WO2003005268A1 - A method of providing preadjusted personal information in security through network - Google Patents

A method of providing preadjusted personal information in security through network Download PDF

Info

Publication number
WO2003005268A1
WO2003005268A1 PCT/KR2002/001262 KR0201262W WO03005268A1 WO 2003005268 A1 WO2003005268 A1 WO 2003005268A1 KR 0201262 W KR0201262 W KR 0201262W WO 03005268 A1 WO03005268 A1 WO 03005268A1
Authority
WO
WIPO (PCT)
Prior art keywords
classification
user
information
computer
action
Prior art date
Application number
PCT/KR2002/001262
Other languages
French (fr)
Inventor
Hyun-Su Kim
Original Assignee
Softgram Co. Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Softgram Co. Ltd. filed Critical Softgram Co. Ltd.
Priority to JP2003511164A priority Critical patent/JP2004534327A/en
Publication of WO2003005268A1 publication Critical patent/WO2003005268A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising

Definitions

  • the present invention relates to a method of supplying tailored information services capable of protecting personal information. More particularly, it relates to a method of supplying tailored information services that can perform differentiated marketing according to the classification of customers without leaking out personal information such as the age, sex, business relations, etc. of each customer.
  • a service supplier has only the limited information such as the personal information that each customer has given or information of business relations, so the service supplier cannot provide differentiated information services to potential customers or common people who do not have business relations with itself.
  • the service supplier does not have important personal information of actual customers, particularly, information of each customer's assets that is the most principal point of the purchasing power, the service supplier cannot distinguish potential customers who can let it profit greatly.
  • the present invention concerns a method of supplying tailored information services which can perform differentiated marketing according to the classification of users without leaking out personal information of the users from a computer that a person is using and managing.
  • the inventive method of supplying tailored information services capable of protecting personal information includes: the step of a user's registering and storing personal information according to a given data model through a program installed in his or her computer; the steps of a service supplier's generating data including classification/rule information, action information according to the above classification/rule information, and classification/rule application and taking-action logic, and transmitting the data to the user's computer to decide the classification of the user; the step of the user computer's deciding the classification of the user according to the received data of classification/rule information, action information according to the above classification/rule information, and classification/rule application and taking-action logic, and asking the service supplier's computer for taking action according to the classification of the user; and the step of the service supplier computer's taking action in response to that request, and transmitting a result obtained from the action to the user's computer.
  • the above personal information includes a person's character and status of assets.
  • the step of asking for taking action in accordance with the classification of the user includes: the sub-step of checking if the personal information of the user stored in the user's computer corresponds to conditions of deciding the classification/rule information; the sub-step of determining a classification identifier according to the corresponding conditions of deciding when the personal information of the user corresponds to the conditions of deciding the classification/rule information, thus deciding the classification of the user; and the sub-step of determining a request for taking action corresponding to the classification identifier according to the information of taking action to transmit the request to the service supplier's computer.
  • the above classification/rule information can be embodied by anyone of a decision table, a decision matrix, a decision tree and a script.
  • FIG. 1 shows a system construction for carrying out the present invention
  • FIG. 2 is a flow chart showing a method of supplying tailored information services capable of protecting personal information according to the present invention
  • FIG. 3 is a flow chart showing in detail the step of asking for taking action according to the classification of a user after deciding the classification of the user.
  • FIG. 1 shows a system construction for carrying out the present invention
  • FIG. 2 is a flow chart showing a method of supplying tailored information service capable of protecting personal information according to the present invention.
  • FIG. 3 is a flow chart showing in detail the step of asking for taking action according to the classification of a user after deciding the classification of the user.
  • a user's computer 1 and a service supplier's computer 2 are connected to each other through Internet or wire/wireless network.
  • a program that the service supplier has provided such as a personal assets management program or an integrated saving account management program, is installed in user's computer 1.
  • a user registers and stores S10 personal information such as his or her character and present status of assets according to a given data model in a program installed in his or her computer 1.
  • a service supplier produces data D including classification/rule information, action information according to the above classification/rule information, and classification/rule application and taking action logic, and stores S20 data D in the service supplier's computer 2.
  • the following table 1 shows a first preferred embodiment of the classification/rule information, action information according to the above classification/rule information.
  • This classification/rule information includes conditions of decision A that enable deciding the classification of a user according to the personal information, and a proper classification identifier B for each classification.
  • the classification/rule information can be embodied by general software program logic such as a decision table, a decision matrix, a decision tree, and a script.
  • Conditions of decision A consist of equations each using values of personal information as parameters. If the user's personal information corresponds with some classification's conditions of decision, a predetermined classification identifier B is decided. Once the classification identifier B is decided, corresponding to this identifier B, a request for taking action C is determined in the action information.
  • Data D held in the service supplier's computer 2 is transmitted S30 to the user's computer 1 periodically or at a given point of time (e.g. login) through Internet or wire/wireless network.
  • a given point of time e.g. login
  • the user has been already registered as a customer in the service supplier such as a banking facility, his or her personal information, information of business relations, etc. that he or she has already provided to the service supplier when he or she was registered as a customer therein can be also transmitted.
  • the classification of the user can be more exactly carried out in his or her computer 1.
  • the user's computer 1 After the user's computer 1 decides the classification of the user on the basis of the classification/rule information and action information according to the received data D's classification/rule application and taking-action logic, it requires S40 to take action according to the classification of the user.
  • This step S40 is fully described as follows.
  • Computer 1 checks S41 if the user's personal information held in computer 1 corresponds to conditions of decision A of the classification/rule information according to the received classification/rule application and taking- action logic. If the user's personal information corresponds to conditions of decision A of the classification/rule information, computer 1 decides classification identifier B according to those corresponding conditions of decision A and decides S42 the classification of the user. After that, computer 1 determines request for taking action C in response to the above classification identifier B, thus transmitting it to the service supplier's computer 2.
  • an action F is carried out in response to request for taking action C, thus transmitting S50 a result, obtained from the action, to the user's computer 1.
  • the user's computer 1 determines the user as a man of forties having assets of more than one hundred thousand dollars
  • a request for taking action asking for the information suitable for his character and assets
  • the service supplier's computer 2 takes action in response to the request 2 and transmits information about kinds of insurance and kinds of savings deposits, stock information, tax information, etc. to the user's computer 1. Accordingly, a person's confidential personal information such as personal assets information cannot leak out from a computer that the person is using and managing, and the service supplier can perform effective marketing according to a person's character and status of assets.
  • the present invention enables users to be provided with information services according to information about a person's tastes and inclination (e.g. religion, political preference, etc.), information about personality and mental state (e.g. fortune-telling, biorhythm, etc.), another information relating to a person (e.g. academic background, grade, etc.).
  • information about a person's tastes and inclination e.g. religion, political preference, etc.
  • information about personality and mental state e.g. fortune-telling, biorhythm, etc.
  • another information relating to a person e.g. academic background, grade, etc.
  • confidential personal information such as information of personal assets, identification numbers, bank account passwords, etc.
  • a service supplier can perform effective marketing according to a person's character and status of assets, thus reducing the marketing costs and realizing a new turnover. Moreover, because personal information does not need to be stored in a service supplier's computer, maintenance and repair costs such as barrier system construction costs that may fall on the service supplier can be saved.

Abstract

Disclosed is a method of supplying tailored information services capable of protecting personal information include: the step of a user's registering and storing personal information according to a given data model through a program installed in his or her computer; the steps of a service supplier's generating data including classification/rule information, action information according to the above classification/rule information, and classification/rule application and tacking-action logic, and transmitting the data to the user's computer to decide the classification of the user; the step of the user computer's deciding the classification of the user according to the received data of classification/rule information, action information according to the above classification/rule information, and classification/rule application and tacking-action logic, and asking the service supplier's computer for taking action according to the classification of the user; and the step of the service supplier computer's taking action in response to that request, and transmitting a result obtained from the action to the user's computer.

Description

A METHOD OF PROVIDING PREADJUSTED PERSONAL INFORMATION IN SECURITY THROUGH NETWORK
Technical Field
The present invention relates to a method of supplying tailored information services capable of protecting personal information. More particularly, it relates to a method of supplying tailored information services that can perform differentiated marketing according to the classification of customers without leaking out personal information such as the age, sex, business relations, etc. of each customer.
Background Art
Recently, many enterprises are providing differentiated information services according to the age, sex and taste of each customer by using a customer relationship management (CRM). According to this service supply method, a service supplier has only the limited information such as the personal information that each customer has given or information of business relations, so the service supplier cannot provide differentiated information services to potential customers or common people who do not have business relations with itself. In addition, since the service supplier does not have important personal information of actual customers, particularly, information of each customer's assets that is the most principal point of the purchasing power, the service supplier cannot distinguish potential customers who can let it profit greatly. By way of example, if a customer, John, is saving l,OO0USD and 50,000USD in a bank A and a bank B, respectively, the bank A cannot get from the bank B the information that John is saving 50,000USD in the bank B without John's agreement. Therefore, the bank A cannot offer kinds of more proper savings accounts to John who may possibly let the bank A make more profits or provide beneficial interest information to him. In order to solve this problem, there proposed a method of providing services by using personal information of customers attained through a software program such as a personal asset management program or integrated account management program distributed to customers or potential customers. However, according to this conventional service supply method, customers evade storing the personal information in an outside computer system because their personal information may leak out easily, and it is hard for a service supplier to get personal information of customers, potential customers and common people. Besides, it is difficult for the service supplier to distinguish potential customers who let the service supplier make a profit, whereby a new turnover cannot be realized.
Disclosure of Invention
Accordingly, the present invention concerns a method of supplying tailored information services which can perform differentiated marketing according to the classification of users without leaking out personal information of the users from a computer that a person is using and managing.
The inventive method of supplying tailored information services capable of protecting personal information includes: the step of a user's registering and storing personal information according to a given data model through a program installed in his or her computer; the steps of a service supplier's generating data including classification/rule information, action information according to the above classification/rule information, and classification/rule application and taking-action logic, and transmitting the data to the user's computer to decide the classification of the user; the step of the user computer's deciding the classification of the user according to the received data of classification/rule information, action information according to the above classification/rule information, and classification/rule application and taking-action logic, and asking the service supplier's computer for taking action according to the classification of the user; and the step of the service supplier computer's taking action in response to that request, and transmitting a result obtained from the action to the user's computer.
According to another preferred embodiment of the present invention, the above personal information includes a person's character and status of assets.
According to still another preferred embodiment of the present invention, the step of asking for taking action in accordance with the classification of the user includes: the sub-step of checking if the personal information of the user stored in the user's computer corresponds to conditions of deciding the classification/rule information; the sub-step of determining a classification identifier according to the corresponding conditions of deciding when the personal information of the user corresponds to the conditions of deciding the classification/rule information, thus deciding the classification of the user; and the sub-step of determining a request for taking action corresponding to the classification identifier according to the information of taking action to transmit the request to the service supplier's computer. According to still another preferred embodiment of the present invention, the above classification/rule information can be embodied by anyone of a decision table, a decision matrix, a decision tree and a script.
BRIEF DESCRIPTION OF THE DRAWINGS
The above and other objects, features and advantages of the present invention will be apparent from the following detailed description of the preferred embodiments of the invention in conjunction with the accompanying drawings, in which:
FIG. 1 shows a system construction for carrying out the present invention; FIG. 2 is a flow chart showing a method of supplying tailored information services capable of protecting personal information according to the present invention; and FIG. 3 is a flow chart showing in detail the step of asking for taking action according to the classification of a user after deciding the classification of the user.
Best Mode for Carrying Out the Invention
The present invention will now be described in detail in connection with preferred embodiments with reference to the accompanying drawings. For reference, like reference characters designate corresponding parts throughout several views. FIG. 1 shows a system construction for carrying out the present invention, and
FIG. 2 is a flow chart showing a method of supplying tailored information service capable of protecting personal information according to the present invention. FIG. 3 is a flow chart showing in detail the step of asking for taking action according to the classification of a user after deciding the classification of the user. A user's computer 1 and a service supplier's computer 2 are connected to each other through Internet or wire/wireless network. A program that the service supplier has provided, such as a personal assets management program or an integrated saving account management program, is installed in user's computer 1.
First, a user registers and stores S10 personal information such as his or her character and present status of assets according to a given data model in a program installed in his or her computer 1. A service supplier produces data D including classification/rule information, action information according to the above classification/rule information, and classification/rule application and taking action logic, and stores S20 data D in the service supplier's computer 2. The following table 1 shows a first preferred embodiment of the classification/rule information, action information according to the above classification/rule information. This classification/rule information includes conditions of decision A that enable deciding the classification of a user according to the personal information, and a proper classification identifier B for each classification. The classification/rule information can be embodied by general software program logic such as a decision table, a decision matrix, a decision tree, and a script. Conditions of decision A consist of equations each using values of personal information as parameters. If the user's personal information corresponds with some classification's conditions of decision, a predetermined classification identifier B is decided. Once the classification identifier B is decided, corresponding to this identifier B, a request for taking action C is determined in the action information.
[Table !] Classification/rule information Action information
Figure imgf000006_0001
Data D held in the service supplier's computer 2 is transmitted S30 to the user's computer 1 periodically or at a given point of time (e.g. login) through Internet or wire/wireless network. If the user has been already registered as a customer in the service supplier such as a banking facility, his or her personal information, information of business relations, etc. that he or she has already provided to the service supplier when he or she was registered as a customer therein can be also transmitted. At this point, the classification of the user can be more exactly carried out in his or her computer 1.
After the user's computer 1 decides the classification of the user on the basis of the classification/rule information and action information according to the received data D's classification/rule application and taking-action logic, it requires S40 to take action according to the classification of the user. This step S40 is fully described as follows.
Computer 1 checks S41 if the user's personal information held in computer 1 corresponds to conditions of decision A of the classification/rule information according to the received classification/rule application and taking- action logic. If the user's personal information corresponds to conditions of decision A of the classification/rule information, computer 1 decides classification identifier B according to those corresponding conditions of decision A and decides S42 the classification of the user. After that, computer 1 determines request for taking action C in response to the above classification identifier B, thus transmitting it to the service supplier's computer 2.
Once the service supplier's computer 2 receives request for taking action C according to the classification of the user, an action F is carried out in response to request for taking action C, thus transmitting S50 a result, obtained from the action, to the user's computer 1.
For example, if the user's computer 1 determines the user as a man of forties having assets of more than one hundred thousand dollars, a request for taking action, asking for the information suitable for his character and assets, is transmitted to the service supplier's computer 2. The service supplier's computer 2 takes action in response to the request 2 and transmits information about kinds of insurance and kinds of savings deposits, stock information, tax information, etc. to the user's computer 1. Accordingly, a person's confidential personal information such as personal assets information cannot leak out from a computer that the person is using and managing, and the service supplier can perform effective marketing according to a person's character and status of assets.
Industrial Applicability
While the present invention has been described with reference to the particular illustrative embodiments, it is not to be restricted by the embodiments but only by the appended claims. It is to be appreciated that those skilled in the art can change or modify the embodiments without departing from the scope and spirit of the present invention. Particularly, the present invention enables users to be provided with information services according to information about a person's tastes and inclination (e.g. religion, political preference, etc.), information about personality and mental state (e.g. fortune-telling, biorhythm, etc.), another information relating to a person (e.g. academic background, grade, etc.). According to the present invention, since confidential personal information such as information of personal assets, identification numbers, bank account passwords, etc. cannot leak out from a computer that a person is using and managing, a person can use information services with a sense of security. A service supplier can perform effective marketing according to a person's character and status of assets, thus reducing the marketing costs and realizing a new turnover. Moreover, because personal information does not need to be stored in a service supplier's computer, maintenance and repair costs such as barrier system construction costs that may fall on the service supplier can be saved.

Claims

WHAT IS CLAIMED IS;
1. A method of supplying tailored information services capable of protecting personal information comprising: a step of a user's registering and storing personal information according to a given data model through a program installed in his or her computer; a step of a service supplier's generating data including classification/rule information, action information according to said classification/rule information, and classification/rule application and taking-action logic, and transmitting the data to the user's computer to decide the classification of the user; a step of the user computer's deciding the classification of the user according to the received data of classification/rule information, action information according to said classification/rule information, and classification/rule application and taking- action logic, and asking the service supplier's computer for taking action according to the classification of the user; and a step of the service supplier computer's taking action in response thereto, and transmitting a result obtained from the action to the user's computer.
2. A method according to claim 1, wherein said personal information includes a person's character and status of assets.
3. A method according to claim 1, wherein the step of asking for taking action according to the classification of the user includes: a sub-step of checking if the personal information of the user stored in the user's computer corresponds to conditions of deciding the classification/rule information; a sub-step of determining a classification identifier according to the corresponding conditions of deciding when the personal information of the user corresponds to the conditions of deciding the classification/rule information, thus deciding the classification of the user; and a sub-step of determining a request for taking action corresponding to the classification identifier according to the information of taking action to transmit the request to the service supplier's computer.
4. A method according to claim 1, wherein said classification/rule information can be embodied by anyone of a decision table, a decision matrix, a decision tree and a script.
PCT/KR2002/001262 2001-07-03 2002-07-03 A method of providing preadjusted personal information in security through network WO2003005268A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2003511164A JP2004534327A (en) 2001-07-03 2002-07-03 Customized information service method that can protect personal information

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2001-0039589A KR100461990B1 (en) 2001-07-03 2001-07-03 The method of servicing information capable for protecting personal information
KR2001/39589 2001-07-03

Publications (1)

Publication Number Publication Date
WO2003005268A1 true WO2003005268A1 (en) 2003-01-16

Family

ID=19711713

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2002/001262 WO2003005268A1 (en) 2001-07-03 2002-07-03 A method of providing preadjusted personal information in security through network

Country Status (3)

Country Link
JP (1) JP2004534327A (en)
KR (1) KR100461990B1 (en)
WO (1) WO2003005268A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7752671B2 (en) 2004-10-04 2010-07-06 Promisec Ltd. Method and device for questioning a plurality of computerized devices
CN104704505A (en) * 2012-08-28 2015-06-10 维萨国际服务协会 Protecting assets on a device

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100725471B1 (en) 2005-05-12 2007-06-08 후지쯔 가부시끼가이샤 Personal information control system, mediation system, and terminal unit
KR100866247B1 (en) * 2006-06-09 2008-10-30 에스케이 텔레콤주식회사 System for Relay of Personal Information and Service Method for Customization Using the Same
KR102024153B1 (en) 2017-12-26 2019-09-23 주식회사 마인드웨어?스 Query processing service providing system based on personal information protection
KR102392300B1 (en) 2020-06-03 2022-04-29 주식회사 마인드웨어Ÿp스 System for providing voice information processing service based on personal information protection

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20000058889A (en) * 2000-07-04 2000-10-05 김영호 System and method for personal financial planning over the internet
KR20000064085A (en) * 2000-08-21 2000-11-06 김영호 Method for personal financial management using a housekeeping book and its recording medium
KR20000072653A (en) * 2000-09-18 2000-12-05 민태홍 Method and system for personal financial planning over the internet
KR20010025715A (en) * 2001-01-20 2001-04-06 김진형 Integration property management system and method of using internet
KR20010107282A (en) * 2000-05-26 2001-12-07 오석주 Method and system for managing asset based on a communication network
KR20020043404A (en) * 2000-12-04 2002-06-10 윤병철 Financial management system and method for using a network

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10326289A (en) * 1997-03-28 1998-12-08 Nippon Telegr & Teleph Corp <Ntt> Method for providing information and system therefor and storage medium for storing the same program
JPH11212911A (en) * 1998-01-28 1999-08-06 Mitsubishi Electric Corp Distributed service cooperation device
JPH11345202A (en) * 1998-06-03 1999-12-14 Hitachi Ltd Customizing method of service providing form
KR19990068754A (en) * 1999-06-17 1999-09-06 김도연 Database Method of Personal Information over Internet
KR20020018321A (en) * 2000-09-01 2002-03-08 김종우 Method and its System for Offering Fit Information Through Internet
KR100494975B1 (en) * 2001-02-21 2005-06-16 주식회사 핑거 Customer finance management method and system using screen scrapping
KR20010069421A (en) * 2001-03-21 2001-07-25 하준영 One click joining member system through the standardization of personal information
CN113800773B (en) * 2017-01-26 2023-03-14 巨石集团有限公司 High-performance glass fiber composition, and glass fiber and composite material thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010107282A (en) * 2000-05-26 2001-12-07 오석주 Method and system for managing asset based on a communication network
KR20000058889A (en) * 2000-07-04 2000-10-05 김영호 System and method for personal financial planning over the internet
KR20000064085A (en) * 2000-08-21 2000-11-06 김영호 Method for personal financial management using a housekeeping book and its recording medium
KR20000072653A (en) * 2000-09-18 2000-12-05 민태홍 Method and system for personal financial planning over the internet
KR20020043404A (en) * 2000-12-04 2002-06-10 윤병철 Financial management system and method for using a network
KR20010025715A (en) * 2001-01-20 2001-04-06 김진형 Integration property management system and method of using internet

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7752671B2 (en) 2004-10-04 2010-07-06 Promisec Ltd. Method and device for questioning a plurality of computerized devices
US8544099B2 (en) 2004-10-04 2013-09-24 Promisec Ltd. Method and device for questioning a plurality of computerized devices
US8566939B2 (en) 2004-10-04 2013-10-22 Promisec Ltd. Method and device for scanning a plurality of computerized devices connected to a network
CN104704505A (en) * 2012-08-28 2015-06-10 维萨国际服务协会 Protecting assets on a device

Also Published As

Publication number Publication date
JP2004534327A (en) 2004-11-11
KR20010086475A (en) 2001-09-13
KR100461990B1 (en) 2004-12-14

Similar Documents

Publication Publication Date Title
US8458062B2 (en) Real-time product matching
KR100486357B1 (en) Activity management method
US8447630B2 (en) Systems and methods for managing permissions for information ownership in the cloud
CA2651543C (en) Apparatus for access control and processing
US8554606B2 (en) System and method for managing sponsorships
US20080288393A1 (en) Credit Worthiness Rating Method
US6957198B2 (en) Use of persona object in electronic transactions
GB2437321A (en) A networked method for the control and monitoring of internet messages by analysis using a smart algorithm and a designated dictionary.
WO2019130809A1 (en) Transaction management system, transaction management device, transaction management method, and transaction management program
US8917837B2 (en) Consumer contact portal
KR100494975B1 (en) Customer finance management method and system using screen scrapping
WO2003005268A1 (en) A method of providing preadjusted personal information in security through network
US20170024725A1 (en) Method, system and computer readable medium for web site account and e-commerce management from a central location
US20210185036A1 (en) Secure authentication system
JP2005196699A (en) Personal information management system
US7769691B2 (en) Systems and methods for configurable entitlement management
KR100489426B1 (en) Edi system and the method on on-line through providing the information of discontinuance and suspension of business
JP2004030410A (en) Method, system and program for providing particular service
US20160078468A1 (en) Automated service verification system
Manyeruke Customer satisfaction with the electronic banking services in Zimbabwe: a case of Mashonaland West Province, Zimbabwe.
Yüksel Fraud in Marketing and Consumption Practices
Hadzic et al. Dignified ID in Cash Assistance in East Africa
Farrell Will You Still Trust Me Tomorrow? Lessons Learnt in Maintaining Trust for SME, B2C E-commerce
TESFAYE OPPORTUNITIES AND CHALLENGES OF ELECTRONIC BANKING SERVICE RENDERING THE CASE OF COMMERCIAL BANK OF ETHIOPIA
KR20030087495A (en) A method of collecting a card client using game room

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

ENP Entry into the national phase

Ref country code: JP

Ref document number: 2003 511164

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 2003511164

Country of ref document: JP

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase