|Publication number||USRE42154 E1|
|Application number||US 11/342,233|
|Publication date||Feb 15, 2011|
|Filing date||Jan 27, 2006|
|Priority date||May 24, 1995|
|Also published as||CA2195968A1, CA2195968C, DE69636065D1, DE69636065T2, EP0782728A1, EP0782728A4, EP0782728B1, US5737414, US5949875, US6249865, US6684333, USRE45241, WO1996037848A1|
|Publication number||11342233, 342233, US RE42154 E1, US RE42154E1, US-E1-RE42154, USRE42154 E1, USRE42154E1|
|Inventors||Jay S. Walker, James A. Jorasch, Gregory G. Carson|
|Original Assignee||Hewlett-Packard Development Company L.P.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (20), Non-Patent Citations (10), Referenced by (2), Classifications (51), Legal Events (8)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application is a continuation application of U.S. patent application Ser. No. 08/732,620 entitled “PARALLEL DATA NETWORK BILLING AND COLLECTION SYSTEM” filed on Oct. 16, 1996 in the name of Jay S. Walker et al. and issued on Sep. 7, 1999 as U.S. Pat. No. 5,949,875; which is a continuation-in-part application of U.S. patent application Ser. No. 08/449,208, filed May 24, 1995, now abandoned.
The present invention relates generally to billing for information, goods, services and the like made available to a user on a computer or data network, and more particularly, to a method for such billing and collection linked to a separate telephone connection associated with a billing network that manages and bills for access to information over the computer or data network.
With the advent of data networks such as the Internet, World Wide Web, bulletin board systems, and commercial on-line services, electronic commerce has become one of the fastest growing segments of the economy. The most readily available form of commerce is the exchange of information to an end-user for payment. While these data networks are adept at disseminating information, collection of payment has been problematic—holding back the growth of electronic commerce.
Methods of collecting payment for information can be separated into two broad categories, on-line and off-line. On-line methods include the transfer of credit card numbers and the use of digital cash. Off-line methods require the end-user to mail in cash or checks. These approaches can be cumbersome, time consuming and risky from a security standpoint.
Transferring credit card numbers via the Internet, for example, carries the risk of theft from unscrupulous computer hackers and thieves, who can tap into a server connected to the Internet and search for messages containing 16 digit numbers. Digital money systems (e.g. DigiCash, eCash, etc.) are presently a long way from practical implementation, with no standards having yet been established. Another problem associated with the use of credit cards, is that some users may not even be able to qualify for one, or have a sufficient amount of credit. Vendors are also discouraged from billing small amounts on credit cards because of the relatively high transactional costs as a percent of the sale.
While cryptographic systems will eventually enable the safe transmission of credit card numbers through cyberspace, some users will never feel completely comfortable providing their credit card numbers in this manner, even if the communications are ostensibly made secure.
Additionally, there exists a problem in that casual short-term or single usage visits to an information provider on a computer network cannot be charged in an economical manner for both the information provider and the user. For example, if an information provider wanted to charge twenty-five cents to view a one time copy of a “top ten” list, the end-user obviously would not want to set-up a credit or cash account as the expense to establish such an account would exceed the value of the one-time information obtained. The minimum practical credit card charge exceeds $2.50.
There have been attempts to use existing telephone-based billing and collection systems to bill for such information, however those have many disadvantages. One type is a 900-number-based billing system, which is cumbersome, difficult to use, and generally ineffective as described in more detail below.
Specifically, all of the existing systems use codes that are simply passwords, and are limited to the particular data site for which they were issued. These codes do not represent “value” and therefore cannot be used to control or limit access to digital data.
A second major problem with existing systems is that the information site must be “intelligent” and able to store and maintain codes in order to know which codes are valid (e.g. when does a code expire). This greatly increases the information provider's cost for providing digital information and greatly limits the number of information providers that can afford the additional overhead, thus reducing commerce and competition on data networks.
A third major problem with existing systems is that neither the data network nor the information provider are connected to the billing system. This severely limits their ability to provide even basic customer service to users of the system.
A fourth major problem with existing systems relates to the use of the 900 system itself, information providers are limited as to the amounts charged for information. The 900-number system provider in existing systems offers no more than seven different dollar amounts they can charge on their 900-numbers. Each 900-number represents a different dollar amount charged to a consumer. For example, a 900-number system provider has three different 900-numbers, each corresponding to a different dollar value, $10, $15 and $20. An information provider using such a system for billing would be limited to those dollar amounts regardless of the value of the information they were selling. Additionally, the dollar charges cannot reflect the number of times a user, or multiple users, has had access to information, and the consumer is billed immediately for the 900-number call, even if they never receive the digital information.
A specific example of one such system is known as Web 900, offered by Logicom, Inc. In that system, the user calls a given 900-number, in exchange for which he is provided a code valid for a specified time period for unlimited access to a particular information site, and the information site locally verifies the validity of the code. There are several problems with this arrangement. First, there is no way to control access to the information by the number of uses. Users are forced to pay for unlimited access even if the user desires one piece of information or single use access. Second, since the data network has no way of preventing access to unauthorized users in possession of the code, the code could be posted to a BBS or newsgroup on the web, allowing for repeated uncontrolled use by anyone reading the posting. Third, the codes provided are usable only at a particular information site. A code provided for the purchase of five dollars worth of information at information site “A” cannot be used for the purchase of five dollars worth of information at site “B.” Finally, the data network must have the ability to store codes, and must have software to verify each code entered.
A principle object of the present invention is to provide a new and improved system for selling digital data.
Another such object of the present invention is a system in which information is communicated to an end-user from a data site, while billing is implemented through a billing system, with communications between the data site and billing system managed by an access management system. A further object of the present invention is to provide such a system wherein the billing system may include a “900 type” shared-revenue telephone line.
In accordance with a first embodiment of the present invention, there is provided a method and apparatus for using an access management computer to control a user's access to digital data located at a data site, while causing a billing system to toll the user's access to the data. In this embodiment of the invention, the access-management computer receives from the billing system a first access code corresponding to the user's request for access to the digital data. The access management computer receives a second access code from the data site, and verifies that the first access code corresponds to the second access code. (The first and second billing codes may be received in either order.) The access management computer communicates a message confirming the verification to the data site, thereby authorizing the user's access to the digital data. To complete the transaction, the access management computer authorizes the billing system to post an access charge to an account associated with the user based upon the user's access to the digital data.
In accordance with a second embodiment of the invention, a method and apparatus are provided for using a billing site to toll a user's access to digital data at a data site by signaling an access management computer to authorize the user's access to the digital data. In this embodiment of the invention, the billing site receives a user's request for access to the digital data, the request for access being associated with a billing account for charging the user, and including a code corresponding to the digital data. The billing site routes to the access management computer a signal indicating that the billing site has received the code corresponding to the user request for access to the digital data. Subsequently, the billing site receives from the access management computer a signal that the user has received access to the digital data. In response, the billing site posts an access charge to the billing account based upon the user's access to the digital data.
In yet another embodiment of the invention, a method and apparatus are provided for a user to access stored digital information at a data site. In this embodiment, the user communicates to a billing system a first access code authorizing the billing system to charge his billing account for access to the stored digital information. The user receives from the billing system a second access code permitting the user to access the stored digital information at the data site. The user connects to the remote data site, and provides to the remote data site the second access code whereby to gain access to the stored digital information.
In still another embodiment of the invention, a method and system are provided for using a billing site to toll a user's access to a data site through an access management computer, wherein the user establishes a communications link between himself and the billing site, the communications link being associated with a the user's billing account. A communications link is established between the billing site and the access management computer, and the billing site sends the access management computer a signal indicating that the communications link between the user and the billing site is active. This signal authorizes the user access to the data site. Subsequently, the billing site receives from the access management computer a signal that the user has received access to the data site, and posts via the billing site an access charge to the billing account based upon the user's access to the data site.
In all of the embodiments described above, the billing site, or billing system, preferably consists of a shared-revenue telephone system—typically a “900 number” or equivalent. The data sites comprise database providers, for example, as may be found on the internet or through other means of user access. The user is typically remote, while the billing system, access management computer, and data site may be all or in some limited combination co-located.
In accordance with the foregoing, the many features and advantages of the invention will be better understood as the detailed description of the invention proceeds with particular reference to the accompanying drawings.
The method and apparatus of the preferred embodiments of the invention will now be described with reference to
With reference to
Referring now to
In addition to indexes of information 420, some sites may have indexes of products 425 which describe goods available for sale. In the case of the chess site, the index of products 425 might list chess books.
To obtain access to information 450, the end-user must pass through information barrier 430. Information barrier 430 acts as a “toll-booth” at information provider 410, and is analogous to password screens that require a valid password to be inputted to obtain access to a computer. If the proper code is entered, access is granted; otherwise the barrier remains in place. Information barrier 430 determines whether the code is valid by communicating with access management computer 510 over an open channel of communication as described below.
In another embodiment, information barrier 430 itself may contain a code generator capable of issuing codes directly to the end-user, thus eliminating some of the communication between information barrier 430 and access management computer 510. This code generator either retrieves a predetermined code from a database or generates random codes. These codes may then be transmitted to access management computer 510 for validation. In yet another embodiment, information barrier 430 accepts digital “tokens” in exchange for access to information 450.
Session and purchase codes are generally described as a unique series of digits, either retrieved from a database of predetermined codes or generated at random, used to purchase information 450 or physical goods 40. Those skilled in the art will understand that there are some variations to the structure of the codes in each embodiment of the invention and they can range from a simple series of random digits to long strings or groups of digits. Optionally, each group of digits may represent a number of pieces of information including, but not limited to, cost, product description, originating ANI, time/date, server ID number, etc. The uniqueness of codes allows a high level of security. The code can be limited to one-time access, making the broadcasting on the web of a lost or stolen code useless. Thus, only the first user is able to use the code, subsequent users of the same code will be denied access. This uniqueness of codes also assures an easy and reliable method for auditing of the 900-number service provider.
Session code database 575 stores codes used to purchase information 450. To activate the codes, the end-user calls 900-number network 600 and enters the requested code, which is then processed by access management computer 510.
Purchase code database 577 stores codes used by the end-user in the physical goods purchasing embodiment. The end-user calls 900-number provider computer 610 and enters the requested code. The 900-number provider computer 610 transmits this code to access management computer 510. These codes are then transmitted to information provider 410 to authorize fulfillment.
Billing record database 580 stores a copy of each active session code 60 and active purchase code 80. This database provides both an audit trail for all transactions and a cross reference for the accounting of LEC charges and commissions due information providers.
Token database 582 is the repository for tokens used by the end-user for the purchase of information or physical goods 40.
ANI database 584 stores all end-user telephone number information and is closely tied to billing record database 580.
Activation query database 586 stores the queries used to determine whether or not the end-user is currently connected to 900-number network 600.
Communication port 530 allows access management computer 510 to communicate with data network 400 and 900-number provider computer 610. Communication with 900-number provider computer 610 also involves conventional interactive voice response unit (IVRU) 590. IVRUs are well known in the art (see, e.g., Jerry Fitzgerald, Business Data Communications—Basic Concepts, Security & Design, 4th ed., John Wiley & Sons, 1993) and need not be described in detail here. IVRU 590 allows the end-user and access management system 500 to interface directly over the public switched telephone network.
Referring now to
Dedicated communications links may be established between access management computer 510, data network 400, and 900 number network 600. Although these systems are described as being located remotely from one another, one or more of the systems may be located within the same location.
Referring now to
At step 700 the end-user logs on to data network 400. Data network 400 may be the Internet, World Wide Web, Bulletin Board Service, or any other electronic network. As described previously, data network 400 encompasses at least one information provider 410. After the end-user reaches information provider 410, he reviews indices of information 420 at step 705 and locates information 450 that he would like to purchase. Indices of information 420 are similar to the table of contents of a book, in which chapter and sub-chapter headings provide an indication of the information to follow. Indices of information 420 may also contain short excerpts from information 450.
After finding information 450 to purchase, the end-user selects information 450 for viewing or downloading. The end-user, for example, might select a chocolate chip cookie recipe from a list of dessert recipes. Before information 450 (the cookie recipe) is made available, however, the end-user is presented with information barrier 430 at step 710. Information barrier 430 is software which requests that the end-user enter a valid code to obtain access to information 450; it is similar to data security software which denies access to a network without the proper password. There is no way to access information 450 without providing the correct access code to information barrier 430. At step 715, information barrier 430 provides a dialog box displaying a place to enter session code 50 (an access code) along with instructions for obtaining session code 50. If the end-user does not yet have session code 50 at evaluative step 720, information barrier 430 requests session code from access management computer 510 at step 730.
Access management computer 510 retrieves session code 50 from session code database 575 at step 735. Session code database 575 has three fields—code, status, and price data. The code field stores session codes 50 with one database record for each session code 50. Each session code 50 is a string of digits or letters. These digits may be randomly generated or developed by code generation algorithms such as the algorithms for generating credit card numbers. Alternatively, session codes may be sequential numbers. After being created and stored in session code database 575, each session code 50 is assigned a status. The status field has values of “unassigned,” “pending,” “active,” and “completed.” When a session code 50 having a status of “unassigned” has been sent to information barrier 430, its status is changed to “pending.” After session code 50 is activated by the end-user the status is changed to “active.” The status of session code 50 is changed to “completed” after the end-user has gained access to information 450. Each session code 50 also has corresponding pricing data which indicates the cost of information 450 purchased through the use of session code 50. This pricing data is updated by information barrier 430 after the end-user has selected information 450 to purchase, described at step 935.
At step 740, access management computer 510 changes the status of one session code 50 to “pending” and transmits it to information barrier 430 at step 745. Information barrier 430 displays session code 50 in a dialog box on video monitor 350 of end-user computer 310 at step 750. This dialog box provides instructions for activating session code 50, which the end-user writes down at step 755.
If the end-user already has session code 50 (i.e. he has already called the 900-number to activate it) and enters it at information barrier 430, at step 725 a search of session code database 575 is performed at access management computer 510 to check the status of session code 50 to verify that its status is “active” as described at step 915 of FIG. 9.
Referring now to
At step 800 the end-user dials the 900-number provided by information barrier 430 and enters session code 50 using the touch tone keys of telephone 395 at step 805. 900-number network 600 then transmits session code 50 to access management computer 510 at step 810, and stores a copy of session code 50 along with the billing information of the call so that pricing data received from access management computer 510 may be matched with the particular call record. At step 815, access management computer 510 searches session code database 575 to determine whether session code 50 is present. If it is, the status field of the database record for session code 50 is changed to “active” at step 825. IVRU 590 then reads a confirmation message to the end-user at step 830 and instructs him to disconnect the 900-number call and return to information barrier 430 from which session code 50 was obtained. At step 835, the end-user hangs up the phone, disconnecting from 900-number network 600. If the search at step 815 reveals no matching session code 50 in session code database 575, the end-user is instructed to check the entered session code 50 and re-enter it, or return to information barrier 430 for a new session code 50 as described at step 805.
If, at step 920, session code 50 is not found in session code database 575 (or its status is not “active”), then access management computer 510 has not found a corresponding session code 50 received from 900-number network 600. Access management computer 510 then communicates a message to information barrier 430 indicating that the end-user should not be provided access to information 450. The end-user returns to step 715 at which point he is requested to enter another session code 50.
If session code 50 is found in session code database 575 and its status is “active”, session code 50 is communicated back to information barrier 430 to verify that two corresponding session codes 50 have been received. This correspondence of two session codes 50 indicates that the session code is valid and that the end-user should be authorized access to information 450 at step 925.
At step 935, access management computer 510 adds the pricing data to the pricing data field of session code 50 of session code database 575 and then transfers this data to a billing record at billing record database 580. This billing information contains the end-user phone number, 900-number, time of call, date of call, length of call, price, etc. At step 940, this billing information is sent to Local Exchange Carrier (LEC) computer 675, authorizing LEC computer 675 to post an access charge to the end-user's account where it shows up on his monthly phone bill 675. Access management computer 510 then searches session code database 575 to change the status of session code 50 to “completed” at step 945. An end-user activating a session code, but not using it, will of course not generate the pricing data sent to LEC computer 675 at step 940. Access management computer 510 may send a nominal charge to LEC computer 675 in order to cover transport charges of the 900-number call used to activate session code 50.
The above embodiment describes session codes 50 generated at access management computer 510, transmitted to information barrier 430, provided to the end-user, and entered into 900-number network 600. Those skilled in the art will appreciate that session code 50 can be transmitted directly from access management computer 510 to 900-number network 600. After reaching information barrier 430, the end-user is instructed to call 900-number network 600 to receive session code 50. This code is then entered at information barrier 430 where it is verified by access management computer 510 as previously described.
In another embodiment, session code database 575 contains fields in addition to code, status, and pricing data. Such fields may include remaining uses, dollar value remaining, expiration date, start date, time remaining, valid information providers, valid information, etc. The remaining uses field is an integer indicating the number of times that session code 50 may be used before its status is changed to “completed” while the dollar value remaining field contains a dollar amount which is reduced as information 450 is purchased. A field for expiration date allows session codes 50 to expire on a given date while a field for start date allows session codes 50 to remain unusable (status of “pending”) until a given date, regardless of whether or not the end-user has called the 900-number to activate session code 50. A test field for valid information providers enables session codes 50 to be designated for a particular information provider 410. Attempts to use session code 50 at another information provider 410 are denied. A field for valid information is used to restrict information 450 purchases to a class of information 450 (such as education, business, etc.) or to a particular piece of information 450.
In another embodiment, information barrier 430 contains a database capable of storing session codes 50. Instead of requesting session code 50 from access management computer 510, information barrier 430 changes the status of one session code 50 to “pending” and provides it to the end-user. After billing network 600 transmits session code 50 to access management computer 510 the code is transmitted back to information barrier 430, thereby allowing information barrier 430 to perform a local look-up of session code 50 provided by the end-user.
In yet another embodiment, end-user computer 310 contains secure processor 355 and secure storage 377 capable of storing session code database 575. Conventional secure tokens such as National Semiconductor's iPower Card can perform both functions. Secure processor 355 is used to process communications with data network 400 and billing network 600, while secure storage 377 stores session code database 575. When the end-user logs on to data network 400, secure processor 355 is treated as access management computer 510. Information barrier 430 requests session code 50 from secure processor 355, which in turn searches session code database 575 within secure storage 377. After calling 900-number network 600, the end-user types in session code 50 into secure storage 377 (with the use of a separate code provided by 900-number network 600) where its status is changed to “active.” When the end-user logs on to data network 400 and reaches information barrier 430, information barrier 430 queries secure processor 355 to see if session code 50 is “active.” Pricing data is then transferred to 900 number network 600.
In all of the above embodiments, all messages transmitted (including session codes 50 and pricing data) between data network 400, access management system 500, and 900-number network 600 may be encrypted for additional security. Secure processor 555 of access management computer 510 serves to encrypt and decrypt such messages.
Referring now to
At step 1010, the communication link is established to data network 400. After locating desired information 450, the end-user proceeds to the appropriate information barrier 430 at step 1012. At step 1014, the end-user enters session code 50 that he previously provided to access management computer 510 at step 1008. At step 1016, information barrier 430 queries active session code database 575 at access management computer 510 in order to determine whether or not session code 50 is still in session code database 575. CPU 520 of the access management computer 510 performs a database search of session code database 575 at step 1018, denying access to information 450 at step 1020 if session code 50 is not “active.” If session code 50 is in session code database 575, access management computer 510 extracts pricing information from the activation query at step 1022. At step 1024, the price is appended to billing record database 580. At step 1026, access management computer 510 authorizes information barrier 430, indicating that the end-user should now be allowed access to information 450. After information 450 is communicated, the end-user hangs up the phone at step 1028. Access management computer 510 adds the charges for accessed data to the current session total at step 1030 and then sends the amount to LEC computer 675 at step 1032. The end-user may also choose not to terminate the call, proceeding to another information barrier 430 for additional information 450.
Access management computer 510 monitors, either continuously or at fixed-time intervals, the ANI information provided by 900-number network 600. When the ANI is no longer presented by 900-number network 600, access management computer 510 denies access through information barrier 430 by deleting session code 50 from session code database 575.
Referring now to
At step 1046, the end-user is instructed to select a session PIN and enter his telephone number. At step 1048, information barrier 430 transmits the entered session PIN, telephone number, and pricing data to access management computer 510. At step 1050, access management computer 510 combines ANI and session PIN to form session code 50. Access management computer 510 then changes the status of session code 50 to “pending” in session code database 575 at step 1052. At step 1054, the end-user logs on to billing network 600 over the second communications line and enters his session PIN. At step 1056, billing network 600 transmits session PIN and ANI to access management computer 510, where a search is performed to find session code 50 in session code database 575 at step 1058. If session code 50 is found to be active at step 1060, the end-user continues to step 1072 as indicated by step 1062. If the code is not found to be “active” at step 1060, it is checked to see if the code is “completed” at step 1064. If “completed”, the protocol returns to step 1046 as indicated at step 1066. If the status of session code 50 is not “completed,” access management computer 510 changes the status of session code 50 to “active” at step 1068. At step 1070, access management computer 510 transmits session code 50 to information barrier 430 allowing the end-user access to information 450 at step 1072. If the end-user wants additional information 450 at step 1074, he proceeds to access information barrier 430 at step 1038, as indicated at step 1076.
If the end-user does not want more information at step 1074, he is disconnected from billing network 600 at step 1078 with the disconnect signal transmitted to access management computer 510. At step 1080, access management computer 510 changes the status of session code 50 to “completed” and adds a record to billing record database 580 at step 1082. At step 1084, the billing record is sent to billing network 600.
Limited Use Codes Embodiment
Referring now to
As previously described, the end-user logs on to data network 400 at step 1100, reviews indices of information 420 at step 1105, and then accesses information barrier 430 at step 1110. At step 1115, the end-user is requested to enter session code 50. As the end-user does not yet have session code 50 at step 1120, the end-user is requested to enter the number of uses that he wants, and is instructed to call the displayed 900-number at step 1125 in order to receive session code 50. Information barrier 430 sends a request to access management computer 510, instructing it to change the status of session code 50 to “pending” and change the 15 number of uses to the number requested by the end-user. At step 1130, 900-number network 600 requests session code 50 from access management computer 510. At step 1135, session code 50 is provided to the end-user who logs on to data network 400 and returns to step 1120 where he enters session code 50 at information barrier 430. Session code 50 is then transmitted along with pricing data to access management computer 510 at step 1140. Access management computer 510 performs a search of session code database 575 and retrieves the record for session code 50, checking the number of uses remaining at step 1145. If more than one use is indicated at step 1150, access management computer 510 decrements the number of uses by one and transmits session code 50 back to information barrier 430 at step 1155. The end-user is allowed access to information 450 at step 1160 and then proceeds to information barrier 430 at step 1110 if additional information 450 is desired. If the database record for session code 50 indicates no uses remaining at step 1150, access management computer 510 transmits pricing data to 900-number network 600.
In an alternative embodiment, session code 50 is valid for a given amount of time. Instead of determining the number of uses remaining at step 1145, access management computer 510 checks the time remaining field of session code 50, decrementing it by the time used in accessing information 450 at step 1155. In this embodiment, the end-user could be charged by the minute for watching part of a digital video, for example, with the number of minutes watched decremented from session code 50.
Physical Goods Purchase Embodiment
At step 1230, purchase code 70 is transmitted to access management computer 510. At step 1235, purchase code 70 is sent to 900-number provider computer 610 by access management computer 510. The end-user calls the 900-number at step 1240 and is connected to IVRU 590 which then prompts the end-user to confirm the purchase at step 1245 by entering purchase code 70 at step 1250. Purchase code 70 is then transmitted to access management computer 510 at step 1255, allowing confirmation of the presence of purchase code 70 in purchase code database 577. If purchase code 70 is present, access management computer 510 transmits purchase code 70 to information provider 410 at step 1260. If purchase code 70 is not found in purchase code database 577, the end-user is asked to re-enter purchase code 70. Once purchase code 70 is received by information provider 410, it is matched with stored purchase code 70 of product order form 75 at step 1265. If the two purchase codes 70 correspond to each other (i.e. they match), physical goods 40 are shipped to the end-user at step 1270. Contemporaneous with the transmission of purchase code 70 at step 1255, access management computer 510 sends pricing data to 900-number network 600 at step 1275. This billing information is then sent to the LEC at step 1280.
Digital Tokens Embodiment
As shown in
Off-Line Digital Information Purchase Embodiment
In one embodiment of the present invention, digital information is sold directly through billing network 600. The end-users dials a 900-number and connects to IVRU 590. He is presented with a menu of information 450 that may be purchased, much like an audio version of index of information 420. Information 450 to be purchased may include anything in audio form. Electronic tickets, for example, could be sold with this system. A concert could sell unique digital codes which are validated upon presentation at the concert. The end-user presents the code upon arrival at the concert. Concert management calls the 900-number provider to verify that the code provided by the end-user had indeed been sold. Revenues from the 900-number call are shared with concert management. In another example, electronic tickets to on-line or off-line games are sold with the inventive system. Entry fees to trivia tournaments held on a commercial on-line service provider can be represented by unique digital codes, sold via a call to a 900-number. Similarly, games played on handheld electronic devices may be enabled to accept digital codes sold through a 900-number phone call. Data can also be distributed on CD-ROM in encrypted form, with end-users calling a 900-number to receive cryptographic codes capable of decrypting information 450 stored on the CD-ROM.
In alternative embodiment, the end-user uses a local printer to print tickets for entertainment events like concerts or sporting events. DTMF tones generated by the call to the 900-number transmit information 450 to the local printer. Those skilled in the art will understand that this printing device may be a small handheld device specifically adapted for the purpose of printing tickets, or a printer attached to a PC which utilizes a local software program that enables the tickets to be printed. For example, an end-user observes an advertisement for a Rolling Stones concert and would like to purchase a ticket. The end-user dials a 900-number and is connected to an IVRU which directs him through a series of questions relating to concert dates, quantity and seat selection. The IVRU has a list of currently available seats on file, allowing the end-user a variety of custom choices. The end-user selects from the list of available seats and completes the order for the ticket(s). The IVRU then downloads ticket data via DTMF tones or issues a code for the end-user to enter into the ticket printing device. The appropriate ticket prints and is available for immediate use.
At step 1410, the end-user dials the 900-number. At step 1415,900-number network 600 routes the call to IVRU 590. The end-user enters session code 50 or session PIN at step 1420, using the touch-tone keys of his phone. At step 1425, this code is sent to access management computer 510 where it is compared with session codes 50 stored in session code database 575. At step 1430, IVRU 590 communicates a confirmation message which includes session code 50 and further instructions to the end-user. The end-user disconnects at step 1435 and then logs on to data network 400 to access information 450 at step 1440. While the end-user was still connected to 900-number network 600, information about the call was being recorded at step 1445. At step 1450, the system monitors for session code 50, extracting pricing information which is added to the call record at step 1455. At step 1460, the call is priced based on session code 50 entered. At step 1465, 900-number network 600 sends the billing information to the local exchange company (LEC).
Referring now to
Those skilled in the art will recognize that the method and apparatus of the present invention has many applications, and that the present invention is not limited to the representative examples disclosed herein. Moreover, the scope of the present invention covers conventionally known variations and modifications to the system components described herein, as would be apparent to those skilled in the art based on the present disclosure.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US3704346||Jan 28, 1970||Nov 28, 1972||Commatic Systems||Telephone switching and forwarding system|
|US4192972||Nov 28, 1978||Mar 11, 1980||Cselt-Centro Studi e Laboratori Telecomunicazioni S.p.A||Pay-telephone station with deferred collection|
|US4626630||Dec 20, 1984||Dec 2, 1986||Louis Orenbuch||Telephone call forwarding device|
|US4757267||Jun 17, 1987||Jul 12, 1988||Applied Telematics, Inc.||Telephone system for connecting a customer to a supplier of goods|
|US4827508||Oct 14, 1986||May 2, 1989||Personal Library Software, Inc.||Database usage metering and protection system and method|
|US4987587||Jul 26, 1989||Jan 22, 1991||International Business Machines Corporation||Method and apparatus for providing 800 number service|
|US5146491||Aug 8, 1991||Sep 8, 1992||Pilgrim Telephone, Inc.||Telephone billing method|
|US5148474||Aug 21, 1991||Sep 15, 1992||Nancy Haralambopoulos||Interactive value-added telecommunications system and method|
|US5187710||Dec 19, 1990||Feb 16, 1993||At&T Bell Laboratories||Method and apparatus for the billing of value-added communications calls|
|US5311572||Oct 3, 1991||May 10, 1994||At&T Bell Laboratories||Cooperative databases call processing system|
|US5345501||Jul 15, 1991||Sep 6, 1994||Bell Atlantic Network Services, Inc.||Telephone central office based method of and system for processing customer orders|
|US5369699||Mar 2, 1993||Nov 29, 1994||Bi Incorporated||Adaptable personnel supervisory system with automatic fee collection|
|US5394469||Feb 18, 1994||Feb 28, 1995||Infosafe Systems, Inc.||Method and apparatus for retrieving secure information from mass storage media|
|US5418844||Apr 17, 1992||May 23, 1995||Bell Atlantic Network Services, Inc.||Automatic access to information service providers|
|US5475740 *||Jun 22, 1993||Dec 12, 1995||Spectradyne, Inc.||System for accessing and paying for amenities using a telephone|
|US5509070||Dec 15, 1992||Apr 16, 1996||Softlock Services Inc.||Method for encouraging purchase of executable and non-executable software|
|US5592511||Jan 29, 1996||Jan 7, 1997||Schoen; Neil C.||Digital customized audio products with user created data and associated distribution and production system|
|US5615264||Jun 8, 1995||Mar 25, 1997||Wave Systems Corp.||Encrypted data package record for use in remote transaction metered data system|
|US5625690||Nov 15, 1993||Apr 29, 1997||Lucent Technologies Inc.||Software pay per use system|
|US5657222 *||Sep 29, 1992||Aug 12, 1997||Supercomm, Inc.||Revenue sharing system with data capture from video buffer|
|1||"800/900 Billing Systems-Options Available," Homepage: (www.galaxy-net.com/billing.html), Undated.|
|2||"First Virtual Bank of Cyberspace," Newsbytes News Network, 05348022, Oct. 28, 1994.|
|3||"First Virtual Offers Internet Merchant Banking," Newsbytes News Network, 01064674, Oct. 27, 1994.|
|4||"Interactive Services Association Announces Winners of 11th Annual Awards Competition," Business Wire, p7121251, Jul. 12, 1995.|
|5||"Logicom Billing System," Homepage: (http://www.logicom.com), Copyright notice of 1996.|
|6||"Logicom Brings 1-900 Billing to Web," Boardwatch Magazine, p. 29, Apr. 1996.|
|7||"The 900 Industry: Takin' Care of Business in '94," Telemedia News & Views, Jan. 1994.|
|8||"Web900 by Logicom," Web Week, vol. Two, Issue Five, p. 82, Apr. 29, 1996.|
|9||"800/900 Billing Systems—Options Available," Homepage: (www.galaxy-net.com/billing.html), Undated.|
|10||Blankenhorn, Dana. "Virtual Mall Opens in Cyberspace," Newsbyte, NEW06200021, Jun. 20, 1994.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US9443268||Jan 27, 2014||Sep 13, 2016||Consumerinfo.Com, Inc.||Bill payment and reporting|
|USRE45241 *||Jan 25, 2011||Nov 11, 2014||Qualcomm Incorporated||Parallel data network billing and collection system|
|U.S. Classification||713/168, 705/78, 379/114.25|
|International Classification||H04L9/00, G06F17/00, H04M15/00, H04M3/42, H04L29/06, H04L29/08, G06Q20/00|
|Cooperative Classification||H04L69/329, G06Q20/04, H04L12/1439, H04L12/14, H04M15/00, G06Q30/0623, G06Q20/0855, H04M2215/0176, G06Q20/16, G06Q20/00, H04L63/0807, H04L63/10, H04L12/1482, H04M2215/22, H04M2215/0196, G06Q30/0601, G06Q20/12, H04M15/68, G06Q20/14, H04L29/06, G06Q20/085, G06Q30/04, G06Q20/102|
|European Classification||H04M15/00, H04L29/06, G06Q20/00, H04L12/14, G06Q20/14, G06Q30/04, G06Q20/04, G06Q20/16, G06Q20/12, H04M15/68, H04L12/14M2, H04L63/10, H04L12/14P6, G06Q30/0623, G06Q20/102, G06Q20/0855, G06Q20/085, G06Q30/0601|
|Jun 18, 2010||AS||Assignment|
Effective date: 20100520
Owner name: PALM, INC., CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WALKER DIGITAL LLC;REEL/FRAME:024555/0676
|Oct 28, 2010||AS||Assignment|
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PALM, INC.;REEL/FRAME:025204/0809
Effective date: 20101027
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS
|Jul 27, 2011||FPAY||Fee payment|
Year of fee payment: 8
|Nov 22, 2011||CC||Certificate of correction|
|May 3, 2013||AS||Assignment|
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;REEL/FRAME:030341/0459
Owner name: PALM, INC., CALIFORNIA
Effective date: 20130430
|Dec 18, 2013||AS||Assignment|
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PALM, INC.;REEL/FRAME:031837/0659
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS
Effective date: 20131218
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;REEL/FRAME:031837/0544
Effective date: 20131218
Owner name: PALM, INC., CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PALM, INC.;REEL/FRAME:031837/0239
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS
Effective date: 20131218
|Jan 28, 2014||AS||Assignment|
Effective date: 20140123
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HEWLETT-PACKARD COMPANY;HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;PALM, INC.;REEL/FRAME:032177/0210
Owner name: QUALCOMM INCORPORATED, CALIFORNIA
|Aug 8, 2014||AS||Assignment|
Effective date: 20090810
Free format text: LICENSE;ASSIGNORS:WALKER DIGITAL GAMING, LLC;WALKER DIGITAL GAMING HOLDING, LLC;WDG EQUITY, LLC;ANDOTHERS;REEL/FRAME:033501/0023
Owner name: IGT, NEVADA