throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2007/0143231 A1
`Pegaz-Paquet et al.
`(43) Pub. Date:
`Jun. 21, 2007
`
`US 20070143231A1
`
`(54) COMPUTER-IMPLEMENTED METHOD AND
`SYSTEM FOR MANAGING ACCOUNTING
`AND BILLING OF TRANSACTIONS OVER
`PUBLIC MEDIA SUCH AS THE INTERNET
`
`(76) Inventors: Pascal Pegaz-Paquet, Barcelona (ES);
`Stephane Touboul, Secaucus, NJ (US)
`
`Correspondence Address:
`MCDERMOTT WILL & EMERY LLP
`600 13TH STREET, N.W.
`WASHINGTON, DC 20005-3096 (US)
`
`(21) Appl. No.:
`
`11/704,918
`
`(22) Filed:
`
`Feb. 12, 2007
`Related U.S. Application Data
`(62) Division of application No. 10/713,099, filed on Nov.
`17, 2003, now Pat. No. 7, 177,837.
`(60) Provisional application No. 60/486,165, filed on Jul.
`11, 2003.
`
`Publication Classification
`
`(51) Int. Cl.
`(2006.01)
`G06Q 99/00
`(52) U.S. Cl. ................................................................ T05/75
`
`(57)
`
`ABSTRACT
`
`A system and method for managing accounting and billing
`e-commerce (including m-commerce) transactions. The user
`may connect to the e-commerce network by placing a call
`from a land line or sending a text message. The user may
`then purchase goods and/or services after meeting required
`user qualifications, such as minimum age or credit rating.
`The user qualifications may be established within the frame
`work of a gateway that assigns a unique identifier or
`personal identification number (PIN) for e-commerce net
`work access once the qualifications are met. The user
`qualifications may also be established within the framework
`of a remote access server (RAS) that is accessed by a user
`through a downloadable automatic dialer having code con
`taining a unique identifier relating to a merchant, product or
`service. The user is invoiced for the product or service
`according to the telephone from which the call originated.
`
`
`
`
`
`110
`
`
`
`
`
`||
`
`||
`
`from company for services
`Fioriterestered
`
`145
`
`140
`
`35
`
`30
`
`Megative RBOCSANI
`AWDB
`Reverse
`Matching
`
`
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 1 of 18
`
`

`

`Patent Application Publication Jun. 21, 2007 Sheet 1 of 4
`
`US 2007/0143231 A1
`
`
`
`
`
`
`
`
`
`Œ| ||||||
`
`||||||||||||
`
`||||||||||||
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 2 of 18
`
`

`

`Patent Application Publication Jun. 21, 2007 Sheet 2 of 4
`
`US 2007/0143231 A1
`
`s
`
`S.
`
`s
`
`
`
`S
`Vs
`N
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 3 of 18
`
`

`

`Patent Application Publication Jun. 21, 2007 Sheet 3 of 4
`
`US 2007/0143231 A1
`
`FIG 3
`
`Disclaimer 900?
`The Company
`
`350
`
`
`
`- 30
`
`UserName
`
`
`
`Notes HistO
`
`34 E Invoice History
`
`356
`
`Timer History
`Reference Info
`
`ACCOUnt # AL######## Status: Active
`Current Bill Cycle Information
`Bill Period Start: MM/DDIYY
`OpenAR:
`ARDue: $###, ##
`Payments:
`#####
`Adjustments: it;
`Charges:
`iii.
`320
`
`
`
`
`
`
`
`CustomerName
`Address
`Ass: Z
`ity, State Zip
`A. Phone
`Work Phone
`Email:
`
`380
`
`The Company
`Disclaimer:
`By choosing to use this entertainment service, your computer will terminate the modem
`connection to your local internet service provider. Your modem will then diala PREMIUM
`RATE NUMBER(900-000-####) the charge for access to this entertainment service will
`appear On a bill that will be sent to you by your local phone co, This bill will be due and
`payable ten (10) days from the date you receive the bill.
`By pressing the "I AGREE" button below:
`4. You assert that you are the telephone line subscriber (who will be billed for the
`charge) or have been authorized by the telephone line subscriber to incur the per
`minute charge
`5. You assert that you are 18 years of age or older, 21 in some states (you will need to
`check with your appropriate state regulatory office),
`6, You, as the telephone subscriber whose number is being used to dial the PREMIUM
`RATE NUMBER (900)000-00++, understand and agree that you will be charged
`$4.99 perminute and such charge will appear on a bill you receive from the company.
`This document is intended to be governed by the federal "Electronic Signatures Act", By
`pressing the "I Agree" button, you expressly Consent to the terms expressed herin. If you do
`not age with any of the statements, or do not wish to be charged for the call, click on
`the "I Disagree" button below.
`If you are under eighteen years of age, you are not permitted to enter this Website.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 4 of 18
`
`

`

`Patent Application Publication Jun. 21, 2007 Sheet 4 of 4
`
`US 2007/0143231 A1
`
`085
`
`ES?79
`
`WOLI WIS
`
`2178/7d
`
`
`
`
`
`
`
`
`
`
`
`5/5
`
`069
`
`5771870/W
`
`50//IH2/I/MS
`
`Z99
`
`5/6
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 5 of 18
`
`

`

`US 2007/0143231 A1
`
`Jun. 21, 2007
`
`COMPUTER-IMPLEMENTED METHOD AND
`SYSTEM FOR MANAGING ACCOUNTING AND
`BILLING OF TRANSACTIONS OVER PUBLC
`MEDIA SUCH AS THE INTERNET
`
`CROSS REFERENCE TO RELATED
`APPLICATION
`0001. This application is a nonprovisional application
`that claims the benefit of priority to provisional application
`Ser. No. 60/486,165, filed in the United States Patent and
`Trademark Office on Jul. 11, 2003 entitled “Computer
`Implemented Method and System for Managing Accounting
`and Billing of Transactions Over Public Media Such as the
`Internet in the names of inventors Pascal Pegaz-Paquet and
`Stephane Touboul. This previously-filed provisional appli
`cation is incorporated by reference herein in its entirety the
`same as if fully set forth.
`
`FIELD OF THE DISCLOSURE
`0002 The present disclosure relates to e-commerce bill
`ing systems, and more particularly to an automated system
`for conducting and billing e-commerce transactions.
`
`BACKGROUND OF THE DISCLOSURE
`0003. Along with the growth of e-commerce have
`emerged innovative methods of conducting and billing
`e-commerce transactions. One of the most widely used
`media for conducting e-commerce transactions is the Inter
`net. E-commerce offers virtually limitless options as to the
`types of accessible consumer goods and services.
`0004 Videotext is one example of a service that may be
`accessed over the Internet. Videotext is an information
`service which provides for delivery of video and audio
`content to a user's computer or television screen. Videotext
`may include video in the form of still and/or moving
`pictures, viewable text, as well as audio. Other goods and
`services might include magazines, clothing, shoes, music,
`downloadable Software programs, adult entertainment Ser
`vices and access to online publications such as newspapers
`and magazines.
`0005 Numerous business opportunities exist in e-com
`merce as do opportunities for consumer convenience and
`satisfaction. Often, the conduct of e-commerce transactions
`should be tailored to assuage consumer concerns regarding
`issues such as security, privacy and accessibility. The root of
`many Such consumer concerns has been credit card usage in
`e-commerce transactions. Some users are concerned about
`the risk of identity theft as a result of online credit card
`usage, wherein sensitive personal information must be
`divulged in order to consummate a transaction. In other
`cases, the consumer concern is accessibility in that the users
`might not have access to a credit card. Accordingly, it is
`often desirable to conduct e-commerce transactions without
`a credit card.
`0006 E-commerce transactions are often not limited by
`geographical region. A single merchant in one country may
`have a customer base that spans several countries. There
`fore, it is often useful for such merchants to consider habits
`of potential foreign consumers. In some European countries,
`credit card transactions constitute a small percentage of
`online transactions. Because a merchant may wish to
`
`broaden a customer base, the consummate a transaction with
`citizens of countries such as Europe. Availing the customer
`of the opportunity to conduct a transaction without a credit
`card increases business opportunities in foreign countries.
`0007 E-commerce transactions that are consummated
`without a credit card have created additional billing chal
`lenges for electronic retailers. Some e-commerce retailers
`have addressed these billing challenges with creative billing
`Solutions, such as billing a line Subscriber for transactions
`consummated on an e-commerce network, where the net
`work was accessed by telephone.
`0008. In one example of an existing billing system for
`which a credit card is not required, the user can obtain
`information on how to access a private e-commerce network
`by browsing the Internet and following steps provided on a
`web page. Following the steps listed on the web page, the
`user dials a telephone number from the user's computer
`modem. The dialed number may be a toll or toll-free
`telephone number. The call is forwarded from the user's
`terminal to a remote terminal that is operated and adminis
`trated by a network service provider. This network service
`provider is capable of providing access to the e-commerce
`network that the user wishes to access. Prior to reaching the
`remote terminal, the call may be routed through various
`local and/or long distance telecommunications carriers.
`0009. As soon as a connection is established between the
`user terminal and remote terminal, the remote terminal
`begins to attempt to identify the origin of the telephone call
`using call source identification information. An example of
`Such information that might be used is the automatic number
`identification (ANI) service provided by local telecommu
`nications carriers. A database containing ANI information
`may be at a location that is electronically accessible by the
`remote terminal that is administrated by the network service
`provider. This ANI service may be used to inform a tele
`phone call recipient of the originating telephone number for
`the call. The ANI also includes the name and address of the
`line subscriber associated with the telephone number.
`0010. Once the call source has been identified, the user is
`then asked to verify his/her age. This age verification step
`may be performed when the user simply responds affirma
`tively to a query as to whether he/she is over the age of
`eighteen. The user is granted access to the network. The
`users usage is tracked by the network, and an invoice is
`prepared according to network usage. The invoice is sent to
`the line subscriber to the telephone line identified through
`the ANI.
`0011. This system has inherent drawbacks with respect to
`billing. This system provides no measures for additional
`verification of the user's identity. The line subscriber may
`not, in fact, be the network user that incurs network charges.
`The user could be any person, authorized or unauthorized,
`using the line Subscriber's phone to place calls to the
`network. Moreover, it is possible that the network user might
`not even live at the address from which the call originated.
`In this case, the line subscriber is sent a bill for services
`accessed by one who does not live in the household. The
`network service provider might, in this case, incur additional
`administrative costs in attempting to locate the appropriate
`invoice recipient. In some cases, the actual user may never
`be identified or found. Accordingly, not only does the
`network service provider incur administrative costs while
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 6 of 18
`
`

`

`US 2007/0143231 A1
`
`Jun. 21, 2007
`
`attempting to identify and locate the appropriate invoice
`recipient, but the expected revenue from the actual user's
`network usage may never be recovered.
`0012. In these systems, additional billing challenges may
`result when the call source identification (ANI) information
`is not up-to-date. Under these circumstances, the invoice
`might issue in the name and address of a previous line
`subscriber to the telephone number. As noted above,
`improper invoicing results in increased administrative costs
`and sometimes, loss of revenue, for the network service
`provider.
`0013 In addition to the shortcomings in billing proce
`dures, the age verification process used in these systems has
`inherent drawbacks. No further age verification steps are
`taken beyond the users affirmative response when asked if
`the user is over the age of eighteen. Underage users may
`present additional challenges. For example, in some coun
`tries, a debt may be difficult to enforce against a person
`under the age of eighteen. Accordingly, the network service
`provider is likely to lose revenue for network access pro
`vided to the minor. Moreover, some networks provide con
`tent unsuitable for children. Therefore, even a very young
`child might have access to content that is strictly intended
`for adult viewing.
`0014) Moreover, because network access is provided
`without a credit card, the network service provider is essen
`tially extending credit to each of its users. Some systems
`have addressed this issue by establishing a standard limit for
`network usage accrued by any user over a predetermined
`period of time. Treating all users similarly despite past credit
`performance might not be the most beneficial route. If a
`network service provider is to provide access to users
`without a credit card, it is desirable for the network service
`provider to have some assurance as to a particular level of
`credit it should extend to a particular user.
`0015. As illustrated above, the Internet has been a popu
`lar medium for e-commerce. Therefore, various e-commerce
`transactional and billing techniques have been created based
`on Internet usage. However, various other media have
`become increasingly popular for conducting electronic
`transactions. A notable example of another medium is
`mobile telephone commerce (m-commerce). Because many
`potential consumers use mobile telephones, a larger cus
`tomer base could be reached by making an e-commerce
`network accessible via mobile telephone.
`0016. There is a need for a billing system that incorpo
`rates additional protective measures for verifying the proper
`entity or person to be billed, especially when charges are
`assessed without a credit card.
`0017. There is further a need for user age verification on
`a network So that minors do not have access to adult content,
`and so that the network service provider has a better chance
`of enforcing a debt against a network user.
`0018. There is yet further a need for user credit eligibility
`determination so that a user may be extended credit for
`network usage commensurate with the user's credit rating.
`0019. There is yet further a need for an e-commerce
`Solution that provides access via media other than the
`Internet, especially via wireless devices.
`
`SUMMARY OF THE DISCLOSURE
`0020. The present disclosure addresses the needs noted
`above by providing a way to manage user accounting and
`billing transactions over a network. According to the dis
`closure, the user's identity and age may be independently
`verified, and a credit rating may be established for the user
`so that credit may be extended for the purchase of goods
`and/or services.
`0021. In one aspect of the present disclosure, a system is
`provided for managing accounting and billing of transac
`tions. The system includes a gateway device that is config
`ured to provide access to the e-commerce network Subse
`quent to Verification of each required user qualification for
`network access. A required user qualification is at least one
`of a minimum age and a minimum credit rating. Verification
`of each required user qualification is performed by a quali
`fication verification device configured to verify at least one
`required user qualification based on user qualification input
`that includes a unique user identifier that may be input from
`a user terminal.
`0022. In another aspect of the present disclosure, a sys
`tem is provided for managing accounting and billing of
`transactions. The system includes a remote terminal that is
`configured to receive a request to access the e-commerce
`network. The remote terminal further includes a unique user
`identifier retrieval device configured to retrieve a unique
`user identifier from at least one database. The system further
`includes a qualification verification configured to verify at
`least one required user qualification based on user qualifi
`cation input. The user qualification input includes a unique
`user identifier. The at least one required user qualification
`includes at least one of a minimum age and a minimum
`credit rating.
`0023. In yet another aspect of the present disclosure, a
`system is provided for managing accounting and billing of
`transactions. The system includes a remote terminal having
`a text message source identification device. This text mes
`sage source identification device is configured to retrieve
`text message source identification information from at least
`one database, thereby identifying the source of the text
`message sent from a mobile communications device. The at
`least one database includes text message source identifica
`tion information from more than one text message service
`provider.
`0024. In accordance with yet another aspect of the
`present disclosure, a method is provided for accounting and
`billing transactions. The method includes establishing a
`connection between a user terminal and a remote terminal.
`The user terminal includes a display device and a user input
`device. The user terminal is configured to transmit a user
`request to access an e-commerce network.
`0025 The method further includes retrieving call source
`identification information from at least one database Such
`that the source of the established connection may be iden
`tified. The method includes disconnecting the established
`connection when the call source cannot be identified based
`on call source identification information.
`0026.
`In accordance with this method, at least required
`one user qualification is verified based on user qualification
`input. The user qualification input includes a unique user
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 7 of 18
`
`

`

`US 2007/0143231 A1
`
`Jun. 21, 2007
`
`identifier, and the at least one required user qualification
`includes at least one of a minimum age and a credit rating.
`0027 Access to the e-commerce network is provided
`Subsequent to call source identification and Subsequent to
`verification of each required user qualification. The system
`receives user selection of a product or service on the
`e-commerce network. E-commerce network usage informa
`tion is stored, updated and associated with call source
`identification information. The call source is invoiced based
`on the e-commerce network usage information.
`0028. In another aspect of the present disclosure, a com
`puter program product is provided. The computer program
`product contains computer executable instructions for man
`aging accounting and billing of transactions over an e-com
`merce network. When executed by a computer, the instruc
`tions cause a data processing system to receive a user
`communication requesting access to the e-commerce net
`work, the user communication being initiated via a modem.
`0029. The instructions also cause a data processing sys
`tem to retrieve call source identification information from at
`least one database such that the source of the established
`connection between the user terminal and the remote termi
`nal via the communication link may be identified.
`0030 The instructions cause the system to identify a call
`Source based on call source identification information, if the
`call source identification information includes an address for
`the call source. A disconnection occurs of the established
`connection occurs when the call source cannot be identified
`based on call source identification information.
`0031. The instructions cause the system to verify at least
`one user qualification based on at least part of a user social
`security number, if the number is located in the at least one
`database. The at least one user qualification includes at least
`one of a minimum age or a credit rating. The instructions
`cause the system to provide access to the e-commerce
`network Subsequent to identification of the call source, and
`Subsequent to verification of the at least one user qualifica
`tion.
`0032. The instructions also cause the system to receive
`user selection of a product or service for purchase. The
`instructions cause the system to store e-commerce network
`usage information in a record, associate the e-commerce
`network usage information with call source identification
`information, and update the according to e-commerce net
`work usage. The instructions cause the system to invoice the
`call source based on the e-commerce network usage infor
`mation.
`0033) One advantage of the present disclosure is to
`provide a billing system that incorporates additional protec
`tive measures for verifying the proper entity or person to be
`billed, especially when charges are assessed without a credit
`card.
`0034). Yet another advantage of the present disclosure is
`to provide for user age verification on an e-commerce
`network so that minors do not have access to adult content,
`and so that the network service provider has a better chance
`of enforcing a debt against a network user.
`0035) Still another advantage of the present disclosure is
`to provide for user credit eligibility determination on an
`
`e-commerce network. In this manner, a user may be
`extended credit for network usage commensurate with the
`user's credit rating.
`0036 Finally, yet another advantage of the present dis
`closure is to provide e-commerce access via media other
`than the Internet, especially via mobile or wireless devices.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0037. These and other advantages, features, and charac
`teristics of the present disclosure will become apparent to
`one skilled in the art from a close study of the following
`detailed description in conjunction with the accompanying
`drawings and appended claims, all of which form a part of
`this application. In the drawings:
`0038 FIG. 1 is a call flow diagram for conducting and
`billing e-commerce transactions in accordance with one
`embodiment of the present disclosure.
`0039 FIG. 2 is a call flow diagram for conducting and
`billing e-commerce transactions in accordance with yet
`another embodiment of the present disclosure.
`0040 FIG. 3 is a screen shot of a user interface for the
`system for managing accounting and billing of e-commerce
`transactions in accordance with one embodiment of the
`present disclosure.
`0041
`FIG. 4 is an illustration of a call flow diagram for
`conducting and billing e-commerce transactions in accor
`dance with yet another embodiment of the present disclo
`SUC.
`
`DETAILED DESCRIPTION OF THE
`DISCLOSURE
`0042. The detailed description set forth below in connec
`tion with the appended drawings is intended as a description
`of exemplary embodiments of the present disclosure and is
`not intended to represent the only embodiments in which the
`present disclosure can be practiced. The detailed description
`includes specific details for the purpose of providing a
`thorough understanding of the present disclosure. However,
`it will be apparent to those skilled in the art that the present
`disclosure may be practiced without these specific details.
`0043. For purposes of the present disclosure, the term
`“e-commerce' as used herein includes the conduct of finan
`cial or barter transactions by electronic means, including but
`not limited to the purchase and/or sale of goods and/or
`services. The term “e-commerce' as used herein encom
`passes these electronic transactions, regardless of the elec
`tronic media. Such media may include, but are not limited
`to, digital media (including digital television) and wireless
`media (including mobile telephone). Such media include the
`Internet and telephone.
`0044 Because the term “e-commerce' includes elec
`tronic transactions conducted over mobile telephones, the
`term "e-commerce' also encompasses transactions con
`ducted through the medium now commonly known as
`"m-commerce.” Examples of goods and/or services which
`may be the Subject of these transactions are videotext, pay
`television services, magazines, clothing, shoes, music,
`downloadable software programs, online video, dating Ser
`vices, games, adult entertainment services and online pub
`lications such as newspapers and magazines.
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 8 of 18
`
`

`

`US 2007/0143231 A1
`
`Jun. 21, 2007
`
`0045 Goods purchased over the network may be digital
`or physical goods. Goods and/or services which were the
`Subject of the purchase may be enjoyed over a number of
`media, including, for example, a television, a computer or a
`handheld device. In the present application, goods is used
`synonymously with products.
`0046) The present disclosure may be practiced over an
`e-commerce network. These networks may include a system
`of interconnected computers or terminals which share infor
`mation over one or more communication links, e.g., wired
`and/or wireless links. These terminals may include laptop
`computers, desktop computers, WINDOWS(R) CER) hand
`held devices, PDA’s e.g., PALMPILOT's, server computers,
`host computers, client computer, mobile or cellular tele
`phones, and other intelligent devices.
`0047 The terminal may include, but is not limited to, any
`device that incorporates a central processing unit (CPU),
`which may be provided, for example, as a conventional
`microprocessor, a read only memory (ROM) for permanent
`storage of information, and a random access memory
`(RAM) for temporary storage of information. The terminal
`may also include a display. Operation of the terminal may be
`generally controlled and coordinated by operating system
`Software. An operating system resident in System memory
`and executed by the CPU may coordinate the operation of
`the other elements of computer system. The computer sys
`tem may also include storage devices, e.g., a diskette,
`CD-ROM, hard disk, etc.
`0.048. The present disclosure relates to a system and
`computer-implemented method for managing accounting
`and billing of transactions over public media Information on
`accessing the network may be obtained over public media,
`including the Internet, mobile telephone, television or tele
`phone. The user may connect to the network by placing a
`call from a telephone line. The user may then purchase
`goods and/or services. The user is invoiced according to the
`telephone number from which the call originated.
`0049. The present system and method may be practiced
`within the framework of a VOIP gateway or digital line that
`assigns a unique identifier or personal identification number
`(PIN) for e-commerce network access. The present system
`and method may also be practiced within the framework of
`a remote access server (RAS) that is accessed by a user using
`a downloadable automatic dialer having code containing a
`unique identifier.
`0050 Regardless of the framework used, the present
`disclosure includes features for user address verification,
`user age verification, and a user credit eligibility determi
`nation using at least a portion of the user's Social security
`number. The partial or total Social security number is cross
`referenced with a name and/or address to determine an age
`found in a Social security database for the corresponding
`Social security number. In this manner, the user's address
`can be verified for billing purposes.
`0051 Moreover, the user's age can be verified so that
`network access is not provided to minors. The partial or total
`Social security number may also be matched with a credit
`rating contained in a database. This rating is used to deter
`mine the user's credit standing so that credit may be
`extended for the purchase of goods and/or services over the
`network. The present system and method provide for user
`
`billing by including the charges in the user's telephone bill,
`whether a mobile telephone or otherwise. The user may also
`be invoiced by paper invoice, e-mail or SMS text message.
`The present system and method further provide for network
`access with an automated accounting and billing process.
`0.052
`Referring now to FIG. 1, illustrated is a call flow
`diagram of system components 100 used in conducting,
`accounting and billing transactions in accordance with one
`embodiment of the present disclosure. A user terminal 101
`includes a personal computer (PC) 105 operatively coupled
`to a display device such as a monitor 102. The user terminal
`101 further includes one or more input devices such as a
`mouse 103 and keyboard 104. These input devices 103, 104
`are also operatively coupled to the personal computer 105.
`User PC 105 also includes an internal modem (not shown).
`Although the modem shown in this embodiment is internal,
`the modem may also be external. The modem is connected
`via a telephone cord 106 to a wall jack 107. Although the
`embodiment illustrated incorporates a telephone jack, it
`should be understood that any Suitable connection may be
`used, including but not limited to Ethernet, wireless or
`otherwise.
`0053 Software resident at user terminal 105 includes a
`web browser. Largely due to web browser, the user terminal
`105 is capable of receiving one or more web pages which
`may be viewed at monitor 102. Other software resident at
`user terminal 105 might include an operating system used to
`control the execution of computer programs, such as the web
`browser. The operating system may also provide an interface
`to peripheral devices such as mouse 103, keyboard 104 and
`monitor 102.
`0054 At user terminal 101, the user views a web page.
`This web page informs the user of a toll number that can be
`called to access an e-commerce network. After accepting
`relevant terms and conditions, the user dials the toll number
`via the internal modem using a dial-up connection. Toll
`numbers are generally numbers for which an access fee is
`charged. As is widely known, telephone numbers in the
`United States include a three-digit area code followed by a
`seven-digit number. Currently, toll numbers are distin
`guished from regular long distance or local telephone num
`bers in that they often have an area code in the United States
`of 201 or 900, among others.
`0055 Although the United States is used as an example
`in this description, it should be understood that the telephone
`number could be in a format used by any country, whether
`in Europe, Asia or otherwise. Moreover, although a toll
`number is used in this embodiment, it should be understood
`that the telephone number may be a toll number or a toll-free
`number. Use of a toll number may provide certain advan
`tages in that it provides a cross-reference for verification of
`the length of time connected to the e-commerce network.
`Time spent on a toll call is usually recorded on a user's long
`distance telephone bill. If a dispute arose between the
`network service provider and the user as to the amount of
`time spent on the network (especially for time-based bill
`ing), the long distance telephone bill could be used as an
`independent verification of time spent for network usage.
`0056.
`In lieu of dialing the toll number from a computer
`modem as in this example, the user might dial the number
`directly using a home telephone. Moreover, in lieu of dialing
`the telephone number, the user may connect to the remote
`
`Ex. 1015
`CISCO SYSTEMS, INC. / Page 9 of 18
`
`

`

`US 2007/0143231 A1
`
`Jun. 21, 2007
`
`terminal 125 using a broadband connection. As long as the
`remote terminal 125 detects a modem, such as internal
`modems commonly found on today’s computers, the con
`nection may be properly established.
`0057. As illustrated in FIG. 1, the user's call is received
`by a local telecommunications carrier 110. The call may then
`directed to the long distance carrier 115 which the user has
`selected as a long distance service provider.
`0058. The call is received at remote terminal 125 and a
`“wink” occurs upon receipt of the call by the remote
`terminal 125. This “wink” may come to mark the beginning
`of a billable event, depending on the relevant terms and
`conditions agreed to by the user. Through software resident
`at the remote terminal 125, the remote terminal 125 first
`attempts to identify the telephone number and address from
`which the call originated, and the identity of the line
`subscriber. The remote terminal 125 performs this call
`Source identification by accessing information contained in
`an RBOC (regional

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket