For example, in Internet networked or other computer implemented environments, login information, an IP address, cookies or other computer or terminal identification techniques can be used to identify the requesting service site 106 and, in some implementations, the particular user initiating the request.