`(12) Patent Application Publication (10) Pub. No.: US 2007/0143231 A1
`Pegaz-Paquet et al.
`(43) Pub. Date:
`Jun. 21, 2007
`
`US 20070143231A1
`
`(54) COMPUTER-IMPLEMENTED METHOD AND
`SYSTEM FOR MANAGING ACCOUNTING
`AND BILLING OF TRANSACTIONS OVER
`PUBLIC MEDIA SUCH AS THE INTERNET
`
`(76) Inventors: Pascal Pegaz-Paquet, Barcelona (ES);
`Stephane Touboul, Secaucus, NJ (US)
`
`Correspondence Address:
`MCDERMOTT WILL & EMERY LLP
`600 13TH STREET, N.W.
`WASHINGTON, DC 20005-3096 (US)
`
`(21) Appl. No.:
`
`11/704,918
`
`(22) Filed:
`
`Feb. 12, 2007
`Related U.S. Application Data
`(62) Division of application No. 10/713,099, filed on Nov.
`17, 2003, now Pat. No. 7, 177,837.
`(60) Provisional application No. 60/486,165, filed on Jul.
`11, 2003.
`
`Publication Classification
`
`(51) Int. Cl.
`(2006.01)
`G06Q 99/00
`(52) U.S. Cl. ................................................................ T05/75
`
`(57)
`
`ABSTRACT
`
`A system and method for managing accounting and billing
`e-commerce (including m-commerce) transactions. The user
`may connect to the e-commerce network by placing a call
`from a land line or sending a text message. The user may
`then purchase goods and/or services after meeting required
`user qualifications, such as minimum age or credit rating.
`The user qualifications may be established within the frame
`work of a gateway that assigns a unique identifier or
`personal identification number (PIN) for e-commerce net
`work access once the qualifications are met. The user
`qualifications may also be established within the framework
`of a remote access server (RAS) that is accessed by a user
`through a downloadable automatic dialer having code con
`taining a unique identifier relating to a merchant, product or
`service. The user is invoiced for the product or service
`according to the telephone from which the call originated.
`
`
`
`
`
`110
`
`
`
`
`
`||
`
`||
`
`from company for services
`Fioriterestered
`
`145
`
`140
`
`35
`
`30
`
`Megative RBOCSANI
`AWDB
`Reverse
`Matching
`
`
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 1 of 18
`
`
`
`Patent Application Publication Jun. 21, 2007 Sheet 1 of 4
`
`US 2007/0143231 A1
`
`
`
`
`
`
`
`
`
`Œ| ||||||
`
`||||||||||||
`
`||||||||||||
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 2 of 18
`
`
`
`Patent Application Publication Jun. 21, 2007 Sheet 2 of 4
`
`US 2007/0143231 A1
`
`s
`
`S.
`
`s
`
`
`
`S
`Vs
`N
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 3 of 18
`
`
`
`Patent Application Publication Jun. 21, 2007 Sheet 3 of 4
`
`US 2007/0143231 A1
`
`FIG 3
`
`Disclaimer 900?
`The Company
`
`350
`
`
`
`- 30
`
`UserName
`
`
`
`Notes HistO
`
`34 E Invoice History
`
`356
`
`Timer History
`Reference Info
`
`ACCOUnt # AL######## Status: Active
`Current Bill Cycle Information
`Bill Period Start: MM/DDIYY
`OpenAR:
`ARDue: $###, ##
`Payments:
`#####
`Adjustments: it;
`Charges:
`iii.
`320
`
`
`
`
`
`
`
`CustomerName
`Address
`Ass: Z
`ity, State Zip
`A. Phone
`Work Phone
`Email:
`
`380
`
`The Company
`Disclaimer:
`By choosing to use this entertainment service, your computer will terminate the modem
`connection to your local internet service provider. Your modem will then diala PREMIUM
`RATE NUMBER(900-000-####) the charge for access to this entertainment service will
`appear On a bill that will be sent to you by your local phone co, This bill will be due and
`payable ten (10) days from the date you receive the bill.
`By pressing the "I AGREE" button below:
`4. You assert that you are the telephone line subscriber (who will be billed for the
`charge) or have been authorized by the telephone line subscriber to incur the per
`minute charge
`5. You assert that you are 18 years of age or older, 21 in some states (you will need to
`check with your appropriate state regulatory office),
`6, You, as the telephone subscriber whose number is being used to dial the PREMIUM
`RATE NUMBER (900)000-00++, understand and agree that you will be charged
`$4.99 perminute and such charge will appear on a bill you receive from the company.
`This document is intended to be governed by the federal "Electronic Signatures Act", By
`pressing the "I Agree" button, you expressly Consent to the terms expressed herin. If you do
`not age with any of the statements, or do not wish to be charged for the call, click on
`the "I Disagree" button below.
`If you are under eighteen years of age, you are not permitted to enter this Website.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 4 of 18
`
`
`
`Patent Application Publication Jun. 21, 2007 Sheet 4 of 4
`
`US 2007/0143231 A1
`
`085
`
`ES?79
`
`WOLI WIS
`
`2178/7d
`
`
`
`
`
`
`
`
`
`
`
`5/5
`
`069
`
`5771870/W
`
`50//IH2/I/MS
`
`Z99
`
`5/6
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 5 of 18
`
`
`
`US 2007/0143231 A1
`
`Jun. 21, 2007
`
`COMPUTER-IMPLEMENTED METHOD AND
`SYSTEM FOR MANAGING ACCOUNTING AND
`BILLING OF TRANSACTIONS OVER PUBLC
`MEDIA SUCH AS THE INTERNET
`
`CROSS REFERENCE TO RELATED
`APPLICATION
`0001. This application is a nonprovisional application
`that claims the benefit of priority to provisional application
`Ser. No. 60/486,165, filed in the United States Patent and
`Trademark Office on Jul. 11, 2003 entitled “Computer
`Implemented Method and System for Managing Accounting
`and Billing of Transactions Over Public Media Such as the
`Internet in the names of inventors Pascal Pegaz-Paquet and
`Stephane Touboul. This previously-filed provisional appli
`cation is incorporated by reference herein in its entirety the
`same as if fully set forth.
`
`FIELD OF THE DISCLOSURE
`0002 The present disclosure relates to e-commerce bill
`ing systems, and more particularly to an automated system
`for conducting and billing e-commerce transactions.
`
`BACKGROUND OF THE DISCLOSURE
`0003. Along with the growth of e-commerce have
`emerged innovative methods of conducting and billing
`e-commerce transactions. One of the most widely used
`media for conducting e-commerce transactions is the Inter
`net. E-commerce offers virtually limitless options as to the
`types of accessible consumer goods and services.
`0004 Videotext is one example of a service that may be
`accessed over the Internet. Videotext is an information
`service which provides for delivery of video and audio
`content to a user's computer or television screen. Videotext
`may include video in the form of still and/or moving
`pictures, viewable text, as well as audio. Other goods and
`services might include magazines, clothing, shoes, music,
`downloadable Software programs, adult entertainment Ser
`vices and access to online publications such as newspapers
`and magazines.
`0005 Numerous business opportunities exist in e-com
`merce as do opportunities for consumer convenience and
`satisfaction. Often, the conduct of e-commerce transactions
`should be tailored to assuage consumer concerns regarding
`issues such as security, privacy and accessibility. The root of
`many Such consumer concerns has been credit card usage in
`e-commerce transactions. Some users are concerned about
`the risk of identity theft as a result of online credit card
`usage, wherein sensitive personal information must be
`divulged in order to consummate a transaction. In other
`cases, the consumer concern is accessibility in that the users
`might not have access to a credit card. Accordingly, it is
`often desirable to conduct e-commerce transactions without
`a credit card.
`0006 E-commerce transactions are often not limited by
`geographical region. A single merchant in one country may
`have a customer base that spans several countries. There
`fore, it is often useful for such merchants to consider habits
`of potential foreign consumers. In some European countries,
`credit card transactions constitute a small percentage of
`online transactions. Because a merchant may wish to
`
`broaden a customer base, the consummate a transaction with
`citizens of countries such as Europe. Availing the customer
`of the opportunity to conduct a transaction without a credit
`card increases business opportunities in foreign countries.
`0007 E-commerce transactions that are consummated
`without a credit card have created additional billing chal
`lenges for electronic retailers. Some e-commerce retailers
`have addressed these billing challenges with creative billing
`Solutions, such as billing a line Subscriber for transactions
`consummated on an e-commerce network, where the net
`work was accessed by telephone.
`0008. In one example of an existing billing system for
`which a credit card is not required, the user can obtain
`information on how to access a private e-commerce network
`by browsing the Internet and following steps provided on a
`web page. Following the steps listed on the web page, the
`user dials a telephone number from the user's computer
`modem. The dialed number may be a toll or toll-free
`telephone number. The call is forwarded from the user's
`terminal to a remote terminal that is operated and adminis
`trated by a network service provider. This network service
`provider is capable of providing access to the e-commerce
`network that the user wishes to access. Prior to reaching the
`remote terminal, the call may be routed through various
`local and/or long distance telecommunications carriers.
`0009. As soon as a connection is established between the
`user terminal and remote terminal, the remote terminal
`begins to attempt to identify the origin of the telephone call
`using call source identification information. An example of
`Such information that might be used is the automatic number
`identification (ANI) service provided by local telecommu
`nications carriers. A database containing ANI information
`may be at a location that is electronically accessible by the
`remote terminal that is administrated by the network service
`provider. This ANI service may be used to inform a tele
`phone call recipient of the originating telephone number for
`the call. The ANI also includes the name and address of the
`line subscriber associated with the telephone number.
`0010. Once the call source has been identified, the user is
`then asked to verify his/her age. This age verification step
`may be performed when the user simply responds affirma
`tively to a query as to whether he/she is over the age of
`eighteen. The user is granted access to the network. The
`users usage is tracked by the network, and an invoice is
`prepared according to network usage. The invoice is sent to
`the line subscriber to the telephone line identified through
`the ANI.
`0011. This system has inherent drawbacks with respect to
`billing. This system provides no measures for additional
`verification of the user's identity. The line subscriber may
`not, in fact, be the network user that incurs network charges.
`The user could be any person, authorized or unauthorized,
`using the line Subscriber's phone to place calls to the
`network. Moreover, it is possible that the network user might
`not even live at the address from which the call originated.
`In this case, the line subscriber is sent a bill for services
`accessed by one who does not live in the household. The
`network service provider might, in this case, incur additional
`administrative costs in attempting to locate the appropriate
`invoice recipient. In some cases, the actual user may never
`be identified or found. Accordingly, not only does the
`network service provider incur administrative costs while
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 6 of 18
`
`
`
`US 2007/0143231 A1
`
`Jun. 21, 2007
`
`attempting to identify and locate the appropriate invoice
`recipient, but the expected revenue from the actual user's
`network usage may never be recovered.
`0012. In these systems, additional billing challenges may
`result when the call source identification (ANI) information
`is not up-to-date. Under these circumstances, the invoice
`might issue in the name and address of a previous line
`subscriber to the telephone number. As noted above,
`improper invoicing results in increased administrative costs
`and sometimes, loss of revenue, for the network service
`provider.
`0013 In addition to the shortcomings in billing proce
`dures, the age verification process used in these systems has
`inherent drawbacks. No further age verification steps are
`taken beyond the users affirmative response when asked if
`the user is over the age of eighteen. Underage users may
`present additional challenges. For example, in some coun
`tries, a debt may be difficult to enforce against a person
`under the age of eighteen. Accordingly, the network service
`provider is likely to lose revenue for network access pro
`vided to the minor. Moreover, some networks provide con
`tent unsuitable for children. Therefore, even a very young
`child might have access to content that is strictly intended
`for adult viewing.
`0014) Moreover, because network access is provided
`without a credit card, the network service provider is essen
`tially extending credit to each of its users. Some systems
`have addressed this issue by establishing a standard limit for
`network usage accrued by any user over a predetermined
`period of time. Treating all users similarly despite past credit
`performance might not be the most beneficial route. If a
`network service provider is to provide access to users
`without a credit card, it is desirable for the network service
`provider to have some assurance as to a particular level of
`credit it should extend to a particular user.
`0015. As illustrated above, the Internet has been a popu
`lar medium for e-commerce. Therefore, various e-commerce
`transactional and billing techniques have been created based
`on Internet usage. However, various other media have
`become increasingly popular for conducting electronic
`transactions. A notable example of another medium is
`mobile telephone commerce (m-commerce). Because many
`potential consumers use mobile telephones, a larger cus
`tomer base could be reached by making an e-commerce
`network accessible via mobile telephone.
`0016. There is a need for a billing system that incorpo
`rates additional protective measures for verifying the proper
`entity or person to be billed, especially when charges are
`assessed without a credit card.
`0017. There is further a need for user age verification on
`a network So that minors do not have access to adult content,
`and so that the network service provider has a better chance
`of enforcing a debt against a network user.
`0018. There is yet further a need for user credit eligibility
`determination so that a user may be extended credit for
`network usage commensurate with the user's credit rating.
`0019. There is yet further a need for an e-commerce
`Solution that provides access via media other than the
`Internet, especially via wireless devices.
`
`SUMMARY OF THE DISCLOSURE
`0020. The present disclosure addresses the needs noted
`above by providing a way to manage user accounting and
`billing transactions over a network. According to the dis
`closure, the user's identity and age may be independently
`verified, and a credit rating may be established for the user
`so that credit may be extended for the purchase of goods
`and/or services.
`0021. In one aspect of the present disclosure, a system is
`provided for managing accounting and billing of transac
`tions. The system includes a gateway device that is config
`ured to provide access to the e-commerce network Subse
`quent to Verification of each required user qualification for
`network access. A required user qualification is at least one
`of a minimum age and a minimum credit rating. Verification
`of each required user qualification is performed by a quali
`fication verification device configured to verify at least one
`required user qualification based on user qualification input
`that includes a unique user identifier that may be input from
`a user terminal.
`0022. In another aspect of the present disclosure, a sys
`tem is provided for managing accounting and billing of
`transactions. The system includes a remote terminal that is
`configured to receive a request to access the e-commerce
`network. The remote terminal further includes a unique user
`identifier retrieval device configured to retrieve a unique
`user identifier from at least one database. The system further
`includes a qualification verification configured to verify at
`least one required user qualification based on user qualifi
`cation input. The user qualification input includes a unique
`user identifier. The at least one required user qualification
`includes at least one of a minimum age and a minimum
`credit rating.
`0023. In yet another aspect of the present disclosure, a
`system is provided for managing accounting and billing of
`transactions. The system includes a remote terminal having
`a text message source identification device. This text mes
`sage source identification device is configured to retrieve
`text message source identification information from at least
`one database, thereby identifying the source of the text
`message sent from a mobile communications device. The at
`least one database includes text message source identifica
`tion information from more than one text message service
`provider.
`0024. In accordance with yet another aspect of the
`present disclosure, a method is provided for accounting and
`billing transactions. The method includes establishing a
`connection between a user terminal and a remote terminal.
`The user terminal includes a display device and a user input
`device. The user terminal is configured to transmit a user
`request to access an e-commerce network.
`0025 The method further includes retrieving call source
`identification information from at least one database Such
`that the source of the established connection may be iden
`tified. The method includes disconnecting the established
`connection when the call source cannot be identified based
`on call source identification information.
`0026.
`In accordance with this method, at least required
`one user qualification is verified based on user qualification
`input. The user qualification input includes a unique user
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 7 of 18
`
`
`
`US 2007/0143231 A1
`
`Jun. 21, 2007
`
`identifier, and the at least one required user qualification
`includes at least one of a minimum age and a credit rating.
`0027 Access to the e-commerce network is provided
`Subsequent to call source identification and Subsequent to
`verification of each required user qualification. The system
`receives user selection of a product or service on the
`e-commerce network. E-commerce network usage informa
`tion is stored, updated and associated with call source
`identification information. The call source is invoiced based
`on the e-commerce network usage information.
`0028. In another aspect of the present disclosure, a com
`puter program product is provided. The computer program
`product contains computer executable instructions for man
`aging accounting and billing of transactions over an e-com
`merce network. When executed by a computer, the instruc
`tions cause a data processing system to receive a user
`communication requesting access to the e-commerce net
`work, the user communication being initiated via a modem.
`0029. The instructions also cause a data processing sys
`tem to retrieve call source identification information from at
`least one database such that the source of the established
`connection between the user terminal and the remote termi
`nal via the communication link may be identified.
`0030 The instructions cause the system to identify a call
`Source based on call source identification information, if the
`call source identification information includes an address for
`the call source. A disconnection occurs of the established
`connection occurs when the call source cannot be identified
`based on call source identification information.
`0031. The instructions cause the system to verify at least
`one user qualification based on at least part of a user social
`security number, if the number is located in the at least one
`database. The at least one user qualification includes at least
`one of a minimum age or a credit rating. The instructions
`cause the system to provide access to the e-commerce
`network Subsequent to identification of the call source, and
`Subsequent to verification of the at least one user qualifica
`tion.
`0032. The instructions also cause the system to receive
`user selection of a product or service for purchase. The
`instructions cause the system to store e-commerce network
`usage information in a record, associate the e-commerce
`network usage information with call source identification
`information, and update the according to e-commerce net
`work usage. The instructions cause the system to invoice the
`call source based on the e-commerce network usage infor
`mation.
`0033) One advantage of the present disclosure is to
`provide a billing system that incorporates additional protec
`tive measures for verifying the proper entity or person to be
`billed, especially when charges are assessed without a credit
`card.
`0034). Yet another advantage of the present disclosure is
`to provide for user age verification on an e-commerce
`network so that minors do not have access to adult content,
`and so that the network service provider has a better chance
`of enforcing a debt against a network user.
`0035) Still another advantage of the present disclosure is
`to provide for user credit eligibility determination on an
`
`e-commerce network. In this manner, a user may be
`extended credit for network usage commensurate with the
`user's credit rating.
`0036 Finally, yet another advantage of the present dis
`closure is to provide e-commerce access via media other
`than the Internet, especially via mobile or wireless devices.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0037. These and other advantages, features, and charac
`teristics of the present disclosure will become apparent to
`one skilled in the art from a close study of the following
`detailed description in conjunction with the accompanying
`drawings and appended claims, all of which form a part of
`this application. In the drawings:
`0038 FIG. 1 is a call flow diagram for conducting and
`billing e-commerce transactions in accordance with one
`embodiment of the present disclosure.
`0039 FIG. 2 is a call flow diagram for conducting and
`billing e-commerce transactions in accordance with yet
`another embodiment of the present disclosure.
`0040 FIG. 3 is a screen shot of a user interface for the
`system for managing accounting and billing of e-commerce
`transactions in accordance with one embodiment of the
`present disclosure.
`0041
`FIG. 4 is an illustration of a call flow diagram for
`conducting and billing e-commerce transactions in accor
`dance with yet another embodiment of the present disclo
`SUC.
`
`DETAILED DESCRIPTION OF THE
`DISCLOSURE
`0042. The detailed description set forth below in connec
`tion with the appended drawings is intended as a description
`of exemplary embodiments of the present disclosure and is
`not intended to represent the only embodiments in which the
`present disclosure can be practiced. The detailed description
`includes specific details for the purpose of providing a
`thorough understanding of the present disclosure. However,
`it will be apparent to those skilled in the art that the present
`disclosure may be practiced without these specific details.
`0043. For purposes of the present disclosure, the term
`“e-commerce' as used herein includes the conduct of finan
`cial or barter transactions by electronic means, including but
`not limited to the purchase and/or sale of goods and/or
`services. The term “e-commerce' as used herein encom
`passes these electronic transactions, regardless of the elec
`tronic media. Such media may include, but are not limited
`to, digital media (including digital television) and wireless
`media (including mobile telephone). Such media include the
`Internet and telephone.
`0044 Because the term “e-commerce' includes elec
`tronic transactions conducted over mobile telephones, the
`term "e-commerce' also encompasses transactions con
`ducted through the medium now commonly known as
`"m-commerce.” Examples of goods and/or services which
`may be the Subject of these transactions are videotext, pay
`television services, magazines, clothing, shoes, music,
`downloadable software programs, online video, dating Ser
`vices, games, adult entertainment services and online pub
`lications such as newspapers and magazines.
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 8 of 18
`
`
`
`US 2007/0143231 A1
`
`Jun. 21, 2007
`
`0045 Goods purchased over the network may be digital
`or physical goods. Goods and/or services which were the
`Subject of the purchase may be enjoyed over a number of
`media, including, for example, a television, a computer or a
`handheld device. In the present application, goods is used
`synonymously with products.
`0046) The present disclosure may be practiced over an
`e-commerce network. These networks may include a system
`of interconnected computers or terminals which share infor
`mation over one or more communication links, e.g., wired
`and/or wireless links. These terminals may include laptop
`computers, desktop computers, WINDOWS(R) CER) hand
`held devices, PDA’s e.g., PALMPILOT's, server computers,
`host computers, client computer, mobile or cellular tele
`phones, and other intelligent devices.
`0047 The terminal may include, but is not limited to, any
`device that incorporates a central processing unit (CPU),
`which may be provided, for example, as a conventional
`microprocessor, a read only memory (ROM) for permanent
`storage of information, and a random access memory
`(RAM) for temporary storage of information. The terminal
`may also include a display. Operation of the terminal may be
`generally controlled and coordinated by operating system
`Software. An operating system resident in System memory
`and executed by the CPU may coordinate the operation of
`the other elements of computer system. The computer sys
`tem may also include storage devices, e.g., a diskette,
`CD-ROM, hard disk, etc.
`0.048. The present disclosure relates to a system and
`computer-implemented method for managing accounting
`and billing of transactions over public media Information on
`accessing the network may be obtained over public media,
`including the Internet, mobile telephone, television or tele
`phone. The user may connect to the network by placing a
`call from a telephone line. The user may then purchase
`goods and/or services. The user is invoiced according to the
`telephone number from which the call originated.
`0049. The present system and method may be practiced
`within the framework of a VOIP gateway or digital line that
`assigns a unique identifier or personal identification number
`(PIN) for e-commerce network access. The present system
`and method may also be practiced within the framework of
`a remote access server (RAS) that is accessed by a user using
`a downloadable automatic dialer having code containing a
`unique identifier.
`0050 Regardless of the framework used, the present
`disclosure includes features for user address verification,
`user age verification, and a user credit eligibility determi
`nation using at least a portion of the user's Social security
`number. The partial or total Social security number is cross
`referenced with a name and/or address to determine an age
`found in a Social security database for the corresponding
`Social security number. In this manner, the user's address
`can be verified for billing purposes.
`0051 Moreover, the user's age can be verified so that
`network access is not provided to minors. The partial or total
`Social security number may also be matched with a credit
`rating contained in a database. This rating is used to deter
`mine the user's credit standing so that credit may be
`extended for the purchase of goods and/or services over the
`network. The present system and method provide for user
`
`billing by including the charges in the user's telephone bill,
`whether a mobile telephone or otherwise. The user may also
`be invoiced by paper invoice, e-mail or SMS text message.
`The present system and method further provide for network
`access with an automated accounting and billing process.
`0.052
`Referring now to FIG. 1, illustrated is a call flow
`diagram of system components 100 used in conducting,
`accounting and billing transactions in accordance with one
`embodiment of the present disclosure. A user terminal 101
`includes a personal computer (PC) 105 operatively coupled
`to a display device such as a monitor 102. The user terminal
`101 further includes one or more input devices such as a
`mouse 103 and keyboard 104. These input devices 103, 104
`are also operatively coupled to the personal computer 105.
`User PC 105 also includes an internal modem (not shown).
`Although the modem shown in this embodiment is internal,
`the modem may also be external. The modem is connected
`via a telephone cord 106 to a wall jack 107. Although the
`embodiment illustrated incorporates a telephone jack, it
`should be understood that any Suitable connection may be
`used, including but not limited to Ethernet, wireless or
`otherwise.
`0053 Software resident at user terminal 105 includes a
`web browser. Largely due to web browser, the user terminal
`105 is capable of receiving one or more web pages which
`may be viewed at monitor 102. Other software resident at
`user terminal 105 might include an operating system used to
`control the execution of computer programs, such as the web
`browser. The operating system may also provide an interface
`to peripheral devices such as mouse 103, keyboard 104 and
`monitor 102.
`0054 At user terminal 101, the user views a web page.
`This web page informs the user of a toll number that can be
`called to access an e-commerce network. After accepting
`relevant terms and conditions, the user dials the toll number
`via the internal modem using a dial-up connection. Toll
`numbers are generally numbers for which an access fee is
`charged. As is widely known, telephone numbers in the
`United States include a three-digit area code followed by a
`seven-digit number. Currently, toll numbers are distin
`guished from regular long distance or local telephone num
`bers in that they often have an area code in the United States
`of 201 or 900, among others.
`0055 Although the United States is used as an example
`in this description, it should be understood that the telephone
`number could be in a format used by any country, whether
`in Europe, Asia or otherwise. Moreover, although a toll
`number is used in this embodiment, it should be understood
`that the telephone number may be a toll number or a toll-free
`number. Use of a toll number may provide certain advan
`tages in that it provides a cross-reference for verification of
`the length of time connected to the e-commerce network.
`Time spent on a toll call is usually recorded on a user's long
`distance telephone bill. If a dispute arose between the
`network service provider and the user as to the amount of
`time spent on the network (especially for time-based bill
`ing), the long distance telephone bill could be used as an
`independent verification of time spent for network usage.
`0056.
`In lieu of dialing the toll number from a computer
`modem as in this example, the user might dial the number
`directly using a home telephone. Moreover, in lieu of dialing
`the telephone number, the user may connect to the remote
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 9 of 18
`
`
`
`US 2007/0143231 A1
`
`Jun. 21, 2007
`
`terminal 125 using a broadband connection. As long as the
`remote terminal 125 detects a modem, such as internal
`modems commonly found on today’s computers, the con
`nection may be properly established.
`0057. As illustrated in FIG. 1, the user's call is received
`by a local telecommunications carrier 110. The call may then
`directed to the long distance carrier 115 which the user has
`selected as a long distance service provider.
`0058. The call is received at remote terminal 125 and a
`“wink” occurs upon receipt of the call by the remote
`terminal 125. This “wink” may come to mark the beginning
`of a billable event, depending on the relevant terms and
`conditions agreed to by the user. Through software resident
`at the remote terminal 125, the remote terminal 125 first
`attempts to identify the telephone number and address from
`which the call originated, and the identity of the line
`subscriber. The remote terminal 125 performs this call
`Source identification by accessing information contained in
`an RBOC (regional