Method and system for electronic communication

ABSTRACT

Communication and a communications apparatus are controlled with a communication intermediating apparatus. Multiple methods of processing communication requests are provided. Decided rules comprising of pairs of identification information of communication requests and methods of processing are recorded beforehand. When a communication request is received, the identification of the communication request is distinguished, an applying rule is picked from the recorded rules, and the communication request is processed. A virtual account to be set maximum payment amount beforehand is used, and electronic transactions communication is done.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a division of, claims priority to and the benefitof, U.S. Ser. No. 14/207,875 filed Mar. 13, 2014 and entitled “Methodand apparatus for electronic transactions” which is incorporated hereinby reference in its entirety.

BACKGROUND OF THE INVENTION Field of the Invention

The present invention relates to electronic apparatus that provide acommunication function (hereafter referred to as communication device),relates to protecting user's right and communication's security, relatesto communication and control, and also relates to electronic commercialtransactions.

Description of Related Art

Electronic communication services are was spread widely. The variousinformation technology services that utilize the Internet have becomewidely used by a lot of people, and broad-band flat-rate Internetconnection services begin to spread to a general family.

However, there are issues of that the User (As used hereafter, the term“User” shall mean the user owning the terminal device.) owning theterminal device cannot fully control the device, and there are issues ofUser's right and communication security.

A User unsolicited communication occurs when the User is a recipient. AUser has no way to control the terminal device when the User is asender. For example, the User cannot connect the home telephone byitself to confirm the actual scene of the home.

As for the conventional technology to prevent unsolicited communication,there are technologies that realize white-list or black-list.

There are credit cards and debit cards (shopping by bank cards)electronic transactions system, and there are transaction technologiesthat use mobile terminals. However, the User cannot safely use passwordfor purchasing. Card data is easily stolen. The input of password isnon-safe in shopping with debit cards, and password is easily stolenfrom the movement of the fingers.

There are technologies that reduce the risk with separate prepaidaccount for exclusive use of payment.

BRIEF SUMMARY OF THE INVENTION

An object of the present invention is to provide a controllablecommunication apparatus and a communication method to protect the User'srights according to the User's intention.

The more other objects of the present invention will become obvious inthe following detailed explanation.

FIG. 1 illustrates one embodiment of the present invention. A Usercontrols communication and a terminal by an apparatus that is namedelectronic secretary. The electronic secretary exists between theterminal and a network.

In order to process the incoming communication requests from the inside(the terminal) or the outside (the networks), the electronic secretaryis provided with multiple processing methods; The User decides rulescomprising identification information of communication requests andmethods of processing the requests and saves a set of the rules.

The electronic secretary distinguishes the identification information ofthe communication request, picks a rule that can apply from the recordedRuleSet, and processes the communication request according to the methodrecorded in the rule when a communication request is received.

As used herein, the term “Treatment” shall mean the method of processinga communication request; the Treatment means a method of processing acommunication request deciding by the User.

As used herein, the term “executing Treatment” shall mean executing theaction that corresponds to the Treatment.

Depending on needs, the electronic-secretary can be provided withTreatments including: permitting communication request, rejectingcommunication request, verifying communication request, controlling theterminal, starting a user-authentication program, and so on.

The electronic secretary distinguishes the identification informationwith information including:

(a) a subscriber ID (identification, for example a telephone number ofcaller or callee, E-mail addresses, and so on) provided by communicationservice providers, and(b) keyword information such as keyword inputted by communicationinitiator.

A virtual-account with a beforehand decided maximum payment amount thatcan be settled by an account is used in communication for electronictransactions. It is possible that the virtual-account balance is morethan the account balance.

A possible payment amount of money is not more than both thevirtual-account balance and account balance.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING

FIG. 1 illustrates one embodiment of an outline constitution of thisinvention;

FIGS. 2, 3, 9, 11, 15, 16, 19 illustrate flowcharts of the embodimentsof this invention;

FIGS. 4-7, 17, 20, 24, 26, 50 illustrate each of the embodiments of thelayout of the database of the Treatment-set, the 1st RuleSet, thepresentation information, the 2nd to 5th RuleSet, the party data, andthe Treatment-relation;

FIGS. 8, 10, 18, 21, 22 illustrate each of the embodiments of thisinvention;

FIG. 12 illustrates one embodiment of a sending client of email;

FIG. 13 illustrates a flowchart of sending email;

FIG. 14 illustrates a partial flowchart of early-determination process;

FIG. 23 is a flowchart of a sending process;

FIG. 25 shows a mediating system that begins anonymous communication;

FIGS. 27-28 illustrate flowcharts of the processing of the anonymouscommunication of the 1st and 2nd party;

FIG. 29 is a flowchart of the search, data sending, and Treatmentsetting operation;

FIGS. 30, 32 illustrate the structures of embodiments related toposition information;

FIG. 31A is a flowchart of one embodiment related to route guidance;

FIG. 31B is a model diagram of a method to decide a measuringcoefficient;

FIG. 33 illustrates the structure of a multifunction telephone ofExample 1;

FIGS. 34-37 illustrate TDB, R1DB, R2DB, and R4DB of the multifunctiontelephone;

FIG. 38 is a flowchart of the multifunction telephone;

FIG. 39 illustrates an example of the autoSetting-permission Treatment;

FIG. 40 illustrates a Treatment-set of an example of a telephoneanswering machine.

FIG. 41 illustrates the structure of an electronic secretary of an emailterminal;

FIGS. 42-45 illustrate TDB, R1DB, R2DB, and GDB of the electronsecretary;

FIG. 46 shows a screen of inputting the 2nd RuleSet and questions;

FIG. 47 shows a screen of inputting the 1st RuleSet and andefault-Treatment.

FIG. 48 illustrates Internet videophone and a monitor system of example3;

FIG. 49 illustrates its structure;

FIG. 51 is a flowchart of process of its main program;

FIG. 52 shows its main menu screen;

FIG. 53 shows its members list screen;

FIG. 54 shows an new member adding screen;

FIG. 55 is a flowchart of applying for Treatment;

FIG. 56 shows member settings screen;

FIG. 57 is a flowchart of login process;

FIG. 58 shows a members list edit screen;

FIG. 59 shows an applying-for-Treatment restriction options screen;

FIG. 60 is a flowchart of the operation of the videophone program;

FIG. 61 shows a connection waiting screen;

FIG. 62 is a screen in videophone communicating;

FIG. 63 illustrates a summary flow of establishing Treatment-relation;

FIG. 64 is a block diagram of the structure of the electronic secretaryof an email server of example 4;

FIGS. 65A-D and FIGS. 66A-D show a setting example of a direction-file;

FIG. 67 shows a layout of interface.

FIG. 68 shows data to pass to a component;

FIG. 69 is a block diagram of an electronic transactions system ofexample 5;

FIGS. 70, 71 show TDB and R1DB of example of electronic transactions;

FIG. 72 is a block diagram of a example of a ticket;

FIG. 73A is a model diagram of a virtual-account;

FIG. 73B shows a example of a reservation-information;

FIG. 74 is a flowchart of transaction process in a virtual-account;

FIG. 75 is a flowchart of approval process;

FIG. 76 is a flow chart of offline-approval.

DETAILED EXPLANATION OF INVENTION

As used herein, the term “communication request” shall mean messagesreceived by the electronic secretary before the original intention ofthe caller is achieved, for example, a connection request is acommunication request, and an email or a data or a request forconfirmation being received by the electronic secretary is acommunication request, when the recipient has not received them yet;

the term “Treatment” shall mean a method of processing a communicationrequest;the term “Treatment-set” shall mean a set of Treatments;the term “initiator/recipient ID” shall mean initiator/recipientsubscriber identification;and the term “keyword information” shall mean the keyword, password,etc. information sent by initiator;

the term “rule” shall mean knowledge used for control of processing; arule consists of a condition-part and an action-part (i.e. an 1F-THENrule);

the term “RuleSet” shall mean a set of rules, and X RuleSet shall mean aset of the X rules;the term “apply X RuleSet” shall mean that search the X RuleSet to findan rule whose condition is satisfied, and execute found rule's action,for example, “apply 1st RuleSet” shall mean that search the 1st RuleSetto find an rule whose condition is satisfied, and execute found rule'saction;

the term “1st rule” shall mean a rule that include a condition-part andan action-part,

the condition-part has an application condition on identificationinformation to distinguish a communication request, andthe action-part orders execution of an action corresponding to aTreatment, and the rule can be expressed in the following:“upon receiving a communication request from an initiator,if identification information (actual identification information) of thecommunication request detected from the communication request is equalto the identification information of the condition-part, then thecommunication request is processed according to the Treatment of theaction-part”;the term “2nd rule” shall mean a rule that include a condition-part andan action-part,the condition-part has an application condition on keyword information,andthe action-part orders execution of an action corresponding to aTreatment,and the rule can be expressed in the following:“upon receiving a communication request from an initiator,if keyword information detected from the communication request is equalto the keyword information of the condition-part, then the communicationrequest is processed according to the Treatment of the action-part

the term “3rd rule” shall mean a rule that include a condition-part andan action-part,

the condition-part has an application condition on a initiator ID and areceived-time of a communication request, andthe action-part orders execution of an action corresponding to aTreatment,and the rule can be expressed in the following:“upon receiving a communication request from an initiator,if the actual initiator ID detected from the communication request isequal to the initiator ID of the condition-part, anda predetermined amount of time from the received-time has not passed,then process the communication request according to the Treatment of theaction-part”;

the term “4th rule” shall mean a rule including a condition-partincluding conditions on a question to present communication initiatorand a answer of the question, and an action-part on obtaining marks, andthe rule can be expressed in the following method:

“If responses from the initiator are correct answers, summing up themarks”;

the term “5th rule” shall mean a rule that include a condition-part andan action-part,

the condition-part has an application condition on a recipient ID and asent-time,and the action-part orders execution of an action corresponding to aTreatment,and the rule can be expressed in the following:“If an ID of the addressee (recipient ID) is equal to the recipient IDof the condition-part, anda predetermined amount of time from the sent-time has not passed,then the sending request is processed according to the Treatment of theaction-part”;

the term “initiator” shall mean a person or a machine who requestsinitiation of communication;

the term “Treatment information” shall mean information on set Treatmentand RuleSet;the term “communication-permission” shall mean permitting transmissionof requests of communication to recipients,the electronic secretary permits communication, transmits communicationrequest to the recipient, and makes a status same as conventionalcommunication,the recipient can make final determination whether or not to accept therequest;the term “communication-inhibition” shall mean refusing communicationrequests;the term “communication-verification” shall mean including showingpresentation information to the initiator and permitting transmission ofthe request of communication to the electronic secretary;

the term “receiving client” shall mean device capable of retrievingemail stored in servers,

for example mobile phone capable of retrieving email, ora host that uses a client software in accordance with POP3 protocolspecified in the RFC(Request for Comments) published by IAB (InternetArchitecture Board);

the term “sending client” shall mean device capable of sending email,for example a client terminal that can send email, or an email relayserver at ISP (internet service provides);

the term “server” shall mean side that provide service, for exampletelephone switchboards;the term “receiving server” shall mean device that store received email,and enable recipient to retrieve stored email, for example email centersof mobile phone or Internet hosts providing POP3 service are thereceiving servers;

the term “electronic mail” shall mean a substance including an envelopand a content, the content includes a header and a body, the envelopeincludes whatever information is needed to accomplish transmission anddelivery, the contents comprise the object to be delivered to therecipient,

the header is a sequence of lines of characters with special syntax asdefined in a standard,the body is simply a sequence of characters that follows the header;the term “email” shall mean the electronic mail;the term “communication” shall mean transmission of information as wellas control signals;the term “hearing-permission” shall mean permitting initiator to obtainsound signals collected by receiving-side's communication device;the term “monitor-permission” shall mean permitting initiator to obtainimage signals collected by receiving-side's communication device;

the term “position-obtaining-permission” shall mean permitting initiatorto obtain position information collected by receiving-side'scommunication device;

the term “attention-attracting-permission” shall mean permittinginitiator to output attention-attracting-symbols from receiving-side'scommunication device to attract recipient's attention;the term “information-transmission-permission” shall mean permittinginitiator to transfer information to the receiving-side's communicationdevice;

the term “default-Treatment” shall mean the predefined Treatment whenTreatment cannot be determined by applying a RuleSet should be applied;

the term “sender's email address” shall mean the email address that wasspecified by the sender of the email itself for reply to the email;the term “applying-for-Treatment” shall mean applying for permission ofcommunication, which includes conventional initiation of communicationrequests;

the term “Treatment-relation” shall mean the relation between twoparties based on Treatment given, by each party to the other party;

the term “application-contents” shall mean the content of applicationfor permission of communication;the term “program-executing-permission” shall mean permitting to executeapplication programs in a terminal, the terminal includes means such asCPUs for executing the application programs.

FIG. 1 illustrates one embodiment of an outline constitution of presentinvention. The terminal 101 communicates using network 104 via theelectronic secretary 102.

The electronic secretary is connected directly with the terminal.The electronic secretary may be built in the terminal, or serversproviding communication services, or may become independent.For example, in the case of telephone communication, the electronicsecretary may be built in the telephone or the switchboard.

Direction-file 103 can be stored inside the electronic secretary systemor be independent from implementations of the system.

A User can directly input (It is not shown in the FIG.) data to thedirection-file.For example, the provider of services can make the User access toInternet Web pages and input data into the direction-file through theWeb pages.

The User can use the terminal of embodiment of this invention as arecipient or an initiator or a buyer using an electronic transactionssystem.

The User can control the terminal of embodiment of this invention fromanother device as the initiator directly.

When beginning communication for electronic transactions, the User canmake the terminal of embodiment of this invention start anauthentication program as the buyer.

(Hereafter same symbols are used in different figures to indicate sameor similar components)

The electronic secretary processes a communication request that arrivefrom the inside (the terminal) or from the outside (the network).

As used herein, the term “control-permission” shall mean permitting theUser to control the terminal according to the User's intention withoutintervention from the person at the receiving-side in order to obtainreal-time information, to relay an actual scene, and to do real-timeprocessing.

The electronic-secretary is made to have the authority for thecontrolling the directly connected terminal.

For example, if the electronic secretary is built in the terminal, theelectronic secretary can control the terminal directly.When the electronic secretary is installed at the outside of theterminal, the electronic secretary can control the terminal through thecommunication channel to be connected directly with it.The control-permission is realized by controlling the terminal throughthe electronic secretary.

It is an example of control-permission that the initiator remotelycontrols the terminal.

The initiator can watch the receiving-side by starting a camera that isconnected to the terminal.The initiator can locate the receiving-side by starting a GPS devicethat is connected to the terminal.Another example of control-permission relates to electronictransactions.The electronic secretary starts an authentication program for respondingthe communication request from the inside or the outside.

The direction-file can be stored in any storage devices includingmagnetic tapes, semiconductor memories like RAM or ROM, or opticalstorage devices, as long as the purpose of the present invention can beachieved.

Preferably the direction-file is stored in relational databases thatintegrate different formats of data and are easy to perform search.

FIG. 2 is a flowchart of one embodiment of the present invention.

Upon receiving communication request from an initiator of the inside orthe outside, the electronic secretary system detects (201)identification information (i.e. actual identification information) ofthe communication request, reads (202) the direction-file, and appliesthe 1st RuleSet in the following 1st RuleSet applying-procedure.That is to say, the system searches the R1DB (see FIG. 5) using thereceived identification information as a key to find a rule whosecondition is satisfied (203), tests (204) to determine whether acorresponding rule is found, if an entry is found, i.e., if acorresponding rule is found, then the system extracts given Treatmentfrom the Treatment ID field of the found entry, and executes (206) theaction-part of the rule.If no corresponding rule is found, then the system processes (205) thecommunication request according to beforehand predetermined method i.e.default-Treatment.

FIG. 3 is a flowchart of one embodiment of the present invention.

As for this embodiment, applying the 2nd RuleSet is added to theembodiment shown in FIG. 2, and only subscriber ID subscriber ID isincluded in the 1st RuleSet.The system searches (305) 2nd RuleSet on keyword information andTreatment to find a rule whose condition is satisfied, and tests (306)to determine if a rule is found.Steps 301-304, 307, and 308 are equivalent to steps 201-206.

Tables include all the data in a database. A table is a collection of“columns” and data is stored in columns and rows. Each row represents arecord and each column represents a field.

The layout of the record comprises “name of field” (in the left handside in the figure) and “field specifications” (in the right hand sidein the figure). The rows correspond to respective fields.Primary key is the column with unique identification key for each row inthe table. External key is for linking data in two tables.

FIG. 4 illustrates the layout of record of the database that stores oneembodiment of a Treatment-set (hereafter referred to as TDB).Realization of each Treatment and the number of available Treatmentsdiffers for different communication devices. The Treatment-set may beextended or simplified according to need of User individual.

FIG. 5 illustrates the layout of the record of a database (hereafterreferred to as R1DB) that stores a set of the 1st rule on identificationinformation and Treatment.

The communication request is distinguished by at least one of the items.An item being expressed on the table shown in FIG. 5 is ignored when itis nothing (not set); it means that the condition in the condition-parton the item is satisfied.An example in that a caller's number and a command are nothing is shownin FIG. 71.When processing a communication request from the outside, initiator IDis usable as one of the items of the above identification information.In the case of telephone or email communication, initiator ID is acaller's number or a sender's email address.A keyword in the communication request is usable as one of the items ofthe above identification information. For example, signs, text, sound,or images are usable as a one of the items of identificationinformation.

FIG. 6 illustrates the layout of record of the database (hereafterreferred to as GDB) that stores one embodiment of the presentationinformation. In case the presentation information includes questionspresented to initiator, layout shown in FIG. 20 may be used.

FIG. 7 illustrates the layout of record of the database (hereafterreferred to as R2DB) that stores one embodiment of the 2nd RuleSet onkeyword and Treatment. The 2nd RuleSet is equivalent to the 1st RuleSetthat has only one keyword item.

The present invention distinguishes the communication request with acombination of subscriber ID and keyword information.

Subscriber ID is a unique identification provided by a communicationservices provider; a keyword is communication contents; and pluralkeywords may be used simultaneously to distinguish the communicationrequest.It is enables to include subscriber ID and keyword in the 1st RuleSetsimultaneously.For simplicity, the 1st RuleSet has only the subscriber ID; the 2ndRuleSet may have only the keyword.

As used herein, the term “give a Treatment to a subscriber (or give aTreatment to a subscriber ID)” shall mean creating a 1st rule and addingthe rule to a 1st RuleSet; the 1st rule executes the Treatment afterdistinguishing the communication request by the subscriber ID.

As used herein, the term “give a Treatment to keyword information (orgive a Treatment to a keyword)” shall mean creating a 1st or 2nd ruleand adding it to a RuleSet; the 1st or 2nd rule executes the Treatmentafter distinguishing the communication request by the keywordinformation.

An example of the present invention has conventional white list andblacklist function. However, the User cannot fully control the terminalonly with the conventional function.

In order to solve this problem, a list of control-permission (controlauthority) address, and a list of control-permission keyword wasdevised.The concept of “Treatment” is introduced in order to control theterminal fully according to the User's intention.When a conventional art is described directly with “a list”, attentionsshould be paid to the point that is hard to compare the conventional artwith this invention, because of this invention is described withRuleSet. It can be understood that if a RuleSet is expanded into pluralequivalent lists, such as control-permission list element is notincluded in the conventional arts that are disclosed in the INFORMATIONDISCLOSURE STATEMENT BY APPLICANT of this application.

Conventional white list technology cannot prevent “phishing” fraud thatuse forged initiator ID occurring frequently recently.

An embodiment of the present invention enables identification of acommunication request that does not depend on initiator ID. The use ofthe present invention enables initiator authentication equivalent tosuch as a login by a password of email server when it is necessary.For example, the collating a password of a customer stored in thekeyword field of a RuleSet with a password that is a bank accountpassword to be included in the communication request can certify theinitiator is the bank.

The password may use One Time Password (OTP) or cipher.

The password may be transmitted in a specific information field in thecommunication request. For example, keyword field may be used in thecase of email communication.

A communication request from the inside or outside can be processed bysame mechanism.

For example, a 1st RuleSet on recipient ID and Treatment for sending canbe used.A Treatment to refuse a communication request named“transmission-inhibition”, a Treatment to permit a communication requestnamed “transmission-permission”, and a Treatment named“transmission-authenticating” can be used.The transmission-authenticating Treatment starts an authenticationprogram in transmission terminals; if the authentication such ascollation of a password is successful, the transmission is permitted.For example, restricting sending an electronic transactions request to abank only to the owner can prevent an abuse when the terminal is lost.

Communication-verification Treatment permits transmitting acommunication request to the electronic secretary and including showingpresentation information to the initiator.

An initiator's response is received after the information was shown tothe initiator. Until the response is determined to be correct forpermitting the request of communication, the initiator cannot accomplishthe originally intended purpose of the communication request.

In the case of non-realtime communication, a communication-verifyingTreatment considers that a communication request from the initiator thatinitiator ID is not memorized is the response to the presentationinformation.

For example, in the case of email communication, the reception ispermitted when the passwords or keywords decided beforehand was includedin an email.

In the case of realtime communication, a communication-verifyingTreatment receives a response of an initiator, and extractsidentification information from the response.

For example, in the case of telephone communication, the electronicsecretary records the caller's name, telephone number, or business fortelling callee, and sends voice guidance to outside to receive thecaller's response; the response is tested, but until it is determined tobe correct, the caller will not be allowed to talk to the callee.The question and answer of repetition is possible.The response may be determined to be correct immediately or bedetermined later by the callee.The response can be received by a dial number tone or voice recognition.Using an answering machine mode to pretend to be out is one concreteexample of the communication verification Treatment.

A flowchart of FIG. 3 can be used in email communication, too.

The initiator ID is sender's email address (a reply address), thepresentation information includes description of conditions forreceiving email, and the communication-permission Treatment is to makethe recipient receive the email.At first the 1st RuleSet is applied (the sender's email address ischecked) upon arrival of a communication request, when no applicablerule is found, the 2nd RuleSet is applied (the conditions for receivingis checked), when no applicable rule is found, default-Treatment isexecuted.When the default-Treatment is communication-verification, the systemreplies to the sender with the presentation information and refuses thereceiving of the email.

FIG. 8 illustrates the constitution of another embodiment of the presentinvention. The electronic secretary and the direction-file R1DB, GDB,and R2DB are installed in the receiving client side User terminal 801.Reference numeral 802 shows a receiving server of ISP.

FIG. 9 is a flowchart of the embodiment shown in FIG. 8.

The electronic secretary is installed in the receiving client side;rejecting a communication request is issuing a email delete command tothe receiving server for deleting the email from the server.The method to apply for permission of communication to present to theinitiator is to put application contents in the subject of an email.The presentation information includes at least the contents thatpromotes to put the application contents to the subject of the email.For example, it may present questions and ask to put the answers to thequestions in the subject.

After the electronic secretary logs in (901) to the receiving server anddetects (902) the initiator ID i.e. the sender's email address from theemail's header.

For example, a sender's email address can be detected by analyzing theheader of a email; the header of the first email can be received from aPOP3 server by sending out a command “TOP 1 0” that is recorded in POP3that is a general email-receiving-protocol.

Then, the electronic secretary reads (903) the direction-file, andapplies (904-905, 909) the 1st RuleSet with the 1st RuleSetapplying-procedure;

when no rule whose condition is satisfied can be found, applies(906-907) the 2nd rule.When an applicable rule is found, the electronic secretary can extractTreatment ID from the field of Treatment ID, and executes (909) theaction-part of the rule.The electronic secretary processes (908) the default-Treatment.

This embodiment extracts the identification only from email header, andcan achieve the purpose without receiving the contents of the email.

Especially for applying it in mobile phones, the quantity ofcommunication of the charge part of communication with the server can bereduced largely.

FIG. 10 illustrates the constitution of another embodiment of thepresent invention mentioned in explanation of FIG. 3. The electronicsecretary and the direction-file R1DB, GDB and R2DB are installed in thereceiving-server 1001. Reference numeral 1002 shows a receiving client.Reference numeral 1003 shows a sending client of emails.

FIG. 11 is a flowchart of another embodiment of the present inventionmentioned in explanation of FIG. 3. The method to apply to for thepermission of communication to present to a sender is to put applicationcontents on to the subject of the email.

The presentation information includes at least the content that promotesto put the application contents to the subject of the email. Theelectronic secretary is installed in the receiving server side.The “rejecting a communication request” is to break communication afterreturning error messages to sending client.The electronic secretary receives (1101) only the envelope of messageand detects the sender's email address, reads (1102) the direction-file,and applies (1103-1104, 1109) the 1st RuleSet with theapplying-procedure.When no rule whose condition is satisfied can be found from the set ofthe 1st rule, in order to receive the subject of the email, theelectronic secretary receives (1105) the header of the email.Then the electronic secretary applies (1106-1107, 1109) the 2nd RuleSetwith the applying-procedure.The default-Treatment is processed (1108).

Generally, emails are sent from a sender terminal (a sending client) toa sending email server (a receiving server),

and then from the sending email server (a sending client) to a receivingserver,and then from the receiving server to a receiver terminal (a receivingclient).The sending email server has two role of a receiving server and asending client.

FIG. 12 illustrates the constitution of a sending client to send emailsto the embodiment (FIG. 10, 11) of the present invention for receiving.

A sending client 1201 sends emails 1203 stored in storage device 13 to areceiving server 1001. The example of the structure of email 1203 is asdefined in conventional standard, referring to “RFC2822 (InternetMessage Format)” that was prescribed in RFC.In the header of the content, informational fields for human readableinformation including subject, comments, and keywords are specified.

FIG. 13 is a flowchart of an embodiment of the sending client.

Session and the sending client are initiated (1301). According to theconventional SMTP protocol (RFC2821, Simple Mail Transfer Protocol), anenvelope is sent (1302) by issuing SMTP compliant commands “MAIL” and“RCPT”. Then the addresses of the sender and recipient are sent to thereceiving server.The sending client tests (1303) to determine whether the envelope isaccepted by the receiving server.The receiving server tests to determine whether to accept the envelopein step 1104 of FIG. 11.

The informational fields included in the header are sent (1304), theinformational fields includes information to judge the conditionpredetermined by recipient, and the sending client tests whether theinformational fields to be accepted (1305).

This embodiment calls this processing “INFO command”.The receiving server tests whether to accept the body in step 1107.

The receiving server can decide whether the transmission of thefollowing body is approved by collating receiving conditionpredetermined by recipient with information obtained from the envelopeand the informational fields.

When approved, the sending client sends (1306) the content by issuingconventional “DATA” command.The sending client delete sent message from storage 13, when the “DATA”command is approved and accepted, (1307, 1309), otherwise it startserror process (1308).

Preferably, as a sending permitting standard of the body, theinformational fields are separated from the header, and are sent beforethe content.

In order to use existing communication softwares in the maximum, theinformational fields may be extracted from the header, and it may besent first; if the informational fields are approved, then the contentwhich is not changed is sent; i.e. original content may be sent byissuing conventional “DATA” command (1306).It may also first send full header in the INFO command, and send onlybody if approved.

In conventional SMTP, there is not a step of authorization-processing ofsending; the step approves sending based on keyword information. Exceptthe senders ID, recipients have not the information that can controlcommunication.

The conventional white lists and blacklist technology controlcommunication by senders ID. However, there are the problems that cannotcontrol communication satisfactorily when the senders ID has not beenput on the lists; and when it is not necessary to store the sender ID ofan email in the lists, the email cannot be received.There are conventional technologies that judge whether it is unsolicitedcommunication using the received communication contents after thecommunication end; however, it cannot dissolve the congestion problem ofthe network.According to this embodiment, the problems of the conventional arts canbe dissolved because of the information field of communication contentsbe used to distinguish the communication request.

When the embodiment shown in FIG. 11 receives a message from a sendingclient of a conventional art, a special processing is added in step1108.

In conventional art SMTP, when the envelope is accepted, the content issent as one block; it is decided in the protocol that the sending ofcontent cannot break on the way.In other words, there is not a SMTP command to break the sending can beused at step 1108.In order to break useless communication, a processing named anearly-determination is added.

FIG. 14 is a partial flowchart of the early-determination process ofanother embodiment of the present invention shown in FIG. 11. The term“early-determination” refers to the process in which the electronicsecretary decides to refuse receiving the email before receiving fullbody of the email.

The early-determination process begins from a point in time; at thepoint an applicable rule cannot be found (FIG. 11, (1104)) by applyingthe 1st RuleSet.

In the next step a 3rd RuleSet is applied. I.e., the system searches(1401) R3DB to find a rule; in the rule the initiator ID (in thisembodiment the sender's email address) is the same, and a predeterminedamount of time from the received-time to the time of searching has notpassed; and tests (1402) the result.When a record is found, the Treatment ID can be extracted from therecord. Then the action-part of the rule is executed (1410).

When no rule whose condition is satisfied is found, the message isreceived (1403) until the header where the subject of the email isincluded, and the 2nd RuleSet is applied (1404-1405, 1412).

The default-Treatment is processed (1406).However, if (determination 1407) a communication-inhibition Treatment isincluded in the action-part of the found rule or default-Treatment;then a 3rd rule is created based on the actual initiator ID, thereceived time of the message, and a communication-inhibition Treatment,the rule is added (1408) to the 3rd RuleSet, and the electronicsecretary processes communication request according to the Treatment,but, the communication-inhibition Treatment forcibly breaks (1409) thecommunication after returning temporary error status to thesending-client, else, processes (1412) the communication requestaccording to given Treatment.The purpose of execution of the 3rd rule is to stop a conventionaltechnical sender in accordance with SMTP at a step before the receptionof the header. In the step, the sender can be stopped formally.The 3rd rule is deleted (1411) after the action-part of it is executedbecause it is good that it is executed once.

SMTP is located in the upper layer of layering protocol. Usually thetransport protocol in the underlying of SMTP is TCP. TCP connection isindispensable in email communication.

It is one embodiment of the above described “forcibly breaks thecommunication” to issue a socket disconnection command (close) of TCPprotocol of C language.SMTP accomplishes transmission and reception of an email throughconversations by issuing and replying to commands. Normally the senderalways checks the reply of the receiver and decides movement of itselfby the kind of the reply. When it is forcibly disconnected duringreceiving of contents, the sending is tried again automatically atintervals of a predetermined delay even if the receiver cannot reply.

The 3rd RuleSet is a RuleSet including the pair of rejection historyinformation and a Treatment.

When sending retrying of a sender in accordance with SMTP occurs after afixed time, in the case that sending retrying of a sender disconnectedforcibly has found using the histories (1410), it is not necessary toreceive the content, then the receiving server refuses the content bythe standard protocol of SMTP.

When the retrying has not, occurred, it is good to delete the 3rd rulethat has become old. In this way, the early-determination that canprevent happening of useless communication can be realized.

If the predetermined amount of time in the 3rd rule is longer than theinterval of the sending retrying accordance with SMTP protocol, thesending retrying can be caught surely (YES of 1402), unsolicitedrepetitional retrying be prevented by making the sender give up.

In step 1409, a failure reply may be return to the sending clientinstead of the temporary error status.

In step 1105, the electronic secretary may receive while collating therejecting or the permitting keywords from the body instead of theheader.

The quantity of communication is more than the case of only using theheader, but it is possible that it is statistically less than the caseof judging after the communication ends, because the transfer of thebody can be forcibly discontinued.

The 3rd RuleSet is a mechanism about repeated processing with historyinformation.

In addition to the early-determination, the present invention uses thismechanism for other purpose too.

FIG. 17 illustrates the layout of record of the database (hereafterreferred to as R3DB) that stores one embodiment of the 3rd RuleSet oncommunication initiator, received time, receiving frequency, andTreatment. The 3rd RuleSet for early-determination does not use thereceiving frequency field.

The electronic secretary is provided with a Treatment named“autoSetting-permission”.

The autoSetting-permission permits the communication request, and givesa communication-permission Treatment to the initiator ID.When default-Treatment is communication-verification, the system replieswith presentation information; the recipient can set the receivingcondition in the presentation information freely.For example, it is usable as a receiving condition that a name of therecipient is included in communication contents, and theautoSetting-permission Treatment is given to the name. Then the emailthat the recipient's name is included is received, in addition, acommunication-permission Treatment is given to the initiator ID.

Attention should be paid to the point that the autoSetting-permissionTreatment permits communication based on keyword information.

As for the above mentioned example, it is possible that the initiator IDcan be added automatically to a white list, even if the initiator whoknows the recipient name does not appear in the white list of therecipient, after the second time the sending can be permitted withoutqualification.

The whole of an email of unknown partner is not received byautomatically making white list by giving the autoSetting-permissionTreatment to keywords included in information fields, so that largequantities of useless communication can be avoided when the sender usesan automatic program.

There is the effect that can solve the problem of congestion ofcommunication infrastructure.

A Treatment named “temporary-receiving” is equipped. Thetemporary-receiving permits a received communication request.

Emails that include specified keywords can be received by giving thetemporary-receiving Treatment to the keywords. For example, anadvertisement email about “golf” that has interest can be received. Itis not necessary to record the initiator ID of such an email in a list.

The autoSetting-permission Treatment can be configured with a furtherdetailed condition.

FIG. 15 is a flowchart of another embodiment of the example mentioned inexplanation of FIG. 3.When the 2nd RuleSet is applied, if an applicable rule is found, TheTreatment of the action-part of the found rule is given the initiator.The electronic secretary detects (1501) the ID, reads (1502) thedirection-file, applies (1503-1504) the 1st RuleSet, applies (1505-1506)the 2nd RuleSet, and processes (1507) the default-Treatment.The difference between FIG. 3 is that when the electronic secretaryfinds an applicable 2nd rule, the electronic secretary further tests(1510) to determine whether the saving condition is satisfied, and whenthe condition is satisfied, the electronic secretary gives the Treatmentof the action-part of the found 2nd rule to the initiator, i.e. create a1st rule based on initiator ID and Treatment, and adds (1509) the ruleto the 1st RuleSet, processes (1508) the communication request accordingto the Treatment.Normally, one of the saving conditions is that the Treatment in thefound 2nd rule is not communication-verification. The saving conditioncan be predetermined or can be changed by Users.

FIG. 16 is a flowchart of one part of another embodiment of theembodiment mentioned in explanation of FIG. 3.

The process of this part is included in the block of default-Treatment(FIG. 3, 307). I.e. when no applicable 1st or 2nd rule can be found, a3rd RuleSet is applied (1601-1602, 1605). Once a 3rd rule is applied,the rule is deleted from the RuleSet (1606); then a 1st rule is createdbased on initiator ID and a predetermined Treatment, and the rule isadded to the 1st RuleSet (1607).When no rule whose condition is satisfied is found, the electronicsecretary creates a 3rd rule based on initiator ID, received time,receiving frequency, and a predetermined Treatment, and adds the rule tothe 3rd RuleSet (c.f. FIG. 17).When there was already a 3rd rule record, receiving frequency is added(1603). The electronic secretary executes (1604) the originaldefault-Treatment.

There are conventional arts for preventing unsolicited communicationthat automatically reply when an initiator is unknown; the reply has notany limit.

However, the reply-to addresses of most SPAM mails are forged. Thosearts have a danger to promote an illegal act. I.e. legitimate recipientshave danger that they are used as a stepping-stone for attacking otherpersons by illegal initiators.It is possible that the auto-replied messages themselves becomeunsolicited email messages.

FIG. 16 is an embodiment giving a communication-verification Treatmentof limited frequency to a partner.

The embodiment is a countermeasure against an email bomb attack byrepetitive sending. A condition on number of times of receiving is addedto the condition-part of 3rd rule so that communication requests from aninitiator that exceed the predetermined number of times within apredetermined amount of time are refused and the initiator is given witha communication-inhibition Treatment.

For example, if an email is received for the second time from the samereply-to address, and the information by which predetermined identitiescan be confirmed is not included, then, the communication-inhibitionTreatment is given to this address. Then the request can be refusedwithout an automatic reply.

The communication-inhibition Treatment may be promptly given if thesender's address is invalid and cannot be replied to.

Conditions on time may be included in the condition-part of 1st rule inthe same way as the 3rd rule.

For example, when above one month time is passed, the 1st rule having arefusing Treatment is deleted. Then the Treatment of a refused initiatorcan return to default-Treatment again, and the 1st RuleSet can beprevented from being too big.

Therefore, this embodiment provides an email communication systemthrough emails header, so that the system can prevent unsolicited emailsaccording to the individual intention of the recipients.

Further, the system can evade congestion of communicationinfrastructure, can evade being attacked, and can also prevent phishingfraud.

This embodiment can coexist with conventional technology, and it can betaken advantage of as an additional function of conventional technology.

The environment of the conventional email system can be maintained byspecifying communication-permission as the default-Treatment for Userswho uses conventional technology.

FIG. 18 illustrates the constitution of another embodiment of theembodiment mentioned in explanation of FIG. 3.

The electronic secretary, the direction-file R1DB, GDB and R2DB areinstalled in Terminal-A. It is provided with means for communication byreal-time interaction.Terminal C having control authority can communicate with, and sendcontrol commands 1810 to callee's Terminal-A without intervention fromperson at the callee side.Terminal-B to which a communication-permission Treatment was given canstill bidirectionally communicate (1820) with Terminal-A.

User of Terminal-A gave information-transmission-permission andprogram-executing-permission Treatment to terminal C. Information isforwarded (1810) to Terminal-A from terminal C, and written in storagedevice 13 of Terminal-A.

When User of Terminal-A gave a calling-attention-permission Treatment toterminal C, terminal C can make display 18 output information, can makespeaker 17 produce sound, can make vibrator 19 vibrate, and so the Userof terminal C can attract attention of a party near Terminal-A.

When information requesting verification of electronic commercialtransactions is received from terminal C, an authentication program isstarted. Then the owner of Terminal-A inputs a fingerprint throughfingerprint sensor 20, the authentication program collates the inputtedfingerprint information with the registered fingerprint information, ifthey are equal, then a previously registered password is transmitted toterminal C, and the transactions can be verified.

The flowchart of FIG. 3 can be used in telephone communication, too. Theinitiator ID is caller's number. In step 305, a cycle comprising playinga question or message and receiving response from the caller may beincluded.

FIG. 19 is a flowchart of another embodiment of the embodiment mentionedin explanation of FIG. 3.

The presentation information includes questions asked to the initiators;the keywords are answers that have gained predetermined sum of marks tothe questions.The direction-file includes a set of 4th rules (hereafter referred to as4th RuleSet). The 4th rule comprises a condition-part includingconditions on a question to present to initiator and an answer of thequestion, and an action-part on obtaining marks, and the rule can beexpressed in the following way:“If responses from the initiators are correct answers, sum up themarks”.The electronic secretary is also capable of the following actions.(a) Presenting the question to the initiator, (b) receiving initiator'sanswer to the questions, (c) applying the 4th RuleSet.

FIG. 20 illustrates the layout of record of the database (hereafterreferred to as R4DB) that stores one embodiment of the 4th RuleSet onquestions to present to initiators, answers to the questions, and marks.

The questions and presentation information that are stored in GDB caninclude text, sound, and images.

This part of process exemplifies the procedure of repeated presentationof guidance information, receiving response and deciding correctness ofthe response. It can be included in step 305 of FIG. 3.

The electronic secretary tests (1901) to determine whether all recordsin R4DB have been processed, extracts (1902) a record, presents (1904)the question to the initiator, and receives response from the initiator.There may be multiple correct responses for one question.

For example, there may well be multiple correct ID numbers when the IDnumbers is identified.

This embodiment uses the following method to identify multiple correctanswers:If (1903) a record has the flag: “the question is unnecessary”, or hasan empty question field; then match (1905) a received answer to nextrecord in R4DB There may be cases where determination can be madewithout presenting every question.

For example, there is the case which the identity of the party can bejudged with the first question.

If the sum (1906) of mark reaches a predetermined sum, the question andanswer will be finished (1907).This embodiment has a mechanism to finish the question and answer early;that is if the sum of mark reaches a predetermined sum, the question andanswer will be finished.The electronic secretary that carries out this provides means ofreceiving response in different formats. For instance, if the responseis dial tone, the system provides means of recognizing the dial tone.

Callers can be distinguished by the ID numbers or passwords that areissued by Users. Communication is possible from any indefinite callingterminal by using ID numbers.

FIG. 21 illustrates the constitution of another embodiment of thepresent invention.

The electronic secretary and the direction-files are installed in theserver 2101 at the side of communication service providers.The electronic secretary can be used by multiple Users, and each Userhas his own direction-file. The. User inputs (2120) information forconstructing the User's own direction-file by arbitrary client terminal2103 or telephone.Communication requests or control commands are sent (2110) frominitiator terminal 2102 via the electronic secretary.

FIG. 22 illustrates the constitution of another embodiment of thepresent invention.

The electronic secretary has means of accessing (2230) thedirection-file via network; one User uses multiple electronicsecretaries (2201, 2204). The multiple electronic secretaries access onedirection-file 103.Reference numeral 2240 shows an email delivered via server 2204.A 5th RuleSet (cf. FIG. 24, R5DB) that the electronic secretaries makeis also stored in the direction-file 103.

FIG. 24 illustrates the layout of record of the database (hereafterreferred tows R5DB) that stores one embodiment of the 5th RuleSet onrecipient, sent time, and Treatment.

FIG. 23 is a flowchart of sending processing part of another embodimentof the embodiment mentioned in explanation of FIG. 3.

The direction-file further includes a set of the 5th rules (hereafterreferred also as 5th RuleSet); the 5th rule includes a condition-partand an action-part, the condition-part has an application condition on arecipient ID and a sent time, and the action-part orders execution of anaction corresponding to a Treatment.The electronic secretary is also capable of the following actions:(a) applying the 5th RuleSet,(b) sending a communication request to recipient and receiving aTreatment from the recipient, and(c) creating a 5th rule and adding it to the 5th RuleSet.

The electronic secretary searches 5th RuleSet on recipient ID, senttime, and Treatment to find a rule whose condition is satisfied, tests(2301, 2302) to determine whether a corresponding rule is found.

When found, it processes (2304) the sending request according to theTreatment of found rule.When not found, it sends a communication request to recipient and triesto receive (2303) a Treatment from the receiving-side.If the receiving-side is an electronic secretary provided by the presentinvention, specified return codes indicate Treatment.The electronic secretary of sending tests the return codes;communication is continued (2305, 2306).If the receiving-side employs conventional technologies, e.g. aconventional email server, preferably permanent error codes are regardedas the communication-inhibition Treatment.

When the Treatment received is “not able to permit communication now”Treatment, a 5th rule is created based on recipient ID, sent time, andTreatment, and it is added (2307) to the 5th RuleSet,

The primary purpose of this embodiment is to stop unsolicitedcommunication at the outbreak source.Preferably, the invention is operated at server side as illustrated inFIGS. 21 and 22. Initiators cannot prevent the input (2307) of aTreatment; the Treatment includes communication-inhibition or the “notable to permit communication now”.

When the Treatment given by the receiving-side iscommunication-inhibition, repeated communication requests duringpredetermined amount of time are blocked.

Preferably, the administrator of the server sets the amount of time.When a Treatment such as “call me again after one hour” is given, it canbe carried out at the sender's server.When RSDB is not cleared, the number of RSDB record of an initiator whosent a large amount of unsolicited communication indiscriminately willbecome big. According to the number of RSDB record, the administrator ofthe server can lower the transmission efficiency of the initiator, orcan give warning to the initiator.

For sending communication requests from the inside, Treatment processingis executed with a 1st RuleSet set by the User of the terminal forsending.

Attention should be paid to the point that the 1st RuleSet for sendingand the 5th RuleSet have different purposes.

In embodiments of the present invention, because the recipient (User)determines whether the communication is allowed, connection betweensubscriber ID such as telephone numbers and identity of User isseparable.

Only the persons within the group of trusted callers can be connected.An effect such as a private network in the public network can beachieved.The present invention can refuse a communication even if the other partyknows the subscriber ID that the recipient has been using, unless therecipient itself deliberately publishes true identity; it is possible tomaintain anonymity while using normal telephone numbers.Besides, the anonymous communication that all communication functionsare easily usable can be realized.However, two parties who have not communication relation at all needmediator to start communication.

FIG. 25 illustrates one embodiment system of the present invention thatmediates between Users of electronic secretary in order to beginanonymous communication.

A first party and a second party are Users of the electronic secretary.The electronic secretary operates between terminal and the network asshown in FIG. 1, and is incorporated into Users terminal or server 2101that provide communication service (it is not shown in FIG. 25).A first and second data are respectively the personal information of thefirst and second party. This information is shown in FIG. 26 thatdescribes PDDB, and they include party ID such as telephone number,name, pseudonym, address, education history, employment history, etc.Server system 2503 stores personal information of party hoping for theanonymous communication in PDDB, and provides service such as searchingcommunication partner in order to begin the anonymous communication.

FIG. 26 illustrates layout of record for party data database (hereafterreferred to as PDDB), that is one embodiment concerning party data.Other than PDDB, refer to example 3 for another embodiment concerningparty data.

FIG. 27 is a partial flowchart of processing of the first party. FIG. 28is a partial flowchart of processing of the second party. FIG. 29 is aflowchart of processing of searching, data sending, and Treatmentconfiguration of the server 2503.

Multiple parties can use this embodiment at the same time. In followingdescriptions, it is assumed that the first party inputs a Treatment togives to a partner into PDDB, give (2702) avicarious-execution-permission Treatment to server 2503, and the secondparty sends (2802) search requests to the server 2503.

The first and second party input the first and second party data and atleast one party rule for releasing the data to server 2503; and givescommunication-permission Treatment to the server by terminal 2501, 2502,respectively (2510, 2511, 2701, and 2801). Server 2503 receives partydata and party rules, and stores (2901) them in PDDB.

Party rules are stored in authorization profile of PDDB. The rulesinclude profiles of candidates to which the party will and will notrelease data. The rules also include whether confirmations are necessaryor not before releasing data. The rules also include information as towhat information will be released.The second party sends (2512, 2802) search request including searchcriterion.Server 2503 receives it, searches (2902) PDDB, and sends (2803, 2903)search results such as the number of found records to the second party.The server first tests to determine (2904) whether the first datasatisfies search criterions; if there is a first data that satisfied thecriterion, tests to determine (2905) whether first-party rule issatisfied, if yes, sends (2513, 2803, 2906) first data to second party.If the first party gives vicarious-execution-permission Treatment toserver 2503, when a Treatment for giving to a second party has beeninput into PDDB, and when the first data will be released to the secondparty, server 2503 gives (2513, 2907) the Treatment to the second partyon behalf of the first party.Server 2503 tests (2908) to determine whether the second party rule issatisfied, if yes, sends (2514, 2703, 2909) second party data to thefirst party.

Before releasing party information, the confirmation of the party may beincluded as a necessary condition in party rule.

If a User's direction-file is stored in server 2101 in a network, server2503 logs in to server 2101 using the access-permitting-information (IDand a password), and inputs data into the direction-file.

Vicarious-execution-permission is realized by server 2503 modifying aparty's direction-file using access-permitting-information given by theparty; or it is realized by giving a use-permission Treatment ofresources including passwords of the party to server 2503.

If the direction-file is stored locally, Vicarious-execution-permissionis realized by using an information-transmission-permission Treatmentgiven by the party to server 2503, and modifying local direction-file.

A searching process to intermediate for starting anonymous communicationis made public by U.S. Pat. No. 5,884,270, Walker, et al. Mar. 16, 1999.

It is preferable to give communication-permission Treatment to akeyword-information of a partner, i.e., to teach a password or a IDnumber for anonymous communication to the partner.

When the User wants to break off the communication relation, it is notnecessary to store the partner's ID such as telephone number on ablacklist. It is good to delete the ID number.

FIG. 30 is a conception diagram showing the structure of anotherembodiment of the present invention. Means illustrated are equipped asnecessary, and it is not a meaning comprising all simultaneously.

A User of mobile terminal 3001 gave position-obtaining-permission toinitiator of terminal-A 3002. Terminal-A issues a command 3011 forobtaining position information, the mobile terminal follows the commandand obtains position information from installed means of obtainingposition information, and transmits (3012) the information toterminal-A.

The position information includes a member (hereafter referred to as“concrete-position”) of the group consisting of received GPS (GlobalPositioning System) position signal, position information converted bythe GPS position signal, current position information of PHS (Personalhandy phone) terminals, and position information of mobile terminalsbased on position information offered by mobile phone base stations.

The concrete-position includes a member of the group consisting of GPSposition signal received from GPS satellite 3004, position informationconverted by the GPS position signal, current position information basedon position information offered by PHS terminals base station 3005, andposition information of mobile terminals based on position informationoffered by mobile phone base station 3006.

When the mobile terminal apparatus (hereafter referred to as “mobileterminal”) issues a communication request to terminal-A, whose ID ispre-registered in the mobile terminal, the mobile terminal detects theposition information and transmits it to terminal-A (3014), andtransmits a travel plan information to terminal-A, and further givesTreatment of (a) information-transmission-permission, and (b)attention-attracting-permission to terminal-A.

Terminal-A transmits information to the mobile terminal, outputsinformation to the mobile terminal's information-display means, andattracts (3015) attention of the party nearby with the mobile terminal'sattention-attracting means.

For example, in the case of groups who will like notifications ofpositions of each other such as vehicles or mountain climbing personsmoving nearby, the members of the group can display positions of eachother.

Terminal-A that speed-obtaining-permission was given can obtain speed ofthe mobile terminal in the same way as the command for obtainingposition information.Then only when it is necessary, terminal-A can get movement informationfrom the mobile terminal.

The attracting attention includes making the mobile terminal make sound,light, or vibration.

The travel plan information includes a arrival destination information,the information to transmit to the mobile terminal includes a member ofthe group consisting of map information, recommended route information,current route information, traffic congestion information that is aheadof the current position, detouring information, and weather information.The above position information includes the concrete-position.Terminal-B 3003 carries out normal bidirectional communication (3013)with the mobile terminal.

FIG. 31a is a flowchart of another embodiment of the present inventionabout dynamic route guidance (cf. FIG. 30).

The purpose of the embodiment is to provide efficient vehicle navigationfunctionalities to mobile terminal that has means of obtaining positioninformation, for example, mobile phone with GPS.When the mobile terminal issues a communication request to a fixedserver terminal whose ID is pre-registered, it transmits detectedcurrent position information and destination information to the server;and the server receives (3101) it.The server then searches recommended route and sends (3102) it to themobile terminal; then searches (3103) the traffic congestion informationon the recommended route at a certain intervals, tests (3104) todetermine whether there is traffic congestion;if yes, the server that the position-obtaining-permission Treatment wasgiven obtains position of mobile terminal and verifies (3105) itsadvancing route, and if the traffic congestion is ahead of the terminalon the advancing route, the server searches (3106-3107) a bypass route,if there exists a bypass, the server thatinformation-transmission-permission and attention-attracting-permissionTreatment were given sends the bypass information to the mobileterminal, and then notifies (3108) the attention of the driver by sound.

A searching of route needs a lot of computational complexity and speed.

It is not efficient to search dynamic traffic information from a mobileterminal.This embodiment leaves the operation that a cheap mobile terminal cannotdo to the server, and only when there are traffic congestions in whichthe driver will probably be caught, the bypass information is notifiedto the driver through the mobile terminal.By giving control-permission Treatment to the server, the receiving-sidedriver needs not to operate the mobile terminal manually.

FIG. 32 is a conception diagram of an embodiment of the presentinvention about position information, et cetera.

Upon detection of changes in position information, mobile terminal 3001transmits (3211) the changed position information to Terminal-A 3002whose ID is pre-registered.Terminal-A gives information-transmission-permission andattention-attracting-permission Treatment to the mobile terminal.Control-permission includes hearing-permission. It is suppose that theowner of the mobile terminal gave hearing-permission andmonitor-permission Treatment to Terminal-A.

Terminal-A issues (3221) communication requests, hearing commands, ormonitor commands.

According to the commands, the mobile terminal sends (3222) soundsignals obtained from installed mouthpiece, or image signals obtainedfrom cameras, to Terminal-A.This embodiment can be used on a mobile terminal to watch children. Forexample, parents can be informed of the child's location, and hear whatis happening around the child playing in the park, or attending school,and so on.When the child is commuting, the changes of the child's position areautomatically sent to Terminal-A of the parents.Preferably, the mobile terminal is PHS; transmission of information isdone using packet-based email.Preferably, Terminal-A is a personal computer with direct connectionwith the Internet using ADSL lines, displaying the child's position withmap information in real time.The same system can also be used to prevent car thievery. It can beconfigured to send warning to the owner, and to chase when there isunexpected change of position.When higher precision of the position information is necessary such aswhen the system is used in taxies or the transport business, it ispreferable to use position-obtaining means of GPS.

Conventionally, there are technologies that a caller obtains positioninformation of a callee party mobile phone.

However, there are problems that the caller (control-authority-caller)who can obtain position information was fixed at the design stage of theterminal in the above technologies.The User of the terminal cannot change, add, or delete the abovecontrol-authority-caller.Therefore, an end user using position information of the above terminalcannot obtain the position information when the terminal is notconnected through the above fixed control-authority-caller.In other words, a service center corresponding to thecontrol-authority-caller is indispensable.

According to this embodiment of the present invention, the User can givea control-permission (position-obtaining-permission) Treatment to anycaller whom the User decides; can change, add, or delete the address ofcontrol-permission (control-authority-caller) in the list (the 1stRuleSet) freely; and the end user to whom control-permission Treatmentwas given can obtain position information of the callee party terminaldirectly.

Because a service center of a third party is not necessary, a positioninformation system embodying the present invention differs from theabove conventional technology structurally. Because it is simplestructurally, the economic effect is obvious.

A cost is necessary besides a usual mobile phone bill in order to obtainposition information of a GPS mobile phone in Japan now. The minimumcost of position-information-obtaining service of theposition-information-center of KDDI Co. is 3,000 Japanese Yen everymonth (Japanese KDDI CORPORATION, GPS MAP,http://www.kddi.com/business/solution/mobile/gps/index.html 2004.10.17searched).

Center systems of position information for locating elderly people whoget lost appeared several years ago.

Even if there are not the conventional systems, the User can freelylocate its family who carry the mobile terminal 3001 to be shown in FIG.30, 32 when it is necessary.

Models of mobile phone that have displays such as liquid crystaldisplays that display position information of itself was alreadycommercialized.

The increase of the cost for using this embodiment of the presentinvention in these models is only to change control programs. Becausedata of an origin for display can be obtained from the mobile phone ofthe partner, and the data can be displayed by displays means of itself,it is not necessary to increase hardware of these models of mobilephones.

In addition, when the data is the time information (position signal) ofhighly precise atomic clock from the GPS satellite that cannot bedirectly used for display, conventionally, the position information istransmitted to an arithmetic unit, and then the operation result isreceived, and it is displayed. This embodiment can use the operationresult of the similar arithmetic unit.

There is also a disclosing technology for exchanging positioninformation between the mobile terminals that are not connected througha position information center.

However, Users of the above technology cannot choose partners who can orcannot obtain position information.

For example, there is not the function that only parents can obtainposition information of the children. It can be supposed that there isnot a parent letting a child use such a terminal of the abovetechnology, because have the danger that a criminal may know theposition of the child.

Instead of controlling the GPS receiver of the above mobile phone, thisembodiment can control cameras of a TV telephone and microphones andbells of general telephone, too. It is impossible to realize thefunction of this embodiment that can do the following things by simplycombining conventional technologies.

(a). When it is necessary, hearing the sound of a classroom of a childduring class time or catching sight of the classroom.

In the case of conventional mobile phone, when the terminal that thechild carries is being called, ringing bell will cause confusion ofclassroom.

(b). watching a baby-sitter that is at the User's home with a TVtelephone for preventing child abuse; and so on.

In the case of a conventional. TV telephone, when a watched person doesnot receive the TV telephone, the person cannot be watched.

Example 1 Autoanswer Multifunction Telephone (3301)

FIG. 33 illustrates a block diagram of the structure of the machine ofthis example. Reference numeral 17 shows a microphone and a speaker.FIGS. 34-37 illustrate TDB, R1DB, R2DB, and R4DB of this example.

Presentation information is questions to be asked to callers(initiators). The questions are pre-recorded in sound files.In this example, an empty question field means that the question tocallers is unnecessary. A specified mark for early finishing thequestion and answer early is 3. C.f. FIG. 19, 1907. As a save condition,the sum of the mark is 5. If the condition is satisfied, the machineautomatically gives the Treatment of the action-part of the 2nd rule tothe caller. C.f. FIG. 15, 1509, 1510.

FIG. 38 is the outline flowchart of the processing of this example, andbasic portions are the same as FIG. 15. 3801-3810 are equivalent to1501-1510, and 3811 is the question and marking process that seems to beshown in FIG. 19.

The User terminal in this example can be realized as telephone itself,or as add-on adapter component for telephone, or installed as softwareinto personal computers.Upon receiving a call from an unknown number, a pre-recorded message isplayed, and the caller uses the push button on the telephone for answer.Treatments are decided based on the answers.

Various functions can be set from a basic anti-unsolicited communicationfunction. In this example, the setting of the direction-file can realizethe following function:

For each caller's phone number there is specified receiving (TreatmentID=4), refusal receiving (Treatment ID=1), and for unknown caller, sincecommunication-verification is required, the phone line is connectedimmediately without ringing the bell.This way, unknown callers are charged immediately for a call each timethey call, so sanctions on economy can be given a caller of anunsuccessful call from an automatic calling machine.(The unsuccessful call is an act that cancels the call before the calleepicks up the receiver. Before the charge for the call is billed, onlythe caller's number is left in the memory of the callee's telephone, anda callback of the callee is aimed. It is overused by an act of fraud toask “the use charges of information” to the person who did thecallback.)Because there is not an answer to be correct from the caller of theunsuccessful call, the total mark will be zero, Treatment ID zero, sothey are refused, without leaving any traces on history of incomingcall.

However, for callers with permission, upon incoming call, the bell willring as usual, and the caller will not be billed until the callee picksup the receiver.

When a name of a recipient is made a mistake in by the first question,it is refused the reception promptly.When 4 is put by choosing: “I have another business”, then the secondquestion is sent out, which asks the caller which category of productsthe caller wants to sell. for real estate press 1, for English coursepress 2, for daily use goods press 3, for sports goods press 4, and forother business press 5.According to selected category and User's preference, the machine mayring the bell, may not ring the bell but start recording, may hang up,may or may not leave the caller's number in history.When the secret code “5678” is pressed by caller, the machineautomatically connects the line without ringing the bell, so as torealize the hearing-permission, which can be used to hear sound ofbaby-sitter or child in the house when out.For example, in the case of a cellular phone for children, the parentscan choose for hearing or for speaking over the phone.

The first question in this example is quite simple, but it may beconfigured in a more sophisticated way.

For example, the machine can be configured to ask first name and lastname in two questions (the second question is only asked when the callerknew correct answer of the first question), when five alternatives areeach presented, if the reply is nonsense, then the probability that thereply is correct falls to one-25th.

The answers can also be configured in a more sophisticated way.

For example, the “secret code” can be named “extension number”, and ifone sets the guidance information to “please press the extensionnumber”, if the person knows the extension number, he can call inregardless of from which telephone he is calling.

When a Treatment was given to caller's number of house telephone member,the message “or please enter your home phone number” can be added to theguidance message so that when someone whose home phone number is givenwith a Treatment, calls from a public phone, he can receive the sameTreatment of calling from his home phone by entering his home phonenumber.

The actual method used in applying-for-Treatment differs according tocommunication device the callee uses.

As long as the purpose of the applying-for-Treatment is achieve, variousmethods such as voice recognition, image recognition can be used.

FIG. 39 illustrates one example of action of the machine which gives theTreatment of ordinary communication to a party throughautoSetting-permission Treatment. In this example, the electronicsecretary accepts the directions from the User in the form of rules andmarks, but it is also possible to do so through natural language. Forexample, “I will receive call from people who know my name”, or “I willreceive sales call from used car sellers.”

By using conventional technologies (for example, U.S. Pat. No. 6,070,149Tavor, et al. May 30, 2000) of rule base, the secretary can hear theserequests, and lets User input insufficient information, so that anecessary rule can be organized.

Reference numeral 21 shows a control unit of an electronic lock, andreference numeral 22 shows the electronic lock of a controlledapparatus.

When the code “8765” is pressed, the mark is 10, the Treatment ID is 6,then a unlocking signal is output, and the unlocking of the entrancedoor is done.Besides a telephone line, telecommunication line for the unlocking mayuse a short distance communications means such as infrared rays.

FIG. 40 shows a simple Treatment-set. Using the simple Treatment-set andomitting the control unit 21, this example can become an example ofmachine having an answering machine function.

The default-Treatment is “pretending to be out”, when unknown callercalls in, the default-Treatment is used, so it is not necessary to pickup the receiver directly.This way, fraud targeting weak or elderly people can be avoided.Excepting the case of business using for indefinite customers, it issuitable to Users having a communication range limited to some degree.A call from an outsider without communication-permission or a party thatthe User does not already want to speak over the phone can be refused.With the accumulation of the use time, the setting of the Treatment iscompleted naturally, and the User can achieve its purpose without anexcessive burden.

It is preferable to devise operability, such as that the number of acaller can be easily registered (give a Treatment) with one button.Users may want to give Treatment in advance to important people whosecall he needs to receive.

A call such as sales that is not against intention of the callee can beaccepted temporarily by the “pretending to be out” Treatment.

Existing communication relation with a specified party can be cut off bythe “Hang up” Treatment.

This example is simple and cost effective. It can be realized asexternal adapter that can be connected between line and existingtelephone. It can be installed at telephone switchboard or at providerof related services, too.

This example can prevent unsolicited calls without sacrificing mostfunction of a conventional telephone.

Example 2 Electron Secretary for Email Terminal

This example was installed as an add-on software programs at the clientterminal for receiving or sending electronic mail messages. This examplehas been released as an application software product for PersonalComputers (URL: http://www.netinfotech.co.jp, http://www.emailship.com).In the compact disk, directory /Emailship/Config, 12 files, 245,281bytes; directory/Emailship/SafeMail, 13 files, 171,924 bytes; anddirectory/Emailship/State, four files, 21,527 bytes are one part of itssource cord.

FIG. 41 illustrates a block diagram of the structure of this example. Inthis figure, reference numeral 10 shows a server apparatus of ISP.Reference numeral 411 shows a personal computer. This example is aclient of an email service server of ISP. This example is a client of anemail service server of ISP. Reference numeral 11 is a processor,control of each part, transfer of data, various kinds of operation, andtemporary saving of data are done.

Reference numeral 12 shows input and output control means. It controlsthe data inputting from the server connected via the telecommunicationline and outputting to the server.Reference numeral 15 shows a communication device, and ISP is connectedto it.Reference numeral 16 shows a keyboard and a display, and referencenumeral 13 shows a storage device.

First, the programs of this example, which are composed of aconfiguration program for editing the direction-file and a main programof the electronic secretary itself, are run in processor 11. Thedirection-file includes Treatment, default-Treatment, questions forverifying a request, and correct answers (key words).

Second, the direction-file is stored in storage device 13 that is a harddisk drive. FIG. 42-45 illustrate TDB, R1DB, R2DB and GDB respectively.

A sender is replied to with presentation information automatically. Thebasic parts of outline flowchart of receiving processing are the same asFIG. 9.

Processor 11 displays the screen which seems to be shown in FIG. 46 atthe display of personal computer 411, in order to let User input thepresentation information (4601), the questions for verifying thecommunication request, correct answers, and Treatments to give to thecorrect, answers, that is the 2nd RuleSet (4602).

When an email from a sender without permission was received by theserver, the sender is automatically answered with the questions and thepresentation information for guiding application for the permission.In the presentation information, it is asked for entering the answers ofthe questions in the subject of a reply email.

A lot of unsolicited emails were transmitted automatically withprograms.

For example, “What is one plus one?” may be set to one question. Ifcorrect answer “two” or “2” is received, it can be confirmed that thesender is human and probably not a program.The method of processing is different when the sender is an automaticsending program. For a human sender, the recipient can decide by one'sintention whether the future reception is hoped.Of course many programs can compute 1+1, but it is not fit profit towrite a program that can understand all the different questions fromeach different recipient in natural language.

This example can achieve its object without opening the email.

This feature will save considerably the communication charge induced byreceiving the whole email from server, especially in the case of mobiledevices.If acceptable answers set in the direction-file by the recipient, forexample the full name of the recipient or keywords of interest of therecipient, are detected from the subject or body of arrived email, thenrespective Treatment is given, without the auto-replying process. I.e. apermission application procedure is done tacitly; the sender can befacilitated.In case of to detect answers from not only the subject but also the bodyof email, preferably the electronic secretary should be run at emailserver side.

Processor 11 displays in display of terminal 411 screen such as FIG. 47,in order to let the User to choose default-Treatment 4702 from a list ofTreatment 4701.

FIG. 42 shows the Treatment-set used in this example and the concreterealization of the communication-verification Treatment is: “Reply withquestions for verifying and refuse to receive the email”.When necessary, Treatment such as “Reply with questions for verifyingand only receive the subject of the email” can be added.

The example of Treatment of partially permitting communication is“Receive the limited size, store the partial email in temporary folder,and notify the recipient”.

It is “Receive” Treatment to be necessary for further examination bymanual operation.The “Receive and give the “Receive” Treatment to it” Treatment receive aemail and give the “Receive” Treatment to the sender after receiving it,that is this is an example of the autoSetting-permission Treatment.Default-Treatment is “Reply with questions for verifying and refuse toreceive the email”.When a email is arrived from an unknown email address, the systemreplies with questions for verifying and refuses to receive the email.

As the initial setting of this example as the product, the Treatment(Treatment ID=4) of permitting receiving is given to every address onthe existing address book of existing email client software by pushingbutton 4703.

The User may also individually modify or add each address or each domainname (group of addresses) to the list 4704 (That is the 1st RuleSet) andassociated Treatment any time.In addition, an address is extracted from the email that the User sent,and it can be given with the Treatment of permitting receivingautomatically.

FIG. 42-45 illustrates one configuration of the direction-file. Thisconfiguration achieves the following functionalities:

Emails of a predetermined address or domain are received (TreatmentID=4).Emails of a predetermined address or domain are refused (TreatmentID=1).Unsolicited emails that are transmitted automatically with programs arerefused (Treatment ID=2).In the case of persons who can answer the question: “1+1=?”, but have norelation to the recipient, emails from the persons are received withsize limitation and wait for manual Treatment assignment. (TreatmentID=3).In the case of persons knowing the name of the recipient, the Treatmentof permitting receiving is given to the sender after receiving the emailwhich the persons sent. (Treatment ID=5).

This example handles multiple languages of the presentation informationaccording to encoding information included in the email header andsuffix of domain names of sender's email address.

Example 3 Internet Videophone and Monitor System

This example is a completed system composed of an electronic secretaryoperating at server, and client side videophone programs thatcommunicate via the electronic secretary. In the compact disk Copy1 thedirectory /VCALL is one part of the source cord of the electronicsecretary, and the directory /iphone is one part of a source cord of thevideophone terminal.

1. FIG. 48 illustrates a block diagram of the overall structure. FIG. 49illustrates a block diagram of the structure.

Server 480 is connected to the Internet via router and communicationline.Various terminals 481-484 etc. are also connected to the Internet. Theseterminals are equipped with output units such as displays and speakersas well as input units such as keyboards, mouse, cameras andmicrophones. These terminals are also equipped with means of executingvideophone programs.

1-1. The detailed structure of server 480.

FIG. 49 shows a block diagram of the structure of server 480 andterminals, where Reference numeral 11 is a processor including CPU,control of each part, transfer of data, various kinds of operation, andtemporary saving of data are done.Reference numeral 12 shows input and output control means. It controlsthe data inputting from the server connected via the Internet andoutputting to the server.Reference numeral 15 is a communication transfer means connected to theInternet.Reference numeral 13 and 14 are storage devices storing the followingfiles.

First, in storage device 14, a main program is memorized, which is runin processor 11.

The main program including: a program for displaying anapplying-for-Treatment screen at a terminal's display; a program forTreatment examination, which display detailed information of the partywho did applying-for-Treatment; and a program for starting avideophone-program.

The program displays an icon to send a communication request to apartner, pseudonyms of parties who did applying-for-Treatment to amembers list of the User, and status of parties.

Next, in storage device 13, User-master-database-table andTreatment-relation-master-database-table are stored.

User-master-database-table stores multiple User information records,each of which comprises User ID, password, email address, IP address,self PR and other User predetermined information (another one exampleabout User data refers to PDDB).

The User ID is automatically assigned by processor 11 upon the finish ofservice sign up procedure. The password, email address, and self PRfields store information sent by Users from terminal 481, 482 arestored.

The IP address field stores address information sent by the videophoneclient side programs at terminal 481, 482 . . . , upon launch.

Treatment-relation master table stores multiple Treatment informationrecords, each of which comprises Treatment information and a flag ofapplying-for-Treatment.

FIG. 50 illustrates the layout of record of the Treatment-relationmaster database (hereafter referred to as TRDB) that stores oneembodiment of the Treatment-relation. An electronic secretary operatingin client-side records Treatments those give to partners by R1DB.

When an electronic secretary is operated in the server-side, preferablyeffective the Treatment-relation master table TRDB is used.Treatment information comprises a callee ID, a caller ID, and aTreatment given by the callee. The Treatment information andapplying-for-Treatment flags are based on an input from terminal 481,482 . . . .The input is done via User interface of the program for displaying theapplying-for-Treatment screen.

2. Operation.

Each terminal 481, 482 . . . may connect to server 480 simultaneouslyand functions as User terminal.I assume that terminal 481 is connected to server 480.When this happens, main program run by processor 11 detects thisconnection through input output control means 12, and displays screen atterminal 481 and receives input from the terminal.FIG. 51 shows a flowchart describing the operation of this main program.

2-1. In order to describe the procedure of creation of User informationrecord, I assume the person at the terminal is a new User.

At step Sa1 in FIG. 51, processor 11 displays a main menu screen such asshown in FIG. 52 at terminal 481, and let the User to choose “login” or“create account”.

In the main menu screen, mouse cursor mc is displayed, various kinds ofoperation gets possible to be done by clicking a predetermined place.For example, the displayed processing concerned is done if link button5201 or 5202 is clicked.

The User at the terminal first place mouse cursor MC at link button 5202on the screen, and click a mouse button to choose “create account”. Theprocessor 11 detected this, and then proceeds to step Sa2 which showedin FIG. 51, where the User may input name, email address and password.

When it is determined that inputted email address is not already used byother Users in the User-master-database-table, according to inputtedinformation, a User ID is assigned by processor 11, and is used aspublic ID for that User.

In the next step Sa3, processor 11 displays members list screen as shownin FIG. 53 at terminal 481.

In step Sa4-Sa7, the User may return to members list screen and mainmenu screen by certain operation.

In the members list screen, although for User with newly createdaccount, no item is displayed, in the figures I assume there already isseveral item on the list.

First an add operation of new member is explained.

In order to communicate with a member in this example, the User does atfirst applying-for-Treatment to the member.The add operation is the actual procedure of applying-for-Treatment inthis example.The screen for adding a new member enables the User to specify Treatmentto give to the new member as well as to do applying-for-Treatment to thenew member.

For a terminal operation User, addition of a member is promoted.

When the User at the terminal clicks link button 5301, processor 11proceeds to the next step Sa4, where processor 11 displays screen (shownin FIG. 54) for adding a new member at terminal 481, and enables theUser to input public ID information.

This shows an example of applying-for-Treatment beforehand.

The public ID information was disclosed on bulletin boards or chat onthe Internet by a User self, or was taught directly from the User, or isobtained with anonymous communication embodiment to show in FIG. 25.In the screen for adding new member, ID input box 5401 and selfintroduction input box 5402 are shown;about information-to-show Treatment to give to the new member,checkboxes 5403-5407 corresponding to “Show email address”, “Showprivate email address”, “Show web site address”, “Show profile address”,and “Show status information” are shown; andabout call incoming permission Treatments to give to the new member,selection box 5408 is shown. So that it let the User to input or to makechoice.The User input the public ID “200” of the new member into the “ID” box,and input “I am . . . ” into the “Self introduction” box. Then the Userclick the execute link button 5410.

In this example, for responding to videophone call incoming request,there are three Treatments (namely “Automatic refusal”, “Ask each time”,and “Automatic reception”) in the Treatment-set.

“Automatic reception” is equivalent to one of the control-permissionTreatments.The electronic secretary orders the callee's terminal (the videophone)to obey control of the caller, and the caller can communicate with thecallee's terminal without intervention of the callee.Of course it is always necessary for the callee's terminal to beconnection waiting state.

An extent of information (5409) to show to other members consists of“Show email address”, “Show private email address”, “Show web siteaddress”, “Show profile address” and “Show status information”.

The information to show to a member can be chosen among the extentarbitrarily.About applying-for-Treatment, there are two kinds:“Refuse applying-for-Treatment” and “Permit applying-for-Treatment”.The default-Treatment is “Ask each time”, to show no information and“Permit applying-for-Treatment”.The function to change default-Treatment is not included in thisexample.

The procedure does the next execution processing ofapplying-for-Treatment (cf. FIG. 55).

It is assumed that the terminal operation person is User-A, and it isassumed that the User-A wish to communicate with User-B. Public ID ofUser B is “200”.Processor 11 should process applying-for-Treatment based on theTreatment that User-B gave to User-A.At first it is checked (5501) whether there was already User-A in thecaller list of User-B by searching the User-master-database-table thatalready was made.When there was it, the Treatment that User-B gave to User-A onapplying-for-Treatment is checked (5502).When the given Treatment is “Refusal applying-for-Treatment”, processor11 displays “Addition of the member was refused” at the screen ofterminal 481, then returns to step Sa3, and displays the members listscreen again.When there is not User-A in the caller list of User-B, and when thegiven Treatment is not “Refuse applying-for-Treatment”, prescribeddefault-Treatment is given to User-A, and a new Treatment informationrecord comprises ID of User-B and User-A, the default-Treatment, and aflag of applying-for-Treatment is created and inserted intoTreatment-relation-master-database-table.Then the procedure returns to the members list screen.

In step Sa3, processor 11 displays a members list screen as shown inFIG. 53 at terminal 481. Verifying of personal setting is promoted to aUser. When the link button 5302 is clicked, processor 11 processes nextstep Sa7.

In step Sa7, processor 11 displays the personal settings screen as shownin FIG. 56 at terminal 481, displays the public ID (5601), disables thechange of public ID, and enables the User to modify personal information(5602).

2-2. Login.

It is assumed that the terminal operation person is User-A, who hascompleted the applying-for-Treatment to party B. It is also assumed thatUser-B is the operation person at terminal 482.

It is assumed that FIGS. 52 and 53 is displayed at terminal 482 (thoughFIG. 52, 53 was displayed at terminal 481 in explanation of above 2-1,in convenience these are used here) and that terminal 482 has connectedto server 480.

When terminal 482 connects to server 480, this connection is detected byinput and output control means 12; processor 11 controls terminal 482according to the main program.FIG. 57 shows a flowchart describing the operation of login of this mainprogram.

In step Sa1 in FIG. 51, processor 11 displays a main menu screen asshown in FIG. 52 at terminal 482, so as to enable the User at theterminal to choose “login” or “create account”.

In here, the User inputs an email address into “email address” input box5203, inputs a password into “password” input box 5204, and clicks linkbutton 5201 for choosing “login”. Then processor 11 that detected thissearches User-master-database-table which was already created based oninput email addresses and passwords in order to check (FIG. 57, 5701).

When processor 11 found no match, it proceeds to step Sa7 and displays“the email address or password are not right” at terminal 482, and thenreturn to step Sa1 and displays the main menu screen.

Otherwise if a match is found, it proceeds to step Sa3.

In step Sa3, processor 11 displays members list screen as shown in FIG.53 at terminal 482.

When processor 11 extracts a new applicant of Treatment fromTreatment-relation-master-database-table, notifies User-B, the pseudonym“souss” of User-A who did applying-for-Treatment is displayed (5305) inthe members list of User-B in green color.According to the information-to-show Treatments that other members gaveto User-B, processor 11 shows (5306) status of the Users with colors andicons.If a member shows its email address, email-making-icon 5303 will bedisplayed at where.If a member shows its profile address, link-icon 5304 will be displayedat where. Pencil icons are link buttons displaying detailed informationof the members.

When link button 5307 is clicked, processor 11 proceeds to step Say,where it displays a members list edit screen as shown in FIG. 58 atterminal 482, so as to display detailed information 5803 about thespecified member and to enable the User to modify Treatments 5801 togive to the specified member.

This screen enables User-B to examine the applying-for-Treatment ofUser-A and decide what Treatment to give to User-A.This screen also enables modification of Treatments given existingmembers.

After User-B selects various options of Treatments, it clicks linkbutton 5804. Then, based on chosen Treatments contents, processor 11updates. Treatment information record stored inTreatment-relation-master-database-table.

To discontinue relations with the specified member, it clicks deletelink button 5802. Then processor 11 proceeds to step Sa6, where itdisplays a Treatment application restriction options screen as shown inFIG. 59 at terminal 482.If “Refuse applying-for-Treatment” is chosen in applying-for-Treatmentqualification 5901, the communication from the member will be refused infuture.When. User-B clicks submit link button 5902, processor 11 updatesTreatment information record in Treatment-relation-master-database-tableaccording to selected options.

This example exemplifies realization of anonymous communications.

Unless the User discloses its identity itself, this example easilyrealizes anonymous communications with normal numbers (ID) without anyfunctional restrictions.There is no need for specialized communication channel or centralcontroller, in order to remove any information that would reveal theidentity of the Users.

2-3. Videophone communications

It is assumed that User-A and User-B established Treatment-relation bythe procedure described in 2-1 and 2-2, and server 480 and terminal 481,482 are connected.FIG. 60 illustrates a flowchart describing the operation of a videophoneprogram.

In step Sa3, processor 11 displays screen as shown in FIG. 53, andUser-B clicks link button 5308 “start program”.

Then, processor 11 let the terminal of User-B start the videophoneprogram, with a start parameter “-”.When the videophone program is started, the program sends (6001) theterminal's IP address to server, and then tests (6002) to determinewhether an IP address is given as a start-parameter.

If no IP address is found, it starts waiting connection and displays thescreen of waiting connection as shown in FIG. 61 in step Sb3.

A connection request is checked (6005) in connection waiting state.Processor 11 updates information record of User-B inUser-master-database-table according to the IP address sent, by thevideophone program from terminal of User-B.

Then, Processor 11 displays at the member screen of User-A a camera icon(FIG. 53, 5309) indicating the status of User-B.

When User-A clicks the camera icon 5309 of User-B, processor 11 extractsthe IP address of User-B, lets terminal 481 of User-A start thevideophone program, gives (6003) the IP address and caller ID asstart-parameters, lets the program connects to the IP address.The program originates a call to User-B, and receives (6004) a responsefrom the videophone program of User-B.

When User-B's videophone program receives a connection request, it usesthe received caller ID as parameter to query processor 11 at server.Processor 11 extracts (6006) the Treatment information fromTreatment-relation-master-database-table of server 480 based on thereceived caller ID, and returns the Treatment given to User-A to thevideophone program.

If the Treatment is “Automatic reception” (6007, YES), the electronicsecretary indicate to the callee side's videophone program that thecaller has control authority; as the result of this indication, theprogram permits the communication request, sends out the response ofconnection permission, and starts sending image signals from the camerato the caller's program automatically, i.e. sends image signals, and ifthe caller's image signals is received, displays the image in the screenof videophone as shown in FIG. 62 in step Sb2 simultaneously;

in this case, the connection is without ringing as well as withoutdisplaying the screen that ask for connection permission.

On the other side, the videophone program of caller User-A receivespermission response, and through step 6004 and 6009, displays receivedimage-signals, and let the User to talk or watch in step Sb2.

If the Treatment given to the caller User-A is “Ask each time”, (FIG.60, 6008, YES), then the videophone program of callee User-B notifiescallee by ringing sound, and displays a screen including a message“Incoming call from User-A, receive?” in step Sb4, in order to askUser-B whether to connect.

At the same time, the videophone program at the caller side displays aAt the same time, the videophone program at the caller side displays apermitting waiting screen with a message “waiting the callee to receivethe call” at step Sb1.

When callee User-B permit (FIG. 60, 6010, YES) the call, the program atcallee User-B's side notifies the program at caller User-A's side thepermission, then the caller side's program judges (6009, YES) thisresponse, and start a videophone session between two side.

If callee User-B refuses to receive the call, (FIG. 60, 6010, NO), thevideophone program returns to connection waiting state, and notifies theprogram at caller User-A's side of the refusal.

Then the program executing at the terminal of caller User-A judges(6009, NO) the response, and displays a screen at the terminal of User-Awith a message “The call was refused” (FIG. 61, 6102, FIG. 60, 6011),and then returns to connection waiting state in step Sb3 of the screenas shown in FIG. 61.If the Treatment given to caller User-A is “Automatic refusal”, (FIG.60, 6008, NO), the program automatically perform the same procedure asif the callee chose to refuse to receive the call.

3. Brief explanation of the flow

FIG. 63 illustrates the flow of establishing Treatment-relation with acallee through public ID.

In order to receive communication service of this example, User-A usingterminal 6301 logs in to server 6302 via the Internet, and makes (1)Applying-for-Treatment using a public ID 200 disclosed by User-B, inorder to assert the intention to communicate with User-B.

The applicant User-A enters the public ID: 200 of party User-B at box5401 of FIG. 54, and at the same time, User-A gives the Treatment “Askeach time” (selection box 5408) to User-B.

The server stores (6303) the Treatment “Ask each time” given by User-Ato User-B in Treatment-relation-master-database-table, and if User-Adoes not exist as an entry in User-B's caller list, the server gives(6304) the default-Treatment (Automatic refusal) configured by User-B toUser-A.

In this state, User-B can initiate a call, and communicate to User-A.But User-A cannot communicate to User-B in the reverse direction. As aresult, the callee holds leadership.

The server returns (3, 4) confirmation that it has receivedapplying-for-Treatment of User-A. When User-B logs in to the server fromterminal 6305, the server extracts pending applications of Treatment,and notifies (5 to 8) User-B, in the User-B's members list screen as inFIG. 53, pending Treatment applicant User-A's pseudonym “souss” isdisplayed (5305) in green, and other User's status are disclosed (5306)in the screen by colors and icons, according to the information-to-showTreatment given by each Users to User-B.

The screen as in FIG. 58 displays a detailed information of User-A whohas made the applying-for-Treatment to User-B.

User-B examines the applying-for-Treatment, and decides (FIG. 58, 5801)the Treatment to be given to User-A.The Treatment (“Automatic refusal”) memorized in the server is replaced(10) with the Treatment (“Ask each time”) given to User-A.As the result, both User-A and User-B can initiate video telephonerequest to each other.

This example can give anyone or plural callers the control-permissionTreatment.

The caller can control the camera of callee's videophone directly, canstart the image transfer program of the callee side, and can transferdata between both.Instead of control of cameras of this example, it can be executed forcontrol of GPS receivers of mobile phones by the same method.

Example 4 Email Server Electron Secretary

FIG. 64 illustrates a block diagram of this example, which demonstratesoperation of the electronic secretary 6401 at the email server side atISP 6412.

The electronic secretary which is independent of existing email servertransmits received email messages with permission to existing emailserver 6402.FIG. 65A-D, 66A-D show a example of a setting of direction-files.Email messages sent from clients of ISP 6412 are directly handled by theelectronic secretary.

For business contact addresses of organizations providing services togeneral public, upon arrival of a message without communicationpermission given beforehand, the electronic secretary 6401 replies towith a guidance email message including information and keywords aboutthe organization or provided services, and then refuses to receive themessage, unless by applying the 2nd rules after receiving header of themessage, predetermined keyword is found from the arrived message.

For example, It is assumed the contact email address for applicantregistration at Japan Patent Office (JPO) is “PA1670@jpo.go.jp”(abbreviated as reference mark “F” in FIG. 64). The guidance information(FIG. 65B) for this address is set to

“This address is the inquiry address of application registration atJapan Patent Office. If you need to send message to this address, pleaseput the phrase “inquiry about application registration” in the subjectof the email and send it again”,a rule of giving a temporary-receiving-permission (an email is received,but a Treatment is not given to the sender. cf. FIG. 65A 65C, ID=5) tothe keyword: “inquiry about application registration” is inputted intothe 2nd RuleSet.

It is assumed that the email address of the applicant of terminal 6404is fe1@netinfotech.co.jp (FIG. 64, reference mark “A”), the applicantobtains the inquiry email address from the website of the patent office.

Preferably the guidance information is posted in the website.Then the applicant will send an email to “PA1670©jpo.go.jp” (F) with thesubject “inquiry about application registration. About registrationmethod . . . ” (FIG. 64, (a1)).The electronic secretary permits the email according to the 2nd rule andtransfers it to email server 6402, and reach the mailbox of F. The replyemail (a2) from application support section is sent via the electronicsecretary.

If the applicant sends email without knowing the key phrase, theelectronic secretary immediately replies an email message including theguidance.

Even after business hours, the applicant can receive the above guidanceinformation in a short time.The course occurring by automatic reply of guidance information is fromthe applicant-sending server 6403-receiving server 6401-sending server6403-the applicant.I tested the transfer time in the real environmental: an ADSL line,servers URL: mail.netinfotech.co.jp and mail.yahoo.co.jp, from asender-a sending server-a receiving server-a recipient, the transfertime was less than five seconds.Therefore, the applicant can send a message according to the guidancewithout a delay of time almost.

Let's suppose terminal 6405 sends advertising emails (FIG. 64, (b1)To:F, oooxxx . . . ) using a program to the address F for sales.

The electronic secretary replies with guidance message (b2) and thenrefuses to receive the advertising email.In most cases the advertising emails sending programs cannot understandthe guidance and follow the instructions.

When someone intentionally attacks the recipient by sending emails thataccording to the guidance, the recipient can give thecommunication-inhibition Treatment by manual operation to the sender.

Let's suppose an attacker 6406 uses an automatic sending program, and totransmit a large quantity of emails (email bomb) (FIG. 64, (c1) To:F,oooxxx . . . ) to F frequently.

Upon arrival of the first message, the electronic secretary replies withthe guidance (c2) and refuses to receive the message.In the case that the electronic secretary using the method to show inFIG. 16 replies automatically, a 3rd rule is created based on thesender's email address, received time and predeterminedcommunication-inhibition Treatment (ID=0), and it is added to the 3rdRuleSet (FIG. 66A) for preventing attack.FIG. 66B shows the predetermined fixed numbers.The predetermined time in condition-part of the 3rd RuleSet forpreventing attack is 60 minutes, the predetermined Treatment is “Refuseto receive and do not reply”, then when the second email (c3) is sentfrom the attacker within 60 minutes, the communication-inhibitionTreatment that have not a reply (FIG. 65D) is given (FIG. 16, 1607), andattack after this is refused immediately by looking at the envelope ofemails.

Preferable variation of this invention is to add the count of emailarrival to the condition-part of the 3rd RuleSet for attack prevention.

For example, only after receiving five emails from a attacker within 60minutes, processing the communication request based on a Treatment.

This example does not allow a large quantity of useless communication tooccur in the public network, there is no worry that the communicationband is pressed, there is not the worry that a server area runs out byemail bomb attack.

By the mechanism of the 3rd RuleSet for preventing attack, there is nopossibility that the emails of an automatic reply itself have become alot of new spam mails.These points are different from a conventional art replyingautomatically simply.When the mechanism of this example is used in the client side such as amobile phone, the charged packets by unsolicited emails can be decreasedgreatly. In other words an unreasonable charge can decrease greatly.

As above, the present invention guarantees normal business operation andcompletely shuts out irrelevant emails, aggressive emails, andadvertising emails which send with programs.

A preferable variation of the present invention memorizes a list of IPaddresses of abnormal senders for refusing TCP connection with the IPaddress on that list.

If the sender is an email sending server using conventional art (an SMTPclient), the electronic secretary receives the header of the email todetermine the identity of the sender without receiving the body of theemail, forcibly breaks the communication by shutting down underlyingtransport-level connection (FIG. 14).

Conventional email sending-servers that communication is forcibly brokenwill re-try. The status of the forcibly broken are stored with anexclusive 3rd RuleSet.Upon the re-trying of the sending-server, the electronic secretarydetermines the sender's identity using stored sender's ID, so as toformally refuse receiving the email.FIG. 66C illustrates the exclusive 3rd RuleSet (R3DB2).Please note that R3DB1 and R3DB2 are separate instance of the 3rdRuleSet, they record different information. R3DB1 shown in FIG. 66A isused for preventing attack.

If the email sending-server exchanges the above conventional art, andemploys the sending client that is shown in FIG. 13, it sends (FIG. 13,1304) informational fields in header before sending body.

The electronic secretary at receiving-side receives these informationalfields and applies the 2nd RuleSet (FIGS. 11, 1106-1107 and 1109) todetermine if it allows the sender to send the body.I.e., when the communication is permitted, it is conveyed to the sendingside, and the communication can be continued (FIG. 13, 1306).Then there is not necessity to forcibly break the communications, andthis will thus further reduce wasteful communications.

If emails are sent from the electronic secretary, the unsolicitedcommunications can be prevented from sources (cf. FIG. 23).

Let's suppose that the sender (6407) D of email bombs sends an email(FIG. 64, (d1) To:A, oooxxx . . . ) to the applicant A, and theapplicant uses the electronic secretary 6403 that runs in the serverside.Electronic secretary 6403 receives (d1) the communication request.Because there is not receiving-permission, electronic secretary 6403replies (d2) with guidance information of the applicant A automatically,and refuses the reception.Electronic secretary 6401 that sent the d1 receives acommunication-inhibition Treatment from 6403, creates a 5th rule, addsit to the 5th RuleSet R5DB (FIG. 66D), and saves it to the sender D'sdirection-file.

If D attempts to send email d3 to A again within the time intervalpredetermined in the 5th RuleSet (1 day), electronic secretary 6401 willrefuse (FIG. 23, 2304) delivering the email as the result of applyingthe 5th RuleSet.

Therefore, unsolicited emails like these will be blocked at the firstsending client before it is being transferred on the Internet.For instance, if the sender uses email software like Microsoft Outlook,when he presses the send button, Outlook will immediately report thatthe transmission is not possible.

When the predetermined time of the condition-part have passed since thecreated time, the 3rd and 5th rules will be removed periodically.

Many organizations provide services to specified groups of people.

Public communication networks such as email are economical, but sincethey are open to general public, they themselves are unsuitable forproviding services only to specific group of people.The present invention provides method and systems to make publiccommunication networks suitable also for these services.

For example, the Japan Patent Office uses only postal mail to provideinquiry service of patent examination. This example suggests work by thenext email system.

Suppose the inquiry email address is E (FIG. 64, 6408). The guidanceinformation of E is set to:

“This is the inquiry address for patent examination process. If you area first time user, please put “APPLICATION NUMBER:ATTORNEY DOCKETNUMBER” to the subject, and please send it again. For example:“2003-70953:0302-001””Upon arrival of emails, by applying the 2nd RuleSet, sender who put avalid application number and an attorney docket number will be givencommunication-permission Treatment, which is stored in the first set ofrules.

“APPLICATION NUMBER:ATTORNEY DOCKET NUMBER” has the role of a passwordin the first time communication for getting the permission ofcommunication. Instead of using this scheme, password issued by thepatent office or the applicant and sent to the applicant by postalmailed may also be used.

When the Treatment ID determined by applying the 2nd RuleSet is 6 theTreatment is saved. I.e. the next-emails sent by the sender is notchecked with the password.

In some enterprise system there are a large number of people involveddynamically in the communication, so the manual input of direction-filemay be difficult. This problem is solved by the direction-file inputcomponent.

FIG. 67 illustrates the User interface of the direction-file inputcomponent. FIG. 68 illustrates the data passed from the User interfaceto the direction-file input component.

The electronic secretary 6401 operates in a computer running MicrosoftWindows Operating System.

The User can manually input some information that does not vary often,such as guidance information and configuration constants through theInternet.

The input component operates in a computer running Microsoft WindowsOperating System.

Computer 6410 running existing patent examination management systemextracts application numbers and attorney docket numbers from pendingapplication data 6411, then pass them to the component.Or when an application number is determined and is saved in managementdata, the management system calls the component to input the number intothe direction-file. Preferably the management system also calls acomponent to remove completed patent application's numbers from thedirection-file.

Therefore, the present invention provides a communication environmentthat seems to be a secure private communication network for enterpriseshaving a large number of users who are constantly changing, and withoutmanual maintenance through public Internet communication networks.

The electronic secretary 6401 directly sends emails to the Internet6413, but it may also sends (it is not shown in FIG. 64) emails otherthan automatically replied ones, via existing email server 6402; forexample, from 6408 to 6401 to 6402 to 6413.

This way, because emails transfer of the ISP inside (from 6401 to 6402)is early, queue management functionality will be no need to implementwithin the electronic secretary. The queue management functionalityprovided by existing email servers can be utilized.

Any existing email server can be used, such as Sendmail running in aUNIX base computer. This example may be used as a component of an emailserver.

Example 5 An Electronic Transactions System

FIG. 69 is a block diagram of systems and methods for electronictransactions.

In an electronic transactions system and method processing commercialtransactions between a account holder (hereafter referred to as “buyer”)and a seller, in order to do payment of planned purchases in electronictransactions,

the buyer (FIG. 69, block 6901), who holds an account (credit card ordebit card for example) in optional financial institutions or settlementinstitutions (hereafter referred to as “bank”),transmits reservation-information (FIG. 69, (A)) to reserve electronictransactions to the bank (FIG. 69, block 6903), anduses a discrimination-ID (FIG. 69, (B)) to purchase goods (FIG. 69,(G)).

FIG. 73B shows a simple example of reservation-information, data, andoperation-information.

As used herein, the terms are defined as follows:

the term “communication-ID” shall mean the communications destination tobe used to verify transaction-approval-requests with the buyer, it canbe a mobile phone number or a computer communications address;

the term “discrimination-ID” shall mean identification of a user that islinked to the buyer's account in the bank, it can be a phone number or alicense plate number;

the term “virtual-account” shall mean virtual-account that is used onlyto pay a specified type, group of sellers, or organizations, such asrailroads, toll roads, ATM withdrawals, shops or Internet shops;

the term “balance-limit” shall mean predetermined amount of a balance ofa virtual-account, a balance of a virtual-account is set to abalance-limit by reserving it;

the term “no-verification-limit” shall mean amount of payment upperlimit that may omit verification;

The term “no-verification-accumulation-limit” shall mean an amount, ifan accumulation of payments that omitted verification is more than theamount (hereafter referred to as “accumulation-excess”), then averification is required, after the verification the accumulationrestarts from zero;

the term “balance-notifying-amount” shall mean an amount of balancebelow which the buyer should be notified for reserving;

the term “auto-recovery-interval” shall mean the amount of time betweenautomatically recovering the balance to the balance-limit;

it is assumed that a discrimination-ID medium holder passes through anentrance of a toll area, and when the holder passes through an exit ofthe area, the user is demanded for payment;

the term “transaction-reservation-verifying-need-or-no” shall mean aflag that designates whether or not it is necessary to reservetransaction request of the exit with the user when the holder passesthrough the entrance;

the term “verification-information” shall mean information that to beused to verify transaction-approval-requests, theverification-information is equivalent to the password of avirtual-account;

the information that is described with the above terms,balance-notice-destinations and account passwords are thereservation-information, c.f. FIG. 73 B;

the term “balance” shall mean balance of virtual-accounts unlessparticularly specified;

the term “user-identifying” shall mean a Treatment that is provided witha kind of control-permission Treatment, Treatment ID cf. FIG. 70;

the term “operation-information” shall mean information that is inputinto authorization program started by user-identifying Treatment.

The transaction-reservation-verifying-need-or-no flag which is not usedfor a virtual-account in FIG. 73B is shown with “-”.

Responsive to receipt of the purchase request, the seller submits atransaction-approval-request (FIG. 69, (C)) to the bank for beingapproved.

The bank determines a virtual-account from the seller identificationincluded in the transaction-approval-request;if both the balance and the bank account balance (hereafter referred toas “total-balance”) are enough, the bank presents a verification-request(FIG. 69, (D)) to the buyer in order to verify thetransaction-approval-request.The buyer presents a verification-information (FIG. 69, (E)) to the bankto verify the transaction-approval-request.The bank transmits an approval (FIG. 69, (F)) to the seller only afterthe transaction-approval-request is verified by the buyer; and settlesthe account.

A virtual-account is specified with such as sellers business type, nameor goods kind by the buyer. Banks offer that identification informationof sellers to buyers for choosing the link with virtual-accounts.

Data structures related to settlement procedure in this example isdisclosed by documents such as United States Patent Application20020007345, Kind Code, A1, Harris, David N. Jan. 17, 2002.

Virtual-accounts differ from conventional arts such as special account,reserved amount (the amount that cannot be withdrawn from the account),or prepaid cards.

There is not any limit to withdraw savings from the account though usingvirtual-accounts. FIG. 73A is a model diagram of a bank account andvirtual-accounts that are reserved by the bank account holder.Balances of virtual-accounts can be set to higher than thetotal-balance,However, the payment possible amount of money using a virtual-account isnot more than both the balance and the total-balance.The virtual-accounts have an effect to maintain fluidity of funds whilekeeping safety of transactions.In the conventional art, once too much money is transfer to a specialaccount, the funds cannot be easily used by other uses.As for the virtual-account, there is not such inconvenience.

The above verification-request includes a request cause and an amount ofmoney, and the buyer is requested to verify thetransaction-approval-request.

It is demanded that the bank processes it immediately. A settlementinstitution of seller own to serve as the position of a bank may beadministered.

Many means of communications can be employed. Means including telephone,e-mail or the internet can be employed as long as the purpose issatisfied.

A communications means to do continuous connection in a network may beused. For example, mobile Internet Web or chat-like interactioncommunications may be used.

The buyer may initiate a communication request to the bank in order toverify pending transaction-approval-requests.

The electronic secretary analyzes sending communication requests, andexecutes user-identifying Treatment for the communication request toverify the transaction-approval-request.For example, the electronic secretary starts user-identifying programwhen a telephone call to a bank electronic transactions number, or anaccess to a web site identified with an URL that provides electronictransactions service, is detected.

The reservation-information may also include criterions of verification.

The bank may approve a transaction-approval-request without exchange ofverification-request and verification-information, if the criterions aresatisfied by data contained in the transaction-approval-request.Examples of the criterions may include, but not limited to, selleridentification, payment amount limit, date, time or their combination,or other criterions convenient to the buyer.

The bank may transmit the verification-request to the buyer forverifying through a seller's communication device such as the check-outcounter terminal.

The verification-request may be chosen to send to both of the seller'sdevice and the buyer's device. The verification-request may be sent withan e-mail, and the buyer may verify with the web.

The discrimination-ID record medium may use optional means to match witha seller's device.

For example bar-code can be displayed on the screen of a mobile phone.Magnetic card, ID tags, IC card, or infrared communication devices mayalso be used.A discrimination-ID may be input into the seller's device by hand.Further the buyer may choose to print out or to display the use history,the balance, or the total-balance on the seller's device.

The discrimination-ID record medium may be duplicated for use by forinstance family members.

For example, a child may buy juice and present a bar-code withdiscrimination-ID at a convenience store, and his parents can answer thetransaction-approval-request sent to a mobile phone while sitting athome.When the bar-code is lost or stolen, illegal use can be readily detectedand the discrimination-ID can be voided.

The present invention can be used to confirm all withdrawal from theuser's bank account.

For example, when the user withdraws cash from ATM machine, the ATM canbe seen as a seller (FIG. 69, block 6902).The user enters an account number or inputs a unique ID by a magneticcards medium, and the amount to withdraw into the ATM, and the ATM willonly withdraw cash after the bank verifies through the mobilecommunication terminal of user (the buyer).The conventionally authentication of a bank card may be added.

Furthermore, the bank can transfer a transaction code generated everytime to user's mobile phone. Using a short distance communications meansinput the above transaction cord into ATM in order to collate it.

Then only the user can do the transaction by operating an authenticationprogram by fingerprints.

The balance of the virtual-account is an upper limit on the amountpayable with that account using electronic transaction.

The settlement debits from the virtual-account with the settlementamount.When the balance is insufficient, the transaction-approval-request isdenied.The balance can be used with the verification-information which isdifferent from a password.The balance is the greatest loss amount even if the discrimination-ID,the verification-information and the buyer terminal are stolensimultaneously.

When the no-verification-limit is reached the account holder is notifiedimmediately for verifying.

The no-verification-limit is an amount of a cash sense it can be usedonly with the discrimination-ID.When it is refused to transaction-approval-request, averification-information may be repealed, and a virtual-account may befrozen.

The payment that omitted the verification is accumulated in the amountof accumulation.

The transaction-approval-request is verified at the time ofaccumulation-excess.After the verification the accumulation restarts from zero.The verification of accumulation-excess can be used to verify a paymentof a successive promotion.The no-verification-accumulation-limit is the amount of maximum losswhen an discrimination-ID and a verification-information are stolensimultaneously.

When the balance goes below the balance-notifying-amount, the message issent to a specified balance-notice-destination.

Further, when certain condition is satisfied, the balance isautomatically recovered (automatic recovery) to the balance-limit.For example, it is recovered automatically if time passed through theauto-recovery-interval since last automatic recovery or since lastreserving.

The verification-information is different fromauthentication-information such as a password in the property.

There can be multiple verification-information for each virtual-account,and they may have different importance according to the purpose of eachvirtual-account.When a virtual-account is used for payment in public environment, theverification-information which is different from a password had betterbe used.The verification-information of a virtual-account for ATM cornersenvironment that can be input safely may use the same as the accountpassword.

As used herein, the term “discrimination-IDentifying” shall mean aTreatment including:

attracting attention of the user by sound or vibration for acommunications request to arrive,receiving information and visually or audibly presenting it, andstarting an authentication program automatically.The authentication program including:authenticating the user by operation-information,transmitting information (registered-information) registered withbeforehand to the outside (banks) when the authentication is successful.The operation-information includes a simple button operation, anapproval cord, a voice, a password or a characteristic of a human body(biological information) such as a fingerprint.

The verification-information is used as the registered-information.

If it is necessary, it can be provided with the plural user-identifyingTreatments such as to be shown in FIG. 70.

The reservations of electronic transactions are based ondiscrimination-ID or account number and password, and it can be donethrough Internet or telephones or at a bank window.

The reservations may be possible only at banks window.Preferably One Time Password (OTP) is used for the password(authentication-information). Because different passwords are used inevery communications, the communications intercept damage can beprevented.For example, the authentication program may be provided with function torealize OTP.The reservation is possible with a public telephone temporarily.A use limit per day may be used in order to prevent the damage of linewiretapping.Further OTP may be used for the verification-information.

It is desirable to validate electronic transactions (make it into thestatus that can approve a transaction) after passing throughuser-authentication.

For example, users give a user-identifying Treatment to the bank throughsetting direction-files.Or a flag controlling the status of electronic transactions indirection-files is established. Electronic transactions is validated orinvalidated by setting the flag. When the flag is set in invalidity, theuser-identifying Treatment refuses to communication.

The user-authentication uses a user-authentication-means being attachedto terminal devices.

Buyers register a user-identification-information in the devicesbeforehand. When the user-authentication-means is started, the users arepromoted to input the user-identification-information into the devices.The input information is collated with theuser-identification-information registered, and if the collation resultagreed (authentication success), the next operation is forgiven.The user-identification-information includes information such aspassword or biological information.

Preferably, the electronic transaction is invalidated after it isvalidated through predetermined time (e.g. four hours).

The maximal security can be expected by doing a reservation ofelectronic transactions before going for shopping and by doing theverification by fingerprints. The reservation is done by setting thebalance to a planned use amount, by setting the no-verification-limit tozero and by setting the communication-ID to the user's mobile phonenumber.

It is possible to go shopping without carrying anything by setting thecommunication-ID to seller's device and by memorizing adiscrimination-ID and verification-information. The payment can do byinputting the discrimination-ID and the verification-information in theshop.

In everyday's shopping there is no need to use the password of the realbank account.

The password is needed only when do the reservation. It is good if thereservation is done safely.

The virtual-accounts can control use speed of money according topurposes freely, there is no possibility of the high-priced damage thatsuch as a conventional back card is forged, and

there is not trouble to do the repetitional reservation in an expectedeveryday consumption life range with the automatic recovery.

Detailed Descriptions:

The details being used conventional arts (such as communicationsoftware, command transmission, execution of programs, IC card, DTP) areomitted.

FIGS. 70 and 71 shows TDB and R1DB that to be used in an example of amobile phone having function of the electronic transactions. A blockdiagram showing the structure of the phone is basically the same as FIG.18.

The R1DB is one example of that shown in FIG. 5.Caller's number is used in order to do explanation easily. Like example3, packet transmission to do continuous connection of Internetcommunications means can be used, the initiator can be alsodistinguished with ID such as an email address.

FIG. 74 shows a flowchart of the transaction processing in thevirtual-account shown in FIG. 73A. FIG. 75 shows a flowchart of theapproval processing to show in FIG. 74.

The reservation of virtual-account “Shopping” is described in thereservation-information to show in FIG. 73B.The communication-ID is “090-1234-5678” and “shop”. Thediscrimination-ID is “045-1234-5678”. The verification-information is“456”. See FIG. 73B, the other reservation-information.The reservation-information is transmitted for the reservation.The verification-information and the buyer fingerprint describing inFIG. 73B are stored in the direction-file.

The communication-ID is mobile phone number and “shop”, this means theverification-request will be sent to both of the mobile phone and ashop's terminal.

The discrimination-ID is a home phone number, and a bar-code thatrecorded the discrimination-ID is pasted on the back of the mobilephone.

In FIG. 74, 7401, the seller reads the discrimination-ID by bar-codereader of such as a POS terminal, and transmits thetransaction-approval-request including the discrimination-ID, theseller's account number, the shop name and amount (X) of money to thebank.

The buyer can input home phone number by hand in the POS terminal ifforgetting to carry the mobile phone.

The bank searches the account number based on the discrimination-ID;

for example, the first time payment X is 500 yen; when the total-balance(Y) is 200,000 yen, continues (7402, YES) the processing because Y isenough;chooses (7403) the shopping account, when the predeterminedvirtual-account cannot be determined;does approval processing (7405) because X has not exceed (7404, YES) thebalance 100,000 yen;omits the verification because X has not exceed (FIG. 75, 7501) theno-verification-limit 1,000 yen, approves thetransaction-approval-request promptly.adds up (FIG. 75, 7502) the 500 yen amount of money of the payment thatomitted the verification in the amount (Z) of accumulation; (Z becomes500 yen.)transfers 500 yen to the credit of the seller and debits the account ofthe buyer with that amount, and debits the virtual-account with thatamount simultaneously.The new total-balance becomes 200,000−500=199,500 yen, and the balancebecomes 100,000−500=99,500 yen (7407).

It is assumed that the amount of the second time payment X is 600 yen bythe shopping. Z becomes 1,100 yen for accumulating.

Because Z exceeds (step 7503, YES) theno-verification-accumulation-limit, the bank searches a mobile phonenumber based on the discrimination-ID, and initiates communication withthe user to verify the pending transaction-approval-request.At the same time, the verification-request is also displayed (7504) onthe POS terminal.The transaction-approval-request is verified by the buyer with inputtingthe verification-information “456” into the POS terminal, or is verifiedby the buyer with inputting the fingerprint into the authenticationprogram started by the mobile phone through a fingerprint sensor.The transaction-approval-request is not verified (step 7505, NO) if theinput information is not right, then the transaction is disapproved(step 7406).The transaction is approved when it is verified, and ifaccumulation-excess then the amount of accumulation Z is set to zero yen(step 7506).The new total-balance becomes 200,000-1,100=198,900 yen, and the balancebecomes 100,000-1,100=98,900 yen.

FIG. 72 is a block diagram showing further another example to apply thisexample to tickets.

[Field]

It is relates to the field: toll collection system of a toll area(hereafter referred to as “road”) such as the railroad, the bus, anexpressway, Congestion Charging, parking lots, and stadiums.

[Means]

The electronic transaction to show in FIG. 69 is used.The seller (a road, FIG. 72, 6902) reads (FIG. 72, 1) thediscrimination-ID at the entrance (FIG. 72, 7204), and transmitstransaction-reservation information (FIG. 72, 2) including thediscrimination-ID and the cause to the bank to reserve the transaction.The bank sends the verification-request (FIG. 72, 3) verifying thereservation to a user.The user verifies the verification-request and sends theverification-information (FIG. 72, 4) to the bank.The bank sends reservation-complete information (FIG. 72, 5) to theseller only after the verification-request is verified by the user.The seller reads (FIG. 72, 6) the discrimination-ID at the exit (FIG.72, block 7205), adjusts the toll, and sends thetransaction-approval-request (FIG. 72, 7) to the bank.The bank sends the verification-request (FIG. 72, 8) verifying thetransaction-approval-request to the user.The user verifies the verification-request and sends theverification-information (FIG. 72, 9) to the bank.The bank transmits approval (FIG. 72, 10) to the seller only after theverification-request is verified by the user; and then settles theaccount.

When the transaction-reservation-verifying-need-or-no flag is reservedin “Yes”, it is possible to control the entrance by the approval ordenial result of the reservation of the transaction.

Detailed Descriptions

A payment of a railroad fare is a specific example.The discrimination-ID is recorded to a non-contact type IC card.The reservation of virtual-account “Railroad” is described in thereservation-information to show in FIG. 73B.The communication-ID is mobile phone number “090-1234-5678”.The discrimination-ID is “IC card number”.The verification-information is “456”.The transaction-reservation-verifying-need-or-no flag is “No”.See FIG. 73B, the other reservation-informations.The reservation-information is transmitted for the reservation.

The ticket gate of the departure station (block 7204) reads thediscrimination-ID, and forward it to a server (it is established in FIG.72, block 6902, and it is not shown in this FIG.).

The server creates an entrance record to record the discrimination-ID,the departure station, and time. And the server sends thetransaction-reservation information (different from thereservation-information of the virtual-account) including thediscrimination-ID and name of the departure station to the bank.The bank omits the verification (FIG. 72, 3, 4) when thetransaction-reservation-verifying-need-or-no flag is “No”, and sendsreservation-complete information to the ticket gate.Then the entrance is allowed.

The ticket gate of the arrival station reads the discrimination-ID,adjusts fare of the passenger distinguished by the discrimination-ID,transmits the transaction-approval-request to the bank, and the exit ispermitted if the approval is received.

In the case of the fare which does not exceed the no-verification-limit,the bank omits the verification (FIG. 72, 8, 9). Therefore the judgmentprocessing of exit can be made faster.

When the transaction-reservation-verifying-need-or-no flag is “Yes” andthe discrimination-ID that, the entrance ticket gate reads is valid, thetransaction-reservation is sent to the bank after permitting theentrance.

The exit ticket gate may transmit the transaction-approval-request tothe bank after permitting the exit when the reservation-completeinformation has been received.The judgment processing of entrance or exit can be made faster for this.

In order to process high speed further, and in order to hold down theexpense of transaction-approval-request processing, the amount of moneyof the payment that omitted the verification may be accumulated to theIC chip card or to the server.

The accumulation and entrance or exit judgment can approve offlinewithout communicating with the bank.In order to approve offline, the seller obtains the necessaryreservation-information set by the buyer from the bank.

FIG. 76 is a flowchart of the offline-approval.

The sellers terminal reads the discrimination-ID. When the goods priceis not more than the no-verification-limit (FIG. 76, 7601), the goodsprice is added (7602) to the amount of accumulation that the seller sidestored.In the case of accumulation-excess, the seller creates thetransaction-approval-request in order to charge the amount ofaccumulation, andsubmits it to the bank for requesting (7605) approval according to theprocedure to show in FIG. 74; Herein referred to as “online-approval”.When the transaction is approved (7606, YES), the amount of accumulationis reset (7607) to zero.When there is not accumulation-excess, the transaction is approvedwithout communicating with the bank.In this system, this processing is named “offline-approval”.

The discrimination-ID (such as IC cards) may be lent for an amount ofsecurity.

When the transaction-approval-request is refused, the fare is charged incash.When the abolition of the discrimination-ID is required, the amount ofmoney that deducted the amount used from the amount of security may berepaid to the user.The no-verification-accumulation-limit and the amount of security may belimited in same amount degree.There is an effect to guarantee the collection of the fare.For example, it is assumed that the discrimination-ID is lent or isvalidated; the amount of security is 1000 yen. It is supposed thattaking a train that the accumulation fare is 990 yen allowed without thetransaction-approval-request,then the next time transaction-approval-request of 1110 yen will besubmitted at an exit ticket gate if the fare is 120 yen. When thetransaction-approval-request is refused, the passenger is charged 120yen in cash as the fare, andthe amount of repayment is 10 yen if the abolition of thediscrimination-ID is required.

The offline-approval can be done by plural sellers that store the amountof accumulation originally with one discrimination-ID.

For example, the same mobile phone number can be used as thediscrimination-ID, and can be used for different railroad company.

Further the entrance or exit processing can be processed at high speedby the passenger giving position-obtaining-permission Treatment to theseller.

The entrance ticket gate can judge the validity of the nearby passengersdiscrimination-ID beforehand.The exit ticket gate can adjust a supposed-fare (it is supposed that thepassenger gets off at the nearest station).The position of the mobile phone can be obtained from the system of thephone company. It is not need to connect to the mobile phone directly.

In the case of processing of a ticket to enter stadiums, customers ordera ticket from ticket shops beforehand.

The entrance management server is equivalent to the bank, and ticketinformation is stored in it.The ticket information includes data such as the discrimination-ID, thestadium name, the event name, the date and time, the number of people,and seat positions.And the server initiates communication to the mobile phone linked to thediscrimination-ID which is read by the entrance ticket gate, andentrance is permitted after doing user-authentication.

Sellers may administer an own settlement institution.

Instead of the public communications means, the ticket gate maycommunicate with the mobile phone by a short-distance communicationsmeans such as infrared, DSRC (Dedicated Short Range Communication), orBluetooth, and may start the user-authentication program of a mobilephone directly.

Toll collection of an expressway is described as further anotherexample.

[Background]

Electronic Toll Collection (ETC) System of Japan consists of in-vehicleapparatuses, ECT cards, tollgates, and a DSRC (Dedicated Short-RangeCommunication) radio system is used for road-vehicle communication. TheECT card stores personal information, contract information, andelectronic money.However, it is demanded to pass the tollgates with the low speed; “canbe stopped at any time” is demanded. In addition, the expense ishigh-priced.While in Singapore, toll collection system for ERP films a license plateof vehicles with cameras. Even vehicles to pass through at a speed of180 k.p.h. are all right.The camera method of existing technology can realize the free flowtollgate which can pass high speed, but separation of a owner and apayer of a car is difficult.

[An Object]

The free flow toll collection system that cash is unnecessary isrealized by a low cost.

[Means]

The electronic transaction to show in FIG. 69 is used.A vehicle license plate number is used as the discrimination-ID todiscriminate a user.The reservation of virtual-account “Expressway” is described in thereservation-information to show in FIG. 73B.The communication-ID is mobile phone number “090-1234-5678”.The verification-information is “456”.The transaction-reservation-verifying-need-or-no flag is “Yes”.See FIG. 73B, the other reservation-informations.The reservation-information is transmitted for the reservation.

The seller films a license plate with a digital camera at an entrance(block 7204), and reads the discrimination-ID with image recognitionmeans, and sends the transaction-reservation information including thediscrimination-ID and the entrance name to the bank.

The toll is adjusted on the basis of entrance record after permittingexit when reservation-complete information is received, and atransaction-approval-request is transmitted to a bank.

Further the record such as type of the car which met toll classificationand the photograph are included in the entrance and exit record as theuse evidence.

When the transaction-reservation or the transaction-approval-request isrefused or electronic transactions is not reserved, the seller can senda bill to the user (the owner) of vehicle determined by thediscrimination-ID, and the office work fee cost may be add to the amountof money of the bill.

When a gate is installed at an entrance, a vehicle is allowed to passthe gate in the following condition:

the discrimination-ID is reserved in the virtual-account; orthe reservation-complete information is received.

When a gate is installed at an exit, a vehicle is allowed to pass thegate in the following condition:

the discrimination-ID is reserved in the virtual-account;the reservation-complete information is received; orthe approval information is received.

Preferably the vehicle is guided by electric light signals or by themobile phone's sound according to the judgment result.

A nonstop lane for electronic transactions may be installed in parallelwith a conventional gate in tollgates.

Further the gate may decide passage permission at high speed by thefollowing preprocessing for the vehicles that approach to the gate:

judging the payment method at the entrance gate;adjusting the supposed-toll at the exit gate.The gate may decide the vehicles that approach to the gate by thefollowing method:installing cameras at the first arrival position of traffic lanes; orobtaining position information of the mobile phone approaching to thegate.Preferably the buyer specifies a road use-plan period, and if the periodpassed, the virtual-account will be canceled.In the case of charging for passing through a toll area such as adowntown area, at the boundary line the charging can be done similar tothe above exit.

A charging system on the basis of mileage (distance charging) can berealized. The buyer provides a position-obtaining-permission Treatmentto the system and lets the system almost grasp the position of themobile phone continually when enter in a toll area. For example, theserver may obtain the mobile phone's position information (such aslocation cell or GPS information) and may chase it,

The system considers the moved distance of the mobile phone to be themoved distance of the vehicle, and calculates the amount of toll. Whenthe position cannot be determined when the battery of the mobile phoneis cut, a fixed toll will be applied.The vehicle information to be necessary for charging is read withcameras. The cameras may be replaced by other means to obtain the aboveinformation.For example, a license plate system having a communication function maybe used.

[Effect]

In the case of a conventional ETC system, when a vehicle passes a gateor a boundary line at speed, the following is necessary: recognizing thevehicle instantly; doing interactive communication with the vehicle inorder to move electronic money instantly; keeping the security of thecredit card information; preventing the data manipulation; processingthis in high reliability in large quantities at high speed. This is thecause that the cost of the ETC system is high.While in this example, it is only necessary to film the vehicle, and toread the license plate. And processing technology for this purpose ismaturity. There is the following effect: it is not necessary to transmitcredit card information; it is not necessary to process a large quantityof data at the gate at high speed; because the in-vehicle apparatus andthe ETC card are not necessary, the cost of roads and vehicles arelowered; the problem such as forgery of a prepaid expressway card can beprevented; separation of a owner and a payer of a car is easy; nonstopat tollgates can be realized easily; because a card is not used, it isnot necessary to worry about the card being forged, a lack of balance orincrease of electronic money.

Further, FIG. 69 shows a block diagram about another transaction methodand system.

In an electronic transactions system and method processing commercialtransactions between a buyer and a seller, the buyer uses thediscrimination-ID (FIG. 69, 1) to purchase goods (FIG. 69, 6) from theseller.

Responsive to receipt of the purchase request, the seller submits atransaction-approval-request (FIG. 69, 2) to the bank (FIG. 69, block6903).The bank presents a verification-request (FIG. 69, 3) to the buyer inorder to verify the transaction-approval-request.The buyer transmits a authentication-information such as password (FIG.69, 4) to the bank to verify the transaction-approval-request through abuyer's communications module.The bank transmits an approval (FIG. 69, 5) to the seller only after thetransaction-approval-request is verified by the buyer.

When a communication request which is for verifying thetransaction-approval-request is received, the user-identifying Treatmentis executed. Then the authentication program is started by theuser-identifying Treatment.

The authentication-information is included in theregistered-information. Because the registered-information istransmitted to the bank by the authentication program, as for the buyer,there is not necessity to input the authentication-information inpublic.Preferably the electronic transaction is invalidated after verifying thetransaction-approval-request.Then in order to validate electronic transactions user-authenticationalways is done every time before paying, and there is not danger to bedamaged even if a mobile phone is lost.

Example 6 A Mobile Phone Key

[Field]

A mobile phone is used as a key for a home door, a safe, or a car.

[Means]

When unlock, the electronic lock control system verifies theunlocking-request with a user through communications module.The system unlocks only after the request was verified by the user.The user sends an authentication-information such as password to theelectronic lock control system to verify the request.

FIG. 33 exemplifies structure of an electronic lock control system. Thecase to unlock by a call originating from the mobile phone was describedin example 1.

This example, the electronic lock side of controlled apparatusoriginates a call.When the user unlock by operation means such as unlocking operationbuttons, the system originate a call to the user. In FIG. 70, 71, anexample to give a user-identifying Treatment to the communicationrequest to verify the unlocking-approval-request is shown. The systemunlocks only after having received a predeterminedauthentication-information.

Further the unlocking operation may be collated with the password thatinput by a ten key.

Unlocking operation may merely push a call button of a door phone. Thedoor phone may connect with a mobile phone. Unlocking can be remotelycontrolled.

[Effect]

A strong keyless lock can realize by a user-authentication result suchas biometrics authentication.

Example 7

[Field]

This example relates to collection of traffic information and routeguidance of moving-objects.

It is shown herein an exampling using mobile phone as personal mobilecommunication terminal, but it is not restricted to mobile phone,electronic equipments with communication capabilities such as notebookPC, hand held PC, or car navigation systems can also be used.

[Background]

The following technology is known: to collect traffic information fromcars; to predict traffic on roads; to prevent traffic congestion inadvance.

[An Object]

To achieve cooperative efficient traffic information collecting,prevention of traffic congestion, and dynamic navigation ofmoving-object.

[Means]

A database including information such as traffic, maps and institutiondata is stored in a traffic center that is capable of calculating bestroutes. Through telecommunication line, the traffic center collectsdeparture time and trip plans including a starting point and destinationfrom users (pedestrian and drivers), and provides recommended trip plansand routes to the users.

The user's mobile terminal obtains current position information, and thetraffic center communicates with the terminals, to obtain movementstatus.

When traffic congestion is happening or predicted, the traffic centeronly chooses the limited numerical vehicles which can dissolve thetraffic congestion to send bypass information.When it is necessary, the traffic center also sends information such asforward map to vehicles.

Whenever a mobile terminal is communicated with, the center collectsmovement information such as a position, speed, and a moving directionto update a traffic real condition database.

The center may connect with the vehicles by plural methods includingconstant connection, intermittent connection.The center may connect with the vehicles when certain events aredetected.

The mobile terminal measures data such as position, speed and movingdirections, and provides necessary control Treatment such as“measurement-data-obtaining-permission”, “map or voiceinformation-transmission-permission”, and“attention-attracting-permission” to the center, and the user in drivingis not necessary to get a hand off the steering wheel to operate themobile terminal.

When the mobile terminal initiates communication to the center, it sendsinformation including its current position and requests such as routesearch, traffic congestion information search.

Then the traffic center replies with route information, and commands.The terminal operates according to the commands. The user is guided tothe received route.If the vehicle is off the route, the terminal sends request to thecenter again for route search.

When there is fog or visibility is bad, or when there are uphill slopesof a traffic congestion outbreak factor position or intersection, eventof speed changes of vehicles can be detected.

The center grasps the positions of vehicles continually, and tells thedrivers the position of nearby vehicles, and urges regulation of speedto keep a safe distance among the vehicles. This way, the trafficcongestion prevention and safe driving are assisted.

The mediation of the center enables accident prevention service which isprovided through communications among nearby vehicles.

Nearby vehicles are treated as a group. The center grasps the positionof each member of the group. By the mediation of the center, such as theconnection numbers of each member are exchanged.Then the vehicles can be connected directly. The positions of othervehicles in the group are displayed on the screen of the mobile terminalby communication among vehicles. When the dangers (such as approach ofvehicles which are in front or behind, braking hard, airbags inflate, oraccidents) are detected, the mobile terminal sends urgent warning tovehicles concerned.The mobile terminal can keep the position information of all thevehicles in the group and help auto navigation system in the vehicles tokeep safe distance between vehicles.

When information lacks, the traffic center uses mobile phones which havea positioning device as monitors to watch the movement information.

When the monitors are carried on moving objects (such as vehicles),movement information is collected from the monitors.The traffic center analyzes the received information, createsinformation collecting commands, and sends it back to the monitors.

One start method of the monitor is to transmit movement informationautomatically to the traffic center when a predetermined condition suchas speed higher than 20 km/h is met. The center then replies with atransmitting interval (T) as a command. It is assumed the spatialdensity of monitors is represented in D. the T and D are made in apositive correlation. In other words when D increases the centerincreases the T.

When density D increases, the possibility that the same movementinformation is transmitted to the center increases. The center increasesin the transmitting interval T in order to control useless informationtransmission.For example, T is calculated by equation:

T=A*D+B

wherein A and B represents constant values.FIG. 31B is a model diagram of method to determine a value of A and B.The value of A and B is smaller the information is more much. When thereis necessity, the downtown area and the suburbs may use differencevalues. The center uses the value which is predetermined according tothe current location of the monitor.For example, the constant value of spot X is set to (A1, B1), and Y isset to (A2, B2); because mobile terminal 1 is the nearest to spot X, thecenter uses the value (A1, B1) for mobile terminal 1; the number of themonitor which transmitted around spot X for less than 10 minutes iscounted as density D1; and the center uses the value (A2, B2) for mobileterminal 2.

Concretely if D1=10, A1=5, and B1=10 then T1 is 60 minutes. In otherwords that mobile terminal 1 is ordered to transmit information againafter 60 minutes.

Further the following information transmission conditions can beincluded in the command: do not transmit in a predetermined period oftime, speed range, or area; transmit only when speed or moving directionchanged.

A management of the monitor provides reward to informants or sells theautomatic monitor function built-in mobile phone. Preferably the rewardis offered as points depending on offered quantity of information, routeguidance service is offered in exchange for the points that the useraccumulated.

It is possible to optimally control traffic lights by using real-timetraffic information such as real traffic flow or urgent vehicles.

For example, when an expectation position of vehicles becomes near to anintersection, the traffic center initiates communication with thevehicles in order to grasp its real position for avoiding needless redlights.If the vehicles such as urgent send itself position information atrealtime, the center can do optimization control its front trafficlight.The traffic center examines the position of other vehicles in frontcourse of urgent vehicles, and evacuation can be ordered to pertinencevehicles.

The traffic center can watch speed limit violations as well as movementof vehicles near intersection, and warns nearby drivers or walker whenthere is danger of collision.

The traffic center can do route guidance service to walkers carrying themobile terminal. When trains have been canceled, or missed the lasttrain, through using the user's action plan or commuting course, thecurrent location and time, the center can guide a course of evasion.

[Effects]

The center can simultaneously provide traffic navigation and collectreal-time information to facilitate the traffic navigation.The following feedback effect can be expected: if traffic starts to becongested, then the request for navigation service will increase, thenthe information collected by the traffic center will increase, then thecenter can provide better navigation service based on the collectedinformation and consequently the traffic congestion will be decreased.

Because the recommendation course where a traffic center fits the realcondition can be guided, the most suitable traffic system is enabled bychanging the traffic flow that is not cooperative into cooperative.

The center can provide personalized relevant information to each driverand pedestrian in a timely manner.Traffic congestion can be foreseen, and optimal bypass route can befound from the destination information of each vehicle.Transport capacity of the traffic network can be used enough withoutmaking concentrate on a specific road.The spots measured with the monitors in comparison with stationarysensors on roads are not limited. The traffic conditions informationthat met in equality or importance in probability can be collectedwithout omission in roads.

Dynamic route guidance and traffic congestion avoidance service with themobile phone can be offered. The user of the service is not necessity tooperate the mobile phone in moving (There is a law of traffic to forbidthe above operation).

The following thing becomes easy: support of safe driving, optimizationof traffic management, promotion of efficiency of road management,support of pedestrians, support of emergency vehicles, easing trafficcongestion, and preventing traffic congestion beforehand.

What is claimed is:
 1. A computer-implemented method comprising:receiving, by one or more processors, a request to execute an action forachieving a purpose of a user, wherein the purpose comprisestransmitting communication-information via electronic circuits, using,by one or more processors, direction-information, wherein thedirection-information being previously set by setting, wherein thesetting step includes the steps of: authenticating the user based onauthentication-information, wherein the authentication-information isinformation obtained from an electronic device, wherein the electronicdevice is a device that provides the authentication-information to theuser, receiving the direction-information, and storing thedirection-information in a storage device, determining, by one or moreprocessors, whether or not to execute the action, and executing, by oneor more processors, the action.
 2. The method of claim 1, wherein thedirection-information comprises a password.
 3. The method of claim 1,wherein the authentication-information comprises a one-time password. 4.The method of claim 1, further comprising: authenticating, by one ormore processors, the user based the authentication-information.
 5. Themethod of claim 1, wherein the authentication-information is differentfrom authentication-information used last time, and wherein theelectronic device comprises an item selected from the group consistingof: a computer, a portable electronic device, and a mobile phone.
 6. Themethod of claim 5, wherein the purpose comprises a transaction, whereinthe transaction is a transaction involving an account, and wherein themethod further comprising: updating, by one or more processors, anaccount balance of the account.
 7. The method of claim 5, wherein thepurpose comprises a transaction, wherein the transaction comprises oneor more of: a withdrawal-transaction, a debit-card-transaction, acredit-card-transaction, a funds-transfer, a transaction regarding anelectronic money, and a payment, and wherein the electronic money iselectronic data having the same value as currency.
 8. The method ofclaim 5, wherein the direction-information comprises informationselected from the group consisting of account-identification-informationassociated with an account, an address, a name, a password,communication-destination-information, and identification-information,wherein the account is selected from the group consisting of a creditaccount, a debit account, and a bank account, and wherein thecommunication-destination-information can identify a communicationdestination.
 9. The method of claim 5, wherein the direction-informationcomprises determination-information that is information used todetermine whether or not a condition is satisfied, wherein thedetermination-information comprises information selected from the groupconsisting of a monetary amount, time-information, and a status flag,and wherein the status flag indicates whether or not to execute theaction.
 10. The method of claim 5, wherein the direction-informationcomprises identification-information.
 11. The method of claim 10,wherein the purpose comprises passing through a gate, wherein the actioncomprises opening the gate, and wherein the communication-informationcomprises a control command that causes the opening of the gate.
 12. Asystem comprising: a memory; and one or more processors, coupled to thememory, and operative to perform the steps of: receiving a request toexecute an action for achieving a purpose of a user, wherein the purposecomprises transmitting communication-information via electroniccircuits, using direction-information, wherein the direction-informationbeing previously set by setting, wherein the setting step includes thesteps of: authenticating the user based on authentication-information,wherein the authentication-information is information obtained from anelectronic device, wherein the electronic device is a device thatprovides the authentication-information to the user, receiving thedirection-information, and storing the direction-information in astorage device, determining whether or not to execute the action, andexecuting the action.
 13. The system of claim 12, wherein thedirection-information comprises a password.
 14. The system of claim 12,wherein the authentication-information comprises a one-time password.15. The system of claim 12, wherein the one or more processors arefurther operative to perform the step of authenticating the user basedthe authentication-information.
 16. The system of claim 12, wherein theauthentication-information is different from authentication-informationused last time, and wherein the electronic device comprises an itemselected from the group consisting of: a computer, a portable electronicdevice, and a mobile phone.
 17. The system of claim 16, wherein thepurpose comprises a transaction, wherein the transaction is atransaction involving an account, and wherein the one or more processorsare further operative to perform the step of updating an account balanceof the account.
 18. The system of claim 16, wherein the purposecomprises a transaction, wherein the transaction comprises one or moreof: a withdrawal-transaction, a debit-card-transaction, acredit-card-transaction, a funds-transfer, a transaction regarding anelectronic money, and a payment, and wherein the electronic money iselectronic data having the same value as currency.
 19. The system ofclaim 16, wherein the direction-information comprises informationselected from the group consisting of account-identification-informationassociated with an account, an address, a name, a password,communication-destination-information, and identification-information,wherein the account is selected from the group consisting of a creditaccount, a debit account, and a bank account, and wherein thecommunication-destination-information can identify a communicationdestination.
 20. The system of claim 16, wherein thedirection-information comprises determination-information that isinformation used to determine whether or not a condition is satisfied,wherein the determination-information comprises information selectedfrom the group consisting of a monetary amount, time-information, and astatus flag, and wherein the status flag indicates whether or not toexecute the action.
 21. The system of claim 16, wherein thedirection-information comprises identification-information.
 22. Thesystem of claim 21, wherein the purpose comprises passing through agate, wherein the action comprises opening the gate, and wherein thecommunication-information comprises a control command that causes theopening of the gate.
 23. A non-transitory computer-readable mediumcomprising instructions that, when executed, cause one or moreprocessors to perform the steps of: receiving a request to execute anaction for achieving a purpose of a user, wherein the purpose comprisestransmitting communication-information via electronic circuits, usingdirection-information, wherein the direction-information beingpreviously set by setting, wherein the setting step includes the stepsof: authenticating the user based on authentication-information, whereinthe authentication-information is information obtained from anelectronic device, wherein the electronic device is a device thatprovides the authentication-information to the user, receiving thedirection-information, and storing the direction-information in astorage device, determining whether or not to execute the action, andexecuting the action.
 24. The non-transitory computer-readable medium ofclaim 23, wherein the direction-information comprises a password. 25.The non-transitory computer-readable medium of claim 23, wherein theauthentication-information comprises a one-time password.
 26. Thenon-transitory computer-readable medium of claim 23, wherein the one ormore processors are further operative to perform the step ofauthenticating the user based the authentication-information.
 27. Thenon-transitory computer-readable medium of claim 23, wherein theauthentication-information is different from authentication-informationused last time, and wherein the electronic device comprises an itemselected from the group consisting of: a computer, a portable electronicdevice, and a mobile phone.
 28. The non-transitory computer-readablemedium of claim 27, wherein the purpose comprises a transaction, whereinthe transaction is a transaction involving an account, and wherein theone or more processors are further operative to perform the step ofupdating an account balance of the account.
 29. The non-transitorycomputer-readable medium of claim 27, wherein the purpose comprises atransaction, wherein the transaction comprises one or more of: awithdrawal-transaction, a debit-card-transaction, acredit-card-transaction, a funds-transfer, a transaction regarding anelectronic money, and a payment, and wherein the electronic money iselectronic data having the same value as currency.
 30. Thenon-transitory computer-readable medium of claim 27, wherein thedirection-information comprises information selected from the groupconsisting of account-identification-information associated with anaccount, an address, a name, a password,communication-destination-information, and identification-information,wherein the account is selected from the group consisting of a creditaccount, a debit account, and a bank account, and wherein thecommunication-destination-information can identify a communicationdestination.
 31. The non-transitory computer-readable medium of claim27, wherein the direction-information comprisesdetermination-information that is information used to determine whetheror not a condition is satisfied, wherein the determination-informationcomprises information selected from the group consisting of a monetaryamount, time-information, and a status flag, and wherein the status flagindicates whether or not to execute the action.
 32. The non-transitorycomputer-readable medium of claim 27, wherein the direction-informationcomprises identification-information.
 33. The non-transitorycomputer-readable medium of claim 32, wherein the purpose comprisespassing through a gate, wherein the action comprises opening the gate,and wherein the communication-information comprises a control commandthat causes the opening of the gate.