Abstract:
The invention relates to a system and method of retrieving a service contact identifier for providing a service to a user is proposed. The method is performed in a system comprising at least one server system configured for connecting to a user device of said user. The server system has access to a database comprising at least a first service contact identifier required for providing a first service and a second service contact identifier required for providing a second service. The first service is identified by a first service identifier. The first service contact identifier and second service contact identifier are different service contact identifiers. The first service identifier and a service contact identifier are received from the user device of said user. The first service contact identifier may then be retrieved in dependence of the received first service identifier and the received service contact identifier, irrespective of whether said received service contact identifier is said first service contact identifier or said second service contact identifier.
Abstract:
The invention relates to a method and system for reducing the proliferation of electronic messages. An electronic message or a portion thereof is transmitted by the server system. A spam notification signal may be received related to the electronic message or the portion thereof. Access to said electronic message is restricted solely in response to receiving the spam notification signal.
Abstract:
The invention relates to a method and system for reducing the proliferation of electronic messages. An electronic message or a portion thereof is transmitted by the server system. An access restriction instruction signal may be received related to the electronic message or the portion thereof. Access to said electronic message is restricted solely in response to receiving the single access restriction instruction signal.
Abstract:
The invention relates to a method and system for reducing the proliferation of electronic messages. An electronic message or a portion thereof is transmitted by the server system. An access restriction instruction signal may be received related to the electronic message or the portion thereof. Access to said electronic message is restricted solely in response to receiving the single access restriction instruction signal.
Abstract:
The invention relates to a method and system for reducing the proliferation of electronic messages. An electronic message or a portion thereof is transmitted by the server system. A spam notification signal may be received related to the electronic message or the portion thereof. Access to said electronic message is restricted solely in response to receiving the spam notification signal.
Abstract:
The invention relates to a method and system for establishing a telephone connection between a first subscriber device (A-subscriber device) and a second subscriber device (B-subscriber device) in a telephone system. The telephone system is arranged for connecting the A-subscriber device (the calling party) and the B-subscriber device (the called party). The method includes receiving a request from the A-subscriber device to establish a connection with the B-subscriber device and also receiving a personal identity code of a user of said A-subscriber device. The connection can be established between the A-subscriber device and the B-subscriber device only after having received said personal identity code of said user of said A-subscriber device.
Abstract:
The invention relates to a computer-implemented method of controlling a computer application program in a computer system configured for electronically communication with a client. The computer system is configured to have access to a first request set of one or more allowable requests corresponding to a first application state of the computer application program.The computer application program may run on the computer system or on one or more other computer systems. A client request is received at the computer system for the computer application program.The computer application program is in the first application state in relation to said client (using e.g. the client connection).The client request is analysed to determine if the client request matches one of the allowable requests corresponding to the first application state of the computer application program.The computer application program is controlled by instructing this program to execute the client request only if the clxent request matches an allowable request of the first request set.