Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND TELECOMMUNICATION SYSTEM FOR CHARGING A USER
Document Type and Number:
WIPO Patent Application WO/1996/015616
Kind Code:
A2
Abstract:
The invention relates to a method and a system for charging of a user of a telenetwork, especially a computer equipment offering chargeable services. In order to achieve a simple and reliable charging method: A) the identification number and the secret code of an account in a separate account register is given to the user, whereby for the charging of the user; B) the identification number and the secret code of the user is asked; C) a debiting message is sent to the account register via the telecommunication link, whereat said debiting message includes at least the sum to be charged and also the identification number and the secret code announced by the user; and D) a message is expected from the account register indicating that the account register has debited the chargeable sum from the account the user has announced, whereby it is stated that the user has paid for the chargeable service.

Inventors:
GROENBERG JANI (FI)
KARJALAINEN ULLA (FI)
KOSONEN MARTTI (FI)
NODBERG MARKO (FI)
MIETTINEN JARMO (FI)
TUOMISTO ELINA (FI)
Application Number:
PCT/FI1995/000622
Publication Date:
May 23, 1996
Filing Date:
November 13, 1995
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
FINLAND TELECOM OY (FI)
GROENBERG JANI (FI)
KARJALAINEN ULLA (FI)
KOSONEN MARTTI (FI)
NODBERG MARKO (FI)
MIETTINEN JARMO (FI)
TUOMISTO ELINA (FI)
International Classes:
G06Q20/00; G07F19/00; H04M11/00; H04M15/00; H04M17/00; (IPC1-7): H04M15/00
Foreign References:
US5136632A1992-08-04
GB2171877A1986-09-03
EP0540234A21993-05-05
EP0572991B11996-10-30
US5148474A1992-09-15
US5181238A1993-01-19
US5323448A1994-06-21
US5353335A1994-10-04
Download PDF:
Claims:
CLAIMS
1. A method for charging a user of a telecommunication net¬ work, c h a r a c t e r i z e d in that in this method (A) the identification number and the secret code of an ac¬ count in a separate account register is given to the user, whereby for the charging of the user; (B) the identification number and the secret code of the user is asked; (C) a debiting nessage is sent to the account register via the telecommunication link, whereat said debiting message includes at least the sum to be charged and also the identi¬ fication number and the secret code announced by the user; and (D) a message is expected from the account register indica¬ ting that the account register has debited the chargeable sum from the account the user has announced, whereby it is stated that the user has paid for the chargeable service.
2. A method according to claim 1 for charging the user of a computer equipment offering chargeable services, c h a r a c t e r i z e d in that in this method (A) the identification number and the secret code of an ac¬ count in a separate account register is given to the user, whereby for the charging of the user; (B) the identification number and the secret code of the user is asked; (C) a debiting nessage is sent to the account register via the telecommunication link, whereat said debiting message includes at least the sum to be charged and also the identi¬ fication number and the secret code announced by the user; and (D) a message is expected from the account register indica¬ ting that the account register has debited the chargeable sum from the account the user has announced, whereby it is stated that the user has paid for the chargeable service.
3. A method according to claim 1 or 2, c h a r a c t e r i z e d in that said debiter produces chargeable services in the telecommunication system.
4. A method according to claim 1 or 2, c h a r a c t e r i z e d in that the producer of said ser¬ vice makes services regardless of the telecommunication sys¬ tem.
5. A method according to any of the claims 1 4, c h a r a c t e r i z e d in that to the user is given the identification number and the secret code of an account in the account register connected with the telecommunication network: by establishing a new account in the account register and determining the identification number and the secret code for this account and also the sum of money available in the ac¬ count; by giving to the user the identification number and the secret code of the new account against the predetermined payment, which payment will be collected in the way known in itself, so that the user knowing the identification number and the secret code of the account may use the account for paying the bills, until the monetary amount avalaible in the account has been exhausted.
6. A method according to claim 1 or 2, c h a r a c t e r i z e d in that the user is charged in real time by sending a new debiting message to the account register always when the user activates a new chargeable service.
7. A method according to claim 1 or 2, c h a r a c t e r i z e d in that when the user selects a service based on time charging, new debiting messages are repeatedly sent with predetermined time intervals, whereby by each debiting message the user is charged in advance for the subsequent predetermined time period.
8. A method according to claim 1 or 2, c h a r a c t e r i z e d in that when the user selects a service based on time charging, the account register is con¬ tinuously updated, preferably with very short time intervals, which are advantageously between a few seconds ... a few mil¬ liseconds, by debiting messages, whereby by each debiting message the user is charged in advance for the time of the predetermined time period, so that the charging takes essen¬ tially place in real time.
9. A method according to claim 1 or 2, c h a r a c t e r i z e d in that it is used in this method a customerrelated identification number and a prepaid com¬ pensation included in it, that for the formation of the con¬ nection the caller calls to a predetermined call number and delivers from the teleterminal equipment his identification number and/or the secret code, whose validity and the amount of the remaining limited value included in them are verified, whereafter the caller selects the desired call number.
10. A method according to claim 1, in which method an intel ligent network base is used, c h a r a c t e r i z e d in that for the forming and charging of a prepaid connection from the account in the telenetwork the call is processed with a prodecure essentially according to FIGS. 5 and 6.
11. A telecommunication system for charging a user, c h a r a c t e r i z e d in that to this system belongs a separate account register (2) arranged in the telenetwo.κ, whereat in the connection with the identification number of each account in the account register it has been deposited at least the secret code of the account and the sum of money available in the account, whereby to the account register belong means (6, 7) for charging the monetary amount indica ted by the debiting message received by the account register from the account included in the debiting message, if the secret code in the debiting message corresponds the secret code of the account, and the sum of money available in the account is at least as large as the sums to be charged.
12. A telecommunication system according to claim 11, comp¬ rising subscriber devices (12) and a computer equipment (13, 16) offering chargeable services via a telenetwork for the subscriber devices (12) of the telecommunication system for charging the users of the services, c h a r a c t e r i z e d in that to this system belongs an account register (2) separate from said computer equipment (13, 16), in which register it has been deposited in connec tion with the identification number of each account at least the secret code of the account and the sum of money available in the account, whereby to the account register belong means (6, 7) for charging the monetary amount indicated by the debiting message received by the account register from the account included in the debiting message, if the secret code in the debiting message corresponds the secret code of the account, and the sum of money available in the account is at least as large as the sums to be charged, and that said com¬ puter equipment (13, 16) comprises means for the reception of the identification number and the secret code from its subsc¬ riber device (12) using chargeable services and for sending said debiting message to the account register (2) for char¬ ging of the user (12) of the computer equipment for the char¬ geable services used by him.
13. A telecommunication system according to claim 11 or 12, c h a r a c t e r i z e d in that to the system belong seve¬ ral telecommunication equipments (13, 16) offering chargeable services and including each means for the reception of the identification number and the secret code from their subscri¬ ber device (12) using chargeable services and for sending said debiting message at the same time to the common account register (2) for charging of the user (12) of the computer equipments (13, 16) for the chargeable services used by him.
14. A telecommunication system according to claim 11 or 12, c h a r a c t e r i z e d in that said telecommunication system forms a part of the INTERNETnetwork (1) , whereby said computer equipment (13) and the account register (2) are composed of servers connected with the INTERNETnetwork, and that the computer equipment (13) has been adapted to send a debiting message via the INTERNETnetwork (1) or a corres¬ ponding telecommunication network to the account register (2) and to receive from the account register via the INTERNET network or a corresponding telecommunication network a con¬ firmation about the remittance or the failure of the payment attempt.
15. A telecommunication system according to any of the claims 1114, c h a r a c t e r i z e d in that the account register (2) has also been connected with a public telephone network (5), whereby the account register comprises means for charging the costs due to a call made from a selective te¬ lephone extension (10) from the account in the account regis¬ ter (2), if the identification number and the secret code of the account delivered from the telephone extension in ques tion correspond the identification number and the secret code of an account in the account register (2) and the sum of money available in the account in question exceeds the costs caused by the call.
16. A system according to claim 11, based on the intelligent network base, c h a r a c t e r i z e d in that in order to form a prepaid connection and to charge it from an account in the telenetwork, the call processing is essentially in accor¬ dance with the procedure shown in FIGS. 5 and 6.
Description:
Method and telecommunication system for charging a user

This invention relates to telecommunications and data trans¬ mission in a telenetwork. Particularly the present invention relates to a method for charging of a user of a telecommuni¬ cation network, especially of the one using a computer equip¬ ment offering paid services. The invention relates also a telecommunication system for charging of a user of a tele¬ communication network, especially of a telecommunication system, including subscriber devices and a computer equipment offering paid services for the subscriber devices of a tele¬ communication system, for debiting of a customer.

This invention relates also to an electronic payment system, by which a payment that is comparable to a cash payment can be given to the vendor. The invention can be used especially for the payment of the services used in the telecommunication and data transmission taking place in telecommunication net¬ works and also the ones offered in the telenetworks, as for instance payment of the data searches, but the method accor¬ ding to the invention can also be applied to services of another type, as for the payment of newspaper subscriptions and other similar charges.

Is is a well-known practice to use charging methods to be utilized in telecommunication networks and based on the iden¬ tification of the user for example by his or her credit card number or the identification number. When the user has an¬ nounced his identification number and the secret code (PIN, Personal Identification Number) for the account associated with it, paid services are offered to the the customer accor¬ ding to his or her selection and debited from the customer's account. The disadvantage of these known solutions is that by them the customer can buy services only from the particular computer, for which he has a user symbol. Thus the customer cannot buy services from the computer he has randomly selec¬ ted, if he does not take a contact to the operator of the

computer in question or the service offerer in order to get the user symbol. The solutions based of the credit card num¬ ber require in their part the use of complicated encryption systems in order to be certain that the credit card number informed by the customer will not end up to outsiders. The problem of such encryption systems is that their creation in telecommunication networks is difficult.

The object of this invention is to offer a simple and reliab- le charging method. This object is attained by the method according to the invention, the characteristic features of which have been shown in the characteristic part of the inde¬ pendent claim 1.

The object of the invention includes also a telecommunication system, in which the method according to the invention can be applied. The characteristic features of the telecommunication system according to the invention have been presented the characteristic part of the enclosed independent claim 11.

The term "account register" means in the present invention both a computer equipment, by which an account register can be maintained, and the register itself or the database, in whuch the accounts are kept.

The invention is based on the idea that when at the disposal of a customer is given against a special charge an account in a pretermined account register, the utilization of which requires only the knowledge of the identification number for the account and the secret code. The method according to the invention is thus based on the use of this identification number and the secret code including the compensation in accordance with the prepaid monetary value, by which a charge can be paid for the used telecommunication ja data transmiβ- sion time as well as chargeable services and/or products pur¬ chased via the telenetwork. The identification number and the secret code are advantageously sold in the form of a card and

in order to create connections the user calls to the call number of a predetermined service and jives his or her iden¬ tification number and secret code, which means that a physi¬ cal card is not necessary for the creation of the connec- tion. According to the invention the validity of the identi¬ fication number and the secret code is checked and also the monetary compensation remaining in the account. The present invention combines thus the predebiting and the freedom to use all kinds of terminal devices connected with the telenet- work, as telephones and computer equipment, for the creation of a connection.

With the present invention the customer may in future pay the telecommunication services used by him in a very simple way - by announcing to an occasional service offerer the identifi¬ cation number of his account and the secret code, whereby the service producer may get a payment comparable with the cash payment using the teleoperator maintaining the account regis¬ ter as an intermediary. For instance in a telecommunication network the customer may thus buy services also from the computers of such service producers, for which he has not any identification number. The computer of the service producer sends then a debiting message to the customer's account re¬ gister, in which the combination of the identification number for the account and the secret code informed by the customer will be verified. If in the account register there is then discovered an account, the identification number and the secret code of which coincide with the identification number and the secret code announced by the customer, the sum debi- ted by the service offerer will be charged in the account register from the account informed by the customer, so that this sum can be compensated to the service producer in a way separately agreed. The sum aid by the customer will be then carried to the account of the servicer producer in such a way, that the operator can compensate it to the service pro¬ ducer e.g. by depositing the portion of the sum belonging to the service producer directly into his or her bank account.

The computer of the service producer will not participate in this case in any way in the authentication of the user or the account apprised by him, but this action is entirely effected in the account register.

If the accounts in the account register are also made as disposable, so that it is not possible to deposit more money in the accounts, but these accounts are discarded, when the money amount determined upon their creation has been exhaus- ted, the expenses caused for the user by the information leak and the misuse of the account associated with it are minimi¬ zed. Or as the sum in the beginning has been one hundred marks, the customer cannot lose more, though some third party would find out the identification number and the secret code of his account.

The most significant advantages of the method and the system according to the invention are therefore expressed in that the service producer cannot debit the user, though there is no agreement between the user and the service producer about the manner by which the bills are paid, that it is not ne¬ cessary for the service producer to know the identity of the customer in order to succeed in the invoicing, that the cus¬ tomer can pay for the services to several service producers by having an account in only one account register, and that the customer must not have any payment cards at his or her disposal or corresponding means depending on the equipment, but it is enough that the customer knows the identification number and the secret code of one account in the account register.

According to a particularly advantageous embodiment of the invention the value of the monetary compensation in the ac¬ count register is essentially reduced in real time during the connection and/or the electrical trading.

Preferred embodiments of the method and the telecommunication system according to the invention are described in the accom¬ panying subclalms 2-10 and 12-16.

The invention will be described in detail in the following referring to the enclosed drawings, in which:

FIG. 1 shows a flowchart of the first advantageous embodiment of the method according to the invention ; FIG. 2 shows a block diagram of the first advantageous embo¬ diment of the telecommunication system according to the in¬ vention;

FIG. 3 shows a block diagram of the second advantageous embo¬ diment of the telecommunication system according to the in- vention; and

FIGS. 4-7 show as an example a third preferred embodiment of the invention having an intelligent network base (IN-plat- form) as the realization base, and of which FIG. 4 shows the relationships between the activities; FIGS. 5 and 6 show the processing procedure of the connec¬ tion; and FIG 7 shows the user interface.

FIG. 1 shows a flowchart of the first advantageous embodiment of the method according to the invention. In the block A of FIG. 1 the operator of the account register establishes in the account register a new account, for which he determines the identification number, the secret code (PIN) and the monetary amount available, for example 100,-. After this the operator cam output an account card on paper provided with the identification number and the secret code. The operator sells the account card to a prospective buyer, who pays for the card the price the operator asks, e.g. 100,- (if the operator is not willing in this trading to receive any profit from the user) . After this the buyer of the account card or any other person knowing the identification number and the secret code of the account may use the account in question

for payments, until the monetary amount in the account has totally been used up or the latest expiration date of the card has been exceeded. No markings are therefore needed in the account register indicating the holder of a certain ac- count. If the account in question is of disposable type, no additional money can be deposited in the account, but the user must buy another account card for himself having another identification number, when the means in the first account have been exhausted. Consequently for instance if one's ac- count card is lost or if the identification number and the secret code of the account fall into the hands of a third party, only the economical loss of no more than the purchase price of the account card is caused for the user.

If it is desired to have larger deposit sums for the accounts in the account register (e.g. several thousands marks), it is possible to establish two different secret codes for the accounts in question. In this case the first secret code is used for the payment of bills and the second secret code (which the account holder should keep in a safe place) is used to exchange the first secret code in the account regis¬ ter.

When the user has contacted for instance by a telecommunica- tion network to the computer offering commercial services and he wants to pay the services by using the account register, he entries into the computer the identification number and the secret code of his account in the block B. This may hap¬ pen for example in such a way that the customer contacts with his computer terminal a specified commercial server (compu¬ ter), whereby the server in question asks the customer upon making the connection to announce the identification number and the secret code of his account and is waiting, until it receives by the telecommunication the identification number and the secret code of the account sent by the customer from his terminal.

In the block C the server sends a debiting message to the account register. If the server in question has been program¬ med so that there are several different account registers, through which its chargeable services can be paid, this ser- ver decides for instance on the grounds of the identification number of the account announced to it, to which server this debiting message should be sent.

The debiting message sent by the server comprises at least the identification number and the secret code of the account informed by the customer. Additionally this debiting message may include among other things a product symbol for the ser¬ vice the user is paying and the telecommunication address of the user.

If the debiting message includes the telecommunication add¬ ress of the user, the account register may essentially impede the misuse of an account in the account register for instance so that if to the account register comes within a specified time limit (e.g. 5 minutes) a certain amount (e.g. 5 pcs) of debiting messages, which have the same telecommunication address of the user, but the identification number and/or the secret code included in the message are wrong, the account register may reject all the debiting messages for instance during the next hour including the same telecommunication address in question. Therefore for example a "hacker" trying with repeated efforts to find out the secret code of a speci¬ fied account, cannot make more than a few "breaking attempt" in an hour, whereat it is very improbable that he could dis- cover the correct secret code.

In the block D the server waits for the confirmation indica¬ ting the successful or unsuccessful payment. If the payment has not been succeeded, a transfer is made directly from the block E to the block G, whereby the server states that the customer has not paid the required payment and that he does not therefore offer paid services to the customer.

If, on the contrary, a message is received, according to which the payment has been succeeded, a transfer is made to the block F, in which chargeable services in the server are offered to the customer.

If the service desired by the customer from the server has been classified as a disposable one, the server can function only so that it debits upon the contact-making a single pay¬ ment through the account register, whereafter the customer may use the service it has chosen and paid in advance as long as he wants. The customer makes therefore a real-time payment for the service used by him.

If, on the contrary, a time debiting has been specified for the service desired by the customer, the server may send the first debiting message to the account register immediately after the connection-making, whereafter the customer has the right to use the service under the payment for instance du¬ ring ten minutes. When the paid time (or in this case ten minutes) has been exhausted the server sends a new debiting message to the account register, in which again the sum in¬ cluded in the debiting message is charged from the customer's account, whereafter the customer has again ten minutes of the connection time at his disposal. If it is desired to make the charging of the service based on the time debiting as a real¬ time invoicing, the above-mentioned time period can be speci¬ fied as a very short one, e.g. lasting only some milliseconds or a second. Therefore debiting messages are sent to the account register with very short intervals, whereby the char- ging of the customer takes place on the real-time basis.

By the above-mentioned way the customer may utilize the char¬ geable service, until the monetary amount in his or her ac¬ count has been exhausted, whereat the server cuts off the use of the chargeable service for the customer.

FIG. 2 shows a block diagram of the first preferred embodi¬ ment of the telecommunication system according to the inven¬ tion. The account register visible in FIG. 2 consists of a server, or a computer 2, comprising a connection unit 3 by which it has been connected with the INTERNET-network 1 for example by a TCP/IP telecommunication link.

The account register comprises also a telephone service unit 4 (VRU, Voice Response Unit), by which it has been connected to the public telephone network 5 (PSTN, Public Switched Telephone Network) . The connection between the public te¬ lephone network 5 and the server 2 can comprise for example a connection according to the national R2 signalling specifica¬ tion or alternatively for instance an ISDN-connection (Integ- rated Services Digital Network) .

The telephone service unit 4 and the connection unit are controlled by the control unit 6, which is also connected with the database 7, in which the actual account register or the accounts are maintained. For the accounts in the database 7 at least the identification number, the secret code (PIN) and the monetary amount available in the account have been marked in t database. Markings of the limitations of use for some accounts can also be made in the database 7, or for instance telephone numbers, which have been called, and these calls cannot be debited from the account in question (as international calls or the ones made to the cellular phone) .

When the operator of the account register creates a new ac- count record in the database 7, at least the identification number, the secret cc e and the available monetary amount, e.g. 100,-, are thus determined for it. This information is registered also by the printer 8 to the outputted account card 4. The account card in question is sold thereafter to the prospective buyer at the price agreed in advance. The buyer of the card can thus utilize the account registered to the account card by the visible identification number and the

secret code in it, until the monetary amount addressed to the account has been exhausted.

Alternatively a new account can be generated in the account register 7 by the initiative of the user. When the user by his telephone or the computer terminal selects such an event, the control unit 6 creates a new account in the database, for which it establishes the identification number and the secret code. After this to the user's telephone or terminal is sent a message, by which the identification number and the secret code are delivered to the user and for instance also a cer¬ tain sum of money, the bank account number and the reference number. When the user after this in an identified way pays the announced sum via his bank to the announced account using the reference number, the account in the account register is activated in such a way that it can be used for the paying of the bills. This may take place so that a special checking bit addressed to the account changes the value, or alternatively for example so that the balance of the account remains zero until the the user has made the bank payment, whereafter the balance of the account is increased in certain relation to the monetary amount paid by the user.

When a person using the telephone 10 utilizing the sound frequency selection (DTHF) wants to call the telephone 11 in such a way that the costs due to the connection will be debi¬ ted from the account according to the account card bought by him or her, he selects initially the free telephone number of the telephone service unit 4. The telephone service unit 4 advices the user to key in his account number and the secret code, which the telephone service unit sends to the control unit 6. The control unit 6 checks, whether there is any ac¬ count in the database, the identification number and secret code of which correspond the number and the code keyed by the telephone 10, or whether there is still money available in the account in question. If this is the case, the telephone unit 4 sends to the telephone apparatus 10 a sound message,

by which to the customer is announced the sum of money at his disposal and by which he is adviced to key in the number of the B-subscriber he desires. After this the account register 2 creates a connection between the telephone 10 and the te¬ lephone extension selected by the subscriber, which can be e.g. the telephone 11. The costs due to the connection are not charged from the holder of the extension 10, but from the account, the identification number of which the customer has entried by the telephone 10.

If the duration of the call made from the telephone to the telephone 11 is so long that the monetary amount available in the account ends up, the telephone service unit 4 of the account register announces this by a sound message, after which it cuts off the connection after a predetermined time period.

According to the invention the user may also utilize the account marked in the account card bought by him via his computer terminal 12 for the payment of the chargeable servi¬ ces selected by him. Or if the user upon scanning through for instance the WWW-pages (World Wide Web) offered in the INTER- NET-network discovers that in a specified chargeable WWW-page there is the information he wants to buy, he can pay the service bought by him using the account in the database 7. The chargeable service in question can for example include reading of a certain text or optionally making of a newspaper subscription, whereat the customer can immediately pay by the account in the account register to the service producer the price determined for the text reading or the fee due to the subscription of the annual volume of the newspaper.

In FIG. 2 has been shown two separate computer equipment:?; 13 and 16, both of which are in the data transmission conn; tion with the account register 2. The user can therefore freely select, from which computer equipment he wants to buy the services and pay for these services using the account in the

account register regardless of the fact, whether he buys services from the computer equipment 13 or 16 or not.

Or if the customer selects for example a WWW page, the infor- mation for which can be found in the server 13, the server 13 asks in the beginning from the customer the identification number and the secret code of his or her account. After the reception of the identification number and the secret code, the server 13 sends a debiting nessage to the account regis- ter 2 via the telecommunication link 14. This telecommunica¬ tion link 14 can for example comprise any connection link, by which the debiting message can be delivered directly to the connection unit 3 of the account register. Optionally the debiting message can be supplied via e.g. the INTERNET-net- work. The debiting message includes at least the identifica¬ tion number and the secret code of the account entried by the user.

When the connection unit 3 of the account register receives the debiting message, it delivers this message further on to the control unit 6. The control unit 6 checks then, whether there is in the database the account having the identifica¬ tion number and the secret code included in the debiting message. If this account is discovered, the control unit checks subsequently the sum of the available money. If the sum of the money in the discovered account exceeds the mone¬ tary amount included in the debiting message, the control unit 6 charges the sum of the money included in the debiting message from the account mentioned in the debiting message. Correspondingly the control unit 6 entries the charging event in the call-log of events 15. Hereby at least the chargeable sum of money is registered into the call-log and also the information, by which it is identified the party, to which the sum in question should be paid. The information in ques- tion can consist of for example the product identification number needed for the identification of a chargeable service or alternatively for instance of the identification number of

the server offering the chargeable service or of its opera¬ tor. Thereafter the control unit 6 sends to the server the confirmation of the successful payment via the telecommunica¬ tion link 14.

If, on the contrary, the identification number or the secret code of the account of the debiting message is incorrect or if there is not available money enough in the account, the control unit 2 delivers to the server via the telecommunica- tion link a message announcing the failure of the payment.

FIG. 3 shows a block diagram of the second preferred embodi¬ ment of the telecommunication system according to the inven¬ tion. The embodiment illustrated in FIG. 3 resembles very much the embodiment shown in FIG. 2, but in the case of FIG. 3 the user buying via his terminal 12 services from the ser¬ ver 13 can select between various optional methods of pay¬ ment.

When the user selects from the server 13 a chargeable servi¬ ce, the server 13 sends through the INTERNET-network an in¬ quiry to the user's terminal 12 concerning the way by which he wants to pay for this service. There can be several possi¬ ble useful methods of payment, of which two have been shown in FIG. 3:

- charging the user by increasing the price of the services selected by him to the telephone invoice, whereat the user is adviced to announce his telephone number and the secret code possibly in use; and - charging the user by the (prepaid) account at his disposal, whereat the user is adviced to announce the identification number and the secret code of his account.

When the server 13 has received from the user the information concerning the selection of the method of payment and the identification numbers associated with it (telephone/account number, secret code), it supplies a debiting nessage to the

account register 2 in a way known in itself for example via a data network 14 or the INTERNET-network 1. The information about the method of the payment the user has selected is then included in the debiting message.

The control unit 31 receives the debiting message and entries it into the call-log 15. By the call-log 15 it is possible to find out later on the contents of the arrived debiting messa¬ ges or inter alia the amount the upkeeper of the server 2 should pay to the parties offering chargeable services for instance via the server 13. Hereby it is advantageous if the debiting message to be sent from the server 13 to the account register 2 includes besides the chargeable sum, identificati¬ on number of the account and the secret code also among other things:

- A product code for the product the user 12 is paying. By this product code it is for instance possible to find out, to whom the sum charged for the product purchase should be deli¬ vered in cases, where various different service producers offers chargeable services via the same server 13.

- The telecommunication address of the user 12, whereat mis¬ suses can be prevented in advance in such a way, that if the server 2 repeatedly within a predetermined time period re¬ ceives debiting messages, including an incorrect secret code, but the same telecommunication address, the account register may reject all the nessages comprising the telecommunication address in question for a predetermined time.

- An identification number indicating the method of payment, whereby the account register 2 may discover, how it should process the debiting message in future.

When the control unit 31 has entried the debiting message to the call-log 15, it then checks the identifying number indi¬ cating the method of payment in the debiting message. If the identifying number indicating the method of payment shows that the user wants to pay the chargeable service selected by him by his telephone invoice, the control unit 31 generates a

nessage sending it further on to the teleoperator addressed by the telephone number delivered by the user for instance via the telephone network. The message in question is depo¬ sited then to the teleoperator's system 30, in which it is observed, when the next telephone invoice is sent to the user. If the control unit 31 gets the confirmation concerning the successful payment operation from the teleoperator's system, it delivers a confirmation about the succesful pay¬ ment to the server 13 via the data network 14.

If the control unit on the contrary finds out on the grounds of the identification number indicating the payment, that the user wants to pay the chargeable service selected by him using the account in the database 7 of the account register, it checks subsequently, whether there is money enough In the account in the database 7 and whether the secret code inclu¬ ded in the debiting message corresponds the secret code of the account in question. If this is the case, the control unit 31 debits from the account in question the chargeable sum and sends to the server 13 a confirmation about the suc¬ cessful payment procedure via the datanetwork 14.

It should be understood that the specification above, the figures associated therewith and the following detailed exem- plary description connected mostly to the calls and the figu¬ res associated therewith are only intended to illustrate the present invention. It is evident that many variations and modifications will be apparent to those skilled in the art. Accordingly it is intended to embrace all such variations and modifications without diverging from the scope and the spirit of the invention determined in the appended claims.

Example

It is possible to buy a generally applied right for a prepaid telecommunication and/or data transmission, e.g. in the form of a preprinted card, via common distribution channels, and the card batches intended for special adaptations can be

produced according to the customer's wishes. The service connection is attained by calling the service number free of charge, whereafter the system asks the caller to key in the identification number of the card. In order to impede pos- sible misuses it is also possible to arrange in the system the inquiry of the secret code before the approval of the identification number. The system verifies the validity of the identification number, the amount left of the telecom¬ munication or data transmission right, and the system checks also that no operating teleconnecting link exists for this identification number. After a positive examination result the system tells to the user the balance of the account and asks him to key in the desired number. After the formation of the connection the system controls the costs and charges the balance of the card essentially in real time using the debi¬ ting data received from the telenetwork. No charging is di¬ rected to the extension, from which the connection is formed. If the connection ends or is ended before the connection right is exhausted, the system deposits the remaining balance for the following uses. If the balance during the connection attains the preset lower limit, a warning signal is given to the user indicating that the connection right is ending. If the balance is exhausted during the connection, the system discharges the connection. The usufructuary right of the identification number is passivated to zero during the balan¬ ce or after the preset validity time has expired.

A prepaid usufructuary right can be applied for the normal telecommunication and/or data transmission within the limits set by the balance. In special adaptations the usufructuary right can also be limited to concern only the calls to a specified number or numbers or to a certain connection type. In the embodiment, where the objects have been limited, the usufructuary right can be sold and announced instead of the balance in monetary units (= marks) also during the available connection time. In special adaptations it is also possible

to set the guides and notices given during the service to the user of the system relating to the adaptation.

General description The main purpose of this method for the collection of debits (called hereafter as the "Prepaid Phone Card Service") is to offer to a customer a prepaid connection time. The card in¬ cludes a predetermined amount of credit (= balance) that can be used during the connection. The card is paid when it is purchased and no other expenses will be charged from the holder of the card. The actual physical card is needed only for the printing of the card number. When the connection is started, only the card nunber printed on the card, i.e. the identifying number, and the possible secret code are needed.

2. Service qualities

The following qualities belong to the Prepaid Phone Card

Service paid in advance:

The basic functionality comprises the following functions:

the access to the service by a free number the number of the caller determines the language to be used - the identification of the card is ended by # means for the simultaneous use of the card for more than one connection event the card number comprises information about the distribu¬ tion channels - the prepaid card (number) is active during a limited time and is auto a Ically passivated on the expiration day the "spoken money" announcement after the identification of the card apprises the available balance the selected object number is announced as a dialling tone (or a voice information), selection is ended by #. The object number can also be selected by the service itself (autodial).

the outgoing connection parameters and their control comprise the balance and the debiting information belon¬ ging to the call made to the object number. These parame¬ ters determine the permissible maximal connection time. - the actual charging data is received from the network the access can be limited to the connection of certain type depending only on the card type the operational time/balance available during the connec¬ tion is reduced. A warning tone 1 is given, when the li- mit 1 is attained. the warning tone 2 is sent to the user, when the limit 2 is attained the connection is ended, when the available operational time/balance is ended - the debiting record is generated from each connection for checkings after the connection the balance is preserved for subse¬ quent connections the service operator has the access to the cards and the service information in order to update the balance viewing of the connection report/statistics and to es¬ tablish and nullify the cards.

The additional functionality covers the following things:

further connection without a need for the new identifica¬ tion of the cars number the qualification of the PIN-code for securing the legal use of the card - the covering of the object number according to the custo¬ mer needs individualized announcements

3. Functions associated with the realization, see FIG. 4 3.1 Functions included

The functions included are shown in accordance with the ITU-T recommendation Q.1204 Intelligent Network Distributed Func-

tional Plane Architecture. Though these recommendations con¬ cern the intelligent network technology, the same basic func¬ tions are needed also in the not-IN solutions. In the physi¬ cal realization these functions may be located in different ways in separate or combined entities.

CCAF (Call Control Agent Function) is an intermediate func¬ tion of the connection control enabling the access for the user. It contains the interface between the user and the connection control function of the network.

CCF (Call Control Function) is a connection control function in the network taking care of the connection, the coupling process and the control.

SSF (Service Switching Function) is a service coupling func¬ tion, which together with the CCF takes care of many func¬ tions needed between the CCF and the service control function (= starting and connection coupling etc. ) .

SRF (Specialized Resource Function) takes care of special subfunctions needed for the performance of the services (= marking reception, announcements, speech generators).

SCF (Service Control Function) is a function commanding the requested service upon performing the connection control functions.

SDF (Service Data Function) includes customer- and network- related data for the access thereto of the SCF, when the service is made in real time.

All the above functions are controlled, updated and/or other¬ wise managed by the SMF.

SMF (Service Management Function) enables the spreading and upkeep of the services and makes possible the support of the

activities being performed. It allows the coordination of the debiting and the statistical information attained from the SCF and also the working up of the information data distribu¬ ted to the SDF.

SCEF (Service Creation Environment Function) makes possible the determination, development, testing and entrying the performed services to the SMF. The delivery of this function may include service logic, service control logic, supplemen- tary information for the service data and the starting data of the service.

SMAF (Service Management Access Function) forms an extension between the service controls and the SMF.

There is also a generation and control function of the card number controlling the number space reserved for this servi¬ ce. It generates numbers according to certain generation rules and combines the service data (as the initial balance, card expiration date, announcement codes) associated with them.

The service logic has been created by the SCEF and spread by the SMF. All the service information is sent from the SMF to the other functions.

The functions mentioned above can be divided into different groups. CCAF, CCF, SSF, SRF, SCF and SDF form a group with the name "service performance functions", because they are connected to each connection processing. SNF, SMAF and SCEF form a group with the name "service control functions", be¬ cause they are associated with the control service, service data, card data and service creation. The number generation function is used for the production of card numbers, but it is not in any way associated with the service itself. Also some individualized service functions can be used, needed for the communication with the customer (= a customer serving

person) and for the utilization of the administrative possi¬ bilities offered by the service control functions. The custo¬ mer service functions may also determine the amount of the card required for the number generation function. The rela- tions between these groups are shown in FIG. 4.

3.2 Connection processing

The hereby referred connection processing events have been shown in FIGS. 5 and 6. In each stage during the processing the service performance is ended, if the user (A-subscriber) closes the connection.

Service access by a free number

When the processing of the prepaid connection is started, CCAF announces of the call coming to the CCF. CCF and SSF announce together that the call is prepaid (the triggering key is the B-number - the service access number) and the control of the SCF is needed in order to achieve a successful connection. SCF analyses the B-number and connects it to the logic of the Prepaid Phone Card Service -service. SCF is developing a counter following the amount of the future con¬ nections and starting the service logic. The charging of the A-subscriber has been prevented (so that the SSF has been controlled to preserve each measuring pulse intended for the delivery to the A-subscriber) . SCF controls the SRF to give a welcome wish.

Identification

After the welcone wish the service asks the user to give the identification number. SCF controls the SRF to express the request and is prepared to receive the DM F-characters ended with #. SCF confirms/compares the announced identification number with the identification numbers registered into the SDF, and if the compatibility is obvious, the service perfor- mance is continued. SCF ensures that no connection is opera¬ ting with the same identifying number. This is made in order to avoid misleading balance announcements and charging er-

rors. If no connection is operating by the announced identi¬ fying number, the process is continued. In other cases the connection is cut off. If the user does not give all the required characters or gives too many of them, which leads to a non-compatible state in the number selection, the opportu¬ nity for a new announcement of the characters is given. The identification number can be given N times. If the reception time of the characters is exhausted, the contact processing is cut off.

The PIN/secret code request and confirmation can optionally be included in the service.

When the SCF receives a useful identification, it searches the customer data connected with it from the SDF. To the customer data belongs the card balance, expiration day and selectively individual announcement codes and the object number.

Operational time

After the user has been identified the service checks the system date and compares it with the expiration date. If the usufructuary right is no more valid (expiration date has al¬ ready been reached) the SRF gives the announcement, the con- nection event is generated to the call-log and the connection processing is ended. In another case the processing is con¬ tinued.

'Spoken money' announcement SCF continues the contact processing by controlling the SRF to announce the remaining balance. Optionally an individual announcement can be given.

Selection of the object number If the identified user enables only one object, the object number is given from the SDF data. The user cannot choose any

number and the service control continues by checking, whether there is enough balance for the forming of the connection.

If the identifying number/secret code enables many object numbers, the SCF guides the SRF to ask the user to give the object number. SRF receives the characters and sends them further to the SCF. SCF analyzes the characters and makes some confirmation procedures or changes if necessary. The selective object number can be covered in order to impede the calls to a specified number. If desired, also an announcement for the giving of the new object number can be informed.

Formation of a connection

If the number is permissible, the SCF verifies the balance. If there is enough balance for this connection, the SSF crea¬ tes a connection to the object number and forms the connec¬ tion. At the same time the SCF or the SSF begins to control the used time/balance.

If the object number is reserved, the service can selectively offer a further connection.

If the SCF (SSF) discovers that the balance is being exhaus¬ ted (the first limit value is attained), the SRF gives a warning announcement to the A-subscriber, but the connection can continue. A second warning is given, when the second limit value is attained. After the second warning announce¬ ment the user must rapidly end the connection or otherwise the service cut it automatically off. After the connection is ended, a report is created into the call-log and is brought for the deposition (to SDF or elsewhere) . The call-log record includes critical informts ion about the connection, as the starting time, ending time, used balance/time, A-number, C- number and the remaining balance.

When the connection is normally ended (the A-subscriber clo¬ ses the connection and some balance is left) the remaining balance is deposited to the SDF for future use.

The service can selectively offer a further connection. This can be introduced after the C-subscriber closes the connec¬ tion or some other trigger information is attained. First the SCF (SSF) generates a conventional connection record into the call-log and then the SRF guides the user to answer, whether he wants the further connection or not. If the answer is positive, the service continues the asking for the object number. In a negative case the service is ended.

4. Use of the cards 4.1 Card types

Cards can be made for different purposes: cards for one object cards for limited objects cards for free objects

Cards for one object or limited objects offer a different user interface than the cards for free objects. Cards for one object can give individual announcements and perform simple number modifications after the card number has been given. The connection is routed to a predetermined object (customer service of the publisher, technical support etc.), which enables a limited amount of the free connection time. The object number will not be informed to the user.

With the cards for limited objects the user can take a con¬ tact only to a few object numbers, or the C-numbers have been prevented to come out, e.g. 0700-numbers.

Cards for the free numbers do not limit the C-numbers. The service logic may confirm the given number by requesting a new entry, if a useless or wrong number is in question. The

user can then make further connections, until the total ba¬ lance is exhausted.

4.2 Possible ways to use a prepaid card

The cards can be made suitable for calling without any need for coins from the telephones liable to charges. Because the charging is not directed to the A-number in question, the connections/calls can be taken from any telephone supporting the DTMF (including the public telephones liable to charges) .

The cards can be used for the sales promoting purposes. The publisher can ask several cards from the service offerer and include an individualized announcement to the connection processing procedure. Such 'customized' cards can thus be given out for example by closing them into a product package. The customer buying the publisher's products gets the card connected with the product and hears thus when the card is used an announcement telling something about the publisher. The connections can be guided automatically to the customer service of the publisher, when a card for one object is in question.

5. User interface

5.1 Brief and simple explanation for the use of the service The user makes a call to the call number. The service gives a welcome announcement. The user entries the identification number and/or the secret code and the object number. The connection can be continued, until the card balance is ex¬ hausted. After the balance has been used up, the card is automatically passivated.

5.2 More detailed explanation of the user interface

FIG. 7 depicts the user interface. The lines 1 refer to the cases of the free object or limited objects. Lines 2 refer to the cards for one object, whereat these cards have predeter¬ mined object numbers.

The user procedure begins, when the user selects the call number of a specified prepaid service. After the call number has been chosen, the user hears the welcone announcement advicing the use of the service procedure (e.g. "Welcome to the xxx, please give the identification number and the secret code"). When the card number has been keyed in, the user hears some individual announcement and the amount of the remaining balance (e.g. "You have xxx balance/minutes/amount left") .

Then, if the card is intended for one object, the call is connected. If the object number has not been specified, the service asks for the C-number. If the given C-number is not in the table of non-permissible numbers, the connection is formed. In other cases the service asks the user to select the number anew.

If the object number is reserved, the service can selectively offer a further connection.

During the connection a checking is made, whether the remai¬ ning balance is still sufficient. If it reaches a certain limit value (2 limit values) a warning tone or tones is given to the A-subscriber. The warning tone tells that the balance is being exhausted.

A further connection can be allowed, if the card has not been marked as a card for one object. After the C-subscriber has closed the line, the service asks from the A-subscriber, whether he or she wants a further connection. If the answer is yes, the service requests the C-number (without asking the card number) .

If a further connection is not requested, the remaining ba¬ lance is deposited and the service ended.

If the balance is exhausted during the connection, a warning tone is given to indicate that the connection must be ended

during a few seconds. After the remaining time the connection is cut off and the execution of the service is stopped.

6. Control/generation of the card number Card numbers, i.e. identification number/secret codes, are generated by the generation and control function of the card. Numbers and the information associated with them (balance, expiration day, selective individual announcement codes) will be sent to the SMF, which installs them to the SDF so that the SCF can search this information in real time. The card numbers can also be cancelled by using this control function.

Card numbers are assembled in such a way that the information concerning the distribution channel of the card can be found from the number.

7. Customer service adaptation

The basic idea of the customer service adaptation is to crea¬ te for the customer service personnel a kind of a viewing tool for the connection event log and also the means to chan¬ ge the remaining balance, if necessary. By this tool the customer service personnel may handle the customer complaints and selectively the passive cards.

The adaptation makes it possible to check the connection log events associated with a specified card. A card number can be given and the time period can be determined, from which the events are searched for. As a result of the search connec¬ tions are attained, which have been made by using the card in question. In the report are shown the connection dates, coup¬ ling time, used balance and also the A- and C-numbers and the remaining balance after each connection. Based on this infor¬ mation the customer service personnel may discuss with the complainer in order to solve a possible discrepancy concer- ning for example the used balance.

The search is activated by the SMF starting the inquiry event from the SDF (or some other external database) . The requested log events are collected and sent to the SMF, who then pre¬ sents them to the SMAF.

When the balance must be changed, the customer service per¬ sonnel determines the desired balance by using the SMAF and the updating order is sent from the SMF to the SDF.

By using the customer service adaptation it is also possible to update the 'black list' of generally non-permissible ob¬ ject numbers, if these exist.

8. Collection of statistical data The SSF generates 'usual' CDR file after each connection, but because CDR-tickets are not collected and indicated immedia¬ tely after the connection (because of the system settings), they are not used for the debiting purposes. CRD-tickets can be used for informative purposes concerning the use of the whole service or a specified card type (e.g. sales promotion cards) . CDR-tickets can also be utilized as a security stora¬ ge for a long time period of connection events.

More statistical updating information concerning the use of the service can be collected by utilizing a statistical ap¬ plication functioning in the SMF and registering different things, as the total amount of the received calls (the coun¬ ter steps off always, when the realization of the service logic begins) and possibly the amount of wrong card number PIN-pairs etc.