http://www.w3.org/ns/prov#value | - The method as set forth in claim 2, wherein said step c) is adapted to, if said specific user access detection/call item is selected, perform a subroutine including the steps of: c-1) searching a log-in table for data about a specific user in response to a specific user access detection request from said mobile personal computer, said log-in table storing identifications of users connected to said
|