The method as claimed in claim 10 wherein said proxy server authenticates said wireless device by confirming that said wireless device is a device registered on said proxy server or that a user of said wireless device is a user registered on said proxy server.