SYSTEM AND METHOD FOR AUTHORIZING AND MONETIZING COLLECT CELLULAR TELEPHONE CALLS

Abstract
The collect cellular call identifies the cellular telephone carrier and called party cell phone. After determining whether the carrier and phone accept message service charges (SMS), a voice response module seeks positive authorization from the called party with the telephone. If positive, the system facilitates a connection between the calling party and the called party and initiates a predetermined billing charge assigned to the cellular telephone number. If the carrier or the cell phone is not enabled or if no authorization is obtained from the called party, the system facilitates a denial of completion signal. A timer monitors the length of the collect cellular call. Databases are accessed to locate the carrier and called cell phone number approved list of numbers and deny service list of numbers.
Description
FIELD

The present invention relates to a method, a system and programming instructions stored on computer readable medium for authorizing and monetizing collect cellular telephone calls.


BACKGROUND

In some situations, a calling party cannot easily establish a telephone telecommunications link with another called party. This is particularly true when the calling party is in a physically restricted environment such as a prison, hospital or other controlled facility. In this situation, the calling party must use a specially configured telephone which accesses an operator service provider (OSP) and that OSP then assists the calling party to reach the called party. In these situations, the called party's telephone must accept collect calls. In the absence of the collect call acceptance by the called party, the telephone telecommunications link is not established and the calling party is blocked from communicating over the telephone due to actions by the OSP (electronic denial of service).


OBJECTS

It is an object of the present invention to provide a system and a method for authorizing and monetizing collect cellular telephone calls.


It is a further object of the present invention to provide a system and a method wherein authorization requires a positive response, either a positive voice response or a positive touch tone response or a positive text message response, from the called party in possession of an identifiable cellular telephone.


It is a further object of the present invention to provide both internal and external databases with a white list or approved cellular phone list, capable of accepting cellular collect calls, and a black list or “service denied” list containing cellular telephone numbers which are blocked due to various considerations.


It is an additional object of the present invention to provide inspirational information to the called party as part of the collect cellular telephone call.


SUMMARY

The method of authorizing and monetizing a cellular collect call requires identifying the cellular telephone carrier associated with an identified cellular telephone having a certain telephone number. After determining whether the carrier and the cellular telephone is enabled to accept a message service charge (premium SMS), a voice response module is activated seeking a positive authorization from the called party in possession of the cellular telephone. If the carrier and the telephone is enabled and a positive response is obtained from the called party on the identified cellular telephone, the system facilitates a connection between the calling party and the called party and initiates a predetermined billing charge assigned to the cellular telephone number. If the carrier or the cell phone is not enabled or if no authorization is obtained from the called party, the system facilitates a denial of completion of the collect cellular telephone call (a refusal to connect the caller and the called party). A timing function is often activated upon facilitating the connection between the calling party and the called party. In order to determine whether a collect cellular telephone call will be accepted by an identified cellular telephone, databases are accessed and one of these databases includes prior billing records of cellular telephone numbers. The designated database has an approved list of cellular telephone numbers (a white list) and a denied-service list of cellular telephone numbers (a black list). In the denied-service list, the designated database typically includes an indicator referencing prior charge backs for the assigned cellular telephone number.





FIGURES AND TABLES


FIG. 1 is a system diagram of the telephone communications system.



FIGS. 2, 2A and 2B diagrammatically illustrate a block-diagram flowchart showing many functional aspects and software modules for the collect cell phone program.





DESCRIPTION

The present invention relates to a system, a method and programming instructions stored on computer readable medium for authorizing and monetizing collect cellular telephone calls. Similar numerals designate similar items throughout all the figures. The following Abbreviations Table shows several abbreviations used in the drawings and in the description of the present inventive system, method and program. The term “monetization” refers to utilizing a certain feature of cell phone telecommunications and collecting money employing that cell phone feature.


In the prior art, it is known that some cell phones and some telecommunications cellular telephone carriers permit cell phones, which are connected to the telecommunications carrier wireless network, to accept charges for short message charges or SMS charges. Particularly, SMS premium charges may be permitted by both the cellular carrier and the cell phone. Sometimes, a carrier handles SMS charges but will not permit certain cell phones on its network to accept SMS premium charges. SMS technology has facilitated the development and growth of text messaging and is sometimes called herein “message service communications protocol.”


The term “cellular telephone carrier” includes all types of telecommunications carriers delivering cellular or other types of wireless telephone service, either directly or through other telecommunications entities, to end-users with cellular phones or cellular service enabled devices. “Cell phones” include these cellular service enabled devices. The cellular telephone carrier may be a third party reseller of cellular phone services (a reseller of Verizon cell phone carrier services). The term “telephone number” includes numeric and alphanumeric and symbolic characters. A “cellular telephone number” also includes, in conjunction with the present invention and appended claims, either the cell phone number or any unique identifier which, by data processing methods, is linked or associated with the cellular telephone number.












Abbreviations Table
















Admin
Administrator


ANI
Automatic number identification service or system



commonly used to identify a called telephone unit


ASP
Application service provider—server on a network


API
Application programming interface


bd
Board


CCS
Cell phone connect service


chg
Charge, such as charge or invoice a customer for a phone call


ck
Check or confirm with


comm.
Communications, typically telecommunications


db
Data base


Disp
Display


doc
Document


equip
Equipment


ext
External


I/O
Input/output


IVR
Interactive voice response service, system or module


id
Identify


int
Internal


mem
Memory


msg
Message


OSP
Operator Service Provider, as part of a telecommunications



service or system


sms
Short message service communications protocol


ph
Phone


pgm
Program


P/W
Password


Rcd
Record or log into data in a database or record profile


re
Regarding or relating to


rei
Release


req
Request


rev
Review


rpt
Report


sel
Select


Serv.
Service


sys
System


t
Time


telecom
Telecommunications system or network


URL
Unifonn Resource Locator, x pointer, or other network locator


w/
With










FIG. 1 diagrammatically illustrates a system diagram of a telecommunications system. Calling party 10 has access to a land line 12 or a cellular telephone 14. In conjunction with the present invention, calling party 10 can only access telecommunications network 15 through an operator service provider OSP 16. The linkage or coupling or backbone of the telecommunications system 1 is graphically identified as telecommunications network 18. Network 18 may include land lines, satellites, fiber optics, the Internet (see VoIP applications) and wireless networks. Telecommunications network 18 is connected to cell phone connect service (CCS) 20, a called party cell phone carrier 22, cell phone carrier B 24, cellular carrier C 26 and phone service provider telecom 28.


The prior methodology enables calling party 10 via land line 12 to access OSP 16. The operator or automated IVR system at OSP 16 recognizes that calling party 10 wishes to access alternate called party 11 having land line 29 connected in some fashion to phone service provider 28 because caller 10 inputs the phone number of phone 29. The OSP 16 utilizes telecommunications network 18 to access phone service provider 28 which provider 28 then calls alternate called party 11. OSP 16 then inquires through phone service provider 28 whether alternate called party 11 will accept the collect call. If YES, the collect call is connected between caller party 10 and alternate called party 11. Phone service provider 28 bills the owner of telephone 29 for the collect call.


In contrast, called party 30 utilizing cell phone 31 may or may not be enabled or permitted to accept collect calls.


A reasonable number of cellular telecom carriers are unable or unwilling to bill the owner of cell phone 31 for collect calls. Sometimes in this patent description, reference is made to a “message service billing charge” which refers to charges billed to the account for cell phone 31 by cellular carrier 22. Premium SMS or message service billing charges may be $10 or higher per unit event (for example, 20 minutes of call time). Multiple message service billings or variable message service billings may be employed herein.


In contrast, a reasonable number of cellular telephones and/or cell phone carriers 22 do permit billing of SMS or message service billing charges to a particular cellular telephone account. Therefore, a determination must be made early in the “collect call” process to ascertain whether cell phone carrier 22 is enabled to accept message service billing and is enabled to charge their customers for such message service bills. Also, a determination must be made that a particular identifiable cellular telephone is enabled to accept these message service billing charges. Calling party 10 employing a telecommunications device with operator service provider 16, inputs a called cellular telephone number which may be associated with either cell phone carrier 22 or cell carrier B 24 or cell carrier C 26. Therefore, the system must ascertain what cell phone carrier is linked to the input cellular telephone number.


A diagrammatic billing cycle for the message service billing is shown by billing service computer program module 35 which sends a bill 36 (paper or electronic or charge slip to a bank or a credit card or a financial institution) to called party 30. Called party 30 then authorizes or permits withdraw of money or compensation which payment is ultimately logged or recorded by billing module 35 and cell phone carrier 22. Part of that money paid by called party 30 in the present invention is delivered to CCS 20 for compensation of the inventive system and method for collect cellular telephone calls. This process monetizes the collect cell phone call.



FIG. 2 diagrammatically illustrates functional block diagrams and cell phone program modules which may be employed in conjunction with the present inventive method and system. It should be noted that the sequence of operation of the collect cell phone program 48 in FIGS. 2, 2A and 2B may be rearranged in any sequence unless otherwise specified herein. Some modules may be combined with others or expanded to include features discussed herein. General comments regarding the system and method are found at the end of this detailed description of the preferred embodiment.


Collect cell phone program 48 begins by calling party 10 (FIG. 1) placing a cellular telephone collect call to operator service provider OSP 16. Calling party 10 inputs a cellular telephone number associated with an identifiable cellular telephone 31 (at step 50). The OSP 16 has an application programming interface (API) provided by and operating in conjunction with cell phone 7 connect service CCS 20. Effectively, OSP 16 and the hardware and software at OSP 16 either is a combination of software modules (provided by CCS 20) or communicates software and hardware at CCS 20 provided over telecommunications network 18. In any event, the OSP 16, in step 52, passes the called cell phone number to CCS 20. In step 54, CCS 20 accesses a database to determine the automatic number identification (ANI) service. The ANI service identifies which cell carrier 22, 24, 26 is associated with the input cellular telephone number. Technically, the ANI service is provided via external database 55. There may be one or many data stores or databases. The communications links 54A, 54B in FIG. 2 establish mechanisms and software access modules for returning this information ultimately to CCS 20 and to the API at OSP 16. Further, the API and/or the CCS 20 determines whether the input number from calling party 10 is an active cellular number and determines whether the cell phone carrier 22 accepts the message service billing, in the present situation, an SMS charge service.


In step 56, the called cellular telephone 31 of called party 30 is input or recorded in internal database 57 along with the cell phone carrier. The internal or designated database or data store is typically maintained by CCS 20 but may be an external database. As is known in the industry by person of ordinary skill in the art, the automatic number identification (ANI) service and external database 55 is publicly available through reasonable authorization procedures. Internal database 57 is internally run by CCS 20. Step 58 accesses the internal database 57 and activates a loss prevention system.


One example of an external database 57 is Neustar which enables an inquiring party via a data packet to determine the cell phone carrier for a particular cell phone telephone which then enables CCS 20 to determine whether that cell phone carrier will accept SMS or message service billing charges.


The loss prevention system operated on and utilizing internal database 57 at CCS 20 can be configured in many ways. The loss prevention system may include a call frequency analysis program (limiting frequent collect calls to a single phone), a white list of approved cell phone numbers, and a black list of disapproved or deny-service cell phone numbers. For example, if a collect cellular telephone call has been made and a bill 36 is sent out but then rejected or charged back by called party 30, the charge back is recorded in internal database 57 and the denied service or black list is updated to include the designated cell phone 31 which correlates to called party 30. Future calls to this denied-service number may be blocked or rejected. The frequency of calls over a predetermined period (monthly) and the total amount of calls during that period may be monitored by the internal loss prevention system and internal database 57 (the designated data store for CCS20). For example, AT&T, a cellular telephone carrier, limits premium SMS or message billings to no more than 5 calls per billing cycle. In contrast, T-Mobile, another cellular carrier, permits no more than 7 SMS or message service billings per billing cycle. The CCS loss prevention program limits collect calls within these parameters based upon carrier id and frequency of use in a set period of time.


Further, the internal database 57 and loss prevention system and software module may provide a white list or approved cell phone numbers which override other considerations. For example, if calling party 10 is in prison, and calling party 10's lawyer wishes to speak to prisoner on all occasions, the lawyer, as called party 30 and as owner and in possession of cell phone 31, may always authorize a collect cell phone call from calling party 10 to cell phone 31. This cell phone number is posted on the white list.


As a further enhancement, calling party 10 may be required to input a special code in order to confirm his or her ability to complete the collect cellular telephone call. Software modifications would then include a password cross-check.


Decision step 60 determines whether the cell phone carrier 22 is enabled to accept message service billing and whether called cellular telephone 31 is enabled to accept message service billing. If not, the NO branch from decision step 60 is taken, and, in step 71, the caller is returned to OSP 16 and a voice response or interactive voice response IVR module may indicate to calling party 10 that the collect cellular call is not available. Step 73 indicates that the IVR announces that the service is not available and a message to that effect is provided to calling party 10. Step 75 indicates that the OSP 16 may provide other options to caller party 10 such as calling land line 28 and alternate call party 11. Step 77 indicates the end of that branch of the API or software module.


Returning to decision step 60, if the YES branch is taken, in step 62 CCS 20 notifies OSP 16 that an active session ID is open. The ID is passed to OSP 16 as a signal for the “active session.” Optionally, the cell phone carrier identification signal may logged by OSP 16. Step 64 activates an IVR or interactive voice response to the called party in possession of cellular telephone 31. Step 66 continues the collect cell phone program from FIG. 2 to FIG. 2A. Step 68 places a message MSG 1A which is audibly heard or visibly presented via a text message to called party cell phone 31. One type of message 1A can be as follows: “You have a call from calling party 10 name. For a one-time charge of $9.99 charged to your wireless cell phone bill, you can be connected for up to 20 minutes of talk time. You will also receive an inspirational text alert. You must be 18 years or older to accept this call. Standard text message and air time charges may apply. To accept this call, press 1 or say YES.”


Decision step 70 determines whether called party 30 accepts or denies the call. If the called party denies the call either by saying NO, pressing a different number or taking no action (a negative opt in), the NO branch activates program module 81. A positive acceptance or a negative (no action) acceptance may be employed. Step 81 returns a signal to OSP 16 that the call in unbillable. Step 83 triggers a voice response “service not available” message to calling party 10. Step 85 notes that the branch ends.


Returning to decision step 70 if the called party possessing identified cell phone 31 indicates a positive response by pressing 1 or by saying YES, the IVR software system notes that positive response and in step 72, the IVR software module delivers second message 1B. An example of the second message may be as follows: “Thank you. By accepting this call, you are agreeing to the terms of this service which can be located at web address URL. $9.99 will be charged to your wireless phone bill and you will receive your inspirational text message shortly. To confirm these charges and be connected for up to 20 minutes of talk time, press 3.”


Another example, which referred to as the negative option, may be as follows: “Thank you. By accepting the call, you are agreeing to the terms of this service which can be located at web address URL. $9.99 will be charged to your wireless phone bill and you will receive your inspirational text message shortly.”


Decision step 74 determines whether the called party 30 in possession of identified cell phone 31 accepts the collect cellular telephone call. Positive or negative acceptance may be employed. If no, the system takes the NO branch which returns back to step 81 discussed above. If YES, the system activates software module 76 wherein the OSP 16 notifies the CCS 20 of the called party cellular telephone number, the active session ID and the price points for the collect call (these price points are optional). It should be noted that different prices may be assessed for different cellular telephone carriers and different calling parties 10. Therefore, different price points may be identified to OSP 16 as compared to CSS 20.


Step 78 activates the interactive voice response IVR message “we will connect you.” Step 80 then delivers an inspirational text message via text message (msg). A typical inspirational text follows: “No action is more fascinating than the action of self transformation.” Step 82 connects the calling party 10 through the OSP 16 and telecommunications network 18 and cell phone carrier 22 to identified cellular telephone 31. Substantially concurrently or shortly thereafter, the system in step 91 via CCS 20 generates a billing data packet or SMS premium charge linking the predetermined billing charge to the cellular telephone 31. This billing data packet (billing code, cell phone number, vendor id (CCS)) is sent effectively via telecommunications system 18 to cell phone carrier 22. In step 93, CSS 20 logs or records the call event in internal database 57. Step 95 ends the branch.


Returning to step 82 wherein the collect cellular telephone call is connected between calling party 10 and called party 30, either the OSP or the CCS establishes and initiates a timer clock in functional block 84. The activation of a timing function by the API at OSP 16 or the CCS 20 limits the duration of the collect cellular telephone call. As illustrated in FIG. 2A, jump step 86 continues the collect cell phone program on FIG. 2B. In step 88, the IVR may generate a time limit reminder to both calling party 10 and called party 30. This audio reminder may say “call will end in 2 minutes” or other predetermined call end time indicator. Step 90 shows that a “time up” has been reached on the functional timer clock. In step 92, the call is ended or disconnected by OSP 16 or CCS 20.


As explained above, the billing data packet or SMS premium charge is sent from CCS 20 to cell phone carrier 22. Periodically during a billing cycle, cell phone carrier 22 activates billing module 35 which generates bill 36 having the SMS charge or billing data charge. Called party 30 may pay this bill as shown by arrow 41 and ultimately a portion of this money is paid to CCS 20 as shown by arrow 43. The OSP may also be paid in a revenue sharing system. In the event called party 30 disputes the bill and refuses to pay, this event in the cellular service is called a “charge back.” CCS 20 will accept charge back data from cell phone carrier 22. This charge back data is then stored in internal database 57 and the cell phone number is placed on a black list or deny-service list.


In contrast, if the cell phone and the cell phone carrier 22 excepts the billing data packet and premium SMS charge, the cell phone number and the cell phone carrier ID is placed on an approved list or white list in internal database 57. By building a denied-service or black list and an approved list of cell phone numbers and cell phone carrier IDs, the CCS 20 can quickly connect calling party 10 to called party 30 without accessing multiple databases both internal to CCS 20 and external to their operation. External databases are generally available and accessible via telecommunications network 18. The use of internal databases or data shares reduces costs of operation.


It is important to note that the CCS 20 or the API placed on both OSP 16 and CCS 20 does not actually complete the call or deny the cell phone call but simply facilitates the completion of calls and denial of service connections. The facilitation of call completion utilizes a connection data packet sent to OSP 16. The denial by CCS 20 requires generating a call denied data packet to OSP 16. In any event, the connection data packet or call denied data packet results in completion of the call by OSP 16 or the refusal to complete the collect cellular telephone call by OSP 16.


Internal database 57 may record the called cellular telephone number, the associated cell phone carrier, an indication of the predetermined billing charge, and time-based data such as date-time stamp associated with a completed call, among other things. Internal database 57 associated with CCS 20 determines the presence of an earlier record of a cell phone number and either connects the call or denies the call by generating a connection data packet or a call denied data packet.


The system utilizes software modules which are computer programs and associated memory units to identify the cellular telephone carrier, and determine whether the carrier and the cellular telephone are able to accept the message service billing charge. The resulting enablement signal is generated by CSS 20 or the API operating in conjunction with OSP 16 and CCS 20. There may be two enablement signals, one for the cell phone carrier and a second for the identified cell phone or cell phone number. The IVR generates signal representing a request for authorization which are generally identified above as messages 1A and 1B. The IVR, as is known by persons of ordinary skill in the art, includes some system or software module to determine a positive audio or electronic response from call party 30 in possession of cellular telephone 31. The facilitation of a connection between OSP 16 and cellular telephone 31 is generated by a connection signal ultimately developed by CCS 20. A system for generating the billing charge or premium predetermined billing charge is provided by computer systems, memories and programs at CCS 20.


General Comments Regarding System and Method

The present invention relates to a cell phone collect calling system and method on a telecommunications network or in a computer network (LAN or WAN) and, potentially, over the Internet and computer programs, computer modules and an information processing system to accomplish this cell phone collect calling system. In addition to the computer implementation of the inventive aspects of this invention, a computer-based method is also encompassed herein.


It is important to know that the embodiments illustrated herein and described herein below are only examples of the many advantageous uses of the innovative teachings set forth herein. In general, statements made in the specification of the present application do not necessarily limit any of the various claimed inventions. Moreover, some statements may apply to some inventive features but not to others. In general, unless otherwise indicated, singular elements may be in the plural and vice versa with no loss of generality. In the drawings, like numerals refer to like parts or features throughout the several views.


The present invention could be produced in hardware or software, or in a combination of hardware and software, and these implementations would be known to one of ordinary skill in the art. The system, or method, according to the inventive principles as disclosed in connection with the preferred embodiment, may be produced in a networked telecommunications computer system having separate elements or means for performing the individual functions or steps described or claimed or one or more elements or means combining the performance of any of the functions or steps disclosed or claimed, or may be arranged in a distributed computer system, interconnected by any suitable means as would be known by one of ordinary skill in the art.


According to the inventive principles as disclosed in connection with the preferred embodiments, the invention and the inventive principles are not limited to any particular kind of computer system but may be used with any general purpose computer, as would be known to one of ordinary skill in the art, arranged to perform the functions described and the method steps described. The operations of such a computer, as described above, may be according to a computer program contained on a medium for use in the operation or control of the computer as would be known to one of ordinary skill in the art. The computer medium which may be used to hold or contain the computer program product, may be a fixture of the computer such as an embedded memory or may be on a transportable medium such as a disk, as would be known to one of ordinary skill in the art. Further, the program, or components or modules thereof, may be downloaded from the Internet of otherwise through a computer network.


The invention is not limited to any particular computer program or logic or language, or instruction but may be practiced with any such suitable program, logic or language, or instructions as would be known to one of ordinary skill in the art. The sequence of operation may be altered, steps or functions combined, and simplified or made more complex as necessary to carry out the functional purposes of the program step forth herein and in the claims. The functional software modules may be configured as APIs in hardware at the CCS and/or OSP as necessary to achieve the functional elements described herein. Without limiting the principles of the disclosed invention any such computing system can include, inter alia, at least a computer readable medium allowing a computer to read data, instructions, messages or message packets, and other computer readable information from the computer readable medium. The computer readable medium may include non-volatile memory, such as ROM, flash memory, floppy disk, disk drive memory, CD-ROM, and other permanent storage. Additionally, a computer readable medium may include, for example, volatile storage such as RAM, buffers, cache memory, and network circuits. Furthermore, the computer readable medium may include computer readable information in a transitory state medium such as a network link and/or a network interface, including a wired network or a wireless network, that allows a computer to read such computer readable information. The claims appended hereto are meant to cover modifications and changes within the scope and spirit of the present invention.

Claims
  • 1. A method of authorizing and monetizing a cellular telephone communication as a collect call, billed to an identifiable cellular telephone, over a telecommunications system, initiated by a calling party over said telecommunications system with an input of a cellular telephone number associated with said identifiable cellular telephone, said cellular telephone associated with a cellular telephone carrier, the method comprising: identifying said cellular telephone carrier associated with said cellular telephone number after a call is initiated by said calling party; determining whether said cellular telephone carrier and said cellular telephone is enabled to accept a billing charge for a message service communications protocol directed towards said cellular telephone; in the event said carrier and cellular telephone is enabled to accept said billing charge, seeking a positive response to an inquiry directed to a called party possessing said cellular telephone, approving the collect cellular telephone call initiated by said calling party; in the event of said positive response, (a) facilitating a connection between said calling party and said called party via said cellular telephone and said telecommunications system and (b) initiating a predetermined billing charge for said message service communications protocol and associating said predetermined billing charge with said cellular telephone number; and in the event of (a) a failure by said carrier to be enabled to accept said billing charge for the message service communications protocol; (b) a failure of said cellular telephone to be enabled to accept said billing charge for the message service communications protocol; or (c) an absence of said positive response to said inquiry directed to said called party possessing said cellular telephone, then facilitating a denial of completion of said collect cellular telephone call by said calling party to said called party.
  • 2. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 1 wherein said initiating said predetermined billing charge includes generating billing charge data with said cellular telephone number and sending said billing charge data to said cellular telephone carrier.
  • 3. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 1 including, in conjunction with said facilitating said connection, facilitating activation of a timing function to limit a duration of said connection between said connection between said calling party and said called party via said cellular telephone.
  • 4. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 1 wherein said identifying said cellular telephone carrier associated with said cellular telephone number interacts with an automatic number identification service.
  • 5. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 4 wherein said determining whether said cellular telephone carrier and said cellular telephone is enabled to accept said billing charge for said message service communications protocol includes accessing one or more data stores.
  • 6. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 5 including recording, in a designated data store, which is one of said one or more data stores, said predetermined billing charge, time-based data associated therewith and said cellular telephone number.
  • 7. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 6 wherein determining whether said cellular telephone carrier and said cellular telephone is enabled to accept said billing charge for said message service communications protocol includes accessing said designated data store and determining the presence of a record of said cellular telephone number after said call is initiated by said calling party.
  • 8. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 7 including maintaining, in said designated data store, one or both of an approved list of cellular telephone numbers and a deny-service list of cellular telephone numbers, said determining whether said cellular telephone carrier and said cellular telephone is enabled to accept said billing charge for said message service communications protocol includes accessing said approved list and deny-service list of cellular telephone numbers.
  • 9. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 7 including accepting charge-back data for a cellular telephone number and recording the charge-back cellular telephone number in said deny-service list in said designated data store.
  • 10. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 1 wherein said seeking said positive response includes an interactive voice response and data reply with said cellular telephone.
  • 11. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 1 wherein facilitating said connection between said calling party and said called party via said cellular telephone and said telecommunications system includes generating a connection data packet directed to said telecommunications system.
  • 12. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 1 wherein initiating said predetermined billing charge for said message service communications protocol includes generating a billing data packet directed to said cellular telephone carrier associated with said cellular telephone number.
  • 13. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 1 wherein facilitating said denial of completion of said collect cellular telephone call includes generating a call denied data packet directed to said telecommunications system.
  • 14. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 2 including, in conjunction with said facilitating said connection, facilitating activation of a timing function to limit a duration of said connection between said connection between said calling party and said called party via said cellular telephone.
  • 15. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 14 wherein said identifying said cellular telephone carrier associated with said cellular telephone number interacts with an automatic number identification service.
  • 16. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 15 wherein said determining whether said cellular telephone carrier and said cellular telephone is enabled to accept said billing charge for said message service communications protocol includes accessing one or more data stores.
  • 17. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 16 including recording, in a designated data store, which is one of said one or more data stores, said predetermined billing charge, time-based data associated therewith and said cellular telephone number.
  • 18. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 17 wherein determining whether said cellular telephone carrier and said cellular telephone is enabled to accept said billing charge for said message service communications protocol includes accessing said designated data store and determining the presence of a record of said cellular telephone number after said call is initiated by said calling party.
  • 19. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 18 including maintaining, in said designated data store, one or both of an approved list of cellular telephone numbers and a deny-service list of cellular telephone numbers, said determining whether said cellular telephone carrier and said cellular telephone is enabled to accept said billing charge for said message service communications protocol includes accessing said approved list and deny-service list of cellular telephone numbers.
  • 20. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 19 including accepting charge-back data for a cellular telephone number and recording the charge-back cellular telephone number in said deny-service list in said designated data store.
  • 21. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 20 wherein said seeking said positive response includes an interactive voice response and data reply with said cellular telephone.
  • 22. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 21 wherein facilitating said connection between said calling party and said called party via said cellular telephone and said telecommunications system includes generating a connection data packet directed to said telecommunications system.
  • 23. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 22 wherein initiating said predetermined billing charge for said message service communications protocol includes generating a billing data packet directed to said cellular telephone carrier associated with said cellular telephone number.
  • 24. A method of authorizing and monetizing a cellular telephone communication as a collect call as claimed in claim 23 wherein facilitating said denial of completion of said collect cellular telephone call includes generating a call denied data packet directed to said telecommunications system.
Parent Case Info

This is a divisional application based upon and claiming the benefit of priority of U.S. patent application Ser. No. 12/103,138, filed Apr. 15, 2008, claiming the benefit of priority of U.S. provisional patent application Ser. No. 60/935,634, filed Aug. 23, 2007. The content of both applications is hereby incorporated by reference.

Provisional Applications (1)
Number Date Country
60935634 Aug 2007 US
Divisions (1)
Number Date Country
Parent 12103138 Apr 2008 US
Child 13449308 US