Claims
- 1. A method of operating a telecommunications device, comprising the steps of:
detecting an incoming call or data message from a calling party to a called party; and using a called number or identifier to determine whether said called party is a universal service user for whom service is provided at no charge or substantially no charge.
- 2. The method of claim 1, further comprising the step of using a called number or identifier to determine the quality level of connecting to a flow-based steering and cost modeling system approved for a user.
- 3. The method of claim 1, further comprising the step of using a called number or identifier to determine one or a plurality of current sponsors or payers of that called number service in order to prepare and make a request for additional funds.
- 4. The method of claim 1, further comprising the step of using a called number to determine, as necessary, the location of the sponsored user.
- 5. The method in accordance with claim 22, further comprising the step of using a calling number to determine, as necessary, the location of the calling party needing services and/or additional funding so that a request for additional services and/or funds can be made.
- 6. The method of claim 1, further comprising the step of using called number or identifier to provide free security applications such as free digital signatures, PKI or encryption services.
- 7. The method of claim 1, further comprising the step of generating and sending a message to the calling party requesting authorization to charge said calling party an additional fee for connecting an additional party.
- 8. The method of claim 1, further comprising the step of generating a message to a sponsor requesting funding for the accompanying application to said called party.
- 9. The method of claim 1, further comprising the step of generating and sending a message to said calling party offering participation as a sponsor for the current and subsequent calls of this type for the sponsored party.
- 10. The method of claim 1, further comprising the step of using calling number or identifier, to provide free security applications such as free digital signatures, PKI, biometrics, or encryption services.
- 11. The method of claim 1, further comprising the step of generating and sending a message to the calling party requesting authorization to charge said calling party an additional fee for connecting an additional party.
- 12. The method of claim 1, further comprising the step of generating a message to a sponsor requesting funding for the accompanying application, service or product to said called party;
- 13. The method of claim 1, further comprising the step of generating and sending a message to said calling party offering participation as a sponsor for the current and subsequent calls of this type for the sponsored party.
- 14. The method in accordance with claim 1, wherein the step of using a telecommunications device comprises the step of using a central office switch.
- 15. The method in accordance with claim 1, wherein the step of using a telecommunications device comprises the step of using an intelligent peripheral connected to a central office switching system.
- 16. The method in accordance with claim 1, wherein the step of using a telecommunications device comprises using a tandem switch.
- 17. The method in accordance with claim 1, wherein the step of using a telecommunications device comprises using a cable television network.
- 18. The method in accordance with claim 1, wherein the step of using a telecommunications device comprises using a satellite system.
- 19. The method in accordance with claim 1, wherein the step of using a telecommunications device comprises using an intelligent user device such as a phone, computer, or monitoring device with either routing or switching capabilities built into it.
- 20. The method in accordance with claim 1, wherein the step of using a telecommunications devices comprises using a private network switch or PBX.
- 21. The method in accordance with claim 1, wherein the step of using a telecommunications device comprises using a virtual private network.
- 22. A method of operating a telecommunications device, comprising the steps of:
detecting an outgoing call or data message from a calling party to a called party; and, using an originating number or identifier to determine whether the calling party is a universal service user for whom service is provided at no charge or substantially no charge.
- 23. A method in accordance with claim 22 further comprising the step of using an individual identifier, PIN number, biometric, digital signature or secure means of identification, to determine whether said calling party is a universal service user for whom service is provided at no charge.
- 24. A method in accordance with claim 22 further comprising the step of using a calling number, or identifier to determine the quality level of sponsored service approved for that sponsored user.
- 25. A method in accordance with claim 22 further comprising the step of using a calling number or identifier to determine one or more of the current sponsors or payers of that called number service in order to prepare a request for additional funds.
- 26. The method of claim 22, further comprising the step of using a called number to determine, as necessary, the location of the sponsored user
- 27. A method in accordance with claim 22 further comprising the step of using a calling number to determine, as necessary, the location of the calling party needing services and/or additional funding so that a request for additional services and/or funds can be made.
- 28. A method in accordance with claim 22 further comprising the step of using a calling number or identifier to provide security applications, biometrics, digital signatures and PKI or encryption services.
- 29. A method in accordance with claim 22 further comprising the step of generating and sending a message to said calling party requesting authorization to charge a separate sponsoring party an additional fee for connecting an additional party.
- 30. A method in accordance with claim 22 further comprising the step of generating a message requesting funding for the accompanying application, service, or product to calling party.
- 31. A method in accordance with claim 22, further comprising the step of generating a message requesting funding for the accompanying application, service, or product to the calling party's sponsor.
- 32. A method in accordance with claim 22, further comprising the step of generating and sending a message to a calling party offering participation as a sponsor for the current and subsequent calls of this type for the sponsored party.
- 33. A method in accordance with claim 22, further comprising the step of generating and sending a message to a non-participating third party to allow the sponsored user during the communication to accept delivery of a value added service or product, such as information services.
- 34. A method of in accordance with claim 22, further comprising the step of generating and sending a message to a calling party requesting authorization to charge said calling party to connect and pay for an accompanying service.
- 35. A method in accordance with claim 22, further comprising the step of generating or sending a message to a third party requesting an additional fee for connecting said calling party to a called party and paying for the accompanying application.
- 36. A method in accordance with claim 22, further comprising the step of generating and sending a message to a sponsor offering participation as a sponsor for subsequent calls and communications.
- 37. A method of generating an additional interactive request for additional funding of communications services and/or applications supported by a communications routine, comprising the steps of:
monitoring a plurality communicating parties for a signal indicating that an additional service and/or application is requested, checking a database to see if the service and/or application is provided by the sponsor; and determining if the service and/or application is funded and if the services and/or applications are not funded connecting to the sponsor to request additional funds and/or services.
- 38. The method of claim 37 wherein the communications service and/or application may be provided from either a public or private network.
- 39. The method of claim 37 wherein the step of determining if the service and/or application is funded, further comprises the step of determining whether sufficient funds exist in a pre-paid account of the calling party, the called party or a third party to cover charges associated with the call and its applications.
- 40. The method in accordance with claim 1, wherein said step of using a telecommunications device comprises the step of using an intelligent peripheral connected to an identification verification service.
- 41. The method in accordance with claim 1, wherein said step of using a telecommunications device comprises the step of using a PBX, wireless PBX or virtual PBX.
- 42. The method in accordance with claim 1, wherein said step of using a telecommunications device comprises the step of using a network device for wireline local loop service or private network connections.
- 43. The method in accordance with claim 22, wherein said step of using a telecommunications device comprises the step of using a network device for wireless local loop service and attendant automatic location information.
- 44. The method in accordance with claim 22, wherein said step of using a telecommunications device comprises the step of using a network device for wireline long distance service whether over public or private networks.
- 45. The method in accordance with claim 1, wherein said step of using a telecommunications device comprises the step of using a telecommunications account, phone card account or virtual phone card account, which allows the sponsored user to be identified separately from or in addition to a specific telecommunications device.
- 46. The method in accordance with claim 10, wherein said step of using a telecommunications device comprises the step of using a telecommunications account, phone card account or virtual phone card account, which allows the sponsored user to be identified separately from or in addition to a specific telecommunications device.
- 47. The method in accordance with claim 1, further comprising the step of allowing a third party to restrict the communicating parties that are available to the sponsored user by entering the phone numbers, e-mail addresses, or websites of the allowed communicating parties into a database, directory or repository.
- 48. The method in accordance with claim 22, further comprising the step of allowing a third party to restrict the communicating parties that are available to the sponsored user by entering the phone numbers, e-mail addresses, or websites of the allowed communicating parties into a database, directory or repository.
- 49. The method in accordance with claim 1, further comprising the step of allowing a third party to restrict the services or objects that are available to the sponsored user by entering an identifier, speed dial number or voice recognizable name of an allowed service into a database, directory or repository and having the software provide the sponsored user the choice of using the allowed service by use of an identifier, speed dial number or voice recognized name of an allowed service.
- 50. The method in accordance with claim 22, further comprising the step of allowing a third party to restrict the services that are available to the sponsored user by entering an identifier, speed dial number or voice recognizable name of an allowed service into a database, directory, or repository and having the software provide the sponsored user the choice of using the allowed service by use of an identifier, speed dial number or voice recognized name of an allowed service.
- 51. The method in accordance with claim 1, wherein said incoming call is a voice call and its applications require additional funding or approval.
- 52. The method in accordance with claim 1, wherein said incoming call is a data call and its applications require additional funding or approval.
- 53. The method in accordance with claim 22, wherein said data call contains multimedia content and its applications requiring additional funding or approval.
- 54. A method for provisioning data services to customers comprising the steps of:
receiving a request from an initiating party to conduct telecommunications with a receiving party at a specified time; and determining whether said receiving party is a universal or sponsored service user for whom service is provided at no charge or substantially no charge.
- 55. A method in accordance with claim 54, further comprising the step of calculating a cost for provisioning a quality of service necessary to support said requested data communications.
- 56. A method in accordance with claim 54, further comprising the step of determining the cost of accompanying applications at said specified time.
- 57. A method in accordance with claim 54, further comprising the steps of:
generating and sending a message to said initiating party requesting authorization to charge a fee for connecting said calling party to said called party; receiving user input from said initiating party indicating said initiating party's authorization to charge said fee; and, provisioning data services to support said requested data communications at said specified time.
- 58. The method in accordance with claim 54 of calculating a cost for provisioning a quality of service supporting the accompanying applications further comprising the step of assessing the network elements and quality of service necessary to support said requested data communications.
- 59. The method in accordance with claim 54 wherein said step of calculating a cost for provisioning a quality of service further comprises a step of assessing a market demand on said network elements at said specified time.
- 60. The method in accordance with claim 1, wherein said step of determining whether said called party is a universal service user comprises the step of using a secure identifier.
- 61. The method in accordance with claim 54, wherein said secure identifier comprises a PIN code, digital signature, pseudo-random number generator, biometric or video transmission.
- 62. The method in accordance with claim 1, wherein said step of determining whether said called party is a universal service user further comprises the step of using a secure identifier.
- 63. The method in accordance with claim 57, wherein said secure identifier comprises a PIN code, digital signature, pseudo-random number generator, biometric or video transmission.
- 64. The method in accordance with claim 1, further comprising the step of using codes and speed dial numbers for allowed calling parties access only to those called parties allowed by sponsors to be contacted and only using those services provided to users by the sponsor or sponsors.
- 65. The method in accordance with claim 1, further comprising the step of restricting incoming calls whether voice, data, or multimedia, to those calls intended by a sponsor.
- 66. The method in accordance with claim 22, further comprising the step of restricting the availability of services or products to those chosen by a sponsor through the use of codes.
- 67. The method in accordance with claim 22, further comprising the step of restricting the quality of services or products to those chosen by a sponsor through the use of codes.
- 68. The method in accordance with claim 22, further comprising the step of restricting the duration of services or products to those chosen by a sponsor through the use of codes.
- 69. The method in accordance with claim 22, further comprising the step of restricting the bandwidth that chosen by a sponsor through the use of codes.
- 70. The method in accordance with claim 22, further comprising the step of restricting the availability of applications to those chosen by a sponsor through the use of codes.
- 71. In an information network, a method for patient or environmental monitoring comprising:
distributing secured communications agents throughout the network; enabling the secured communications agents to monitor the network for signals indicating a triggering event; enabling the secured communications agents to communicate with one another; collecting information gathered from the secured communications agents.
- 72. The method of claim 71, further comprising the step of enabling the secured communications agents to communicate with one another.
- 73. The method in accordance with claim 71 wherein the secured communication agents and associated applications are approved and/or paid for by sponsors.
- 74. The method in accordance with claim 73, further comprising the steps of
connecting to a called party's number; providing options of services that can be chosen at a fee; receiving input indicating selection of one or a plurality of the options; checking the input against a sponsored user's database to determine if the service is approved; and delivering or denying each of the secured communications agents and associated applications depending on approval.
Parent Case Info
[0001] This application is a continuation-in-part of U.S. patent application Ser. No. 09/942,930, filed Aug. 31, 2001, the entire disclosure of which is incorporated herein by reference.
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
09942930 |
Aug 2001 |
US |
Child |
10234840 |
Sep 2002 |
US |