System and method for determining computer access with electronic payment mechanism

ABSTRACT

A method of public access computing comprises providing a computer system for accessing computer software applications, and selectively permitting access to the computer system with an electronic payment mechanism. A selective access computer system comprises a computing workstation having at least one software application and a selective access mechanism connected to the workstation. The selective access mechanism is configured for obtaining electronic payment authorization for a user&#39;s financial instrument and for permitting selective access to the computer workstation upon payment authorization for the user.

THE FIELD OF THE INVENTION

[0001] The present invention relates to computer access systems, and inparticular, to computer systems with selective access controlled byelectronic payment mechanisms.

BACKGROUND OF THE INVENTION

[0002] Technology has revolutionized our lives by simplifying many tasksfor us. Moreover, with miniaturization, we take computers wherever we goin the form of notebook computers, personal digital assistants, andother techno gadgets. With these devices, we can take personal orbusiness information with us to almost any location for access at ourconvenience.

[0003] This technological revolution has produced an information age inwhich all types and volumes of information are widely available.Accordingly, most of us expect that all business and/or personalinformation should be available to them anywhere and at anytime. Networkcommunications, such as the internet and World Wide Web, facilitate thisseemingly limitless ability to deliver and obtain information.

[0004] Nevertheless, computer users still sometimes find themselves inplaces without their desktop or notebook computer, or without theirpersonal digital assistant. Unfortunately, this situation might arisewhen the computer user has extra time on their hands, such as waiting atan airport or a retail shopping center. When properly equipped, peoplecan use this otherwise lost time for making telephone calls, checkingemail, other communication tasks, or computing tasks. However, without amobile phone or notebook computer, this time is wasted.

[0005] Some public venues such as airports provide business suites withtelephones and even capability for internet communications includingemail. Nevertheless, these services tend to be quite limited. Moreover,all of these arrangements create issues of access and control regardingwho is using these devices, how the services are paid for, and how toprotect the devices from unauthorized use. Accordingly, many computerusers still yearn for complete freedom to compute and electronicallycommunicate in public settings, such as an airport, just as they wouldat home or at work.

SUMMARY OF THE INVENTION

[0006] A method of public access computing of the present inventioncomprises providing a computer system for accessing computer softwareapplications, and selectively permitting access to the computer systemwith an electronic payment mechanism.

[0007] A selective access computer system of the present inventioncomprises a computing workstation having at least one softwareapplication and a selective access mechanism connected to theworkstation. The selective access mechanism is configured for obtainingelectronic payment authorization for a user's financial instrument andfor permitting selective access to the computer workstation upon paymentauthorization for the user.

BRIEF DESCRIPTION OF THE DRAWINGS

[0008]FIG. 1 is a block diagram of a public access computing system,according to one embodiment of the present invention.

[0009]FIG. 2 is a block diagram of a locked user interface of a publicaccess computing system, according to one embodiment of the presentinvention.

[0010]FIG. 3 is a block diagram of an unlocked user interface of apublic access computing system, according to one embodiment of thepresent invention.

[0011]FIG. 4 is a flow diagram of a method of public access computingsystem, according to one embodiment of the present invention.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0012] In the following detailed description of the preferredembodiments, reference is made to the accompanying drawings which form apart hereof, and in which is shown by way of illustration specificembodiments in which the invention may be practiced. It is to beunderstood that other embodiments may be utilized and structural orlogical changes may be made without departing from the scope of thepresent invention. The following detailed description, therefore, is notto be taken in a limiting sense, and the scope of the present inventionis defined by the appended claims.

[0013] Components of the present invention may be implemented inhardware via a microprocessor, programmable logic, or state machine, infirmware, or in software within a given device. In one aspect, at leasta portion of the software programming is web-based and written in HTMLand JAVA programming languages, including links to graphical userinterfaces, such as via windows-based operating system. The componentsmay communicate via a network using a communication bus protocol. Forexample, the present invention may or may not use a TCP/IP protocolsuite for data transport. Other programming languages and communicationbus protocols suitable for use with the present invention will becomeapparent to those skilled in the art after reading the presentapplication. Components of the present invention may reside in softwareon one or more computer-readable media. The term computer-readable mediaas used herein is defined to include any kind of memory, volatile ornon-volatile, such as floppy disks, hard disks, CD-ROMs, flash memory,read-only memory (ROM), and random access memory (RAM).

[0014] Preferably, the user interfaces described herein run on acontroller, computer, appliance or other device having an operatingsystem which can support one or more applications. The operating systemis stored in memory and executes on a processor. The operating system ispreferably a multi-tasking operating system which allows simultaneousexecution of multiple applications, although aspects of this inventionmay be implemented using a single-tasking operating system. Theoperating system employs a graphical user interface windowingenvironment which presents the applications or documents in speciallydelineated areas of the display screen called “windows.” Each window hasits own adjustable boundaries which allow the user to enlarge or shrinkthe application or document relative to the display screen. Each windowcan act independently, including its own menu, toolbar, pointers, andother controls, as if it were a virtual display device. Other softwaretools may be employed via the window, such as a spreadsheet forcollecting data. The operating system preferably includes awindows-based dynamic display which allows for the entry or selection ofdata in dynamic data field locations via an input device such as akeyboard and/or mouse. One preferred operating system is a Windows®brand operating system sold by Microsoft Corporation. However, otheroperating systems which provide windowing environments may be employed,such as those available from Apple Corporation or IBM. In anotherembodiment, the operating system does not employ a windowingenvironment.

[0015] A selective access computing system and method of the presentinvention enables a member of the public to privately use a computersystem for a fee. The computer system preferably is located in a kioskof an airport or retail shopping center, or private suite in a businesssetting or hotel. The fee is paid through an electronic paymentmechanism such as an electronic credit card reader. To insure that onlypaying customers use the computer system, the computer system operatesin a locked mode until the computer system receives a signal from theelectronic payment mechanism that the customer has payment authorizationto use the computer system. In this locked mode, a screen saver on adisplay of the computer system informs prospective customers of servicesavailable from the computer system. Upon payment authorization, a userinterface desktop is revealed and the customer uses the computer systemincluding software applications (desktop or web-based), input/outputdevices such as a printer, scanner, and storage media devices, such as adisk drive.

[0016] When a customer is done using the computer system, then thecustomer is electronically charged a fee corresponding to the time ofuse and/or extent of use the software applications and input/outputdevices. Finally, upon the customer's termination from the computersystem, the computer system returns to the locked mode with display ofthe screen saver until the next paying customer activates the computersystem.

[0017] A selective access computing system and method according to thepresent invention is illustrated generally at 10 in FIG. 1. System 10includes computer workstation 20, financial instrument reader 22,financial database 24, input/output devices 26, office supply vendingmachine 28, and synchronization port 30. Computer workstation 20includes display 40, controller 42, resource tracker 44, program toolsmonitor 46, peripherals monitor 48, and storage media devices 52.Display 40 comprises user interface 60 including screen saver 62, webbrowser 64, and desktop 65. Resource tracker 44 includes system usagetimer 70, resource cost calculator 72, and input/output (I/O) requestcounter 74. Storage media devices 52 include CD drive 80 with writecapability 82, and disk drive 84. Computer workstation 20 also includesadditional input devices including keypad 90 and voice recognitiondevice 92, which are used for entering data into computer workstation 20and/or for manipulating operating system 10.

[0018] Input/output devices 26 include printer 100, scanner 102, fax104, copier 106, digital sender 108, and DVD player 116. One or more ofthese devices optionally are incorporated into a single device 110 suchas a multifunction printer. Using the well known features of thesedevices 26, an authorized user either produces an output from computerworkstation 20, such as a printed page from printer 100, or a facsimilemessage sent from fax 104, or receives an input into computerworkstation 20, such as an imaged paper from scanner 102.Synchronization port 30 permits docking a portable computing device tocomputer workstation 20 for exchanging data.

[0019] Network communication link 32, as used herein, includes aninternet communication link (e.g., the Internet), an intranetcommunication link, or similar high-speed communication link. In onepreferred embodiment, network communication link 32 includes an Internetcommunication link 33. Network communication link 32 facilitatescommunication between computer workstation 20 and network-providedsoftware applications such as application service providers.

[0020] Controller 42 of computer workstation 20 includes hardware,software, firmware or combination of these. In one preferred embodiment,controller 42 includes a computer server or other microprocessor basedsystem capable of performing a sequence and logic operations.

[0021] Display 40 of computer workstation 20 preferably includes a videomonitor that displays user interface 60. User interface 60 comprises agraphical interface through which a user can interact with program toolsmonitor 46 and peripherals monitor 48. Screen saver 62 of user interface60 appears on display 40 when computer workstation 20 is not in use foran extended period of time, and/or when system 10 prevents unauthorizedaccess to computer workstation 20. Screen saver 62 appears as aninformational or decorative screen on display 40. Web browser 64comprises any well-known network browser such as Internet Explorer® orNetscape Navigator® that is used to navigate the internet including theWorld Wide Web. Web browser 64 is available to authorized users ofcomputer workstation 20 for internet computing.

[0022] Desktop 65 comprises a graphical interface for allowing the userto access and operate various software and hardware features of computerworkstation 20 when system 10 is in an unlocked mode. Accordingly, for asystem administrator, desktop 65 displays access for setup andmaintenance of all features of computer workstation 20. On the otherhand, for authorized clients, desktop 65 only displays access to selectsoftware applications through program tools monitor 46, input/outputdevices 26 through peripherals monitor 48, and storage media devices 52.

[0023] Resource tracker 44 of computer workstation 20 includes systemusage timer 70, resource cost calculator 72, and input/output requestcounter 74. System usage timer 70 comprises a module that tracks thetotal amount of time that an authorized user uses system 10 so that theuser can be charged for the time of use. Input/output request counter 74comprises a module that tracks the number of requests by user to useinput/output devices 26 so that the user can be charged for use of eachinput/output devices 26, such as printer 100, scanner 102, fax 104,copier 106, digital sender 108, and DVD player 116. Resource costcalculator 72 comprises a module that communicates with system usagetimer 70 and input/output request counter 74 for determining the totalcost of the use of system 10 by an authorized user.

[0024] Program tools monitor 46 of computer workstation 20 comprises acollection of one or more software applications that are available toauthorized users of system 10 and includes a usage tracker for trackingwhich software applications are used by each user. Peripherals monitor48 comprises a module that controls each input/output device 26 andtracks which input/output devices are used by each authorized user.

[0025] Storage media devices 52 of computer workstation 20 include CDdrive 80 with write capability 82 and disk drive 84. Storage mediadevice 52 permits an authorized user to export or save data producedduring use of computing workstation 20 onto a diskette or CD, and/or toimport or retrieve data from a CD or diskette into computer workstation20 for use in one of the software applications available through programtools monitor 46.

[0026] Financial instrument reader 22 comprises any device capable ofreading a financial instrument (e.g., credit card, check, etc.) with anelectronically readable code or identification and communicating withfinancial database 24 for determining if the financial instrument isvalid and in good standing, as well as for requesting that a charge beapplied against the financial instrument. For example, financialinstrument reader 22 preferably comprises a credit card/debit cardreader that performs these functions by electronically reading anmagnetic code on the back of the card and then using a phone line tocommunicate with financial database 24. Financial database 24 preferablycomprises a financial institution and/or financial services network thatelectronically carry out the financial transaction with financialinstrument. Financial instrument reader 22 is in communication withcomputer workstation 20 so that financial instrument reader 22 receivesan amount to be charged to a financial instrument and so that financialinstrument reader 22 can send a signal to computer workstation 20 that apotential user has received payment authorization with their financialinstrument.

[0027] As shown in FIG. 2, user interface 60 of display 40 includesscreen saver 62. Screen saver appears on display 60 when system 10 is ina locked mode and prevents unauthorized access to system 10 whilesimultaneously providing information to prospective customers about theservices of system 10. Screen saver 62 includes login function 150,tools preview/pricing function 152, and demonstration function 154.Tools function 152 includes peripherals listing 160, programs listing162 and system package listing 166. Tools preview/pricing function 152provides a listing of all software application and peripheralinput/output devices available for use with system 10, as well as anassociated cost for use of each software application and/or device.

[0028] Login function 150 permits an authorized user to login with theirname or an account number. The account number is used to identify theauthorized user and optionally is used for billing purposes toelectronically debit a financial instrument of the user that is alreadyknown to system 10 through a prior contact with the user. In thisarrangement, the user need not swipe their financial instrument throughreader 22 each time that a system 10 is accessed. Rather, by entering anaccount number with a password, an authorized user is recognized and theuser is charged for use of system 10 to that account number and thensent an invoice or electronically billed accordingly.

[0029] Peripherals listing 160 includes a listing 180 of peripheralinput/output devices 26 (FIG. 1) such as a printer, fax, copier,scanner, digital sender and/or other devices available for use withcomputer workstation 20. A cost 182 is associated for each use of one ofperipheral input/output devices 26. Programs listing 162 includes alisting of software applications 186 such as a word processor,spreadsheet program, presentation program, financial program, and/orother software available for use with computer workstation 20 includingapplication service provider software available through networkcommunication link 32. A cost 188 is associated with the use of eachprogram 186. System package listing 166 includes a listing of a group ofperipheral input/output devices 26 and/or programs 186 that are offeredat a package cost for convenience.

[0030] Finally, demonstration function 154 comprises a module thatprovides a demonstration and/or tutorial to a prospective user on all ofthe features of system 10, specifically identifying which softwareapplications and input/output devices are available during use of system10.

[0031] Of course, screen saver 62 optionally can provide much less ormore information, depending on the type of services provided or thelocation of the computer system 10. For example, screen saver 62optionally includes colorful promotional material for attracting theattention of patrons passing by computer system 10.

[0032] As shown in FIG. 3, user interface 60 of display 40 furthercomprises desktop 65. Desktop 65 displays tools that are available to anauthorized user of system 10 and computer workstation 20 when system 10is in its unlocked mode. Desktop 65 includes program tools monitor 200,peripherals monitor 202, and storage media monitor 204. Program toolsmonitor 200 includes a set of keyword functions for activating asoftware application associated with each keyword, such as wordprocessor function 210, spreadsheet function 212, presentation function214, alternate program function 216, and application service provider218. Application service provider 218 identifies a software applicationthat is operable in system 10 and that is provided by a service providerthrough web browser 64 and network communication link 32. The appearanceof desktop 65 is not limited to the arrangement shown in FIG. 3. Forexample, desktop 65 optionally appears as a Windows-based desktop withicons representing keyword functions for activating particular softwareapplications or input/output devices 26.

[0033] Peripherals monitor 202 includes a set of keyword functions foractivating a peripheral input/output device associated with eachkeyword, such as printer function 220, scanner function 222, copierfunction 224, other function 226, and fax function 228. Finally, storagemedia monitor 204 includes a set of keyword functions for activating astorage media device such as CD read/write drive 230 and disk drive 232for importing and exporting data to and from system 10 relative todiskette and/or CD.

[0034] Storage media monitor 204 optionally is used for temporarilyusing a software program from a CD or diskette for operation on computerworkstation 20. For example, the software program can temporarily fullyinstalled onto computer workstation 20 during the authorized user's useof system 10 and then fully uninstalled from computer workstation 20 aspart of the log off process from system 10. Alternatively, the softwareprogram is operated from CD read/write drive 230 and/or disk drive 232with only a minimal number of software components temporarily loadedonto computer workstation 20. Computer workstation 20 optionallyincludes its own security measures such as anti-virus software toprotect itself from malicious hackers and users.

[0035] A method 300 of public access computing of the present inventionuses system 10 and permits a user to operate computer workstation 20 foraccessing software programs in program tools monitor 200 and peripheralinput/output devices 26 in peripherals monitor 202. Method 300 includesa first step 302 in which system 10 rests in a locked mode whiledisplaying screen saver 62 on display 60. In the locked mode, computerworkstation 20 is up and running but desktop 65 (FIG. 3) includingprogram tools monitor 200 and peripherals monitor cannot be viewed oroperated by a user at computer workstation 20. Instead, screen saver 62(FIG. 2) is provided in place of desktop 65 and merely illustrates whatservices are available from system 10.

[0036] In a next step 304 of method 300, the user enters logininformation such as a temporary user id or account number, and obtainsauthorization to pay for services from system 10 with computerworkstation 20 through financial instrument reader 22. In particular, auser passes a credit card, debit card, or other electronic financialinstrument through financial instrument reader 22, which contactsfinancial database 24 to verify the user's ability to pay electronicallyfor the services. Upon a successful payment authorization, financialinstrument reader 22 sends a signal to computer workstation 20 that theuser is financially authorized to use system 10.

[0037] In response, the next step 306 of method 300 includes unlockingsystem 10 and removing screen saver 62 to reveal desktop 65. At the sametime, in a related step 310, controller 42 starts system usage timer 70for tracking the amount of time that user uses system 10.

[0038] With desktop 65 (FIG. 3) available to the user, the user thenselects a tool(s) such as software program and/or peripheral device byactivating one of the listed keyword functions in program tools monitor200 and/or peripherals monitor 202 and operates those tools (step 312).In a related step (314), for each program request and/or peripheralrequest, usage is tracked with input/output request counter 74. After orduring operation of the tools of system 10, a user saves data from useof the software programs and/or peripheral devices to storage media suchas a CD through CD read/write drive 230 or a diskette through disk drive232 (step 316).

[0039] The user then logs off system 10, terminating use of any softwareprograms and/or peripheral devices. This action triggers system 10 toreturn to a locked mode in which desktop 65 is inaccessible and screensaver 62 appears on user interface 60 of display 40. At this point,resource cost calculator 72 combines data from system usage timer 70 andinput/output request counter 74 to produce a total cost for the use ofsystem 10 (step 320). In a final step (330), system 10 charges the userthis cost through financial instrument reader 22 and auxiliary printer30 prints out a receipt for the user. Alternatively, as previouslymentioned, system 10 bills the user through an established accountassociated with the account number entered through login function 150.

[0040] A system and method for public access computing of the presentinvention permits computer users to access their favorite softwareprograms and peripheral devices without having their own computer ordevices with them. System 10 conveniently provides a computing systemthat has all the necessary tools for user and in convenient locationssuch as airports, retail shopping centers, libraries, etc. The computeruser pays for this service through an electronic financial instrumentsuch as a credit card, alleviating the necessity for a supervisor orcashier to manage the computer system 10 and/or receive payment forservices.

[0041] While specific embodiments have been illustrated and described,herein for purposes of description of the preferred embodiment, it willbe appreciated by those of ordinary skill in the art that a wide varietyof alternate and/or equivalent implementations may be substituted forthe specific embodiments shown and described without departing from thescope of the present invention. Those with skill in the chemical,mechanical, electro-mechanical, electrical, and computer arts willreadily appreciate that the present invention may be implemented in avery wide variety of embodiments. This application is intended to coverany adaptations or variations of the preferred embodiments discussedherein. Therefore, it is manifestly intended that this invention belimited only by the claims and the equivalents thereof.

What is claimed is:
 1. A method of public access computing comprising:providing a computer system; and permitting a user access to at leastone of a software application and an input/output device of the computersystem only after payment authorization has been obtained for the user.2. The method of claim 1 wherein the using step further comprises:displaying a screen saver on a monitor of the computer system forpreventing access to the software applications until paymentauthorization for a user is received through an electronic paymentmechanism.
 3. The method of claim 2 wherein the displaying step furthercomprises: displaying icons representing the software applicationsavailable in the computer system; displaying information regardingprices for using the computer system; and displaying demonstrations ofthe software applications.
 4. The method of claim 1 wherein thepermitting step further comprises: displaying a desktop user interfaceon a monitor of the computer system to permit access to the at least onesoftware application and input/output devices.
 5. The method of claim 4wherein the displaying step further comprises: providing activatablekeyword functions for each software application and input/output deviceincluding at least one of a word processor function, spreadsheetfunction, presentation function, application service provider function,printer function, scanner function, copier function, facsimile function,and digital sender function.
 6. The method of claim 1 and furthercomprising: tracking use of the computer system for billing purposesincluding at least one of the following parameters: time of use of thecomputer system; time of use for each software application; time of useof each peripheral input/output device; quantity of job requests to eachperipheral input/output device; and quantity of each item produced byeach peripheral input/output device.
 7. The method of claim 6 whereinthe tracking step further comprises: counting requests to peripheralinput/output devices; and calculating the total cost to the userincluding time of use for the computer system and the number ofinput/output requests.
 8. The method of claim 1 wherein the permittingstep further comprises: obtaining authorization from a financialservices database for electronically charging a user's credit card orbank-issued debit card.
 9. The method of claim 1 wherein the using stepfurther comprises: locking the computer system with a screen saver toprevent its use when no authorization for use of the computer system ispresent; and unlocking the computer system for use of the softwareapplication and the input/output device by displaying a desktop displayupon a user receiving payment authorization through the electronicpayment mechanism.
 10. The method of claim 1 and further comprising:providing the input/output devices as at least one of a scanner, aprinter, a facsimile machine, and a copier, each being configured forconveying input and output from the computer system.
 11. A method ofselective public access computing comprising: providing a computersystem with at least one software application; displaying a userinterface on a display of the computer system including a representationof the at least one software application of the computer system whilepreventing access to the at least one software application; obtainingelectronic payment authorization for a financial instrument; permittingaccess to the at least one software application based on paymentauthorization; tracking use of the computer system including thesoftware application and input/output devices of the computer system;charging the financial instrument with a fee based on the tracking step;and terminating access to the at least one software application uponnotification from the user.
 12. A selective access computer systemcomprising: a computing workstation having at least one softwareapplication; and a selective access mechanism for obtaining electronicpayment authorization for a user's financial instrument and forpermitting selective access to the computer workstation upon paymentauthorization for the user.
 13. The computer system of claim 12 whereinthe selective access mechanism includes: a credit card and bank-issueddebit card reader connected to the computing workstation for obtainingpayment authorization; and a resource tracker configured for determiningan amount to be charged to the user based on at least one of a totalamount of time that the computer system is used and a number of requeststo input/output devices connected to the computer workstation.
 14. Thecomputer system of claim 12 wherein the computer workstation furthercomprises: a program monitor configured for permitting selection of theat least one software application; and a peripheral input/output monitorconfigured for permitting selection of at least one input/output device.15. The computer system of claim 12 wherein the selective accessmechanism further comprises: a screen saver configured for appearing ona display of the computing workstation to prevent access to thecomputing workstation until payment authorization is received.
 16. Acomputer access system comprising: an electronic payment mechanism forobtaining electronic payment authorization for a financial instrument; acontroller in communication with the electronic payment mechanism andconfigured for connection to a computer system and for permittingselective access to the computer system based on payment authorizationthrough the electronic payment mechanism.
 17. The computer access systemof claim 16 wherein the electronic payment mechanism further comprises:a financial instrument reader configured for electronically readingfinancial instruments including credit cards and debit cards.
 18. Aselective access computer system comprises: an electronic paymentmechanism configured for obtaining electronic payment authorization fora user's financial instrument; at least one input/output device; acomputer workstation including: at least one software application; and aresource tracker for determining a cost of using the computer systembased on an amount of time of use and quantity of use of softwareapplications and input/output devices; and a user interface configuredfor permitting access to at least one of the software application andthe input/output devices only upon payment authorization through theelectronic payment mechanism.
 19. A computer-readable medium havingcomputer-executable instructions for performing a method of permittingselective computer system access, the method comprising: providing acomputer system; and permitting access to at least one of a softwareapplication and an input/output device of the computer system only afterpayment authorization has been obtained for the user.
 20. A computeruser interface comprising: a screen saver display configured forappearing on a monitor of a computer system when a user is notfinancially authorized to use the computer system and configured forpreventing use of the computer system; and a desktop display configuredfor appearing on a monitor of a computer system when a user isfinancially authorized to use the computer system and configured topermit access to and operation of the computer system.