Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
VOICE-OVER INTERNET PROTOCOL
Document Type and Number:
WIPO Patent Application WO/2002/023851
Kind Code:
A2
Abstract:
A method of providing VoIP calls, comprises providing a pre-paid card having unique identity information, which identify information is stored at a server; causing a customer to connect to a web site and inputting at least some of the identity information; confirming the identity information corresponds with a previously soted one; and enabling the user to commence a VoIP call to a desired remote terminal upon such verification being successful.

Inventors:
ALLIRAJAH BASKARAN (GB)
JUNANTO AWAL (GB)
Application Number:
PCT/GB2001/004043
Publication Date:
March 21, 2002
Filing Date:
September 10, 2001
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
VECTONE LTD (GB)
ALLIRAJAH BASKARAN (GB)
JUNANTO AWAL (GB)
International Classes:
H04M17/00; H04M3/38; H04M7/00; (IPC1-7): H04L29/00
Domestic Patent References:
WO1999062243A11999-12-02
WO1999009732A11999-02-25
Attorney, Agent or Firm:
SAUNDERS & DOLLEYMORE (9 Rickmansworth Road Watford Hertfordshire WD18 0JU, GB)
Download PDF:
Claims:
CLAIMS
1. A method of providing VoIP calls, comprising providing a token having unique identity information, which identity information is also stored at a server; causing a customer to connect to a web site and inputting at least some of the identity information; confirming that the identity information corresponds with a previously stored one; and enabling the user to commence a VoIP call to a desired remote terminal upon such verification being successful.
2. A method as claimed in Claim 1, wherein identity information comprises at least one identity number.
3. A method as claimed in Claim 2, wherein said identity information comprises a first identity code and a second identity code, one of which is obscured by a removable covering which can be removed to reveal said code.
4. A method as claimed in any preceding claim, wherein the token is credit card sized.
5. A method as claimed in any preceding claim, wherein the token is obtained for a monetary value and wherein the server stores the corresponding monetary value and wherein means are provided for monitoring the cost of calls made using the token and for changing the monetary value associated with the token in response thereto so that the value associated with the token at any time can be determined.
6. A method as claimed in Claim 5, wherein when a threshold level is reached, or when the monetary value reaches zero, no further calls can be made and/or any call in progress is terminated.
7. A method as claimed in any preceding claim, wherein the token is a prepaid calling card.
8. A method as claimed in any preceding claim, wherein at least one piece of identity information comprises the address of a unique web page to which the observer can connect.
9. A method of making voiceover Internet protocol calls, comprising purchasing a prepaid token provided with a unique identity code, and using said identity code to verify that a user is entitled to make calls, and allowing a verified user to make calls using VoIP from a service provider, whereby the token is purchasable without the purchaser having to give any credit or personal information.
10. Apparatus for making VoIP calls, comprising a token provided with unique identity information ; a first terminal capable of Internet access; a server storing details of the identity information and monetary value associated with the token and means for verifying an entered input of the identity information to confirm identity; means for enabling and transmitting VoIP calls and a remote terminal capable of receiving voice data or calls.
11. A method substantially as hereinbefore described, with reference to, and as illustrated by, the accompanying drawings.
12. Apparatus substantially as hereinbefore described, with reference to, and as illustrated by, the accompanying drawings.
Description:
VOICE-OVER INTERNET PROTOCOL This invention relates to voice-over Internet protocol (VoIP).

Voice-over Internet protocol is a well-known method of transmitting voice data over the Internet. It can be used for effectively making telephone-type calls between two terminals, which may be computers with suitable audio inputs (microphone) and outputs (speakers) which may be handheld devices, telephones or other devices which are connectable to the Internet via fixed lines, mobile lines or other ways.

The use of VoIP is ever increasing and is becoming a very important and major carrier of voice calls. It has great advantages which are well known, particularly in terms of cost of calls, especially from one country to another.

At present, the market for VoIP is immature. The majority of devices for accessing the Internet at the moment are desktop computers and many of these are not customised with suitable audio input devices, particularly of the headset type which are most useful with VoIP. Furthermore, there is presently a lack of knowledge of the potential of the VoIP.

More importantly, present solutions to VoIP all require a user to register with a . VOIP service provider, generally by registering at the service provider's web site, and then require the user to provide payment details on-line, such as providing credit card details.

Whilst the security of credit card transactions of this type is improving, there is still a reluctance to release credit card and other details, such as personal identification details, in this way. In addition to concerns about the security of their finances, many customers also would prefer to have more anonymity.

Furthermore, generally a user, when registering with a site, has to download particular software from the service provider in order to be able to use VoIP. There is again a reluctance amongst users to do this, due to concerns such as nervousness or inexperience of downloading software, worries about virus transmission and worries about the cost of on-line time.

According to the present invention there is provided a method of providing VoIP calls, comprising providing a token having unique identity information, which identity information is also stored at a server; causing a customer to connect to a web site and inputting at least some of the identity information; confirming the identity information corresponds with a previously stored one; and enabling the user to commence a VoIP call to a desired remote terminal upon such verification being successful.

Preferably, at least two sets of identity information are provided on the token in the form of a first identity code and a second identity code, one of which is obscured by an obscuring covering when the token is obtained by the customer and which covering the customer can remove to reveal the code. For example, it may be obscured by a thin layer of material which can be scratched off in the form of a scratch card-type lottery ticket, for

example.

Preferably, the token is obtained for a monetary value and the server stores the corresponding monetary value at which the token should be brought and means are provided for monitoring the cost of calls made using the token and monitoring the amount of monetary value left on the token to determine when a user is unable to make any more calls using the token.

The token is preferably a pre-paid card which can be purchased in any number of stores or other location. Pre-paid cards of this type are already well-known in relation to cards for use in conventional telephone calls over (PSTN), conventional telephone links.

In these known systems, a customer purchases a pre-paid card for an amount of money.

Then, in order to place the call, the user has to dial a server number then dial a unique identity code from the card, he then has to wait for a dialling tone and then can dial his call.

With embodiments of the present invention, a user simply has to connect to a web site and then to enter the unique identity code from the card. Nothing requires input which can identify the actual user at all.

Thus, as opposed to all previous uses of VoIP, a user can be completely anonymous since he can simply walk into a store (often newsagents, tobacconist or similar stores that might sell such cards), purchase a card using cash and he can then connect to the web site and use the card to make calls. He does not have to give any credit card information nor

any personal identification in order to use the service.

In a modification, the non-exposed identity number on the token represents a unique web page address. The user then simply has to reveal that number and then to connect to the particular web page indicated by that address. The web site may be a web page forming part of a larger site, which page is dedicated to that token. Upon a user connecting to that web page, the system assumes that that user has correctly obtained the address by purchasing the token, checks remaining credit details (ie amount of call time left) and then allows the user to immediately place the call without having to enter further card identity information.

Traditional telephone phone to phone pre-paid cards are generally sold to ethnic communities, travellers, students and similar groups of the population. The use of tokens in accordance with the present invention enables this market to be enlarged since it enables a way to use an on-line service with a very high level of security and anonymity. Such pre- paid cards can suit very different segments and provide new business opportunities using VoIP. These may comprise, for example, occasional Internet users who do not wish to give personal details and who may purchase, or use the cards at cyber cafés or retailers or corporate bodies such as companies who may wish to control expenses of their staff when they travel and to reduce communication costs.

It will be appreciated that the costs of making a VoIP call, particularly from one country to another are very significantly less than the equivalent cost of conventional phone

to phone calls. Thus, by using VoIP great savings can be made in call charges, as is well- known. The tokens may be printed cards or other media and advantageously advertise or promotional material may be applied by printing or otherwise onto the token either pertaining to the VoIP service provider or relating to third parties.

In non-deregulated telecom countries, users can directly benefit from the present invention, particularly users who do not have credit cards and who are at present unable to use VoIP services. Since Internet protocol transport can be used through electricity cables, the present invention may find use in less developed countries.

According to the present invention in a further aspect there is provided a method of making voice-over Internet protocol calls, comprising purchasing a pre-paid token provided with a unique identity code, and using said identity code to verify that a user is entitled to make calls, and allowing a verified user to make calls using VoIP from a service provider, whereby the token is purchasable without the purchaser having to give any credit or personal information.

Embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings, in which: Figure 1 shows a schematic embodiment of the invention ; and Figure 2 shows a flow chart.

A service provider for VoIP services provides a number of pre-paid calling cards 1,

each of which is provided with a unique or identity number (or PIN) 2 which unique identifies that card. Preferably, each card is also provided with a second ID number 3 for security checking, fraud prevention, etc. Each PIN is also stored in a database 4, the contents of which can be accessed, or included in, a server 5. The PINs 2 are selected at random or by using a suitable selection and/or PIN generating algorithm so that there are sufficient unique pins to satisfy the possible number of subscribers or users of the system.

Methods for generating such numbers are well-known. As each number is randomly or otherwise generated, that number is placed into the database and also placed upon a card.

As shown in Figure 1, pin 2 is then obscured on the card by a layer of an opaque coating 6, this may be a material which can be simply scratched off by a user after purchase, in similar manner to known pre-paid cards or scratch-type lottery cards for example to reveal the PIN.

The server 5 operates as a server for a web site, or a number of separate web pages relating to the service provider and also comprises software for enabling and transmitting voice-over IP data (ie voice calls). The term"server"may include a plurality of computers or processers. Each token is preferably in the form of a card, eg a laminated plastics card, typically of approximately credit card sized dimensions, but may be in other forms. The tokens may be issued by the service provider and sold at appropriate distribution outlets, such as retail outlets, cafés such as cyber cafés, travel agents, railway stations, airport terminals, or similar places where customers may wish to buy such cards. Each token has a face value of a particular monetary value, say $10 and this amount is stored, for each unique identity or PIN.

After a user has purchased a token or card, and revealed the previously obscured pin, he can begin to use voice-over IP services of the service provider without having to give any further credit or other identification information. From a suitable Internet access terminal 7, the user contacts the server 5 by entering the web site address of the server.

Preferably, this web site address will be pre-printed on the token or the card (shown as web site www. yyy. com in Figure 1) so that user has this information immediately to hand.

Once connected to the web site, the user is prompted to enter the PIN 2 and possibly also the second ID number 3 of the card 1. Once this information has been entered, it is checked against the information in the database and, if the number is correctly verified, the user is able to make VoIP calls. He may then be prompted to enter the telephone number, IP address or other contact address of the terminal to which he wishes to place a call and the call is then placed in conventional fashion. For example, once the call has been accepted, it is routed to an IP gateway to the closest IP switch to the receiver or remote terminal 8. This remote terminal may be a computer equipped with audio inputs and outputs or may indeed be a telephone connected to a conventional fixed telephone network, such as PSTN, ISDN, or a mobile telephone linked to a mobile network such as a 6 GPRS, llMTS or other mobile network. The VoIP data (ie voice data) is routed appropriately through the relevant network such as the Internet, PSDN, GSN or so on in order to connect to the remote terminal. Thus, the remote terminal need not be one which can itself normally access the Internet, it can be a standard telephone on a fixed or mobile network for example.

Whilst the remote terminal can be any type of terminal having audio input or output capabilities such as any sort of computer or intelligent terminal, handheld device, fixed or mobile telephone, the inputting terminal 7 will be a device which is capable of connecting to the Internet, whether directly or through a service provider. The nature of devices connectable to the Internet is increasing and so this terminal may be any of a wide variety of devices such as computers, landline telephones equipped with means for accessing the Internet, mobile telephones, handheld devices, personal digital assistants (PDAs) or indeed any other device capable of being connecting to the Internet.

Final delivery of the call on a non-computer-receiving (ie Internet connected) telephone system will be routed through the nearest local termination. The VoIP calls made will of course be two way calls so that both parties in the call can talk and listen.

The database 4 stores, in conjunction with each unique identifier of a token, details relating to monetary value of that token and the amount of call time which has been used.

When each VoIP call is made using that token, the cost of that call is determined and, as monetary value is used up, this is noted on the database. This may be done by calculating the cost of each call after the call is made and modifying the database record accordingly, or is done while the call is in progress so that the remaining credit allocated to the that token is continually updated. When a call terminates, the user may be provided with an indication of the amount credit left on his call that he can reuse in one or more subsequent calls using that token. Alternatively, this information may be provided to the user when he

next connects to make a subsequent call or this information may be otherwise handled.

When a token has run out of credit, it will be unable to use that token any more and the user must purchase a new token.

Alternatively, the user may be able to'top-up'the credit by buying more time on- line. However, this will usually require the user to give credit card and/or other personal information.

The cost of each call can be determined as a call is progressing by various known methods.

Referring to Figure 2, a schematic flow chart of the process is shown. A user purchases a token at Step 10. He connects to the web site of the VoIP service provider at Step 20. The unique identity code of the token is input at Step 30. The system (or server) performs a verification process at Step 40. If the code is incorrect, no call is made (45).

Note that if the card contains two numbers (eg PIN 2 and ID 3), then both of these may be required to be entered and the system may check that these correspond; the database will then store both numbers and an indication that these are matched; both must be present on a valid token.

If the token identity is verified then the call can be made (Step 50) provided sufficient credit remains (55). If there is insufficient credit, the call may not be made (60).

Also, credit may be continually checked during a call and when it has reached a low level (eg less than a threshold value) the user can, for example, be alerted or the call cut-off.

When a user wishes to make a call, if the threshold level is reached, he may not be allowed to commence the call.