recorded as the member of the group GP1 and his operatingterminal is rewritten. Therefore, the record content of the above groupGP1 is always the latest information.

Then, as shown in FIG. 14, if a message to the group GP1 (hereinafter,this is referred to as notice information) D24 is sent from one of themembers of the above group GP1 (i.e., user A) to the network server 22along with the group ID designating the group GP1 and its password, theapplication processor 22C of the network server 22 searches for anoperating terminal being used by each user of the group GP1 recorded inthe database 22D. In this case, the application processor 22C recognizesthat for example the user B is using the cellular phone 31 and the userC is using the personal computer 47 by the above search processing.

The application processor 22C supplies the notice information D24 sentfrom the user A to the other group members to a media converter 22Ealong with the information showing the type of a terminal device used byeach group member who are the destinations (cellular phone 31, personalcomputer 47, . . . ), to convert the notice information D24 into a dataformat receivable in the terminal device used by each user (cellularphone 31, personal computer 47). For instance, the cellular phone 31 ismore suitable for receiving speech data than character representation inits use, and the personal computer 47 is more suitable for receivingdisplay data such as character or the like than speech data in its use.

Therefore, the media converter 22E transmits the notice information D24to the cellular phone 31 used by the user B after converting into speechdata. On the other hand, the media converter 22E transmits the noticeinformation D24 to the user C after converting into a data format thatis able to be displayed in the personal computer 47.

Each terminal device that received the notice information D24 replies aresponse signal to the network server 22. The network server 22transmits an ACK (acknowledge) to the user A (television set 13) that isthe sender of the notice information D24 responding to that, andnotifies that each terminal device has received the notice informationD24.

In this connection, when transmitting the notice information D24 fromthe user A to the terminal device being used by each group member(cellular phone 31, personal computer 47 or the like), if the networkaddress translation (NAT), the small office/home office (SOHO), thedynamic host configuration protocol (DHCP), etc., are interposed betweenthe terminal device and the network server 22, the network server 22 ishard to uniformly recognize the terminal only by address informationsuch as an IP address or the like.

As a method to cope with such case, it may be applied that each groupmember previously records a telephone number to receive a call, and ifthe notice information D24 is arrived, the network server 22 notifieseach group member the arrival of the notice information D24 by callingthe telephone number previously recorded. Each group member who receivedthis notice inserts the memory card 11 _(x) in the desired terminaldevice and requesting the notice information D24. Thereby, the networkserver 22 can transmit the notice information D24 to the terminal devicehaving the memory card 11 _(x). As a result, each group member canimmediately recognize the arrival as soon as the notice information(message) D24 directed to him is arrived to the network server 22.

On the other hand, as a method of transmitting the notice informationD24 to the group members, it may be applied that the sending of thenotice information D24 is notified from the network server 22 via thebroadcast interface 23D (FIG. 1) and broadcast means for example bydigital television broadcasting. In this case, the group ID is assignedto one channel of digital broadcasting, and in the terminal devicehaving the memory card 11 _(x) of each group member in which the groupID has been written, if the broadcasted group ID agrees with the groupID in the memory card 11 _(x), the arrival of the notice information D24to the network server 22 is received. Then, the user who received thisnotice can receive the notice information D24 by requesting of thenetwork server 22 from each terminal device.

In this manner, each user recorded as a group member can send each groupmember the above notice information D24 being a message or the like tothe group members or the notice that the above notice information D24 isreaching the network server 22 from the network server 22, only byspecifying the group, without confirming the place where each groupmember is.

In this connection, FIG. 14 has dealt with the case of transferring amessage in a group. However, the present invention is not only limitedto the case of transferring information in a group but also it can beapplied to transferring a message between other users recorded in thedatabase 22D.

Moreover, as shown in FIG. 15 in which the same reference numeral isadded to the corresponding part of FIG. 7, in the state where thespecified users (user A, user B, user C, user D, . . . ) have beenregistered as the group members of the group GP1 by the group formingrequest D122 and the group entry recording request D132 or the likeamong the combinations of the user and his operating terminal that havebeen recorded in the database 22D by the authentication request dataD21, when one of the group members of the above group GP1 (e.g., user A)searches the network server 22 for the place where a specified groupmember (e.g., user B) is (his using terminal), as shown in FIG. 16, theuser A calls the network server 22 and establishing the session betweenthe television set 13 used by the user A at this time and the networkserver 22.

Then, the user A transmits a search request D141 which includes thegroup ID and the user ID of the user B to the network server 22 byoperating the controller (not shown) of the television set 13. If thenetwork server 22 receives the above search request D141 via thecommunication part 22A, the search part 22K of a controller 22 _(CNT)searches the database 22D for the using history of the terminal of theuser B who has been recorded as a group member responding to the abovesearch request D141 based on the user ID of said user B. In thisconnection, in the database 22D, if each user changes a using terminal(that is, inserts the memory card 11 _(x) in another terminal device),the combined data of the terminal device presently used by said user andthe user is deleted from the record area about the using terminal.However, this using history will be stored in a history data area.

Accordingly, referring to FIG. 16, if the search request for the user Bis transmitted to the network server 22 from the user A, in the abovenetwork server 22, the search part 22K searches the history data area inthe database 22D for the using history of the terminal about the user Bas well as reading out the information on the terminal device presentlyused from the record area about present using terminal and fetching thisin the search part 22K (FIG. 15) as search data DS.

The search part 22K transmits thus fetched search data DS to thetelevision set 13 being used by the user A who inquired that bytransmitting the search request D141 as a searched result D142.

Thereby, the user A can confirm the place where the user B is (his usingterminal) and his using history of terminal based on the terminal usinghistory by the user B.

In this connection, in the case of FIG. 15, it has dealt with the caseof searching for the user B recorded as a group member. However, thepresent invention is not only limited to this but also whereabouts of auser who is not registered as a group member and his terminal usinghistory can be searched.

Here, the network server 22 can set an access right on a specifiedcombination from among the combinations of each group member and allterminal devices used by them. The access right means a right, forexample when the user A is using the personal computer 47, to access tothe personal computer 47 being operated by said user A. The networkserver 22 can set the access right to the combination, for example, ofthe user A and the personal computer 47 etc., about that the right toaccess should be given to all of the other group members or that theright should be given to a part of the group members.

For example, when the user A is using the cellular phone 31, if a rightto access to the cellular phone 31 used by said user A is set to a partof the group members among the other group members (e.g., only the userB and the user C), only the user B and the user C are allowed to accessto the cellular phone 31 being used by the user A.

In this case, as shown in FIGS. 17 and 18 in which the same referencenumeral is added to the corresponding part of FIG. 7, one of the groupmembers (for example, the user A using the television set 13) operatesthe controller (not shown) of the television set 13 and calls thenetwork server 22, and establishing the session between the televisionset 13 and the network server 22. Then, the user A transmits an accessright setting or update request D161 from the television set 13 to thenetwork server 22. In this access right setting or update request D161,the user ID and the group ID of the user A and his using terminaldevice, and the user ID of the person who set the access right (all or apart of the group members) at the time of using the terminal device areincluded.

If the network server 22 receives the access right setting or updaterequest D161 with the communication part 22A, in the access rightcontroller 22H of the controller 22 _(CNT), setting or update of theaccess right is performed on the database 22D based on the access rightsetting or update request D161 from the user A. Thereby, in the database22D, access right setting data AC on the user A (FIG. 17) is obtained.In this case, the setting of the access right in which all the groupmembers can access to the personal computer 47 used by the user A, apart of the group members the user B and the user C can access to thecellular phone 31 used by the user A, all the group members can accessto the television set 13 used by the user A, and all the group memberscan access to a personal computer in the home of the user A used by him(not shown) is performed.

In this manner, if the setting or the update of the access right isperformed, the network server 22 notifies the television set 13 beingused by the user A at this time the execution of the setting or theupdate of the access right by a setting or an update response D162.Then, the setting or the update processing of the access right isfinished.

Also with respect to the update processing of access right, the groupmembers can respectively change their own access right in similar mannerto the access right setting processing.

On the other hand, in FIGS. 17 and 18, the group members hasrespectively set their own access right. However, the present inventionis not only limited to this but also the group former (e.g., the user A)may set the access right of another group member.

Moreover, it is not only limited to the setting or update of the accessright in the group. In short, also users recorded in the network server22 can respectively set or update their own access right.

If an access right is set in this manner, the other users than the users(user B and user C) who have been given the right to the combination ofthe user and his using terminal to which the above access right has beenset (e.g., the combination of the user A and his using cellular phone inFIG. 18) are inhibited to access to the terminal device.

For instance, as shown in FIGS. 19 and 20, if a user D being a groupmember transmits an access request D171 which includes the user ID andthe group ID of the user A to the user A to whom the setting of theaccess right has done to the network server 22, the search part 22K ofthe network server 22 performs the whereabouts search of the user Adescribed above with reference to FIG. 15 according to the above accessrequest D171, and at the same time, searches for the access rightsetting data AC described above with reference to FIG. 17. As a resultof the whereabouts search, if the whereabouts of the user A (his usingterminal device) is a cellular phone, and also as a search result of theaccess right setting data, if the right to access to the above cellularphone during the user A is using the cellular phone is given to only theuser B and the user C, the search part 22K does not allow the user D toaccess to the cellular phone being used by the user A and transmits anaccess inhibit response D172 to the personal computer being used by theuser D.

Thereby, the user D to whom the access right to the combination of theuser A and the cellular phone is not set is inhibited to access to thecellular phone being used by the user A.

According to the above configuration, the network server 22 has recordedthe plural users as one group. Each user in the above group cansend/receive the various notice information (messages) D24 in the groupvia the network server 22 only by specifying the group ID and thepassword of the group.

For instance, if the user A transmits a message to the group members tothe network server 22, the network server 22 searches the database 22Dfor the other users (user B, user C, . . . ) being the other groupmembers, converts the message from the user A into a data format usablein each using terminal and transmits this to where each user is (usingterminal) according to the above searched result. In this case, even ifthe terminal device used by each user (user B, user C, . . . ) is notconnected to the network server 22, the network server 22 can access tothese terminal devices from the searched result and can transmit themessage from the user A.

Accordingly, each user being one of the group members can send eachgroup member the above message only by transmitting the message in whichthe group ID is specified to the network server 22, without grasping themutual whereabouts.

According to the above configuration, a message to a user recorded inthe network server 22 can be surely reached said user.

In the aforementioned embodiment, it has dealt with the case where theplace where a user is (his using terminal) is recorded in the networkserver 22 at the timing of inserting the memory card 11 _(x) when theuser uses each terminal device. However, the present invention is notonly limited to this but also for example in a network system interposedby the dynamic host configuration protocol (DHCP), since number ofterminal devices changes, each terminal device may always notify thenetwork server 22 the latest number of the terminal device by performingpolling.

In the aforementioned embodiment, it has dealt with the case where thenotice information (message) D24 directed to each user is evenly reachedeach user. However, the present invention is not only limited to thisbut also the notice information having higher priority may be reachedthe destination prior to other notice information by previously addingthe priority to the notice information, or the notice informationtransmitted from the user having higher priority may be reached thedestination or the notice information may be reached the user havinghigher priority prior to the others by previously adding the priority tothe users to transmit the notice information or the users to receive thenotice information.

In the aforementioned embodiment, it has dealt with the case where as amethod of transmitting data from the network server 22 to each terminaldevice, the data is transmitted after the line is connected. However,the present invention is not only limited to this but also for exampleas shown in FIG. 21, the arrival of the notice information to thenetwork server 22 may be notified using an outband signal (signal till acall, e.g., call control or the like) in the integrated services digitalnetwork (ISDN), the personal handyphone system (PHS), etc., or by meansof a character transmission service used in radio communication orterrestrial wave broadcast means, satellite broadcast means, etc., indigital broadcasting or the like.

In this connection, information to be put on the outband signal isprescribed by the standard of radio communication. In the ISDN, the datacalled user information is included in call setting. This information iscommunicated between a server and a terminal by peer to peer. On theother hand, in the PHS, subaddress information is information to becommunicated by peer to peer. By putting the notice information on them,an arrival of the information from the server to the terminal can benotified. Since the outband signal does not take any communication cost,the working cost of the network server 22 can be reduced.

In the aforementioned embodiment, it has dealt with the case where thecommunication between the network server 22 and a terminal device isperformed via a communication line such as a telephone line or the like.However, the present invention is not only limited to this but also ifthe terminal device can communicate with a power line via an outlet, thenetwork server can transmit the notice information (message) and thenotice that the above notice information has arrived to each terminaldevice by performing a transmission/receiving via the above power line.

Furthermore, in the aforementioned embodiment, it has dealt with thecase where the memory card 11 _(x) having the memory 11A is used asexternal storage means. However, the present invention is not onlylimited to this but also a memory card mounting a CPU may be used.Moreover, the external storage means is not only limited to in the cardshape but also many storage means in various forms can be applied.

While there has been described in connection with the preferredembodiments of the invention, it will be obvious to those skilled in theart that various changes and modifications may be aimed, therefore, tocover in the appended claims all such changes and modifications as fallwithin the true spirit and scope of the invention.

1. A method executed on a server connected to a terminal devicecomprising the steps of: receiving an authentication request includinginformation for user authentication and information about terminalspecification, in response to said terminal device detecting insertionof a memory device storing said user authentication information, whereinsaid memory device is divided into areas designated by a memory map, oneof said areas containing personal information relating to a user of thememory device and another of said areas containing each terminalinformation relating to a kind of said terminal device; storing saiduser authentication information on said server in association with saidinformation about terminal specification for future communication withsaid terminal device associated with said information about terminalspecification when said user authentication information isauthenticated; converting information to be transmitted to said terminaldevice into information conformed to said terminal device based on saidreceived information about terminal specification; transmitting saidconverted information to said terminal device; and forming a group of aplurality of users by producing a group ID in response to a groupforming request transmitted by said terminal device, for recording another terminal device into said group in response to receiving saidgroup ID from said other terminal device, and for transmittinginformation sent from a user belonging to said group to another userbelonging to said group.