These methods produce better empirical outcomes when in comparison with traditional strategies . The method in accordance with claim 11, whereby the storage system interrogates the message file to discover out if an prompt alert is shipped to th
These methods produce better empirical outcomes when in comparison with traditional strategies [14–16]. The method in accordance with claim 11, whereby the storage system interrogates the message file to discover out if an prompt alert is shipped to the good device by way of good system protocols for push notification. The technique additionally goes from the step 230 to enter a choice level 270 to verify whether or not the consumer has requested the message file one hundred. If there is no request, the tactic branches at NO to perform the check 270 again on a periodic foundation. If there is a request, the strategy branches at YES to a decision point 280 to examine for a correct password entered by the consumer. If the password is inaccurate or not entered, the strategy branches at NO to examine once more for a correct password.