Information processing apparatus and method, recording medium, and service providing system

ABSTRACT

A portable terminal stores a first URL which specifies personal information of a user stored in a personal server, and transmits the first URL to a settlement device. The settlement device serves as a network access port for the portable terminal. The personal server is a server which manages personal data of the user that is identified by the first URL, and communicates with the settlement device and a service server via a network. The service server is a server for performing processing identified by a second URL. The service server executes the processing thereof by communicating with the settlement server and personal server via the network. Thus, the user can receive various types of services. Accordingly, a service providing system can be used with a portable terminal that does not hold any personal information therein.

BACKGROUND OF THE INVENTION

[0001] The present invention relates to an information processingapparatus, an information processing method, a recording medium, and aservice providing system, and particularly relates to an informationprocessing apparatus, information processing method, recording medium,and service providing system which can be safely used even if, forexample, a user loses a portable user terminal.

[0002] There are service providing systems where a user operates aportable terminal to communicate with a server connected to a specificnetwork, so as to be provided with particular services from the server.

[0003] Normally, personal information, such as user IDs, necessary forusing the service providing system, and passwords for user verificationare stored in the portable terminal. However, this can be a problem,since if the user loses the portable terminal, for example, the personalinformation stored therein may be used by unauthorized persons withcriminal intent.

[0004] Also, when exchanging personal information, there are situationswhere encryption is performed at the portable terminal in order toprevent the information from being disclosed. However, the functions ofnormal portable terminals do not allow for sophisticated encryption,thereby enabling personal information to be more easily deciphered anddisclosed.

[0005] Further, while cellular telephones can be used as portableterminals, usage of cellular telephones is restricted depending on thelocation (e.g., considering possibly interruption of delicate medicalequipment, such as pacemakers). Thus, usage of the system is limited.

SUMMARY OF THE INVENTION

[0006] An object of the present invention is, therefore, to enable usageof a service providing system without burdening the users with manyrestrictions.

[0007] An information processing apparatus according to an embodiment ofthe present invention includes a storage device for storing the firstnetwork identifier, a first input device for obtaining the secondnetwork identifier, a second input device for obtaining verificationdata necessary for verifying the user, and a transmitter fortransmitting control information containing the first network identifierand the second network identifier to the first server which manages thepersonal information identified by the first network identifier storedin the storage device, so as to be provided with the service, byprocessing identified by the second network identifier obtained by thefirst input device being executed by the second server.

[0008] The first network identifier or the second network identifier maybe a uniform resource locator (URL).

[0009] Preferably, the information processing apparatus is connected toa network having an access port terminal serving as an access port forthe network. Thus, the transmitter may transmit the control informationto the first server via the access port terminal.

[0010] The transmitter may transmit the control information to theaccess port terminal using directional infrared rays, high-frequencyairwaves, or the like.

[0011] The second input device may obtain a password generated by averification data IC chip built into an article which the user iswearing, and the password may be a one-time password. The password maybe encrypted with a common key shared between the information processingapparatus and the first server, or the password may be encrypted with apublic key of the first server.

[0012] If there is an appropriate response from the verification data ICchip built into an article which the user is wearing as to apredetermined request from the first server, the second input device mayobtain the password generated by the verification data IC chip.

[0013] The article which the user is wearing with the verification dataIC chip built in may be a wristwatch, ring, or the like. Preferably, theverification data IC chip is waterproofed. The verification data IC chipmay operate based on electromotive force generated by electromagneticinduction, electric power based on photo-electric conversion, electricpower from a miniature battery, thermal electromotive force based onbody heat of the user, or the like.

[0014] The second input device may obtain as the verification data:fingerprints, voiceprints, iris patterns, contrast patterns ofcapillaries at predetermined portions of the body, or the like. Thefirst input device may obtain the second network identifier as voicetaken in by a microphone, an image obtained by an image sensor, infraredrays received by an infrared ray sensor, high-frequency waves receivedby a high-frequency antenna, or the like.

[0015] An information processing method according to an embodiment ofthe present invention includes a storing step for storing a firstnetwork identifier, a first obtaining step for obtaining a secondnetwork identifier, a second obtaining step for obtaining verificationdata necessary for verifying a user, and a transmitting step fortransmitting control information containing the first network identifierand the second network identifier to a first server. Preferably, thefirst server manages personal information identified by the firstnetwork identifier stored in the storing step, so as to be provided withthe service, by processing identified by the second network identifierobtained by the processing in the first obtaining step being executed bya second server.

[0016] A storing medium according to an embodiment of the presentinvention includes code for a storing step for storing a first networkidentifier, code for a first obtaining step for obtaining a secondnetwork identifier, code for a second obtaining step for obtainingverification data necessary for verifying a user, and code for atransmitting step for transmitting control information containing thefirst network identifier and the second network identifier to a firstserver. Preferably, the first server manages personal informationidentified by the first network identifier stored in the storing step,so as to be provided with the service, by processing identified by thesecond network identifier obtained by the processing in the firstobtaining step being executed by a second server.

[0017] In an information processing apparatus and method, and program ina recording medium, according to an embodiment of the present invention,a first network identifier is stored, a second network identifier isobtained, verification data necessary for verifying a user is obtained,and processing identified by the obtained second network identifier isexecuted by a second server, whereby control information containing thefirst network identifier and the second network identifier istransmitted to a first server managing personal information identifiedby the stored first network identifier, so that services can bereceived.

[0018] A service providing system according to an embodiment of thepresent invention includes a portable terminal holding a first networkidentifier, a first server for managing personal information of a useridentified by the first network identifier, and a second server forexecuting processing identified by second network identifier, whereinthe portable terminal, the first server, and the second server areconnected via a network. Preferably, the portable terminal includes afirst storage device for storing the first network identifier, a firstinput device for obtaining the second network identifier, a second inputdevice for obtaining verification data necessary for verification of theuser, a first transmitter for supplying control information containingthe first network identifier and the second network identifier to thefirst server. Preferably, the first server manages personal informationidentified by the first network identifier stored in the first storagedevice, so as to be provided with predetermined services, by processingidentified by the second network identifier obtained by the first inputdevice being executed by the second server, and a second transmitter forsupplying the verification data obtained by the second input device tothe first server. Preferably, the first server includes a first controlunit for managing the personal information identified by the firstnetwork identifier, a first requesting portion for requesting to beprovided with the services based on the control information and thepersonal information, to the second server for executing processingidentified by the second network identifier contained in the controlinformation supplied by the first transmitter of the portable terminal,a first verifying portion for making verification of the user based onthe verification data supplied by the second transmitter of the portableterminal, based on a request from the second server, and a thirdtransmitter for supplying verification results from the first verifyingportion to the second server. Preferably, the second server includes asecond control unit for managing processing identified by the secondnetwork identifier, a second requesting portion for requesting the firstserver for verification of the user, if there is a request by the firstrequesting portion of the first server, and a first executing portionfor executing processing identified by the second network identifierbased on the control information and the personal information, if theverification results supplied by third transmitter of the first serverindicate that the user is a valid user of the service providing system.

[0019] The first network identifier or the second network identifier maybe a URL.

[0020] In an embodiment, an access port terminal is connected to thenetwork, serving as an access port for the portable terminal. Thus, thefirst transmitter or the second transmitter of the portable terminal maysupply the control information or the verification data to the accessport terminal. The access port terminal may further include a fourthtransmitter for supplying the control information or the verificationdata supplied from the first transmitter or the second transmitter ofthe portable terminal to the first server.

[0021] In an embodiment, a third server for performing settlement ofusage fees of the service providing system is connected to the network,and the access port terminal measures predetermined communication amountprocessed by itself. The access terminal may further include a fifthtransmitter for supplying the results of the measurement to the thirdserver, and the third server may further include a settlement portionfor performing settlement of usage fees of the service providing systembased on the results of the measurement supplied from the fifthtransmitter of the access port terminal.

[0022] The communication amount may be the amount of data which theaccess port terminal has transferred to the portable terminal or thefirst server.

[0023] In an embodiment, referring to the portable terminal, the firststorage device may further store a public key for the first networkidentifier, and the second transmitter may further supply the public keyfor the first network identifier to the access port terminal, the fourthtransmitter of the access port terminal may encrypt the verificationdata with the public key for the first network identifier, supplied bythe second transmitter of the portable terminal, and supply theverification data that has been encrypted to the first server along withthe control information. Referring to the first server, the firstcontrol unit may further manage a secret key for the first networkidentifier as personal information, and the first verifying portion maydecrypt the verification data supplied by the fourth transmitter of theaccess port terminal with the secret key for the first networkidentifier contained in the personal information, and verify the userbased on the decrypted verification data.

[0024] If that the user is verified to be a valid user of the serviceproviding system by the first verifying portion, the first control unitof the first server may change the secret key of the first networkidentifier. The first server further may include a third requestingportion for requesting the portable terminal to change the public keyfor the first network identifier corresponding to the change in thesecret key for the first network identifier by the first control unit,and the first storage device of the portable terminal may change thepublic key for the first network identifier, based on a request by thethird requesting portion of the first server.

[0025] The second input device of the portable terminal may obtain apassword as the verification data, generated by a verification data ICchip built into a certain article which the user is wearing, with afirst algorithm. The password may be a one-time password. The passwordmay be encrypted with a common key shared by the portable terminal andthe first server, or may be encrypted with a public key of the firstserver.

[0026] If there is an appropriate response from an verification data ICchip built into an article which the user is wearing as to apredetermined request from the first server, the second input device ofthe portable terminal may obtain the password generated by theverification data IC chip.

[0027] The first verifying portion of the first server may generate theone-time password with a second algorithm similar to the first algorithmof the verification data IC chip, and compare the one-time password withthe password serving as the verification data supplied from the secondtransmitter of the portable terminal, thereby verifying the user.

[0028] The first verifying portion of the first server may update thesecond algorithm when the user is verified as a valid user of theservice providing system. The first server may further include a thirdrequesting portion for requesting the portable terminal to update thefirst algorithm of the verification data IC chip corresponding to theupdate in the second algorithm by the first verifying portion, and theportable terminal may further include a fourth requesting portion forrequesting the verification data IC chip to update the first algorithmbased on a request by the third requesting portion of the first server.

[0029] Predetermined service information is supplied to the portableterminal when processing identified by the second network identifier isexecuted by the first executing portion of the second server, and thefirst control unit of the first server may further manage the public keyof the portable terminal. The first server may further include a fourthtransmitter for encrypting the service information with the public keyof the portable terminal and supplying the encrypted service informationto the portable terminal. The first storage device of the portableterminal may further store a secret key of itself, and the portableterminal may further include a decrypting portion for decrypting theencryption of the service information supplied from the fourthtransmitter of the first server, with the secret key of itself.

[0030] When verification is made by the first verifying portion that theuser is a valid user of the service providing system, the first controlunit of the first server may change the public key of the portableterminal. The first server may further include a third requestingportion for requesting the portable terminal to change the secret key ofthe portable terminal correlating to the change of the public key of theportable terminal by the first control unit, and the first storagedevice of the portable terminal may change the secret key of theportable terminal based on a request from the third requesting portionof the first server.

[0031] In an embodiment, a predetermined service terminal is connectedto the network, and processing identified by the second networkidentifier is settlement processing. In the portable terminal, the firstinput device may obtain monetary amount information along with thesecond network identifier from the service terminal, and the firsttransmitter may supply the first network identifier, the second networkidentifier, and the control information containing the monetary amountinformation, to the first server, so that fees indicated by the monetaryamount information can be settled by the settlement processing beingexecuted by the second server. The first requesting portion of the firstserver requests the second server, which executes the settlementprocessing identified by the second network identifier contained in thecontrol information supplied by the first transmitter of the portableterminal, to perform settlement based on the monetary amount informationand the personal information, and the first executing portion of thesecond server executes the settlement processing based on the monetaryamount information and the personal information if the verificationresults supplied by the third transmitter of the first server indicatethat the user is a valid user of the service providing system.

[0032] The first input device may further obtain a payment ID from theservice terminal, the first transmitter may supply control informationfurther containing the payment ID to the first server, and the firstrequesting portion of the first server may request the second server toperform settlement processing based on the monetary amount information,the personal information, and the payment ID, and the first executingportion of the second server may execute the settlement processing basedon the monetary amount information, the personal information, and thepayment ID, if the verification results supplied by the thirdtransmitter of the first server indicate that the user is a valid userof the service providing system.

[0033] In an embodiment, an access port terminal is connected to thenetwork, serving as an access port for portable terminal. The first orsecond transmitter of the portable terminal may supply the controlinformation or the verification data to the access port terminal, andthe access port terminal may include a fourth transmitter for supplyingthe control information or the verification data supplied from the firstor second transmitter of the portable terminal to the first server.

[0034] The first control unit of the first server may further managecharacteristics information of the user, the first server may furtherinclude a fifth transmitter for supplying the characteristicsinformation to the service terminal in response to requests from thesecond server, and the service terminal may further include a secondverifying portion for verification of the user, using thecharacteristics information supplied from the fifth transmitter of thefirst server, and a fifth transmitter for supplying verification resultsby the second verifying portion to the second server. The firstexecuting portion of the second server may execute processing identifiedby the second network identifier, based on the control information andpersonal information, if the verification results supplied from thefifth transmitter of the service terminal indicate that the user is avalid user of the service providing system.

[0035] The user characteristics information may be image data of theface portion of the user, and verification by the second verifyingportion of the service terminal may be performed by displaying an imagecorresponding to image data of the face portion of the user on a displayunit of the service terminal, with the administrator of the serviceterminal comparing the actual face of the user with the image.

[0036] The second server may further include a second storage device foradding a predetermined expiration date to the verification resultssupplied by the third transmitter of the first server, and a comparisonportion for judging, based on the expiration date, whether or not theverification results stored in the second storage device are valid,based on a request from the first requesting portion of the firstserver, wherein the first executing portion of the second server mayexecute processing identified by the second network identifier ifjudgment is made by the comparison portion that the verification resultsare valid.

[0037] In an embodiment, a service terminal for controlling opening andclosing of a gate which can be passed through by purchasing apredetermined ticket is connected to the network. The third transmitterof the first server may supply the first network identifier as theverification results to the second server if the user is recognized as avalid user of the service providing system by the verifying portion, andreferring to the second server, the second storage device may add theexpiration date determined at the time of issuing the ticket to thefirst network identifier supplied by the third transmitter of the firstserver the comparison portion may judge, based on the expiration date,whether or not the first network identifier stored in the second storagedevice is valid, based on a request from the first requesting portion ofthe first server, and the first executing portion may execute processingof opening the gate if judgment is made by the comparison portion thatthe first network identifier is valid.

[0038] In an embodiment, referring to the first server, the firstcontrol unit may add a predetermined expiration date to the verificationresults, and the first verifying portion may judge, based on theexpiration date, whether or not the verification results are valid,based on requests from the second requesting portion of the secondserver, and the third transmitter may supply the verification results tothe second server. Referring to the second server, the second requestingportion may request user verification to the first server at apredetermined timing, and the first executing portion may executeprocessing identified by the second network identifier based on thecontrol information and the personal information, if the verificationresults supplied by the third transmitter of the first server indicatethat the verification results are valid.

[0039] In an embodiment, the service providing system further includesone or a plurality of service processing executing devices for executingprocessing identified by respectively differing sets of the secondnetwork identifier, the first requesting portion of the first server mayrequest to the second server and the service processing executingdevices to be provided with the services based on the controlinformation and the personal information, and the service processingexecuting devices may include a second executing portion for executingprocessing respectively identified by the second network identifier.

[0040] The second executing portion of the service processing executingdevice may execute processing as a monitor, mouse, or keyboard making upa personal computer, and the second server may execute processing as aCPU making up a personal computer. The portable terminal may furtherinclude a fourth transmitter for supplying the first network identifierto one or a plurality of the service processing executing devices, andthe second executing portion of the one or a plurality of the serviceprocessing executing devices may execute processing identified by thesecond network identifier only if the first network identifier issupplied from the fourth transmitter of the portable terminal.

[0041] If the second executing portion of one the service processingexecuting devices executes processing as the keyboard, and the secondserver executes document creating processing, the first control unit ofthe first server may manage the personal information containingcharacter input patterns as to the user on the keyboard, and the firstrequesting portion may request execution of the document creatingprocessing based on the control information and the character inputpattern, to the second server for executing processing identified by thesecond network identifier contained in the control information suppliedby the first transmitter of the portable terminal. The first executingportion of the second server may execute the document creatingprocessing based on the control information and the character inputpattern.

[0042] In an embodiment, the portable terminal is provided withpredetermined service information as the result of processing identifiedby the second network identifier being executed by the first executingportion of the second server, and the portable terminal further includesa second storage device for temporarily storing the service information,and a deleting portion for monitoring the amount of data of the serviceinformation stored in the second storage device, and when the serviceinformation equal to or exceeding a predetermined data amount is stored,deleting with priority the service information not bookmarked, or theservice information not linked to a bookmarked homepage.

[0043] The deleting means may establish an order of priority for thebookmarks, and delete the bookmarked service information, as necessary,according to the order of priority.

[0044] The service providing system may further include a fourthtransmitter, whereby, if the service information is the personalinformation, the first server attaches a tag to the personal informationindicating that the personal information cannot be stored in the secondstorage device of the portable terminal, and supplies the same to theportable terminal.

[0045] In an embodiment, the first server is provided with predeterminedservice information as the result of processing identified by the secondnetwork identifier being executed by the first executing portion of thesecond server, the first server further including a second storagedevice for temporarily storing the service information, and a deletingportion for monitoring the amount of data of the service informationstored in the second storage device, and when the service informationequal to or exceeding a predetermined data amount is stored, deletingwith priority the service information not bookmarked, or the serviceinformation not linked to a bookmarked homepage.

[0046] The deleting portion may establish an order of priority for thebookmarks, and delete the bookmarked service information, as necessary,according to the order of priority.

[0047] When processing identified by the second network identifier isprocessing for Web browsing, the first control unit of the first servermay further manage predetermined information valid for reviewing again ahomepage which has been viewed previously.

[0048] In a service providing system according to an embodiment of thepresent invention, a first network identifier is stored by a portableterminal, a second network identifier is obtained, verification datanecessary for verifying users is obtained and processing identified bythe obtained second network identifier is executed by a second server,whereby, in order to be provided with predetermined services, controlinformation containing the first network identifier and the secondnetwork identifier is supplied to a first server managing personalinformation identified by the stored first network identifier. Theobtained verification data is supplied to a first server, personalinformation identified by the first network identifier is managed at thefirst server, a request for providing services based on controlinformation and personal information is made to the second server forexecuting processing identified by the second network identifiercontained in the supplied control information, the user is verifiedbased on the supplied verification data, based on a request from thesecond server, and the verification results are supplied to the secondserver. Processing identified by the second network identifier ismanaged at the second server, and at the time that a request is made,user verification is requested to the first server, and if the suppliedverification results indicate that the user is a valid user of theservice providing system, processing identified by the second networkidentifier is executed based on the control information and personalinformation.

[0049] A service providing system according to an embodiment of thepresent invention includes a portable terminal holding a first networkidentifier, a first server for managing personal information of a useridentified by the first network identifier, a second server forexecuting processing identified by a second network identifier, and aservice terminal holding the second network identifier, wherein theportable terminal, the first server, the second server, and the serviceterminal are connected via a network. The portable terminal includes astorage device for storing the first network identifier, a first inputdevice for obtaining, from the service terminal, the second networkidentifier and access information for detecting access patterns, asecond input device for obtaining verification data necessary forverification of the user, and a first transmitter for supplying controlinformation containing the first network identifier, the second networkidentifier, and the access information, to the first server. Preferably,the first server manages the personal information identified by thefirst network identifier stored in the a storage device, so as to beprovided with predetermined services, by processing identified by thesecond network identifier obtained by the first input device beingexecuted by the second server. The service terminal includes a firststorage device for holding the second network identifier, a second inputdevice for obtaining the access information from accesses to itself bythe first input device of the portable terminal, a second transmitterfor supplying the second network identifier and the access informationto the portable terminal, so as to be obtained by the first input deviceof the portable terminal, and a third transmitter for supplying thecontrol information supplied by the first transmitter of the portableterminal, to the first server. The first server includes a first controlunit for managing the personal information identified by the firstnetwork identifier, and a first requesting portion for requesting to beprovided with the services based on the control information, thepersonal information, and the access information, to the second serverfor executing processing identified by the second network identifiercontained in the control information supplied by the second transmitterof the portable terminal. The second server includes a second controlunit for managing processing identified by the second networkidentifier, an executing portion for executing, based on the controlinformation, the personal information, and the access information,processing identified by the second network identifier, based onrequests from the first requesting portion of the first server.

[0050] In an embodiment, a first service terminal is installed at afirst location, a second the service terminal is installed at a secondlocation, and the first input device of the portable terminal firstaccesses the first service terminal and then later accesses the secondservice terminal. The access information may contain the time of access,and the executing portion of the second server may calculate thedifference between the time contained in the access information obtainedby the first input device of the first service terminal and the timecontained in the access information obtained by the first input deviceof the second service terminal, judge whether or not the calculationresults indicate time equal to or exceeding a predetermined time, and ifjudgement is made that the calculation results indicate time equal to orexceeding a predetermined time, execute processing identified by thesecond network identifier.

[0051] The first location and the second location may be predeterminedlocations on a concourse of an amusement park or near an entrance or anexit to or from a toll road.

[0052] In an embodiment, the first location is a predetermined locationnear an entrance to a toll road and the second location is apredetermined location near an exit from the toll road. The secondservice terminal may include a camera for capturing images of passingvehicles, and a third input device for obtaining the license platenumber from the vehicle, from the results of images captured by thecamera. The third transmitter of the second service terminal may furthersupply the license plate number obtained by the third input device tothe first server. The first requesting portion of the first server mayrequest the second server which executes processing identified by thesecond network identifier contained in the control information suppliedby the third transmitter of the second service terminal, to provide theserver based on the control information, the personal information, theaccess information, and the license plate number obtained by the secondinput device of the second service terminal. The second server furthermay include a second storage device for holding the license plate numberof the vehicle of the user beforehand, and the executing portion of thesecond server may judge whether or not the license plate number obtainedby the second input device of the second service terminal matches thelicense plate number held in the second storage device. If judgment ismade that these match, settlement processing of the toll for the tollroad may be executed based on the control information and the personalinformation.

[0053] In a service providing system according to an embodiment of thepresent invention, a first network identifier is stored at a portableterminal, a second network identifier and access information fordetecting access patterns is obtained from a service terminal, andprocessing identified by the obtained second network identifier isexecuted by a second server. In order to be provided with predeterminedservices, control information containing the first network identifier,second network identifier, and access information is supplied to theservice terminal at the first server managing personal informationidentified by first network identifier that is stored, the secondnetwork identifier is held at the service terminal, the second networkidentifier and access information is supplied to the portable terminalsuch that access information is obtained by accessing itself, thesupplied control information is supplied to the first server. Personalinformation identified by the first network identifier is managed at thefirst server, a request is made to the second server for executingprocessing identified by the second network identifier contained in thesupplied control information for being provided with service based onthe control information, personal information, and access information.Processing identified by the second network identifier is managed at thesecond server, and processing identified by the second networkidentifier is executed based on the control information, personalinformation, and access information, based on the request.

[0054] Additional features and advantages of the present invention aredescribed in, and will be apparent from, the following DetailedDescription of the Invention and the figures.

BRIEF DESCRIPTION OF THE FIGURES

[0055]FIG. 1 is a diagram illustrating an embodiment of a serviceproviding system according to the present invention.

[0056]FIG. 2 is a block diagram illustrating an embodiment of averification data IC chip assembled into the wristwatch 1 shown in FIG.1.

[0057]FIG. 3 is a block diagram illustrating an embodiment of theportable terminal 2 shown in FIG. 1.

[0058]FIG. 4 is a block diagram illustrating an embodiment of thesettlement device 3-1 shown in FIG. 1.

[0059]FIG. 5 is a block diagram illustrating an embodiment of thepersonal server 5 shown in FIG. 1.

[0060]FIG. 6 is a flowchart describing settlement processing.

[0061]FIG. 7 is a flowchart describing the processing of step S6 in FIG.6.

[0062]FIG. 8 is a flowchart describing the processing of step S7 in FIG.6.

[0063]FIG. 9 is a block diagram illustrating another embodiment of theportable terminal 2.

[0064]FIG. 10 is a flowchart describing settlement processing usingcoupons.

[0065]FIG. 11 is a flowchart describing the processing of step S47 inFIG. 10.

[0066]FIG. 12 is a block diagram illustrating another embodiment of theportable terminal 2.

[0067]FIG. 13 is another flowchart describing settlement processing.

[0068]FIG. 14 is a diagram illustrating another embodiment of a serviceproviding system according to the present invention.

[0069]FIG. 15 is a diagram illustrating another embodiment of a serviceproviding system according to the present invention.

[0070]FIG. 16 is a flowchart describing network shopping processing.

[0071]FIG. 17 is a diagram illustrating another embodiment of a serviceproviding system according to the present invention.

[0072]FIG. 18 is a flowchart describing settlement processing for systemusage fees.

[0073]FIG. 19 is a diagram illustrating another embodiment of a serviceproviding system according to the present invention.

[0074]FIG. 20 is a diagram illustrating another embodiment of a serviceproviding system according to the present invention.

[0075]FIG. 21 is a flowchart describing ticket-taking processing.

[0076]FIG. 22 is a flowchart describing ticket-discharging processing.

[0077]FIG. 23 is a flowchart describing the processing of step S127 inFIG. 22.

[0078]FIG. 24 is a diagram illustrating another embodiment of a serviceproviding system according to the present invention.

[0079]FIG. 25 is a flowchart describing ticket vending processing.

[0080]FIG. 26 is a flowchart describing the processing of step S147 inFIG. 25.

[0081]FIG. 27 is a flowchart describing gate processing.

[0082]FIG. 28 is a flowchart describing other processing of step S147 inFIG. 25.

[0083]FIG. 29 is a flowchart describing other gate processing.

[0084]FIG. 30 is a diagram illustrating another embodiment of a serviceproviding system according to the present invention.

[0085]FIG. 31 is a flowchart describing passage surveillance processing.

[0086]FIG. 32 is a flowchart describing other passage surveillanceprocessing.

[0087]FIG. 33 is a diagram illustrating another embodiment of a serviceproviding system according to the present invention.

[0088]FIG. 34 is a flowchart describing automatic toll paymentprocessing for a toll road.

[0089]FIG. 35 is a diagram illustrating another embodiment of a serviceproviding system according to the present invention.

[0090]FIG. 36 is a flowchart describing contract processing.

[0091]FIG. 37 is another flowchart describing the processing of stepS247 in FIG. 36.

[0092]FIG. 38 is a flowchart describing other settlement processing.

[0093]FIG. 39 is a diagram illustrating another embodiment of a serviceproviding system according to the present invention.

[0094]FIG. 40 is a flowchart describing medical record managingprocessing.

[0095]FIG. 41 is a diagram illustrating another embodiment of a serviceproviding system according to the present invention.

[0096]FIG. 42 is a diagram illustrating another embodiment of a serviceproviding system according to the present invention.

[0097]FIG. 43 is a diagram illustrating another embodiment of a serviceproviding system according to the present invention. and FIG. 44 is ablock diagram illustrating an embodiment of a computer 501.

DETAILED DESCRIPTION OF THE INVENTION

[0098]FIG. 1 illustrates an embodiment of a service providing systemaccording to the present invention. In general, a user A uses theservice providing system to perform settlement of fees.

[0099] Preferably, a wristwatch 1 or the like is worn by the user A, andhas built in an IC chip having functions for communicating with aportable terminal 2, generating a text string or the like with apredetermined algorithm to serve as a password for processing just onetime, according to a request from the portable terminal 2, andtransmitting this to the portable terminal 2. This text string willhereinafter be referred to as “one-time password”, and the IC chip willhereinafter be referred to as “verification data IC chip” (shown in FIG.2).

[0100] The verification data IC chip may be built into articles otherthan wristwatches 1, such as rings or the like. Thus, building theverification data IC chip into articles worn on the body allows usage ofthe system to be facilitated.

[0101] Also, the wristwatch 1 may be waterproofed, so as to be worn atall times (e.g., even when the user is bathing).

[0102] The portable terminal 2 is a compact device which is readilycarried, and connects to a network 4 via a settlement device 3-1according to operations made by the user A, for communicating with apersonal server 5, for example. The portable terminal 2 stores a URLwhich specifies personal information of the user A stored in thepersonal server (this URL hereinafter referred to as “URL 1”), transmitsthe URL 1 to the settlement device 3-1, and the settlement device 3-1performs communication based on the URL 1, thereby enablingcommunication with the personal server 5.

[0103] Note that the URL is not restricted to identifying homepages onthe Internet, but is capable of identifying all sorts of resources inthe network 4, including homepages, text data, processing programs, andthe like.

[0104] The settlement device 3-1 is a device which calculates the totalprice of merchandise purchased by users (e.g., a cash register). Thesettlement device 3-1 can make wireless communication with the portableterminal 2 and also communicates with the personal server 5 and serviceserver 6-1 via the network 4. Thus, the settlement device 3-1 serves asa network access port for the portable terminal 2. Note that in thedrawings referred to in the present specification, devices serving asnetwork access ports are marked as being NAPs (Network Access Ports) forthe portable terminal 2.

[0105] The personal server 5 is a server for managing the personal dataof the user A identified by the URL 1, and communicates with thesettlement device 3-1 and service server 6-1 via the network 4.

[0106] The service server 6-1 is a server for performing processingidentified by a predetermined URL (hereinafter referred to as “URL 2”).The service server 6-1 executes its processing functions bycommunicating with the settlement device 3-1 and personal server 5 viathe network 4. Thus, the user A can receive various types of services.

[0107]FIG. 2 illustrates an embodiment of a verification data IC chipassembled into the wristwatch 1. A CPU 11 executes a program (e.g., aone-time password generating program) stored in main memory 12 which isconnected via a system bus 13, so as to generate a one-time password, orthe like.

[0108] A communication unit 14 makes wireless communication with theportable terminal 2, receives verification data generating requests fromthe portable terminal 2, for example, and supplies the results to theCPU 11 and transmits the one-time password or the like generated by theCPU 11 to the portable terminal 2.

[0109] The communication unit 14 is capable of communicating with theportable terminal 2 using the human body as a medium. Thus, if theportable terminal 2 is directly held by the hand of the user A, forexample, the wristwatch 1 (verification data IC chip) and the portableterminal 2 become communicative, using the body of the user A as amedium.

[0110] An electric power supplying unit 15 supplies electric power tothe components. The electric power supplying unit 15 may be a miniaturebattery, a solar cell, or the like. The electric power supplying unit 15may also use electromotive force generated by electromagnetic induction,thermal electromotive force based on body heat of the user, or the like,as electric power.

[0111]FIG. 3 illustrates an embodiment of a portable terminal 2. Ingeneral, the CPU 21 executes the various types of processing pursuant toprograms stored in the main memory 22.

[0112] The main memory 22 stores various programs, and also stores theURL 1 (that which distinguishes the personal information of the user A).Note that the main memory 12 is configured of SRAM, wherein the storedcontents are saved even if the power of the portable terminal 2 isturned off (i.e., a so-called battery back-up). The main memory 22 canbe configured of a combination of high-speed SRAM and storing flashmemory, or the like.

[0113] An input unit 23 is operated by the user for inputting certaininstructions to the CPU 21 as appropriate. A display unit 24 is made upof an LCD, or the like, for example, for displaying certain characters,shapes, images, or the like. An output unit 25 is configured of aspeaker, or the like, for outputting audio signals.

[0114] A communication unit 26 communicates with the settlement device3-1 (network access port) using infrared ray communication, milliwaveband communication such as Bluetooth technology, airwaves such as 13.5MHz or 20 MHz, or the like. Thus, short-range communication is performedbetween the portable terminal 2 and the settlement device 3-1, and thiscommunication does not cause precision devices such as pacemakers, orthe like, to malfunction. Accordingly, communication between theportable terminal 2 and the settlement device 3-1 can be performedwithout restrictions on locations (i.e., the system can be usedregardless of the location).

[0115] A communication unit 27 communicates wirelessly with theverification data IC chip assembled into the wristwatch 1 (communicationunit 14). The communication unit 27 can communicate with theverification data IC chip using the human body as a medium.

[0116] An interface 28 is situated between the CPU 21 and the followingcomponents: the input unit 23; display unit 24; output unit 25; andcommunication units 26 and 27; and thus, performs interface processing.

[0117]FIG. 4 illustrates an embodiment of a settlement device 3-1. A CPU31 executes various programs according to programs stored in ROM 32. RAM33 stores data necessary for executing various processing functions bythe CPU 31, as appropriate.

[0118] An input unit 34 is operated, as necessary, at the time ofinputting predetermined commands to the CPU 31. A display unit 35 ismade up of an LCD, or the like, for example, for displaying certaincharacters, shapes, images, or the like. A hard disk 36 storespredetermined data (e.g., the URL 2) and reproduces the data, asnecessary.

[0119] A communication unit 37 is connected to the network 4, andcommunicates with the personal server 5 and service server 6-1 thereby.

[0120] A communication unit 38 communicates with the portable terminal 2using infrared ray communication, milliwave band communication such asBluetooth technology, airwaves such as 13.5 MHz or 20 MHz, or the like.

[0121] An interface 39 is situated between the CPU 31 and the followingcomponents: the input unit 34; display unit 35; output unit 36; andcommunication units 37 and 38; and thus, performs interface processing.

[0122]FIG. 5 illustrates an embodiment of a personal server 5. A CPU 41executes various types of processing according to programs stored in ROM42. RAM 43 stores data necessary for executing various processingfunctions type by the CPU 41, as appropriate.

[0123] The ROM 42 stores a program for generating a one-time password orthe like with an algorithm similar to the program stored in thewristwatch 1 (the main memory 12 of the verification data IC chip) forgenerating one-time passwords, or the like. Thus, if the CPU 41 receivesa one-time password, or the like, from the wristwatch 1 via thecommunication unit 47, network 4, settlement device 3-1, and portableterminal 2, the CPU 41 executes the program, and also generates aone-time password. The CPU 41 compares the received one-time password,or the like, with the generated one-time password, or the like, toperform user verification.

[0124] An input unit 44 is operated, as necessary, at the time ofinputting predetermined commands to the CPU 41. A display unit 45 ismade up of an LCD, or the like, for example, for displaying certaincharacters, shapes, images, or the like.

[0125] A hard disk 46 stores predetermined data (e.g., personalinformation such as the name, address bank account number, data of theface portion (hereinafter referred to as “facial photograph data”), of avalid user (such as user A) registered with the service providingsystem), and reproduces this data, as necessary.

[0126] A communication unit 47 is connected to the network 4, andcommunicates with the settlement device 3-1 and service server 6-1 viathe network 4.

[0127] An interface 48 is situated between the CPU 41 and the followingcomponents: the input unit 44; display unit 45; hard disk 46; andcommunication unit 47; and thus, performs interface processing.

[0128] The configuration of the service server 6-1 is similar to that ofthe personal server 5, so illustration and description thereof will beomitted, but note that a program for executing processing identified bythe URL 2 is stored in the ROM or hard disk thereof.

[0129] Next, the procedures for settlement processing will be describedwith reference to the flowchart shown in FIG. 6.

[0130] In step S1, the settlement device 3-1 transmits the URL 2,information indicating monetary amount (hereinafter referred to as“monetary amount of purchase”), and payment ID, to the portable terminal2. The portable terminal 2 receives this.

[0131] At this time, the user A carries the merchandise to be purchasedto a table provided near the settlement device 3-1. A store employeeoperates the input unit 34 of the settlement device 3-1 to calculate themonetary amount of purchase (total monetary amount) of the merchandisewhich the user A has carried to the table, and then performs apredetermined operation on the settlement device 3-1. The settlementdevice 3-1 thus transmits data such as that described above to theportable terminal 2, in response to this operation. The user A (portableterminal 2) is close enough to the settlement device 3-1 so thatshort-range communication can be carried out between the portableterminal 2 and the settlement device 3-1.

[0132] Next, in step S2, the portable terminal 2 transmits the URL 2received in step S1, monetary amount of purchase, and payment ID, to thepersonal server 5 via the settlement device 3-1 and network 4, and alsorequests the personal server 5 for communication with the service server6-1 which executes the processing identified by the URL 2. Communicationbetween the portable terminal 2 and the personal server 5 can beperformed by the portable terminal 2 transmitting the URL 1 to thesettlement device 3-1 and the settlement device 3-1 performingcommunication based on this. Thus, the personal server 5 receives thedata transmitted from the portable terminal 2 and recognizes the requestthereof.

[0133] For example, at this time, the CPU 21 of the portable terminal 2controls the display unit 24 and displays information received in stepS1. Upon confirming the information displayed on the display unit 24,the user A performs predetermined operations at the input unit 23. Thus,the portable terminal 2 transmits information received in step S1 to thepersonal server 5, in response to the operations thereof.

[0134] In step S3, the personal server 5 requests connection to theservice server 6-1, based on the request recognized in step S2. Theservice server 6-1 responds to the request. Thus, communication isestablished between the personal server 5 and the service server 6-1.

[0135] Next, in step S4, the personal server 5 transmits the payment IDand monetary amount of purchase received in step S2 to the serviceserver 6-1, and the service server 6-1 receives this.

[0136] In step S5, the service server 6-1 requests the personal server 5for user verification. The personal server 5 recognizes the request.

[0137] Next, in step S6, user verification processing using facialphotograph data is performed. The details of the processing areillustrated in the flowchart shown in FIG. 7.

[0138] In step S21, the personal server 5 transmits the facialphotograph data stored as the personal information of the user A to thesettlement device 3-1. The settlement device 3-1 receives this. Next, instep S22, the settlement device 3-1 displays an image corresponding tothe facial photograph data on the display unit 35.

[0139] In step S23, the settlement device 3-1 recognizes the userverification results by facial photograph. Specifically, a storeemployee confirms whether or not the individual is actually the user A,based on the image of the face displayed on the display unit 35 of thesettlement device 3-1, or in other words, confirms whether or not theindividual is a valid user registered with the system. The storeemployee then performs operations according to the confirmation resultsat the input unit 34 of the settlement device 3-1. Thus, the settlementdevice 3-1 recognizes the user verification results by facialphotograph.

[0140] Next, in step S24, the settlement device 3-1 transmits the userverification results recognized in step S23 to the personal server 5 andthe service server 6-1. The personal server 5 and service server 6-1receive this. Note that the following description will proceed with theunderstanding that the user A has been verified as being a valid user.

[0141] Subsequently, processing ends, and the flow proceeds to the stepS7 in FIG. 6, where user verification by verification data is carriedout. This processing is illustrated in the flowchart shown in FIG. 8.

[0142] In step S31, the personal server 5 requests the portable terminal2 for verification data, via the network 4 and the settlement device3-1. The portable terminal 2 recognizes this request. Note thatcommunication between the personal server 5 and portable terminal 2 isalways performed via the network 4 and the settlement device 3-1, so inthe following description, the phrase “via the network 4 and thesettlement device 3-1” may be omitted when describing communicationbetween the personal server 5 and portable terminal 2.

[0143] Next, in step S32, the portable terminal 2 obtains a one-timepassword as verification data from the wristwatch 1, based on therequest recognized in step S31. Specifically, the CPU 21 of the portableterminal 2 first controls the display unit 24 to display a messageindicating that a request is being made for verification data.Accordingly, the user A brings the wristwatch 1 near the portableterminal 2 (or directly holds the portable terminal 2 in his/her hand).Consequently, communication can be carried out between the wristwatch 1(verification data IC chip) and the portable terminal 2, so the portableterminal 2 requests the verification data IC chip to generate theverification data, the verification data IC chip generates a one-timepassword in response to the request, and transmits this to the portableterminal 2. The portable terminal 2 receives the one-time password fromthe wristwatch 1. Thus, the portable terminal 2 obtains the one-timepassword as verification data.

[0144] In step S33, the portable terminal 2 transmits the verificationdata obtained in step S32 to the personal server 5. The personal server5 receives this.

[0145] Next, in step S34, the personal server 5 generates a one-timepassword by itself, compares this with the verification data received instep S33, and thus performs user verification. Specifically, asdescribed above, the CPU 41 of the personal server 5 generates aone-time password with the same algorithm as that of the one-timepassword generating program executed by the verification data IC chipthat is stored in the ROM 42, and performs comparison with the receivedone-time password. If both are the same, the user is verified as being avalid user.

[0146] In step S35, the personal server 5 transmits the results of userverification to the service server 6-1. The service server 6-1 receivesthis.

[0147] Now, if user verification is established at this point (i.e., ifthe user A has been verified as being a valid user), the personal server5 updates the one-time password generating algorithm, and also transmitsinformation relating to the update to the wristwatch 1 (verificationdata IC chip) via the portable terminal 2. The verification data IC chipreceives this. Accordingly, the verification data IC chip updates itsown one-time password generating algorithm corresponding to the updatewhich the personal server 5 has made.

[0148] Thus, updating the one-time password generating algorithm of theverification data generating IC chip and the personal server 5 (i.e.,the verifying side and the side being verified) when that userverification is established allows unauthorized use of the presentsystem to be prevented. For example, the one-time password generatingalgorithm is updated, so even if the verification data generating ICchip itself is duplicated, one-time passwords generated thereby will notyield user verification.

[0149] Subsequently, the processing ends and the flow proceeds to stepS8 in FIG. 6. Note that the following description will proceed with theunderstanding that the user A has been verified as being a valid user byuser verification with verification data.

[0150] Upon the user A being verified as a valid user, paymentprocessing is performed in step S8. Specifically, the service server 6-1notifies the personal server 5 of the destination for transferring thepayment to.

[0151] The personal server 5 performs predetermined transfer processingto transfer the payment to a server A (not shown) which is the notifieddestination for transferring the payment to, and when the transfer hasbeen completed, notifies the service server 6-1 to that effect. At thistime, an arrangement may be made wherein the personal server 5 transmitselectronic money or the like with a payment ID appended thereto to theserver A, and the server A uses the payment ID to settle thetransaction. The following description will proceed with theunderstanding that payment for the monetary amount of purchase has beencompleted.

[0152] Once payment for the monetary amount of purchase has beencompleted, in step S9 the service server 6-1 transmits the payment IDreceived in step S4 to the settlement device 3-1 (i.e., returns thepayment ID). The settlement device 3-1 receives this.

[0153] In step S10, the settlement device 3-1 recognizes completion ofthe payment processing. Specifically, the CPU 31 of the settlementdevice 3-1 controls the display unit 35, and displays the payment IDreceived in step S9. Thus, the store employee recognizes that paymentfor the monetary amount of purchase has been completed, and performspredetermined operations at the input unit 34 of the settlement device3-1. Thus, the settlement device 3-1 recognizes completion of thepayment processing.

[0154] Subsequently, the processing ends. Thus, settlement of themonetary amount of purchase is carried out.

[0155] Thus, the personal information of the user A is stored in thepersonal server 5, not in the portable terminal 2, so that if the userloses the portable terminal 2, there is no chance of personalinformation being found by a third party and being used in anunauthorized manner.

[0156] Also, communication between the portable terminal 2 and thenetwork access port (settlement device 3) is conducted via short-rangecommunication, which does not cause precision devices such aspacemakers, or the like, to malfunction. Thus, the user can performcommunication between the portable terminal 2 and settlement device 3 atany time.

[0157] The above arrangement is described with a settlement device 3being provided as a network access port, but an arrangement may also bemade wherein the portable terminal 2 directly communicates with thepersonal server 5 or the like.

[0158] Also, the above description involved carrying out both userverification by facial photograph in step S6 and user verification byverification data in step S7, but an arrangement may be made wherein,for example, only one type of user verification is performed.

[0159] Also, the above description mentions an example of using aone-time password generated by the wristwatch 1 as the verificationdata, but other arrangements may be made, such as using a passwordencrypted with a common key shared by the portable terminal 2 and thepersonal server 5, or a password encrypted with a public key of thepersonal server 5, as verification data. Further, fingerprints,voiceprints, iris patterns, contrast patterns of capillaries atpredetermined portions of the body, or the like may be used asverification data, as well. Also, an arrangement may be made wherein, ifthere is an appropriate response from the verification IC chip to arequest from the personal server 5, the portable terminal 2 obtainsverification data from the verification IC chip.

[0160]FIG. 9 illustrates an embodiment of a portable terminal 2 capableof taking fingerprints and voiceprints as verification data. Thisportable terminal 2 is an arrangement wherein the portable terminal 2shown in FIG. 3 has been further provided with a fingerprint-takingsensor 51 for taking fingerprints, and a microphone 52 for taking inaudio.

[0161] The fingerprint-taking sensor 51 is attached so that the user Acan press the round of the finger thereupon, such that whenever theround of the finger is pressed thereupon, the fingerprint data thereofis taken and output to the CPU 21. Also, the microphone 52 takes in thevoice of the user A and outputs this to the CPU 21.

[0162] The CPU 21 analyzes the fingerprint data from thefingerprint-taking sensor 51 or the audio data from the microphone 52,and obtains the characteristics data thereof as verification data.

[0163] The characteristics data of the fingerprint or voiceprint servingas the verification data is crucial data for distinguishing individuals,and accordingly should be encrypted when transmitting the verificationdata to the personal server 5 during processing in step S33 shown inFIG. 8, for example, when using fingerprints or voiceprints asverification data.

[0164] Preferably, the portable terminal 2 holds the public key for theURL 1, and transmits the obtained verification data (the characteristicsdata of the fingerprint or voiceprint or the like) to the settlementdevice 3-1 with the public key of the URL 1. The settlement device 3-1receives these. Now, the communication between the portable terminal 2and settlement device 3-1 is short-range communication, so theverification data is not encrypted for the communication between theportable terminal 2 settlement device 3-1, since there is little chanceof tampering with the data being transmitted in this case. However,arrangements may be made wherein the portable terminal 2 itself performsencryption. If the potable terminal 2 does not have verification dataprocessing ability, settlement device 3-1 can gather the user'sverification data, for example, the user's fingerprints.

[0165] The settlement device 3-1 encrypts the verification data with thepublic key of the received URL 1, and transmits the verification data tothe personal server 5. The personal server 5 receives this.

[0166] Thus case, the personal server 5 has the secret key for the URL1, and uses this to decrypt the encryption of the verification data fromthe settlement device 3-1.

[0167] The personal server 5 also stores beforehand (at the time ofregistration of the user A) the characteristics data of the user A, suchas fingerprints or voiceprint, as verification data, and at theprocessing of step S34 in FIG. 8, the verification data obtained bydecrypting the encryption is compared with the verification data storedtherein, thereby verifying the user A.

[0168] Thus, if encryption of verification data is necessary, theencryption is performed at the settlement device 3-1 serving as thenetwork access port, so more powerful encryption can be performed ascompared to encrypting with the portable terminal 2. Normally, portableterminals 2 cannot carry programs for powerful encryption, due to designconsiderations such as reduction in size.

[0169] Also, an arrangement may be made, wherein, in step S35 in FIG. 8,the public key of the URL 1 which the portable terminal 2 has, and thesecret key of the URL 1 which the personal server 5 has, can be changedin a correlated manner at the time of updating the one-time passwordgenerating algorithm. Thus, changing the keys themselves realizes aneven more powerful encryption.

[0170] Also, if predetermined information is to be encrypted andtransmitted from the personal server 5 to the portable terminal 2, thepersonal server 5 holds the public key of the portable terminal 2 aspersonal information of the user A, encrypts the information with thepublic key, and transmits the information to the portable terminal 2.The portable terminal 2 decrypts the encryption of the information fromthe personal server 5 using its own secret key. Thus, arrangements maybe made wherein the keys are changed according to the user verificationresults.

[0171] Also, while the payment processing in step S8 in the embodimentshown in FIG. 6 assumes payment using money in a bank account (i.e.,cash), coupons (or vouchers) may be used for payment as well. The term“coupon” refers to data that has been encrypted with a public key of ashop where the coupon can be used, indicating the amount of money whichcan be used there (i.e., coupon data). The coupon which the user A has,is stored in the personal server 5 (on the hard disk 46) as personalinformation of the user A.

[0172] The procedures for settlement processing using the coupon will bedescribed with reference to the flowchart shown in FIG. 10.

[0173] The processing in steps S40 through S46, S48, and S49 in FIG. 10are the same as the processing in steps S1 through S7, S9, and S10 inFIG. 6, so description thereof will be omitted.

[0174] In step S47, payment processing by coupon is carried out. Thedetails of the processing are illustrated in the flowchart shown in FIG.11.

[0175] In step S51, the personal server 5 transmits the coupon dataencrypted with the public key of the service server 6-1 to the serviceserver 6-1. The service server 6-1 receives this.

[0176] Next, in step S52, the service server 6-1 decrypts the encryptionof the coupon data received in step S51, using its own secret key. Inthis case, the service server 6-1 has its own secret key and public keybeforehand.

[0177] In step S53, the service server 6-1 subtracts the monetary amountof the purchase, received in step S43, from the monetary amountavailable for purchasing which is indicated in the coupon data.

[0178] Next, in step S54, the service server 6-1 encrypts the results ofsubtraction using the public key of the personal server 5, generates(updates) the coupon data, and transmits the data to the personal server5. The personal server 5 receives this.

[0179] In step S55, the personal server 5 stores the coupon datareceived in step S54, as personal information of the user A.

[0180] Subsequently, the processing ends, and the flow proceeds to stepS48 in FIG. 9. Thus, payment is carried out using the coupon.

[0181] Now, while the embodiment shown in FIG. 6 has been described withreference to an embodiment where the user A takes merchandise to bepurchased to a settlement device 3-1 (cash register) and pays the pricefor the monetary amount purchased that is calculated by the settlementdevice 3-1, the next embodiment will be described with reference tosettlement processing where the merchandise is too bulky, for example,to be carried to the settlement device 3.

[0182]FIG. 12 illustrates an embodiment of a portable terminal 2 used inthis case. Note that the components in the figure which correspond tocomponents in FIG. 3 are denoted with the same reference numeral, anddescription thereof will be omitted.

[0183] In general, this portable terminal 2 is an embodiment of theportable terminal 2 shown in FIG. 3 further provided with an imagesensor 61.

[0184] The image sensor 61 is a sensor which obtains a URL 2 attached tomerchandise or the like (e.g., a URL 2 attached to a tag on themerchandise), as image data. The CPU 21 recognizes the URL 2 from theimage data obtained by the image sensor 61.

[0185] Next, the procedures for the settlement processing will bedescribed with reference to the flowchart shown in FIG. 13. Note, anetwork access port (not shown) is installed near the merchandise withthe URL 2 attached.

[0186] In step S61, the portable terminal 2 (CPU 21) obtains the URL 2attached to the merchandise from the image data obtained by the imagesensor 61.

[0187] Next, in step S62, the portable terminal 2 transmits the URL 2obtained in step S61 and signals, indicating purchasing of themerchandise, the personal server 5 via an network access port (notshown) and the network 4, and requests communication with the serviceserver 6-1 which manages the URL 2.

[0188] Note, the actions of the portable terminal 2 in steps S61 or S62are preferably performed according to certain operations of the user Aon the portable terminal 2. Also, the user A (the portable terminal 2)is close enough to the network access port, thereby allowing short-rangecommunication between the portable terminal 2 and the network accessport.

[0189] In step S63, communication between the personal server 5 and theservice server 6-1 is established. In step S64 the personal server 5transmits signals indicating purchasing of merchandise specified by theURL 2 to the service server 6-1. The service server 6-1 receives this.

[0190] In step S65, the service server 6-1 requests the personal server5 for user verification. The personal server 5 recognizes the request.

[0191] In step S66, user verification by verification data is performed.The processing here is performed in a similar manner to the processingdescribed in step S7 in FIG. 6, so description thereof will be omitted.

[0192] Once the user A is verified as being a valid user in step S66,the service server 6-1 transmits merchandise information indicated bythe URL 2 (e.g., pricing information, product introduction information,and the like) to the personal server 5 as indicated in step S67. Thepersonal server 5 receives these and transmits to the portable terminal2. The portable terminal 2 receives these.

[0193] In step S68, the portable terminal 2 recognizes whether or notthe merchandise will be purchased. Specifically, the CPU 21 of theportable terminal 2 displays the merchandise information received instep S67 on the display unit 24. The user A judges whether or not thepurchase the merchandise, based on the merchandise information displayedon the display unit 24, and performs an operation corresponding to thejudgement results, at the input unit 23. Thus, the CPU 21 recognizeswhether or not the merchandise is to be purchased.

[0194] Once the operations for purchasing the merchandise are performedat the input unit 23 of the portable terminal 2 by the user A, paymentprocessing is carried out in step S69. The processing here is similar tothat described in step S8 in FIG. 6, so description thereof will beomitted.

[0195] Now, for example, if the price of merchandise changes within ashort time, such as with an auction, the processing in steps S67 and S68are repeatedly executed, so the user can make reference to theever-changing merchandise prices and determine purchasing of themerchandise. Also, at this time, the user A may operate the input unit23 of the portable terminal 2 and input a bid, for example, toparticipate in the auction.

[0196] Also, the embodiment shown in FIG. 13 has been described withreference to settlement processing where the URL 2 is obtained fromimage data obtained by the image sensor 61, but if a barcode indicatingthe URL 2 (including two-dimensional codes) is attached to themerchandise, the portable terminal 2 may have a code reader or the liketo read the URL 2.

[0197] Also, if the URL 2 is intermittently contained in the audiopromoting the merchandise at an inaudible bandwidth, the portableterminal 2 may take in the audio with a microphone 52 (FIG. 9) andextract the URL 2. Further, if the URL 2 is output by infrared rays, theportable terminal 2 may have an infrared ray sensor and extract the URL2 from the infrared rays received by the infrared ray sensor, or, if theURL 2 is output by from a predetermined transmitting device a highfrequencies, the portable terminal 2 may have a high-frequency antennaand extract the URL 2 from the high-frequency airwaves received by thehigh-frequency antenna.

[0198] Also, the embodiment shown in FIG. 13 has been described withreference to a where settlement processing the merchandise informationis displayed on the display unit 24 of the portable terminal 2, but incases where the information is better displayed on a larger screen orthe like, the merchandise information may be displayed on a monitor 3-2serving as a network access port installed near the merchandise, asshown in FIG. 14. Note that in the present specification, devices havingfunctions to serve as a network access port as to the portable terminal2 are denoted by “3-”, and the configuration thereof is basically thesame as the configuration of the settling device 3-1 (shown in FIG. 4).

[0199] In this embodiment, basically the same processing as that shownin the flowchart in FIG. 13 is performed, but in the processingequivalent to step S62, the portable terminal 2 transmits the URL of themonitor 3-2 (a URL 3) to the personal server 5 along with the URL 2 andthe signals indicating purchasing of the merchandise. Thus, prior tothis processing, the user confirms the URL 3 on the monitor 3-2displayed in a visible manner (e.g., attached to the monitor 3-2), andinputs this to the input unit 23 of the portable terminal 2.

[0200] Accordingly, in the processing equivalent to step S67, theservice server 6-1 transmits merchandise information and the like to themonitor 3-2. The monitor 3-2 receives, and displays this.

[0201] Also, according to such an embodiment, if the service server 6-1is to distribute contents (music pieces or picture data), for example,the user A can purchase the contents, and have the contents transmittedto his/her own player (e.g., audio device or monitor) for listening orviewing. Also, this may be transmitted to the personal server 5 ratherthan a player and stored there, for the user A to use at a later time.

[0202] Also, if the service server 6-1 is to provide music piece data ascontents, the URL 2 of the contents may be included in promotionalplayings of the music piece performed as one method of promotion (e.g.,playing the music in stores or over the radio), so that if the user Alistens to the promotional playing and wants to purchase the piece, theuser A can operate the portable terminal 2 such that the music piece isread in from a microphone (the microphone 52) and the URL 2 thereof isobtained. Thus, the contents can be supplied to the player or personalserver 5.

[0203] Also, the embodiment shown in FIG. 13 has been described withreference to a where settlement processing the merchandise informationwhich the service server 6-1 has is displayed on the monitor 3-2, but anarrangement may be made wherein the monitor 3-2 has the information.

[0204] Also, the embodiment shown in FIG. 13 has been described withreference to a settlement processing where a URL 2 of one product isobtained and payment is made. However, an arrangement may be made wherethe user A receives the URL 2 (the URL which is unique to each product)for multiple products in which the user A is interested but has notdecided to purchase at this point. Preferably, user A also receivesmerchandise information while going along, so as to make reference tothe merchandise information at a later time and ultimately decide on themerchandise to purchase.

[0205] The personal server 5 stores (in cache) merchandise informationthat has been provided, and if there is a request from the portableterminal 2, the personal server 5 transmits the merchandise informationthat has been requested to the portable terminal 2. Thus, there is noneed to access the service server 6-1 again regarding the informationwhich the personal server 5 stores, so necessary information can bereadily viewed, and communication costs can be conserved. Also, anarrangement may be made wherein the portable terminal 2 performs Webbrowsing or the like of the service server 6-1 via the personal server5, and the personal server 5 caches operational information at the timeof viewing a certain page, so that this can be used for viewing the samepage again. Thus, the user can reach the same page in a shorter time.

[0206] Also, in addition to the personal server 5, the portable terminal2 may also cache data. However, in the case of caching personalinformation, this information may be leaked to a third party if theportable terminal 2 is lost. Thus, when transmitting such personalinformation to the portable terminal 2, the personal server 5 attaches atag to the personal information to the effect that caching of thepersonal information is forbidden. Thus, personal informationtransmitted from the personal server 5 is not cached in the portableterminal 2, so even if the portable terminal 2 is lost, personalinformation contained in the lost portable terminal 2 can be preventedfrom falling into the hands of a third party.

[0207] Also, there is a limit to the amount of information that can bestored in the personal server 5, and if this limit is exceeded,information stored therein must be deleted. At this time, the personalserver 5 deletes data that is not bookmarked or data that is not linkedto a bookmarked page (i.e., with higher priority). Also, if there isfurther need to delete information, the personal server 5 establishes anorder of priority for the bookmarks, and deletes those with lowerpriority.

[0208]FIG. 15 illustrates another embodiment of a service providingsystem according to the present invention. In general, the user A uses apersonal computer 3-3 as a browsing device and as a network access portfor the portable terminal 2, to conduct network shopping with a shoppingserver 6-2. Note that in the present specification, devices havingfunctions to serve as servers providing services are denoted by “6-”,and the configuration thereof is basically the same as the configurationof the personal server 5 (shown in FIG. 5).

[0209] The processing procedures for performing network shopping areillustrated in the flowchart shown in FIG. 16.

[0210] In step S81, the personal computer 3-3 accesses the shoppingserver 6-2 via the network 4. In step S82, the personal computer 3-3recognizes the merchandise to be purchased, and in step S83, transmitsthe URL thereof (URL 2) to the portable terminal 2. The portableterminal 2 receives this. At this time, the user A (portable terminal 2)is close enough to the personal computer 3-3 that rearrangecommunication between the portable terminal 2 and the personal computer3-3 can be made.

[0211] Note that the actions of the personal computer 3-3 in steps S81through S83 are performed according to certain operations of the user Aon the personal computer 3-3 on the keyboard or the like, for example.

[0212] Next, in step S84, the portable terminal 2 transmits the URL 2received in step S83 to the personal server 5 via the personal computer3-3 and the network 4, and request communication with the shoppingserver 6-2 managing the URL 2. The personal server 5 receives the URL 2and recognizes the request.

[0213] In step S85, communication between the personal server 5 and theshopping server 6-2 is established. In step S86 the personal server 5transmits the URL 2 to the shopping server 6-2. The shopping server 6-2receives this.

[0214] Next, in step S87, the shopping server 6-2 requests the personalserver 5 for user verification. The personal server 5 recognizes therequest.

[0215] In step S88, user verification by verification data is performed.The processing performed in step S88 is performed in a similar manner tothe processing performed in step S7 in FIG. 6, so description thereofwill be omitted.

[0216] Once the user A is verified as being a valid user in step S88,payment processing is performed in step S89. The processing performed instep S89 is substantially similar to the processing performed in step S8in FIG. 6, with the monetary amount information or the like of themerchandise indicated by the URL 2 being transmitted from the shoppingserver 6-2 to the personal server 5, and the personal server 5 performstransfer processing according to that monetary amount.

[0217] Once the payment processing is completed in step S89 (i.e.,payment is concluded), processing for shipping the merchandise isperformed in step S90. Specifically, the shopping server 6-2 obtainsfrom the personal server 5 the address of the user A as a shippingdestination, for example, and transmits this to another server (notshown) which manages the shipping (hereinafter referred to as “shippingserver”). A deliverer delivers the merchandise purchased by the user Ato the shipping destination obtained from the shipping server.

[0218] In step S91, the shopping server 6-2 transmits the contents ofthe shipping processing to the personal computer 3-3, which the personalcomputer 3-3 receives and displays. Thus, the user A can confirm thatthe shipping procedures have been completed (e.g., that the shippingaddress has been determined).

[0219] The shipping server is arranged to, for example, periodicallyprovide delivery status (e.g., the date of shipping and the deliverycenter where the merchandise currently is) to the personal server 5, sothe user A can make reference to this information using the portableterminal 2.

[0220] Also, if the shipping destination is not stored in the personalserver 5 as personal information, the user A can notify the shoppingserver 6-2 of the desired shipping destination, by operating theportable terminal 2. Further, if the user A wants to specify adestination other than his/her address, abstract specifications such as“the convenience store closest to my house” may be made as well. Thus,the shopping server 6-2 searches for the convenience store closest tothe house of the user A based on the address of the user A obtained fromthe personal server 5, and notifies the shipping server of that shippingdestination.

[0221] Also, the embodiment shown in FIG. 16 (FIG. 15) has beendescribed with reference to a system where a user conducts networkshopping with a personal computer 3-3, but the personal computer 3-3 isnot restricted to a computer owned by the user A. For example, systemproviding businesses might install personal computers 3-3 (networkaccess ports) in restaurants or on the street, for example, so that theuser A can use such personal computers 3-3 and receive services such asdescribed above.

[0222] However, there is the need to invoice the user A using thenetwork access port for the usage fees or the like of the serviceproviding system. FIG. 17 illustrates a network access portadministration server 71 (hereinafter referred to as “administrationserver”) which manages usage fees of the service providing system. Theadministration server 71 communicates with the network access port 3 andpersonal server 5 via the network 4, and executes settlement processingfor usage fees determined by a URL 4.

[0223] Next, the procedures for settlement processing of usage fees ofthe service providing system will be described with reference to theflowchart shown in FIG. 18.

[0224] In step S101, the network access port 3 calculates the amount ofdata transferred in a series of transactions (e.g., the amount of datatransferred to the portable terminal 2 or personal server 5).

[0225] Next, in step S102, the network access port 3 transmits theamount of data transferred that has been calculated in step S101, theURL 4, and information indicating its own location (locationinformation) to the personal server 5, and requests communication withthe administration server 71 which executes processing identified by theURL 4. The personal server 5 receives the data, and recognizes therequest. The personal server 5 stores the received location informationas personal information of the user A. Also, the network access port 3holds the URL 4.

[0226] In step S103, communication between the personal server 5 and theadministration server 71 established. In step S104 the personal server 5transmits the location information URL 4, and amount of datatransferred, received in step S102, to the administration server 71. Theadministration server 71 receives these.

[0227] Next, in step S105, the administration server 71 requests thepersonal server 5 for user verification. In step S106, the personalserver 5 performs user verification by verification data. The processingperformed in step S106 is similar to the processing performed in step S7in FIG. 6, so description thereof will be omitted.

[0228] Once the user A is verified in step S106, the flow proceeds tostep S107 where the administration server 71 judges whether or not thenetwork access port 3 is being used in an unauthorized manner, based onthe location information received in step S104.

[0229] For example, if the area of usage is restricted in the contractof the user A, and the location information indicates an area outside ofthe contract area, this is judged as being unauthorized use (use outsideof the contract). Also, if access has been made from two network accessports that are separated by a distance that could not conceivably betraversed in the access interval (the time between accesses), this isjudged as being unauthorized use.

[0230] If judgement is made in step S107 that the use is notunauthorized, the flow proceeds to step S108, and payment processing isperformed. Specifically, the administration server 71 executessettlement processing identified by the URL 4. Thus, payment is made forthe system usage fees corresponding to the amount of data transferredthat has been calculated in step S101.

[0231] If judgement is made in step S107 that unauthorized use is beingmade, the flow proceeds to step S109, and predetermined processing isexecuted.

[0232] Following step S108 or S109, the processing ends. Description hasbeen made with reference to an embodiment where the administrationserver 71 judges whether or not unauthorized use is being made based onlocation information of the network access port 3, but an arrangementmay be made where, for example, the above-described service server 6-1obtains location information of the settlement device 3-1, and judgmentis made regarding whether or not unauthorized use is being made of thesettlement device 3-1.

[0233] Although the embodiments shown in FIGS. 1, 14, 15, and 17 havebeen described regarding the user of one user A, in reality, other users(user B) may use the system with other portable terminals B, as shown inFIG. 19. Thus, the personal server 5 manages the personal information ofmany users, based on the URL 1 of each.

[0234] Now, the processing procedures for a user B to use contents whicha user A has purchased and are managed as personal information of theuser A in the personal server 5, will be described.

[0235] If notification is made from the portable terminal 2 or theportable terminal B to the effect that user B will use predeterminedcontents which the user A has purchased, the personal server 5 transmitsthe location (address) where the contents are stored, to the portableterminal B. The portable terminal B receives and stores this. If theuser B desires to use the contents, the user B operates the portableterminal B, and obtains the contents according to the earlier-storedaddress.

[0236] Thus, the personal server 5 does not need to hold contents in aredundant manner (i.e., does not need to hold the same contents,separate, as personal information for both user A and user B). Also, theportable terminal B does not need to hold the contents until the user Bactually uses the contents. Thus, the personal server 5 and the portableterminal B can hold the contents in an efficient manner.

[0237] The purchased contents and the like can be transferred over thenetwork 4 as described above, and thus are stored in the personal server5 as information that can be transferred, but information such as theaddress, telephone number, etc., of the user is not normallytransferred, and accordingly is saved in the personal server 5 asinformation that cannot be transferred.

[0238]FIG. 20 illustrates another embodiment of a service providingsystem according to the present invention. In general, the serviceproviding system is used to handle tickets at a train station.

[0239] A turnstile device 3-4 is a turnstile device installed at theturnstiles at a train station A where the user A gets on, and aturnstile device 3-5 is a turnstile device installed at the turnstilesat a train station B where the user A gets off. Both turnstile devices3-4 and 3-5 function as network access ports, so as to communicate witha station server 6-3 and a station server 6-4.

[0240] The station server 6-3 executes processing functions for managinginformation relating to ticket-taking at the turnstile device 3-4 of thestation A identified by a URL 2-1, and the station server 6-4 executesprocessing functions for managing information relating toticket-discharging at the turnstile device 3-5 of the station Bidentified by a URL 2-2.

[0241] Next, the procedures for ticket-taking processing will bedescribed with reference to the flowchart shown in FIG. 21.

[0242] In step S111, the turnstile device 3-4 at station A transmits theURL 2-1, the time of ticket-taking, and the ID of the station A, to theportable terminal 2. The portable terminal 2 receives these. At thistime, the user A (portable terminal 2) is close enough to the turnstiledevice 3-4 that short-range communication between the portable terminal2 and the turnstile device 3-4 can be made.

[0243] Next, in step S112, the portable terminal 2 transmits the URL2-1, the time of ticket-taking, and the ID of the station A, obtained instep S111, to the personal server 5, via the turnstile device 3-4 andthe network 4, and request communication with the station server 6-3executed by processing identified by the URL 2-1. The personal server 5receives the data transmitted from the portable terminal 2, andrecognizes the request. The personal server 5 stores the received dataas personal information of the user A.

[0244] Describing the processing in step S112 more specifically, the CPU21 of the portable terminal 2 displays the information received in stepS111 on the display unit 24. The user A, upon confirming the informationdisplayed on the display unit 24, makes predetermined operations at theinput unit 23. Thus, the portable terminal 2 transmits the informationreceived in step S111 to the personal server 5.

[0245] In step S113, communication between the personal server 5 and thestation server 6-3 is established. In step S114, the personal server 5transmits the ticket-taking time and ID of the station A received instep S112 to the station server 6-3 along with the URL 1. The stationserver 6-3 receives these.

[0246] Next, in step S115, the station server 6-3 requests the personalserver 5 for user verification. The personal server 5 recognizes therequest.

[0247] In step S116, user verification is performed by verificationdata. The processing performed in step S116 is similar to the processingperformed in step S7 in FIG. 6, so description thereof will be omitted.

[0248] Once the user A is verified as being a valid user in step S116,flow proceeds to step S117 where the station server 6-3 stores the datareceived in step S114. Subsequently, the processing ends.

[0249] Next, the procedures for ticket-discharging processing will bedescribed with reference to the flowchart shown in FIG. 22.

[0250] In step S121, the turnstile device 3-5 at station B transmits theURL 2-2, the time of ticket-discharging, and the ID of the station B, tothe portable terminal 2. The portable terminal 2 receives these. At thistime, the user A (portable terminal 2) is close enough to the turnstiledevice 3-5 that short-range communication between the portable terminal2 and the turnstile device 3-5 can be made.

[0251] Next, in step S122, the portable terminal 2 transmits the URL2-2, the time of ticket-discharging, and the ID of the station B,obtained in step S121, to the personal server 5, via the turnstiledevice 3-5 and the network 4, and requests communication with thestation server 6-4 which executes processing identified by the URL 2-2.The personal server 5 receives the data transmitted from the portableterminal 2, and recognizes the request.

[0252] Describing the processing in step S122 more specifically, the CPU21 of the portable terminal 2 displays the data received in step S121 onthe display unit 24. The user A, upon confirming the informationdisplayed on the display unit 24, makes predetermined operations at theinput unit 23. Thus, the portable terminal 2 transmits the informationreceived in step S121 to the personal server 5.

[0253] Communication between the personal server 5 and the stationserver 6-4 is established in step S123. In step S124, the personalserver 5 transmits the ticket-discharging time and ID of the station Breceived in step S122 to the station server 6-4 along with the URL 1.The station server 6-4 receives these.

[0254] Next, in step S125, the station server 6-4 requests the personalserver 5 for user verification. The personal server 5 recognizes therequest.

[0255] In step S126, user verification is performed by verificationdata. The processing performed in step S126 is similar to the processingperformed in step S7 in FIG. 6, so description thereof will be omitted.

[0256] Once the user A is verified as being a valid user in step S126,flow proceeds to step S127 where fare calculation processing isperformed, as illustrated in the flowchart shown in FIG. 23.

[0257] In step S131, the station server 6-4 communicates with thepersonal server 5, and obtains the ID of the station A which is storedas the personal information of the user A (step S112 in FIG. 21).

[0258] In step S132, the station server 6-4 calculates the fare based onthe ID of the station A obtained in step S131, and the ID of the stationB obtained in step S124. Then, the process ends, and the flow proceedsto step S128 in FIG. 22.

[0259] In step S128, payment processing is performed. The station server6-4 communicates the transfer destination of the fare calculated in stepS127 to the personal server 5. The personal server 5 performspredetermined transfer processing to the destination server (not shown)that has been notified thereto. Subsequently, the processing ends.

[0260]FIG. 24 illustrates another embodiment of a service providingsystem according to the present invention. In general, the serviceproviding system is used to perform ticket sales processing andturnstile processing (gate processing) for day passes at an amusementpark.

[0261] A ticket vendor 3-6 is a device for selling tickets to theamusement park. A gate device 3-7 is a gate installed near predeterminedattractions, and the user A must pass through a gate (not shown) of thegate device 3-7 to reach the attraction.

[0262] The ticket vendor 3-6 and the gate device 3-7 both have functionsas network access ports, and communicate with a ticket server 6-5 andgate server 6-6 via the network 4.

[0263] The ticket server 6-5 executes processing functions for managinginformation relating to the sold tickets identified by the URL 2-1, andthe gate server 6-6 executes processing functions for controllingopening and closing of the gate of the gate device 3-7 identified by theURL 2-2.

[0264] Next, the processing for ticket vending will be described withreference to the flowchart shown in FIG. 25.

[0265] In step S141, the ticket vendor 3-6 transmits the URL 2-1 andinformation relating to use of a day pass wherein the date that theticket is valid is attached (hereinafter referred to as “ticketinformation”) to the portable terminal 2. The portable terminal 2receives these.

[0266] At this time, the user A performs operations for purchasing theday pass at the operating panel (not shown) of the ticket vendor 3-6.Also, the user A (portable terminal 2) is close enough to the ticketvendor 3-6 that short-range communication between the portable terminal2 and the ticket vendor 3-6 can be made.

[0267] In step S142, the portable terminal 2 transmits the URL 2-1received in step S141 and the ticket information to the personal server5, and requests communication with the ticket server 6-5 which executesprocessing identified by the URL 2-1. The personal server 5 receives thedata transmitted from the portable terminal 2, and recognizes therequest.

[0268] Describing the processing in step S142 more specifically, the CPU21 of the portable terminal 2 displays the information received in stepS142 on the display unit 24. The user A, upon confirming the informationdisplayed on the display unit 24, makes predetermined operations at theinput unit 23. Thus, the portable terminal 2 transmits the informationreceived in step S141 to the personal server 5, based on the operationsthereof.

[0269] Communication between the personal server 5 and the ticket server6-5 is established in step S143. In step S144 the personal server 5transmits the ticket information received in step S142 to the ticketserver 6-5 along with the URL 1. The ticket server 6-5 receives this.

[0270] Next, in step S145, the ticket server 6-5 requests the personalserver 5 for user verification. The personal server 5 recognizes therequest.

[0271] Next, in step S146, user verification is performed byverification data. The processing performed is step S146 is similar tothe processing performed in step S7 in FIG. 6, so description thereofwill be omitted.

[0272] Once the user A is verified as being a valid user in step S146,flow proceeds to step S147 where ticket-issuing processing is performed,as illustrated in the flowchart shown in FIG. 26.

[0273] In step S151, the ticket server 6-5 determines the expirationdate based on the ticket information received in step S144, andcalculates the charges. In this embodiment, the ticket expires at theclosing time of the amusement park today.

[0274] Next, in step S152, the ticket server 6-5 stores the expirationdate determined in step S151 in a manner corresponding to the URL 1received in step S144.

[0275] In step S153, payment processing is performed. The ticket server6-5 communicates the transfer destination of the charges calculated instep S151 to the personal server 5. The personal server 5 performspredetermined transfer processing to the destination server (not shown)that has been notified thereto.

[0276] Once the payment processing in step S153 ends, in step S154 theticket server 6-5 transmits ticket information made up of the expirationdate or the like determined in step S151 to the personal server 5. Thepersonal server 5 receives this.

[0277] In step S155, the personal server 5 stores the ticket informationreceived in step S154 as personal information of the user A.

[0278] Subsequently, the processing ends, the flow returns to the flowshown in FIG. 25, and the ticket-issuing processing ends.

[0279] Next, the processing for gate processing will be described withreference to the flowchart shown in FIG. 27.

[0280] In step S161, the gate device 3-7 transmits the URL 2-2 to theportable terminal 2. The portable terminal 2 receives this. At thistime, the user A is close enough to the gate device 3-7 that short-rangecommunication between the portable terminal 2 and the gate device 3-7can be made.

[0281] In step S162, the portable terminal 2 transmits the URL 2-2received in step S161 to the personal server 5, and requestscommunication with the gate server 6-6 which executes processingidentified by the URL 2-2. The personal server 5 receives the URL 2-2transmitted from the portable terminal 2, and recognizes the request.

[0282] Communication between the personal server 5 and the gate server6-6 is established in step S163. In step S164 the personal server 5transmits the ticket information stored in step S155 in FIG. 26 to thegate server 6-6. The gate server 6-6 receives this.

[0283] In step S165, the gate server 6-6 accesses the ticket server 6-5,obtains the expiration date stored along with the URL 1, and judgeswhether or not this matches the expiration date indicated in the ticketinformation received in step S164, and whether or not the ticket hasexpired. Thus, the gate server 6-6 judges whether or not the user A canpass the gate device 3-7.

[0284] If judgment is made in step S165 that the user A can pass thegate device 3-7, the flow proceeds to step S166, and the gate of thegate device 3-7 is opened. Specifically, the gate server 6-6 transmits acommand to open the gate to the gate device 3-7, and the gate device 37follows the command and opens the gate.

[0285] If judgment is made in step S165 that the user A cannot pass thegate device 3-7, the flow proceeds to step S167, the gate of the gatedevice 3-7 is not opened, and a predetermined message is output.

[0286] Following step S166 or step S167, the gate processing ends.

[0287] Next, other processing for step S147 (ticket-issuing processing)will be described with reference to the flowchart shown in FIG. 28.

[0288] In step S171, the ticket server 6-5 determines the expirationdate based on the ticket information received in step S144 in FIG. 25,and also calculates the charges.

[0289] Next, in step S172, the ticket server 6-5 stores the expirationdate determined in step S171 correlated with the URL 1, and transmitsthis to the gate server 6-6. The gate server 6-6 receives and storesthis.

[0290] In step S173, payment processing is carried out.

[0291] Next, in step S1 74, the personal server 5 transmits facialphotograph data of the user A to the ticket server 6-5. The ticketserver 6-5 receives this.

[0292] In step S175, the ticket server 6-5 stores the facial photographdata received in step S174 correlated with the URL 1, and transmits thefacial photograph data to the gate server 6-6. The gate server 6-6receives this, and stores it in a manner correlated with the URL 1.

[0293] Subsequently, the processing ends.

[0294] Next, gate processing corresponding to this ticket-issuingprocessing will be described with reference to the flowchart shown inFIG. 29.

[0295] In step S181, the portable terminal 2 transmits the URL 1 to thegate server 6-6 via the gate device 3-7. The gate server 6-6 receivesthis. At this time, the user A (portable terminal 2) is close enough tothe gate device 3-7 that short-range communication between the portableterminal 2 and the gate device 3-7 can be made.

[0296] In step S182, the gate server 6-6 reads out the expiration datestored in step S172 of FIG. 28, and in step S183 judges whether or notthe ticket has expired. Thus, the gate server 6-6 judges whether or notthe user A can pass the gate device 3-7.

[0297] If judgment is made in step S183 that the user A can pass, instep S184 the gate server 6-6 transmits a command to open the gate tothe gate device 3-7 along with the facial photograph data stored in stepS175.

[0298] In step S185, the gate device 3-7 displays an image correspondingto the facial photograph data received in step S184, and opens the gate.

[0299] If judgment is made in step S183 that the user A cannot pass, theflow proceeds to step S186, and predetermined processing is executed.

[0300] Following step S185 or step S186, the processing ends.

[0301] Though the example shown in FIG. 25 has been described withreference to an arrangement wherein a ticket is sold if the user A hasbeen verified as a valid user by user verification with verificationdata, the user verification processing may be omitted.

[0302] However, if a third party other than the user A obtains the URL 1stored in the ticket server 6-5 (step S152 in FIG. 26), the third partycan pass through the gate device 3-7 in an unauthorized manner bytransmitting the URL 1 to the gate device 3-7 (step S161 in FIG. 27),(i.e., enter the attraction unauthorized.) FIG. 30 illustrates anembodiment of a system which can prevent unauthorized use even if userverification by verification data is omitted.

[0303] A passage surveillance device 3-8 has a gate 3-8A which can beleft open, and is installed at a predetermined point A in a concourse Athrough which the user moves in the direction of the arrow in thefigure. The user must pass through the gate 3-8A of the passagesurveillance device 3-8 in order to pass down the concourse.

[0304] The passage surveillance device 3-8 also functions as a networkaccess port as to the portable terminal 2, and communicates with theticket server 6-5 and surveillance server 6-7 via the network 4, as wellas communicating with the portable terminal 2.

[0305] A passage surveillance device 3-9 has a gate 3-9A which can beleft open as with the passage surveillance device 3-8, and is installedat a predetermined point B in the concourse A removed from point A by acertain distance in the direction of progression indicated by the arrowin the figure. Point A and point B are separated by a distance whichrequires a certain amount of time to pass (walking).

[0306] The passage surveillance device 3-9 also functions as a networkaccess port as to the portable terminal 2, and communicates with theticket server 6-5 and surveillance server 6-7 via the network 4, as wellas the portable terminal 2.

[0307] The surveillance server 6-7 executes processing functions forsurveillance to determine whether or not a user attempting to passthrough the gate 3-9A of the passage surveillance device 3-9 identifiedby the URL 2-3 is attempting unauthorized use of a ticket.

[0308] Next, the operation of the passage surveillance device 3-8 willbe described with reference to the flowchart shown in FIG. 31.

[0309] In step S191, the passage surveillance device 3-8 transmits theURL 2-3, the time of detection, and its own ID, to the portable terminal2. The portable terminal 2 receives this. At this time, the user A(portable terminal 2) is drawing closer to the passage surveillancedevice 3-8, to the extent that short-range communication between theportable terminal 2 and the passage surveillance device 3-8 can be made.

[0310] Next, in step S192, the portable terminal 2 transmits the URL2-3, the time of detection, and the ID, received in step S191, to thepersonal server 5 via the passage surveillance device 3-8, and requestscommunication with the surveillance server 6-7 which executes processingidentified by the URL 2-3. The personal server 5 receives the datatransmitted from the portable terminal 2, and recognizes the request.

[0311] Communication between the personal server 5 and the surveillanceserver 6-7 is established in step S193. In step S194 the personal server5 transmits the time of detection and the ID received in step S192 tothe surveillance server 6-7 along with the URL 1. The surveillanceserver 6-7 receives this.

[0312] Next, in step S195, the surveillance server 6-7 correlates andstores the time of detection, the ID, and the URL 1, received in stepS194.

[0313] In step S196, the surveillance server 6-7 accesses the ticketserver 6-5, and judges whether or not the URL 1 stored in step S194 ismanaged by the ticket server 6-5 (i.e., judges whether or not the URL 1has been stored in the processing in step S152 in FIG. 26). Thus, thesurveillance server 6-7 judges whether or not the user A has purchased avalid ticket and can pass the gate 3-8A.

[0314] If judgment is made in step S196 that the user A can pass, theflow proceeds to step S197.

[0315] In step S197, the surveillance server 6-7 performs processing ofopening the gate 3-8A of the passage surveillance device 3-8. Thus, thegate 3-8A opens, and the user A can pass through.

[0316] If judgment is made in step S196 that the user A cannot pass, theflow proceeds to step S198, and the surveillance server 6-7 executes apredetermined warning processing.

[0317] Following step S197 or step S198, the passage surveillanceprocessing ends.

[0318] Next, the operation of the passage surveillance device 3-9 willbe described with reference to the flowchart shown in FIG. 32.

[0319] In step S201, the passage surveillance device 3-9 transmits theURL 2-3, the time of detection, and its own ID, to the portable terminal2. The portable terminal 2 receives these. At this time, the user A(portable terminal 2) is drawing closer to the passage surveillancedevice 3-9, to the extent that short-range communication between theportable terminal 2 and the passage surveillance device 3-9 can be made.

[0320] Next, in step S202, the portable terminal 2 transmits the URL2-3, the time of detection, and the ID, received in step S201, to thepersonal server 5 via the passage surveillance device 3-9, and requestscommunication with the surveillance server 6-7 which executes processingidentified by the URL 2-3. The personal server 5 receives the datatransmitted from the portable terminal 2, and recognizes the request.

[0321] Communication between the personal server 5 and the surveillanceserver 6-7 is established in step S203. In step S204 the personal server5 transmits the time of detection and the ID received in step S202 tothe surveillance server 6-7 along with the URL 1. The surveillanceserver 6-7 receives these.

[0322] Next, in step S205, the surveillance server 6-7 reads out thetime of detection with the passage surveillance device 3-8 storedcorrelated with the URL 1 in step S195 in FIG. 31, calculates in stepS206 the difference in detection time with the time of detectionreceived in step S204, and judges whether or not that time is shorterthan a predetermined time T (time necessary for moving from point A topoint B).

[0323] The passage surveillance device 3-8 and passage surveillancedevice 3-9 are separated by a distance which requires time T totraverse, so there cannot be a case wherein the use A passes through thepassage surveillance device 3-8 (gate 3-8A) and then is detected by thepassage surveillance device 3-9 within the time T. That is to say, ifthe URL 1 is transmitted to the passage surveillance device 3-9 withintime T, the URL 1 can be judged to have been held by an unauthorizedthird party. Accordingly, it can be judged whether or not the URL 1 isbeing used in an unauthorized manner and whether or not the user A canpass the gate 3-9A.

[0324] If judgment is made in step S206 that the user A can pass, theflow proceeds to step S207, and the surveillance server 6-7 performsprocessing of opening the gate 3-9A of the passage surveillance device3-9. Thus, the gate 3-9A opens, and the user A can pass through.

[0325] If judgment is made in step S206 that the user A cannot pass, theflow proceeds to step S208, and the surveillance server 6-7 executes apredetermined warning processing.

[0326] Following the processing in step S207 or step S208, the passagesurveillance processing ends.

[0327]FIG. 33 illustrates another embodiment of a service providingsystem according to the present invention. In general, the serviceproviding system is used for payment processing of tolls on a toll road.The user A has the portable terminal 2 and is riding in a vehicle A.

[0328] An on-ramp gate device 3-10 is a device functioning as a networkaccess port as to the portable terminal 2, and is installed at theentrance to a toll road.

[0329] A tool booth device 3-11 is a device having functioning as anetwork access port as to the portable terminal 2, and is installed atthe exit of the toll road. The tool booth device 3-11 also has a videocamera (not shown) for taking images of the license plate numbers ofpassing vehicles, and also detecting the license plate numbers from theimages obtained thereby.

[0330] A toll server 6-8 communicates with the personal server 5,on-ramp gate device 3-10, and tool booth device 3-11, via the network 4,and executes processing functions relating to payment of tolls for thetoll road identified by the URL 2. The toll server 6-8 stores thelicense plate number of a vehicle (vehicle A) along with a predeterminedexpiration date.

[0331] The personal server 5 stores the license plate number of thevehicle of the user A as personal information of the user A.

[0332] Next, the procedures for the payment processing will be describedwith reference to the flowchart shown in FIG. 34.

[0333] In step S221, the portable terminal 2 transmits the URL 1 to theon-ramp gate 3-10. The on-ramp gate 3-10 receives this.

[0334] Specifically, at the time that the vehicle A (portable terminal2) draws closer to the on-ramp gate 3-10 to the extent that short-rangecommunication between the portable terminal 2 and the on-ramp gate 3-10can be made, the user A performs predetermined operations at the inputunit 23 of the portable terminal 2. Thus, the portable terminal 2transmits the above data to the on-ramp gate 3-10.

[0335] Next, in step S222, the on-ramp gate 3-10 transmits the URL 1received in step S221 and the time of reception thereof, to the tollserver 6-8. The toll server 6-8 receives these.

[0336] In step S223, the toll server 6-8 stores the URL 1 and time ofreception, received in step S222.

[0337] Next, in step S224, the portable terminal 2 transmits the URL 1to the toll booth device 3-11. The toll booth device 3-11 receives this.

[0338] The vehicle A passes along the toll road and enters the off-rampwhere the toll booth device 3-11 is installed, and upon approaching thetoll booth device 3-11 (drawing closer to the toll booth device 3-11 tothe extent that short-range communication between the portable terminal2 and the toll booth device 3-11 can be made), the user A performspredetermined operations at the input unit 23 of the portable terminal2. Thus, the portable terminal 2 transmits the URL 1 to the toll boothdevice 3-11.

[0339] In step S225, the toll booth device 3-11 takes an image of thepassing vehicle A, and detects the license plate number from the imagedata obtained thereby. The toll booth device 3-11 receives the detectedlicense plate number along with the URL 1 and time of reception thereofreceived in step S224, and transmits these to the toll server 6-8. Thetoll server 6-8 receives these.

[0340] In step S226, the toll server 6-8 judges whether or not thevehicle A can pass through the toll booth device 3-11.

[0341] In this embodiment, user verification by verification data isperformed with regard to the user A between the personal server 5 andthe toll server 6-8 (in step S7 of FIG. 6, for example), and the tollserver 6-8 stores information that the user A is a valid user, theexpiration date of that information, and the license plate number, in amanner correlated with the URL 1. Thus, the toll server 6-8 compares thelicense plate number stored corresponding to the URL 1 beforehand withthe license plate number received in step S25 5 and judges whether ornot these match, and also judges whether or not the time or receptionstored in step S223 is a time within the expiration time storedbeforehand corresponding to the URL 1. Accordingly, if the license platenumber matches, and judgement is made that the period has not expired,the vehicle A is judged as being able to pass the toll booth device3-11, so the flow proceeds to step S227, and payment processing isperformed.

[0342] On the other hand, if judgment is made in step S226 the licenseplate number is not the same or that the expiration date has expired,the vehicle A is judged as not being able to pass the toll booth device3-11, so the flow proceeds to step S228, and predetermined warningprocessing is performed.

[0343]FIG. 35 illustrates another embodiment of a service providingsystem according to the present invention. In general, the serviceproviding system is used for payment processing of utility bills.

[0344] A settlement device 3-12 is a terminal operated for makingcontracts regarding utility bills or settling utility bills, and isinstalled in convenience stores, for example. The settlement device 3-12also functions as a network access port as to the portable terminal 2.

[0345] A utility bill server 6-9 communicates with the settlement device3-12 and the personal server 5 via the network 4, and executesprocessing relating to utility bills identified by the URL 2.

[0346] Next, the contract processing procedures for settling utilitybills using this system will be described with reference to theflowchart shown in FIG. 36.

[0347] In step S241, the settlement device 3-12 transmits the URL 2 andcontract information to the portable terminal 2. The portable terminal 2receives these.

[0348] At this time, the user A performs operations at the settlementdevice 3-12, such as entering contract information like his/her ownname, for example. Thus, the settlement device 3-12 transmits the aboveinformation to the portable terminal 2.

[0349] Next, in step S242, the portable terminal 2 transmits the URL 2and the contract information received in step S241 to the personalserver 5 via the settlement device 3-12 and the network 4, and alsorequests communication with the utility bill server 6-9.

[0350] In step S243, communication between the personal server 5 and theutility bill server 6-9 is established.

[0351] Next, in step S244, the personal server 5 transmits the contractinformation received in step S242 to the utility bill server 6-9. Theutility bill server 6-9 receives this.

[0352] In step S245, the utility bill server 6-9 requests the personalserver 5 for user verification. The personal server 5 recognizes therequest.

[0353] Next, in step S246, user verification is performed. Theprocessing performed in step S246 is similar to the processing performedin step S7 in FIG. 6, so description thereof will be omitted.

[0354] Next, in step S247, contract processing is performed. The detailsof this processing are illustrated in the flowchart shown in FIG. 37.

[0355] In step S251, the utility bill server 6-9 determines the periodof the contract, based on the control information received in step S244.

[0356] In step S252, the utility bill server 6-9 stores the period ofthe contract determined in step S251 in a manner correlated with the URL1, and transmits the period of the contract and the URL 2 to thepersonal server 5. The personal server 5 receives this.

[0357] In step S253, the personal server 5 stores the URL 2 and periodof the contract received in step S252. Subsequently, the processingends.

[0358] Next, settlement processing for utility bills will be describedwith reference to the flowchart shown in FIG. 38.

[0359] In step S261, communication is established between the personalserver 5 and the utility bill server 6-9. Specifically, the utility billserver 6-9 requests connection to the personal server 5 at apredetermined timing (e.g., on a certain day every month). The personalserver 5 responds thereto.

[0360] In step S262, the utility bill server 6-9 requests the personalserver 5 for payment of the utility bill.

[0361] Next, in step S263, the personal server 5 makes reference to theperiod of the contract stored, correlated with the URL 2, judges whetheror not the period has expired, and if judgment is made that the periodhas not expired, the flow proceeds to step S264.

[0362] In step S264, payment processing is executed. Specifically, thepersonal server 5 performs transfer processing for the bill to transferthe charges. The personal server 5 transmits the results of the transferto the utility bill server 6-9. The utility bill server 6-9 recordsthis.

[0363] In step S263, if judgment is made that the contact period hasexpired, the flow proceeds to step S265, and predetermined processing isexecuted.

[0364] Following step S264 or step S265, the utility bill paymentprocessing ends.

[0365]FIG. 39 illustrates another embodiment of a service providingsystem according to the present invention. In general, the serviceproviding system is used for managing medical records in a hospital.

[0366] A medical record managing terminal 3-13 is a terminal operatedfor making reference to medical records, and is installed in a hospital.The medical record managing terminal 3-13 also functions as a networkaccess port as to the portable terminal 2.

[0367] A medical record managing server 6-10 communicates with themedical record managing terminal 3-13 and the personal server 5 via thenetwork 4, and executes processing functions for managing medicalrecords identified by the URL 2.

[0368] Next, the processing procedures for making reference to medicalrecords information using this system will be described with referenceto the flowchart shown in FIG. 40.

[0369] In step S271, the medical record managing terminal 3-13 transmitsthe URL 2 to the portable terminal 2. The portable terminal 2 receivesthis.

[0370] In step S272, the portable terminal 2 transmits the URL 2received in step S271 to the personal server 5 via the medical recordmanaging terminal 3-13 and network 4, and requests communication withthe medical record managing server 6-10.

[0371] In step S273, communication is established between the personalserver 5 and the medical record managing server 6-10.

[0372] Next, in step S274, the medical record managing server 6-10requests the personal server 5 for user verification. The personalserver 5 recognizes the request.

[0373] Next, in step S275, user verification is performed. Theprocessing performed in step S275 is similar to the processing performedin step S7 in FIG. 6, so description thereof will be omitted.

[0374] Once the user A is verified as being a valid user in step S275,in step S276 the medical record managing server 6-10 encrypts themedical record information of the user A regarding which userverification has been made using a public key of the URL 1, andtransmits the information to the personal server 5. The personal server5 receives this. Note that a public key of the URL 1 is supplied fromthe personal server 5 to the medical record managing server 6-10 in theprocessing in step S275.

[0375] Next, in step S277, the personal server 5 decrypts the medicalrecord information (encrypted using a public key of the URL 1) receivedin step S276 with a secret key of the URL 1, and then encrypts theinformation with a public key of the portable terminal 2.

[0376] In step S278, the personal server 5 transmits the medical recordinformation encrypted in step S277 to the portable terminal 2 via themedical record managing terminal 3-13. The portable terminal 2 receivesthis.

[0377] Next, in step S279, the portable terminal 2 decrypts the medicalrecord information (encrypted using a public key of the portableterminal 2) received in step S278 with a secret key of the portableterminal 2, and displays the information on a display unit 24. Thus, theuser A can view the contents of his/her medical records.

[0378] Subsequently, the processing ends.

[0379]FIG. 41 illustrates another embodiment of a service providingsystem according to the present invention. In general, the personalserver 5, a calculating server 6-11, display device 6-12, keyboard 6-13,and mouse 6-14 are each connected via the network access port 3 andnetwork 4, configuring a so-called computer.

[0380] The portable terminal 2 performs communication (e.g., infra-redcommunication or the like) with the display device 6-12, keyboard 6-13,and mouse 6-14, and obtains the respective URLs thereof, namely, the URL2-2, URL 2-3, and URL 2-4. The portable terminal 2 also transmits, inaddition to the obtained URL 2-2, URL 2-3, and URL 2-4, a URL 2-1managed by the calculating server 6-11 which serves as a CPU of acomputer, to the personal server 5, and requests the personal server 5for controlling the transfer of information based on these URLs. Thus,various types of information are exchanged between the calculatingserver 6-11, display device 6-12, keyboard 6-13, and mouse 6-14, inaccordance with operations made by the user A at the keyboard 6-13 andmouse 6-14. Thus, the user can perform calculation processing and thelike just as if he/she were using an actual computer.

[0381] If the display device 6-12, keyboard 6-13, and mouse 6-14 are tobe used frequently by the user A, the URLs 2 managing these may bestored in the personal server 5 as personal information of the user A,doing away with the need for obtaining these URLs again.

[0382] Also, an arrangement may be made wherein the user A can use thesystem only when situated at the display device 6-12. The portableterminal 2 transfers the URL 1 to the display device 6-12, and thedisplay device 6-12 receives display data and so forth only if there iscontrol from the received URL 1.

[0383] Thus, according to an embodiment shown in FIG. 41, even if a userdoes not have a computer, all that is needed to use the functions of acomputer is a display device and an input device.

[0384] Preferably, a document creating program executed on the computerhas inputted words and phrases regularly stored therein, and hasfunctions, wherein, if part of such a word or phrase is inputted, theentire word or phrase is output. Accordingly, the user does not need toinput all the letters in the words and phrases. Thus, document creationis facilitated.

[0385] In an embodiment shown in FIG. 41, word and phrase informationmay be held by the personal server 5, with the portable terminal 2obtaining and storing this information as necessary. Thus, entire wordsand phrases can be output without the need for inputting all of theletters in the words and phrases.

[0386] The network access port 3 of the portable terminal 2 has beendescribed as being fixed at a certain place, but as shown in FIG. 42,cellular telephones (or PHS (Personal Handiphone Service) devices) 3-14or the like carried by the user A can be used as network access ports.The communication between a portable terminal 2 and, for example, apersonal server 5, is carried out via the cellular telephone 3-14, abase station 81, a public line network 82, a provider 83, and thenetwork 4.

[0387] In an embodiment shown in FIG. 42, the cellular telephone 3-14 isused as a network access port for the portable terminal 2, but can alsobe used as a portable terminal 2 as shown in FIG. 43. The cellulartelephone 3-14 has functions for communicating with the verificationdata IC chip of the wristwatch 1.

[0388] The above-described series of processes can be executed byhardware, or by software as well. When executing the series of processesby software, the program making up the software is installed to acomputer where it is executed, thereby functionally realizing theabove-described portable terminal 2, personal server 5, service server6-1, and so forth.

[0389]FIG. 44 is a block diagram illustrating an embodiment of acomputer 501 functioning as a portable terminal 2 (described above),personal server 5, service server 6-1, or the like. An input/outputinterface 516 is connected to a CPU 511 via a bus 515, and upon input ofcommands from a user from an input unit 518 made up of a keyboard,mouse, or the like, via the input/output interface 516, the programstored in a recording medium such as, for example, ROM 512, a hard disk514, a magnetic disk 531, optical disk 532, magneto-optical disk 533,semiconductor memory 534, or the like mounted on a drive 520, is loadedto the RAM 513 to be executed. Accordingly, the various types ofprocessing described above are executed. Further, the CPU 511 outputsthe processing results to a display unit 517 made up of an LCD or thelike as necessary, via the input/output interface 516, for example. Theprogram may be stored in the hard disk 514 or ROM 512 beforehand to beprovided to the user integrally with the computer 501, may be providedas packaged media such as on magnetic disks 531, optical disks 532,magneto-optical disks 533 semiconductor memory 534, or the like, or maybe provided to the hard disk 514 via a communication unit 519 viasatellite, via network, or the like.

[0390] Note that in the present specification, the steps describing theprograms provided in the recording medium may of course be executed inthe time sequence following the order in which they are listed, but arenot restricted to being executed in this time sequence, and may beexecuted in parallel or individually.

[0391] Also, in the present specification, the term “system” representsall equipment made up of multiple devices.

[0392] In an information processing apparatus and method, and recordingmedium, according to an embodiment of the present invention, firstnetwork identifier is stored, second network identifier is obtained,verification data necessary for verifying a user is obtained, andprocessing identified by the obtained second network identifier isexecuted by a service server, whereby control information containing thefirst network identifier and the second network identifier istransmitted to a personal server managing personal informationidentified by the first network identifier, so that services can bereceived. Accordingly, even if the information processing device islost, for example, personal information can be prevented from fallinginto the hands of a third party.

[0393] In a service or providing system according to an embodiment ofthe present invention, first network identifier is stored by a portableterminal, second network identifier is obtained, verification datanecessary for verifying users is obtained and processing identified bythe obtained second network identifier is executed by a second server,whereby, in order to be provided with predetermined services, controlinformation containing the first network identifier and the secondnetwork identifier is supplied to a first server managing personalinformation identified by the stored first network identifier, theobtained verification data is supplied to a first server, personalinformation identified by the first network identifier is managed at thefirst server, a request for providing services based on controlinformation and personal information is made to the second server forexecuting processing identified by the second network identifiercontained in the supplied control information, the user is verifiedbased on the supplied verification data, based on a request from thesecond server, the verification results are supplied to the secondserver, processing identified by the second network identifier ismanaged at the second server, and at the time that a request is made,user verification is requested to the first server, and if the suppliedverification results indicate that the user is a valid user of the firstservice providing system, processing identified by the second networkidentifier is executed based on the control information and personalinformation. Accordingly, even if the information processing device islost, for example, personal information can be prevented from fallinginto the hands of a third party.

[0394] In a service providing system according to an embodiment of thepresent invention, first network identifier is stored at a portableterminal, the second network identifier and access information fordetecting access patterns is obtained from a service terminal,processing identified by the obtained second network identifier isexecuted by a second server, whereby, in order to be provided withpredetermined services, control information containing the first networkidentifier, second network identifier, and access information issupplied to the service terminal at the first server managing personalinformation identified by first network identifier that is stored, thesecond network identifier is held at the service terminal, the secondnetwork identifier and access information is supplied to the portableterminal such that access information is obtained by accessing itself,the supplied control information is supplied to the first server,personal information identified by the first network identifier ismanaged at the first server, a request is made to the second server forexecuting processing identified by the second network identifiercontained in the supplied control information for being provided withservice based on the control information, personal information, andaccess information, processing identified by the second networkidentifier is managed at the second server, and processing identified bythe second network identifier is executed based on the controlinformation, personal information, and access information, based on therequest. Accordingly, even if the information processing device is lost,for example, personal information can be prevented from falling into thehands of a third party.

[0395] Although the present invention has been described with referenceto specific embodiments, those of skill in the art will recognize thatchanges may be made thereto without departing from the spirit and scopeof the invention as set forth in the hereafter appended claims.

1. An information processing apparatus for use with predeterminedservices provided by a first server, which manages personal informationof a user identified by a first network identifier, and a second serverconnected to a network dedicated to providing said predeterminedservices, said second server executing processing identified by a secondnetwork identifier, said information processing apparatus comprising:storing means for storing said first network identifier; first obtainingmeans for obtaining said second network identifier; second obtainingmeans for obtaining verification data necessary for verifying said user;and transmitting means for transmitting control information containingsaid first network identifier and said second network identifier to saidfirst server which manages said personal information identified by saidfirst network identifier stored in said storing means, so as to beprovided with said services, by processing identified by said secondnetwork identifier obtained by said first obtaining means being executedby said second server.
 2. An information processing apparatus as claimedin claim 1, wherein at least one of said first network identifier andsaid second network identifier is a URL.
 3. An information processingapparatus as claimed in claim 1, further comprising an access portterminal, connected to said network, that serves as an access port forsaid information processing apparatus, and wherein said transmittingmeans transmit said control information to said first server via saidaccess port terminal.
 4. An information processing apparatus as claimedin claim 3, wherein said transmitting means transmit said controlinformation to said access port terminal using at least one ofdirectional infrared rays and high-frequency airwaves.
 5. An informationprocessing apparatus as claimed in claim 1, wherein said secondobtaining means obtain a password generated by a verification data ICchip housed by an article which said user is wearing.
 6. An informationprocessing apparatus as claimed in claim 5, wherein said password is aone-time password.
 7. An information processing apparatus as claimed inclaim 5, wherein said password is encrypted with a common key sharedbetween said information processing apparatus and said first server. 8.An information processing apparatus as claimed in claim 5, wherein saidpassword is encrypted with a public key of said first server.
 9. Aninformation processing apparatus as claimed in claim 1, wherein saidsecond obtaining means obtain a password generated by a verificationdata IC chip housed by an article which said user is wearing uponreceiving an appropriate reply from said verification data IC chip, saidreply being sent in response to a predetermined request from said firstserver.
 10. An information processing apparatus as claimed in claim 5,wherein said article housing said verification data IC chip is at leastone of a wristwatch and a ring, and wherein said verification data ICchip is waterproofed.
 11. An information processing apparatus as claimedin claim 5, wherein said verification data IC chip is powered by atleast one of electromotive force generated by electromagnetic induction,electric power based on photo-electric conversion, electric power from aminiature battery, and thermal electromotive force based on body heat ofsaid user.
 12. An information processing apparatus as claimed in claim5, wherein said second obtaining means obtain, as said verificationdata, at least one of fingerprints, voiceprints, iris patterns, andcontrast patterns of capillaries at predetermined portions of the body.13. An information processing apparatus as claimed in claim 1, whereinsaid first obtaining means obtain said second network identifier as atleast one of a voice taken in by a microphone provided thereto, an imageobtained by an image sensor provided thereto, infrared rays received byan infrared ray sensor provided thereto, and high-frequency wavesreceived by a high-frequency antenna provided thereto.
 14. Aninformation processing method for an information processing apparatusfor use with predetermined services provided by a first server, whichmanages personal information of a user identified by a first networkidentifier, and a second server connected to a network dedicated toproviding said predetermined services, said second server executingprocessing identified by a second network identifier, said methodcomprising the steps of: storing said first network identifier;obtaining said second network identifier; obtaining verification datanecessary for verifying said user; and transmitting control informationcontaining said first network identifier and said second networkidentifier to said first server which manages said personal informationidentified by said first network identifier stored in said step ofstoring said first network identifier, so as to be provided with saidservices, by processing identified by said second network identifierobtained by the processing in said step of obtaining said second networkidentifier being executed by said second server.
 15. An informationprocessing method as claimed in claim 14, wherein at least one of saidfirst network identifier and said second network identifier is a URL.16. An information processing method as claimed in claim 14, said methodfurther comprising the steps of: providing an access port terminal,connected to said network, that serves as an access port for saidinformation processing apparatus; and transmitting said controlinformation to said first server via said access port terminal.
 17. Aninformation processing method as claimed in claim 16, wherein said stepof transmitting said control information to said first server via saidaccess port terminal includes transmitting using at least one ofdirectional infrared rays and high-frequency airwaves.
 18. Aninformation processing method as claimed in claim 14, wherein said stepof obtaining verification data includes obtaining a password generatedby a verification data IC chip housed by an article which said user iswearing.
 19. An information processing method as claimed in claim 18,wherein said password is a one-time password.
 20. An informationprocessing method as claimed in claim 18, wherein said password isencrypted with a common key shared between said information processingapparatus and said first server.
 21. An information processing method asclaimed in claim 18, wherein said password is encrypted with a publickey of said first server.
 22. An information processing method asclaimed in claim 14, wherein said step of obtaining verification dataincludes obtaining a password generated by a verification data IC chiphoused by an article which said user is wearing upon receiving anappropriate reply from said verification data IC chip, said reply beingsent in response to a predetermined request from said first server. 23.An information processing method as claimed in claim 18, wherein saidarticle housing said verification data IC chip is at least one of awristwatch and a ring, and wherein said verification data IC chip iswaterproofed.
 24. An information processing method as claimed in claim18, wherein said verification data IC chip is powered by at least one ofelectromotive force generated by electromagnetic induction, electricpower based on photo-electric conversion, electric power from aminiature battery, and thermal electromotive force based on body heat ofthe user.
 25. An information processing method as claimed in claim 18,wherein said step of obtaining verification data includes obtaining atleast one of fingerprints, voiceprints, iris patterns, and contrastpatterns of capillaries at predetermined portions of the body.
 26. Aninformation processing method as claimed in claim 14, wherein said stepof obtaining said second network identifier includes obtaining at leastone of voice taken in by a microphone, an image obtained by an imagesensor, infrared rays received by an infrared ray sensor, andhigh-frequency waves received by a high-frequency antenna.
 27. A storingmedium storing a computer-readable program for an information processingapparatus for use with predetermined services provided by a firstserver, which manages personal information of a user identified by afirst network identifier, and a second server connected to a networkdedicated to providing said predetermined services, said second serverexecuting processing identified by a second network identifier, saidprogram comprising: code for a storing step for storing said firstnetwork identifier; code for a first obtaining step for obtaining saidsecond network identifier; code for a second obtaining step forobtaining verification data necessary for verifying said user; and codefor a transmitting step for transmitting control information containingsaid first network identifier and said second network identifier to saidfirst server which manages said personal information identified by saidfirst network identifier stored in said storing step, so as to beprovided with said service, by processing identified by said secondnetwork identifier obtained by the processing in said first obtainingstep being executed by said second server.
 28. A storing medium storinga computer-readable program as claimed in claim 27, wherein at least oneof said first network identifier and said second network identifier is aURL.
 29. A storing medium storing a computer-readable program as claimedin claim 27, said program further comprising: code for a providing stepfor providing an access port terminal, connected to said network, thatserves as an access port for said information processing apparatus; andcode for transmitting, in said transmitting step, said controlinformation to said first server via said access port terminal.
 30. Astoring medium storing a computer-readable program as claimed in claim29, wherein said transmitting step transmits said control information tosaid access port terminal using at least one of directional infraredrays and high-frequency airwaves.
 31. A storing medium storing acomputer-readable program as claimed in claim 27, wherein said secondobtaining step obtains a password generated by a verification data ICchip housed by an article which said user is wearing.
 32. A storingmedium storing a computer-readable program as claimed in claim 31,wherein said password is a one-time password.
 33. A storing mediumstoring a computer-readable program as claimed in claim 31, wherein saidpassword is encrypted with a common key shared between said informationprocessing apparatus and said first server.
 34. A storing medium storinga computer-readable program as claimed in claim 31, wherein saidpassword is encrypted with a public key of said first server.
 35. Astoring medium storing a computer-readable program as claimed in claim27, wherein said second obtaining step obtains a password generated by averification data IC chip housed by an article which said user iswearing upon receiving an appropriate reply from said verification dataIC chip, said reply being sent in response to a predetermined requestfrom said first server.
 36. A storing medium storing a computer-readableprogram as claimed in claim 31, wherein said article housing saidverification data IC is at least one of a wristwatch and a ring, andwherein said verification data IC chip is waterproofed.
 37. A storingmedium storing a computer-readable program as claimed in claim 31,wherein said verification data IC chip is powered by at least one ofelectromotive force generated by electromagnetic induction, electricpower based on photo-electric conversion, electric power from aminiature battery, and thermal electromotive force based on body heat ofthe user.
 38. A storing medium storing a computer-readable program asclaimed in claim 31, wherein said second obtaining step obtains at leastone of fingerprints, voiceprints, iris patterns, and contrast patternsof capillaries at predetermined portions of the body.
 39. A storingmedium storing a computer-readable program as claimed in claim 27,wherein said first obtaining step obtains at least one of voice taken inby a microphone, an image obtained by an image sensor, infrared raysreceived by an infrared ray sensor, and high-frequency waves received bya high-frequency antenna.
 40. A service providing system, comprising: aportable terminal holding a first network identifier; a first server formanaging personal information of a user identified by said first networkidentifier; and a second server for executing processing identified by asecond network identifier; wherein said portable terminal, said firstserver, and said second server are connected via a network; saidportable terminal comprising: first storing means for storing said firstnetwork identifier; first obtaining means for obtaining said secondnetwork identifier; second obtaining means for obtaining verificationdata necessary for verification of said user; first supplying means forsupplying control information containing said first network identifierand said second network identifier to said first server which managessaid personal information identified by said first network identifierstored in said first storing means, so as to be provided withpredetermined services, by processing identified by said second networkidentifier obtained by said first obtaining means being executed by saidsecond server; and second supplying means for supplying saidverification data obtained by said second obtaining means to said firstserver; said first server comprising: first managing means for managingsaid personal information identified by said first network identifier;first requesting means for requesting to be provided with said servicesbased on said control information and said personal information, to saidsecond server for executing processing identified by said second networkidentifier contained in said control information supplied by said firstsupplying means of said portable terminal; said first verification meansfor making verification of said user based on said verification datasupplied by said second supplying means of said portable terminal, basedon a request from said second server; and third supplying means forsupplying verification results from said first verification means tosaid second server; and said second server comprising: second managingmeans for managing processing identified by said second networkidentifier; second request means for requesting said first server forverification of said user in response to a request by said firstrequesting means of said first server; and first executing means forexecuting processing identified by said second network identifier basedon said control information and said personal information when saidverification results supplied by third supplying means of said firstserver indicate that said user is a valid user of said service providingsystem.
 41. A service providing system as claimed in claim 40, whereinat least one of said first network identifier and said second networkidentifier is a URL.
 42. A service providing system as claimed in claim40, further comprising: an access port terminal, connected to saidnetwork, that serves as an access port for said portable terminal;wherein at least one of said first supplying means and said secondsupplying means of said portable terminal supply at least one of saidcontrol information and said verification data to said access portterminal; and wherein said access port terminal further comprises fourthsupplying means for supplying at least one of said control informationand said verification data supplied from at least one of said firstsupplying means and said second supplying means of said portableterminal to said first server.
 43. A service providing system as claimedin claim 42, further comprising: a third server, connected to saidnetwork, for performing settlement of usage fees of said serviceproviding system; wherein said access port terminal measures apredetermined communication amount processed by itself; wherein saidaccess port terminal further comprises fifth supplying means forsupplying the results of said measurement to said third server; andwherein said third server further comprises settlement means forperforming settlement of usage fees of said service providing systembased on the results of said measurement supplied from said fifthsupplying means of said access port terminal.
 44. A service providingsystem as claimed in claim 43, wherein said predetermined communicationamount is the amount of data which said access port terminal hastransferred to at least one of said portable terminal and said firstserver.
 45. A service providing system as claimed in claim 42, wherein:said first storing means of said portable terminal further store apublic key for said first network identifier; said second supplyingmeans of said portable terminal further supply said public key for saidfirst network identifier to said access port terminal; said fourthsupplying means of said access port terminal encrypt said verificationdata with said public key for said first network identifier, supplied bysaid second supplying means of said portable terminal, and supply saidverification data that has been encrypted to said first server alongwith said control information; said first managing means of said firstserver further manage a secret key for said first network identifier aspersonal information; and said first verification means of said firstserver decrypt said verification data supplied by said fourth supplyingmeans of said access port terminal with said secret key for said firstnetwork identifier contained in said personal information, and verifysaid user based on said decrypted verification data.
 46. A serviceproviding system as claimed in claim 45, wherein: said first managingmeans of said first server change said secret key of said first networkidentifier when said user is verified to be a valid user of said serviceproviding system by said first verification means; said first serverfurther comprises third requesting means for requesting said portableterminal to change said public key for said first network identifiercorresponding to the change in said secret key for said first networkidentifier by said first managing means; and said first storing means ofsaid portable terminal change said public key for said first networkidentifier, based on a request by said third requesting means of saidfirst server.
 47. A service providing system as claimed in claim 40,wherein said second obtaining means of said portable terminal obtain apassword generated, with a first algorithm, by a verification data ICchip housed by an article which said user is wearing.
 48. A serviceproviding system as claimed in claim 47, wherein said password is aone-time password.
 49. A service providing system as claimed in claim47, wherein said password is encrypted with a common key shared by saidportable terminal and said first server.
 50. A service providing systemas claimed in claim 47, wherein said password is encrypted with a publickey of said first server.
 51. A service providing system as claimed inclaim 40, wherein said second obtaining means obtain a passwordgenerated by a verification data IC chip housed by an article which saiduser is wearing upon receiving an appropriate reply from saidverification data IC chip, said reply being sent in response to apredetermined request from said first server.
 52. A service providingsystem as claimed in claim 47, wherein said first verification means ofsaid first server generate a one-time password with a second algorithmidentical to said first algorithm of said verification data IC chip, andcompare said one-time password with said password serving as saidverification data supplied from said second supplying means of saidportable terminal, thereby verifying said user.
 53. A service providingsystem as claimed in claim 52, wherein: said first verification means ofsaid first server update said second algorithm when said user isverified as a valid user of said service providing system; said firstserver further comprises third requesting means for requesting saidportable terminal to update said first algorithm of said verificationdata IC chip corresponding to the update in said second algorithm bysaid first verification means; and said portable terminal furthercomprises fourth requesting means for requesting said verification dataIC chip to update said first algorithm based on a request by said thirdrequest means of said first server.
 54. A service providing system asclaimed in claim 40, wherein: predetermined service information issupplied to said portable terminal when processing identified by saidsecond network identifier is executed by said first executing means ofsaid second server; said first managing means of said first serverfurther manages said public key of said portable terminal; said firstserver further comprises fourth supplying means for encrypting saidservice information with said public key of said portable terminal andsupplying said encrypted service information to said portable terminal;said first storing means of said portable terminal further store asecret key of itself; and said portable terminal further comprisesdecrypting means for decrypting the encryption of said serviceinformation supplied from said fourth supplying means of said firstserver, with said secret key of itself.
 55. A service providing systemas claimed in claim 54, wherein: said first managing means of said firstserver change said public key of said portable terminal when said useris verified as a valid user of said service providing system; said firstserver further comprises third request means for requesting saidportable terminal to change said secret key of said portable terminalcorrelating to the change of said public key of said portable terminalby said first managing means; and said first storing means of saidportable terminal change said secret key of said portable terminal basedon a request from said third request means of said first server.
 56. Aservice providing system as claimed in claim 40, further comprising: apredetermined service terminal connected to said network; and wherein:processing identified by said second network identifier is settlementprocessing; said first obtaining means of said portable terminal obtainmonetary amount information in addition to said second networkidentifier from said service terminal, said first supplying means ofsaid portable terminal supply said first network identifier, said secondnetwork identifier, and said control information containing saidmonetary amount information, to said first server, thereby allowing saidsettlement processing being executed by said second server to settlefees indicated by said monetary amount information; said firstrequesting means of said first server request said second server, whichexecutes said settlement processing identified by said second networkidentifier contained in said control information supplied by said firstsupplying means of said portable terminal, to perform settlement basedon said monetary amount information and said personal information; andsaid first executing means of said second server execute said settlementprocessing based on said monetary amount information and said personalinformation when said verification results supplied by said thirdsupplying means of said first server indicate that said user is a validuser of said service providing system.
 57. A service providing system asclaimed in claim 56, wherein: said first obtaining means of saidportable terminal further obtain a payment ID from said serviceterminal; said first supplying means of said portable terminal supplycontrol information further containing said payment ID to said firstserver; said first requesting means of said first server request saidsecond server to perform settlement based on said monetary amountinformation, said personal information, and said payment ID; and saidfirst executing means of said second server execute said settlementprocessing based on said monetary amount information, said personalinformation, and said payment ID when said verification results suppliedby said third supplying means of said first server indicate that saiduser is a valid user of said service providing system.
 58. A serviceproviding system as claimed in claim 56, further comprising: an accessport terminal, connected to said network, that serves as an access portfor said portable terminal; wherein at least one of said first supplyingmeans and said second supplying means of said portable terminal supplyat least one of said control information and said verification data tosaid access port terminal; and wherein said access port terminalcomprises fourth supplying means for supplying at least one of saidcontrol information and said verification data supplied from at leastone of said first supplying means and said second supplying means ofsaid portable terminal to said first server.
 59. A service providingsystem as claimed in claim 58, wherein: said first managing means ofsaid first server further manage characteristics information of saiduser; said first server further comprises fifth supplying means forsupplying said characteristics information to said service terminal inresponse to requests from said second server; said service terminalfurther comprises: second verification means for verification of saiduser, using said characteristics information supplied from said fifthsupplying means of said first server; and fifth supplying means forsupplying verification results by said second verification means to saidsecond server; and said first executing means of said second serverexecute processing identified by said second network identifier, basedon said control information and personal information when saidverification results supplied from said fifth supplying means of saidservice terminal indicate that said user is a valid user of said serviceproviding system.
 60. A service providing system as claimed in claim 59,wherein said user characteristics information is image data of the faceportion of said user, and wherein verification by said secondverification means of said service terminal is performed by displayingan image corresponding to image data of the face portion of said user ona display unit of said service terminal, an administrator of saidservice terminal comparing the actual face of said user with said image.61. A service providing system as claimed in claim 40, wherein saidsecond server further comprises: second storing means for adding apredetermined expiration date to said verification results supplied bysaid third supplying means of said first server, and storing; andjudging means for judging, based on said expiration date, whether or notsaid verification results stored in said second storing means are valid,based on a request from said first requesting means of said firstserver; wherein said first executing means of said second server executeprocessing identified by said second network identifier when judgment ismade by said judging means that said verification results are valid. 62.A service providing system as claimed in claim 61, further comprising: aservice terminal, connected to said network, for controlling opening andclosing of a gate which can be passed through by purchasing apredetermined ticket is; wherein said third supplying means of saidfirst server supply said first network identifier as said verificationresults to said second server when said user is recognized as a validuser of said service providing system by said verification means;wherein said second storing means of said second server add saidexpiration date determined at the time of issuing said ticket to saidfirst network identifier supplied by said third supplying means of saidfirst server, and storing; wherein said judging means of said secondserver judge, based on said expiration date, whether or not said firstnetwork identifier stored in said second storing means is valid, basedon a request from said first requesting means of said first server, andwherein said first executing means of said second server executeprocessing of opening said gate when judgment is made by said judgingmeans that said first network identifier is valid.
 63. A serviceproviding system as claimed in claim 40, wherein: said first managingmeans of said first server add a predetermined expiration date to saidverification results, and manage; said first verification means of saidfirst server judge, based on said expiration date, whether or not saidverification results are valid, based on requests from said secondrequesting means of said second server; said third supplying means ofsaid first server supply said verification results to said secondserver; said second requesting means of said second server request saiduser verification to said first server at a predetermined timing; andsaid first executing means of said second server execute processingidentified by said second network identifier based on said controlinformation and said personal information when said verification resultssupplied by said third supplying means of said first server indicatethat said verification results are valid.
 64. A service providing systemas claimed in claim 40, further comprising: at least one serviceprocessing executing device for executing processing identified byrespectively differing sets of said second network identifier, whereinsaid first requesting means of said first server request to said secondserver and said at least one service processing executing device to beprovided with said services based on said control information and saidpersonal information; and wherein said at least one service processingexecuting device comprises second executing means for executingprocessing respectively identified by said second network identifier.65. A service providing system as claimed in claim 64, wherein saidsecond executing means of said at least one service processing executingdevice execute processing as at least one of a monitor, mouse, andkeyboard making up a personal computer, and wherein said second serverexecutes processing as a CPU making up a personal computer.
 66. Aservice providing system as claimed in claim 64, wherein said portableterminal further comprises fourth supplying means for supplying saidfirst network identifier to said at least one service processingexecuting device, and wherein said second executing means of said atleast one service processing executing device execute processingidentified by said second network identifier when said first networkidentifier is supplied from said fourth supplying means of said portableterminal.
 67. A service providing system as claimed in claim 64,wherein: said second server executes document creating processing whensaid second executing means said at least one service processingexecuting device execute processing as said keyboard; said firstmanaging means of said first server manage said personal informationcontaining character input patterns as to said user on said keyboard;said first requesting means of said first server request execution ofsaid document creating processing based on said control information andsaid character input pattern, to said second server for executingprocessing identified by said second network identifier contained insaid control information supplied by said first supplying means of saidportable terminal; and said first executing means of said second serverexecute said document creating processing based on said controlinformation and said character input pattern.
 68. A service providingsystem as claimed in claim 40, wherein predetermined service informationis provided to said portable terminal as a result of processingidentified by said second network identifier being executed by saidfirst executing means of said second server; and wherein said portableterminal further comprises: second storing means for temporarily storingsaid service information; and deleting means for monitoring the amountof data of said service information stored in said second storing means,and when said service information equal to or exceeding a predetermineddata amount is stored, deleting with priority at least one of saidservice information not bookmarked and said service information notlinked to a bookmarked homepage.
 69. A service providing system asclaimed in claim 68, wherein said deleting means establish an order ofpriority for said bookmarks, and deletes said bookmarked serviceinformation as necessary, according to said order of priority.
 70. Aservice providing system as claimed in claim 69, further comprisingfourth supplying means for supplying said service information to saidportable terminal when said service information is said personalinformation; and wherein said first server attaches a tag to saidpersonal information indicating that said personal information cannot bestored in said second storing means of said portable terminal.
 71. Aservice providing system as claimed in claim 40, wherein predeterminedservice information is provided to said first server as the result ofprocessing identified by said second network identifier being executedby said first executing means of said second server; and wherein saidfirst server further comprises: second storing means for temporarilystoring said service information; and deleting means for monitoring theamount of data of said service information stored in said second storingmeans, and when said service information equal to or exceeding apredetermined data amount is stored, deleting with priority at least oneof said service information not bookmarked and said service informationnot linked to a bookmarked homepage.
 72. A service providing system asclaimed in claim 71, wherein said deleting means establish an order ofpriority for said bookmarks, and deletes said bookmarked serviceinformation as necessary, according to said order of priority.
 73. Aservice providing system as claimed in claim 40, wherein said firstmanaging means of said first server further manage predeterminedinformation valid for reviewing a homepage which has been previouslyviewed when processing identified by said second network identifier isprocessing for Web browsing.
 74. A service providing system, comprising:a portable terminal holding first network identifier; a first server formanaging personal information of a user identified by said first networkidentifier; a second server for executing processing identified bysecond network identifier; and a first service terminal holding secondnetwork identifier; wherein said portable terminal, said first server,said second server, and said first service terminal are connected via anetwork; said portable terminal comprising: storing means for storingsaid first network identifier; first obtaining means for obtaining, fromsaid first service terminal, said second network identifier and accessinformation for detecting access patterns; second obtaining means forobtaining verification data necessary for verification of said user; andfirst supplying means for supplying control information containing saidfirst network identifier, said second network identifier, and saidaccess information, to said first server which manages said personalinformation identified by said first network identifier stored in saidstoring means, so as to be provided with predetermined services, byprocessing identified by said second network identifier obtained by saidfirst obtaining means being executed by said second server, said firstservice terminal comprising: first holding means for holding said secondnetwork identifier; second obtaining means for obtaining said accessinformation from accesses to itself by said first obtaining means ofsaid portable terminal; second supplying means for supplying said secondnetwork identifier and said access information to said portableterminal, so as to be obtained by said first obtaining means of saidportable terminal; and third supplying means for supplying said controlinformation supplied by said first supplying means of said portableterminal, to said first server; said first server comprising: firstmanaging means for managing said personal information identified by saidfirst network identifier; and first requesting means for requesting tobe provided with said services based on said control information, saidpersonal information, and said access information, to said second serverfor executing processing identified by said second network identifiercontained in said control information supplied by said second supplyingmeans of said portable terminal; and said second server comprising:second managing means for managing processing identified by said secondnetwork identifier; and executing means for executing, based on saidcontrol information, said personal information, and said accessinformation, processing identified by said second network identifier,based on requests from said first requesting means of said first server.75. A service providing system as claimed in claim 74, furthercomprising: a second service terminal connected to said network;wherein: said first service terminal is installed at a first location;said second service terminal is installed at a second location; saidfirst obtaining means of said portable terminal access said firstservice terminal, said access information containing the time of access;said first obtaining means of said portable terminal access said secondservice terminal, said access information containing the time of access;and said executing means of said second server calculate the differencebetween said time contained in said access information obtained by saidfirst obtaining means of said first service terminal and said timecontained in said access information obtained by said first obtainingmeans of said second service terminal, judge whether or not thecalculation results indicate time equal to or exceeding a predeterminedtime, and execute processing identified by said second networkidentifier when judgement is made that said calculation results indicatetime equal to or exceeding a predetermined time.
 76. A service providingsystem as claimed in claim 75, wherein said first location and saidsecond location are predetermined locations on at least one of aconcourse of an amusement park and near at least one of an entry pointand an exit point of a toll road.
 77. A service providing system asclaimed in claim 75, wherein: said first location is a predeterminedlocation near an entry point of a toll road and said second location isa predetermined location near an exit point of said toll road; saidsecond service terminal comprises: image-taking means for taking imagesof passing vehicles; and third obtaining means for obtaining the licenseplate number from said vehicles, from the results of the image taken bysaid image-taking means; said third supplying means of said secondservice terminal further supply said license plate number obtained bysaid third obtaining means to said first server; said first requestingmeans of said first server request said second server which executesprocessing identified by said second network identifier contained insaid control information supplied by said third supplying means of saidsecond service terminal, to provide said server based on said controlinformation, said personal information, said access information, andsaid license plate number obtained by said second obtaining means ofsaid second service terminal; said second server further comprisingsecond holding means for holding a license plate number of a vehicle ofsaid user beforehand; and said executing means of said second servercompare said license plate number obtained by said second obtainingmeans of said second service terminal with said license plate numberheld in said second holding means, and execute settlement processing oftoll for said toll road based on said control information and saidpersonal information when said license plate number obtained by saidsecond obtaining means of said second service terminal matches saidlicense plate number held in said second holding means.