Method and System for Providing Long Distance Service

ABSTRACT

A system and method of providing long distance service products to users. Post-paid debit calling cards are purchased on-line by a customer or user and the user is billed monthly, along with other service charges. The calling card account, however, is debited as it is used. Since the fee for the account is charged against an existing customer account, fraudulent purchases are reduced. In an embodiment, the purchaser is provided access to a restricted web page on the Internet using a user name and password, where the user name and password are associated with the customer&#39;s account. Once accessed, the user is able to purchase “post-paid debit calling cards.” Upon sending a request to purchase such a calling card, the user is provided a toll free number and PIN. Subsequently, the purchase is logged and the fee is added to the customer&#39;s monthly bill.

CROSS-REFERENCE TO RELATED APPLICATION

The current application is a continuation of U.S. patent applicationSer. No. 10/171,313 which issued as U.S. Pat. No. ______ on ______ whichis hereby incorporated by reference in its entirety.

FIELD OF THE INVENTION

This invention relates to the field of telecommunications, and inparticular systems and method of providing long distance service. Moreparticularly still, the present invention relates to the use of callingcards and methods of providing calling card services to customers.

BACKGROUND OF THE INVENTION

Long distance service is a valued service. It allows one to call outsideof a geographic region. That is, most telephone service providersprovide two types of service: local service and long distance service.Long distance has historically been relatively more expensive due tocomplexities in connecting callers from geographically remote regions.

Given the expense of long distance, many telephone service companiesprovide separate service options, i.e., methods of obtaining longdistance service. For example, a popular and convenient service optionrelates to being able to call long distance from a home telephone. Inessence, the home telephone service provider provides access to bothlocal and long distance. All calls are monitored and any fees incurredare billed on a monthly basis. This “post-paid” system is highlyconvenient to users.

As an extension to this service, many users have post-paid “callingcards.” The calling cards have a toll free number and a personalidentification number (PIN) that allows the user to access long distancefrom a phone, other than the home phone, and have the fees billed alongwith the monthly bill. Such post-paid calling cards are extremelypopular with parents of children living away from home because thechildren have long distance access and the parents are able to pay thebills. One drawback with existing post-paid calling cards is that usersfrequently abuse their long distance privileges. Many students or othersusing the calling cards will run up the fees and make it extremelydifficult for the person responsible for paying the bill to fulfilltheir responsibility. As a result, “pre-paid” calling cards have beengaining in popularity. Pre-paid calling cards are limited long distanceaccounts where the purchaser provides money up front for a limitedamount of long distance service, i.e., a limited number of minutes. Inexchange for the money, the purchaser is provided a toll free number anda PIN number, similar to the post-paid option, which allows thepurchaser to make long distance calls. Although referred to as calling“cards,” the card itself is merely a way to carry the toll free numberand PIN in a convenient way. In this case, however, the service providermonitors the number of minutes used, and once the pre-paid limit isreached, the service is terminated. Once terminated, the toll freenumber and PIN combination is no longer valid. Such a debit featureprevents users from abusing long distance. An additional benefit relatesto the fact that these can be sold over the Internet.

Pre-paid calling cards suffer from at least two drawbacks, however.First, with pre-paid calling cards customers have multiple bills, onefor their local service and home telephone long distance service and onefor their calling card long distance service. Some customers may evenreceive separate bills for their local and long distance services.Second, and quite importantly, the pre-paid calling cards tend to befraudulently acquired. For instance, since pre-paid calling cards aresold independently, any user can purchase a pre-paid calling cardwithout any affiliation to a long distance carrier. Consequently, manyfraudulent purchases have occurred, especially where the purchase hasoccurred over the Internet. For example, when calling cards are offeredover the Internet, the typical purchase involves a purchaser requestinga calling card, the purchaser providing a credit card as a means ofpayment. In response to validating the credit card, a toll free numberand PIN combination, i.e., a “calling card” is transmitted back to thepurchaser. Unfortunately, however, the calling cards used are oftenstolen or are otherwise being used without permission. Since there is noaddress or name of the actual purchaser, either the credit card companyor the long distance carrier is forced to pay for these losses.

It is with respect to these and other considerations that the presentinvention has been made.

SUMMARY OF THE INVENTION

The present invention relates to a system and method of providing apost-paid debit calling card account that can be purchased on-line by acustomer, yet the fee occurs on the customer's monthly bill. The callingcard account, however, is debited as it is used so that abuse iscurtailed. Further, since the fee for the account is charged against anexisting customer account, fraudulent purchases are reduced. In anembodiment, the purchaser is provided or sets up an on-line accountwherein the customer accesses a restricted web page using a user nameand password, where the user name and password are associated with thecustomer's account. Once accessed, the user is able to purchase“post-paid debit calling cards.” Upon sending a request to purchase sucha calling card, the user is provided calling card information, which mayinclude, for example a platform access phone number, such as a toll freenumber, and a personal identification number (PIN). Subsequently, thepurchase is logged and the fee is added to the customer's monthly bill.

In accordance with a particular embodiment, the present inventionrelates to a system and method of providing long distance telephoneservice to a user that involves receiving a request to purchase longdistance telephone service, the long distance service comprising apost-paid debit account. Upon receiving the request the inventionreceives user identification information such that determination may bemade as to whether the user is trustworthy. Upon determining that theuser is trustworthy, the invention provides the user with long distanceservice access information, such as post-paid debit account informationand then bills the user in a predetermined manner for the long distanceservice. The invention typically deems the user as trustworthy if theuser has an existing account.

With respect to other embodiments, the predetermined method or mannerfor billing the user may comprise sending a bill to a physical location,such as an office or home or the bill may be sent to the user via email.In accordance with certain aspects, the post-paid debit accountinformation relates to a platform access number and a personalidentification number combination.

In accordance with other aspects, the present invention relates to acomputer system for providing long distance service to a user inresponse to a received request wherein the system has a server layer forreceiving a request to access a secure link, the request having clientidentification information. The server layer also has a determinationmodule for determining whether the client is trustworthy and a processorder module for processing an order for a debit long distance serviceproduct upon determining the client is trustworthy, wherein the clientis deemed trustworthy upon identifying a pre-existing account having apredetermined method of billing. The server layer also has acommunication module for communicating a request to a platform layer,the platform layer providing the debit long distance service product tothe server layer in response to the request. Further, the server layeralso has a billing module for billing the pre-existing account accordingthe predetermined method of billing, such as by sending a physical billto a physical location or by sending an electronic bill either byproviding access to the account online and/or by providing an emailedelectronic version of the bill, among others. Additionally, the debitlong distance telephone service product may comprise a platform accessnumber, such as a toll free number and a personal identification numbercombination.

The invention may be implemented as a computer process, a computingsystem or as an article of manufacture, such as a computer programproduct. The computer program product may be a computer storage mediumreadable by a computer system and encoding a computer program ofinstructions for executing a computer process. The computer programproduct may also be a propagated signal on a carrier readable by acomputing system and encoding a computer program of instructions forexecuting a computer process.

A more complete appreciation of the present invention and itsimprovements can be obtained by reference to the accompanying drawings,which are briefly summarized below, to the following detaileddescription of presently preferred embodiments of the invention and tothe appended claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a distributed network system that incorporatesaspects of the present invention.

FIG. 2 illustrates a computer system that may be used according toparticular aspects of the present invention.

FIG. 3 is a block diagram illustrating functional components of thesystem shown in FIG. 1 incorporating aspects of the present invention.

FIG. 4 illustrates a flowchart of functional operations related toreceiving requests from a client system such as the client system shownin FIG. 1 and responding to such requests from the client to providelong distance service options in accordance with an embodiment of theinvention.

FIG. 5 illustrates a flowchart of functional operations related toserver-side operations in processing requests for long-distance service,in accordance with a particular embodiment of the invention.

DETAILED DESCRIPTION OF THE INVENTION

A distributed environment 100 incorporating aspects of the presentinvention is shown in FIG. 1. The environment 100 relates to adistributed network having at least one client computer system 102 thatcommunicates with at least one server computer system 104. The clientcomputer system 102 and the server computer system 104 communicate usinga communication protocol over the distributed network. In oneembodiment, the communication utilizes the Internet 106. The servercomputer system 104, in turn, communicates with a platform provider 108,which maintains and manages account information for long distanceservices.

Through the server computer system 104, the client computer systemaccesses a secure communications link, e.g., a secure website or asecure web page. Accessing the secure link provides the client computersystem the ability to request long-distance service options, such aspurchase a post-paid debit calling card. In return, through the securelink, the server computer system 104 and the platform provider canprovide long-distance service information, including platform accessinformation, such as a toll-free number and personal identificationnumber (PIN) combination, to the client computer system. In alternativeembodiments, since the access is not required to be toll free, generalplatform access is provided through such methods as having the user dial“1+” and the number which would cause the user to be routed to theprepaid platform and a look-up on the ANI is performed by the platformfor balance verification as discussed below. The secure nature of thelink provides the server 104 and the platform 108 the ability to verifyclient information and, in turns provide services to the client, i.e.,the user of the client computer system 102, in an automated manner thatminimizes the risk of fraud.

In an embodiment, the client computer system 102 executes a browsermodule (hereinafter browser) as an application or as part of theoperating system for retrieving or browsing electronic documents from aremote computer network, such as server computer system 104. Thecomputer system 102 connects to the computer network 104 over atelephone line with a modem (not shown) or some other physicalconnection, such as a network interface, an ISDN, T1 or other high speedtelephone line, a television cable, a satellite link, an optical fibernetwork, an Ethernet or local area network technology wire and adaptercard, radio or optical transmission devices, etc. The invention canalternatively be embodied in a browsing environment for other public orprivate computer networks, such as computer network of a commercial online service or an internal corporate local area network (LAN) or likecomputer networks.

The browser module is used to access the secure link, such as a secureweb page or website. To access the link, the user of client system 102specifies a URL related to the particular web site, such as by enteringa URL character string with a keyboard, by selecting a hyperlinkspecifying the URL in an HTML document currently being displaying in thebrowser display, or by selecting a URL from a list provided by thebrowser, among others. In response to the entered URL the browsergenerates a request command for the URL and transmits the request on theInternet 106 for the website using conventional Internet protocols, suchas the Hypertext Transport Protocol (HTTP). Consequently, the browsermay display a verification window, such as window 112, in a conventionaloperating system graphical user interface.

The window 112 provides the user of the client computer system theability to enter predetermined client identification information, suchas a login name and password, in areas 114 and 116 respectively. Theinformation may then be supplied to the server computer system 104 forverification. Upon verification, the server computer system may pro idsaccess to a secure web page that includes account information for theuser and provides the ability to purchase a “post-paid debit” callingcard. Billable activity on the secure web page, such as purchases made,is then billed to the user's account. In an embodiment, the web page isassociated with an existing client, having a physical mailing address,such, as a home or an office. In this embodiment, the association with ahome or office address generally reduces the fraudulent activity sinceusers must have a verifiable account to purchase items on the web page.

The computer systems, such as 102 and 104 may be represented by thecomputer system 200 shown in FIG. 2. The system 200 has at least oneprocessor 202 and a memory 204. In its most basic configuration,computing system 200 is illustrated in FIG. 2 by dashed line 206encompassing the processor 202 and the memory 204. Additionally, system200 may also include additional storage (removable and/or non-removable)including, but not limited to, magnetic or optical disks or tape. Suchadditional storage is illustrated in FIG. 2 by removable storage 208 andnon-removable storage 210. Computer storage media, such as memory 204,removable storage 208 or non-removable storage 210 includes volatile andnonvolatile, removable and non-removable media implemented in any methodor technology for storage of information such as computer readableinstructions, data structures, program modules or other data. Memory204, removable storage 208 and non-removable storage 210 are allexamples of computer storage media. Computer storage media includes, butis not limited to, RAM, ROM, EEPROM, flash memory or other memorytechnology, CD-ROM, digital versatile disks (DVD) or other opticalstorage, magnetic cassettes, magnetic tape, magnetic disk storage orether magnetic storage devices, or any other medium which can be used tostore the desired information and which can be accessed by system 200.Any such computer storage media may be part of system 200. Depending onthe configuration and type of computing device, memory 204 may bevolatile, non-volatile or some combination of the two.

System 200 may also contain communications connection(s) 212 that allowthe device to communicate with other devices. Additionally, system 200may have input device(s) 214 such as keyboard, mouse, pen, voice inputdevice, touch input device, etc. Output device(s) 216 such as a display,speakers, printer, etc. may also be included. All these devices are wellknown in the art and need not be discussed at length here.

Computer system 200 typically includes at least some form of computerreadable media. Computer readable media can be any available media thatcan be accessed by system 200. By way of example, and not limitation,computer readable media may comprise computer storage media andcommunication media. Communication media typically embodies computerreadable instructions, data structures, program modules or other data ina modulated data signal such as a carrier wave or other transportmechanism and includes any information delivery media. The term“modulated data signal” means a signal that has one or more of itscharacteristics set or changed in such a manner as to encode informationin the signal. By way of example, and not limitation, communicationmedia includes wired media such as a wired network or direct-wiredconnection, and wireless media such as acoustic, RF, infrared and otherwireless media. Combinations of any of the above should also be includedwithin the scope of computer readable media.

FIG. 3 illustrates a software/hardware environment 300 incorporatingaspects of the present invention. The environment 300 includes separatemodules that perform functional operations in accordance with thoseaspects. In general, the environment 300 comprises a client computersystem or layer of software 302, a server computer system or layer ofsoftware 304, and a platform software system 306, which, in oneembodiment correspond respectively to client computer system 102, servercomputer system 104 and platform system 108 shown in FIG. 1. The clientlayer 302 communicates with the server layer 304 in order to access asecure link and to allow the user of the client system 302 to purchaseone or more long-distance, post-paid debit calling cards. The serverlayer 304, communicates with the platform layer 306 to process purchaserequests and other account management functions, as discussed below.

To access the secure link, the client layer 302 has a send/receivemodule 308 that is used to, communicate with the server layer 304. In anembodiment, the send/receive module 308 is a browser module used to sendrequests and receive documents or other information over the Internet.The client layer 304 may further include a user interface module 310(that is used to interface with the user to provide results back to theuser and receive search requests from the user. In an embodiment, thebrowser module may download ether functional modules to the client layer302, such as secure website access module 312 that provides somefunctionality on the client layer during the process of accessing thesecure website. For instance, the secure website access module 312 mightevaluate the client identification information or the client computersystem itself against predetermined criteria to aid in the verificationprocess. Alternatively, the module 312 might be used to package specificrequests or perform other functions.

Another functional module that might exist on the client system 302relates to an account management module 314. The account managementmodule 314 might perform some account management functions on the clientlayer 314, e.g., refresh requests, simple calculations, error checking,etc. The client layer 302 may include many other modules, such as inputand output control modules, used in the course of processing andcomputing other functions. Such other modules are well known in the artand need not be discussed in detail here. Although client layer modules,such as modules 312 and 314 may provide functional capabilities on theclient layer 302, other embodiments do not include such modules. Inthose embodiments, the client layer 302 primarily packages and sendsrequests to the server layer 304, such that the bulk of the computing isperformed on the server 304 or in the platform layer 306, and receivesand displays the results.

With respect to the server layer 304, it has a communication module 316that communicates with the client layer 302. The communication module316 may include a server receive module 318 for receiving communicationrequests from the client layer 302, e.g., the send/receive module 308.The communication module 312 may further include a send module 320designed to package and send search results back to the client layer302, and in particular, to the module 308.

The server software system 304 incorporates a customer informationfilter module 322, which is used to evaluate customer informationreceived from the client computer layer 302. The evaluation process isto validate that the client system user has an existing account. Thecustomer information, in an embodiment, relates to a login name and apassword. In other embodiments, the customer information may be anyother identification information that may be verified by the serverlayer 302, and in particular the customer information filter module 322.The verification process performed by the customer information filtermodule 322 may involve the parsing of an access request to glean thecustomer information. Upon determining the customer information, thecustomer information filter module 322 may access a user profiledatabase 324 to determine if the information is valid. The database 324may be within the server computer system, or alternatively, thedatabase, and potentially the verification module, may reside on theplatform system layer 306.

In operation, upon validation of the customer information, the serverlayer 304 establishes a secure link with the client layer 302, e.g., byallowing access to a secure web page. Additionally, upon validation, theserver 304 communicates with the platform layer 306 to access thecustomer or user's overall account information. The server layer 304uses a platform communication module 326 to communicate with theplatform layer, and more specifically, a server communication module 328located on the platform layer 306. The modules 326 and 328 maycommunicate across a firewall, and may use one of a number of differentknown protocols to achieve this communication.

The platform layer 306 has a datastore 330, which stores information forvarious calling card records or mini-accounts, where each record relatesto a platform access number and PIN combination. The datastore 330maintains the amount of time or money allotted to or remaining for eachcombination. Each user account, consequently, identifies a list of suchrecords that have been activated and billed to a particular user. Uponvalidating a user, the user account information is requested for theplatform. In one embodiment, a list of all outstanding records isprovided to the platform 306 and the platform uses the datastore 330 toprovide up-to-date calling card information.

The server layer 304 also has a process order module 332 that processesorders for new calling-card number/PIN combinations. Upon receiving sucha request, the process order module 332 communicates with the platformsoftware layer 306 to obtain a new number PIN combination. The platformlayer 306 has a number/PIN generation module to generate such acombination and return the information to the server layer 304. Oncegenerated, the combination is stored in the datastore 330. Importantly,the process order module 332 does not process an order for long-distanceservices, such as calling card requests, unless or until the customerinformation has been verified. In this manner, a calling card number/PINcombination can be provided to a user and the user is then billed inaccordance with normal and customary billing practices, e.g., once amonth, along with the bill for other services, such as their regularlong distance service bill.

The server layer 304 may also have an account management module 334. Inan embodiment, the account management module 334 provides die user theability to manage multiple account elements, such as home-telephoneservice bills, multiple different calling cards, etc. Indeed, theaccount management module may allow a customer to shift pre-paid callingcard time from one calling card to another. Since the time is billed tothe customer on the customer's next monthly telephone bill, the customerhas the convenience of being able to move time or services withoutentering a credit-card number each time. Further, the account managementtool 334, in an embodiment, accesses the information in the datastore330 on a regular basis such that user may understand the current balanceon each account.

In accordance with these features, the platform layer 306 has a billingcontrol module 338 and an update module 340. The billing control module338 charges a user account each time a number/PIN combination has beencreated. Alternatively, the billing control module 338 communicatescharge information to the server layer 304 which then adds the charge tothe user's bill. The server layer may then send a message to anaccounting system (not shown) or some other module used to generate theactual bill that is delivered to the user. This bill displays the user'saccount activity, such as pre-paid calling card purchases and otherservices rendered, along with the charges associated with the accountactivity. The user then pays these charges using known methods, such aswith an Internet payment system, mailing a bank check, using a creditcard, etc.

With respect to the update module 340, the module is used to update thedatastore 330 when a number/PIN combination is used. During along-distance phone call associated with a number/PIN, the update module330 may temporarily freeze account management capabilities and thenupdate or debit the time associated with the number/PIN combination inthe datastore 330. Consequently, the next time the data from thedatastore is accessed either by the account management tool 334 orduring a phone call, the correct, updated information is available.

FIG. 4 illustrates a flowchart of functional operations related to thereceiving requests from a client system such as the client system shownin FIG. 1 and responding to such requests from the client to providelong distance service options in accordance with an embodiment of theinvention. Initially, flow 400 begins with receive operation 402.Receive operation 402 receives a request from the client, such as fromthe client computer system 102 (FIG. 1). The request indicates that theclient desires to log onto or gain access to a secure link, such as asecure website. Many known methods of communication may be used totransfer this request to the sever computer system.

Upon receiving the request, evaluate operation 404 evaluates the requestto determine whether the client identification information is valid.That is the client must send some identification information such thatthe server can make the determination as to whether the client is ableto gain access to the secure website. Indeed, upon evaluating theinformation, determination operation 406 determines whether the clientis trustworthy. Typically, the server maintains a log or record ofclient information and is thus able to check the received clientinformation against a list of trusted client information to make thisdetermination.

If determination operation 406 determines that the client istrustworthy, then flow branches YES to allow operation 408. Allowoperation 408 allows the client to access the secure website. Statedanother way, allow operation 408 establishes a trusted or secure linkbetween the client and the server. Many known methods may be employed inestablishing this link and thus providing access to the secure website.In one embodiment, a web page is displayed at the client location, wherethe web page includes client-specifie information, such as accountinformation. The web page, therefore, may be deemed a personalized webpage for that user. The web page may further include options that allowthe user to select or request services. In a particular embodiment, theweb page provides a selection option that allows the user to purchase acalling card number/PIN combination. The web page may allow the user tochoose one of two or more payment options. One particular option relatesto having the charge for the calling card appear on the user's nextstatement. Other embodiments require this type of billing arrangement.

Flow 400 continues as the server receives, at receive operation 410, arequest to purchase a calling card or other service. Details of thefunctional operations following receipt of the request for a post-paiddebit calling card are detailed below in conjunction with FIG. 5.Assuming the request to purchase a calling card number/PIN combinationhas been fulfilled by the server, return operation 412 returns, withinthe web page, the service access information, such as the toll freenumber and PIN combination. Alternative embodiments may mail thisinformation to a physical address. In yet another embodiment, the billis provided electronically by either providing an electronic version ofthe bill online or by sending an electronic version of the bill viaemail. Once the information is returned to the user, the account ischarged and any future account-information requests will reflect thispurchase. Following return operation 412, flow 400 ends at end operation414.

Referring back to determination operation 406, if it is determined thatthe client is not trustworthy then flow branches NO to deny operation416. A client may be deemed untrustworthy if the login name and password(or other identification information) does not match any of the knowninformation on the server system. Alternatively, the client may bedeemed untrustworthy if no credit information is available and nothingcan be verified at the time, e.g., when setting up a new client forexample. In yet other embodiments, the client may be denied access ifthe client or user is delinquent in paying their bills or for some otherreason locked out of the system.

Deny operation 416 may return a message to the client indicating thataccess has been denied. In some embodiments, the message nay indicatethe reason for such denial and may even provide help tips to the user asto how to rectify the situation. For example, the message may state thatthe user must re-enter the client identification information because nomatch was found. Or the message may indicate that the user is delinquentin paying their bills and provide a phone number for future help to theuser. Upon denying access, flow 400 ends at end operation 414.

FIG. 5 illustrates a flowchart of functional operations related toserver-side operations in processing requests for long-distance service,in accordance with a particular embodiment of the invention. Flow 500begins with receive operation 502, which receives a request, such asfrom a client, for a post-paid debit calling card or other serviceinformation. In one embodiment, the receive operation 502 is the same asreceive operation 410 described above in conjunction with FIG. 4.

Upon receiving the request, determination operation 504 may determinewhether the request can be satisfied. Determination operation 504provides a means to check almost any predetermined criteria, at theserver level, to determine if the service should be denied for somereason, even though the user has been granted access to a secure site.This determination operation may, for example, establish a limit on thenumber or amount of post-paid debit calling card minutes a single usermay purchase at one time. Determination operation 504 may furtherrequest other identification information for security reasons.Alternative embodiments may choose to exclude determination operation504, essentially assuming that if the user is granted access to a securewebsite, then that user may purchase calling card information.

Assuming determination operation 504 is employed, if it is determinedthat the request cannot be satisfied, then flow branches NO to notify,operation 506, which notifies the user that the request cannot besatisfied. The notification request may provide the reason why therequest cannot be satisfied and may further provide tips to the userindicating options for rectifying the situation. Upon notifying the userthat the request cannot be satisfied, then flow 500 ends at endoperation 508.

On the other hand, if the request can be satisfied, as determined bydetermine operation 504, then flow branches YES to submit requestoperation 510, which submits a request to the platform software layer,such as layer 306 shown in FIG. 3. The request may be submitted in manydifferent ways to the platform layer, such via the Internet or by a moresecure link, using any number of different protocols.

Following submit operation 510, receive operation 512 receives therequest at the platform layer. The request is then parsed and evaluatedfor processing. Process operation 514 processes the request, and ifavailable, generates a number/PIN combination for the user. Processoperation 514 may also send a message to an accounting module to billthe user for the combination. Upon processing the request, returnoperation 516 returns the number/PIN combination to the server.

In response to return operation 516, the server receives, at receiveoperation 518, the information from the platform. Return operation 520then sends the number and PIN combination to the user. Additionalprocessing may take place at this point, such as billing or otheraccount management duties. Upon sending the information to the client,flow 500 ends at end operation 508.

It will be clear that the present invention is well adapted to attainthe ends and advantages mentioned as well as those inherent therein.While a presently preferred embodiment has been described for purposesof this disclosure, various changes and modifications may be made whichare well within the scope of the invention. Numerous other changes maybe made which will readily suggest themselves to those skilled in theart and which are encompassed in the spirit of the invention disclosedand as defined in the appended claims.

1-16. (canceled)
 17. A computer system for purchasing post-paidcommunication service comprising: a server layer for receiving a requestto purchase communication service using a post-paid debit account,validating customer information using user identification information,and providing communications service when the customer information isvalidated; and a platform layer for storing customer information andcommunicating with the server layer when validating the customerinformation.
 18. The computer system of claim 17 further comprising aclient layer for sending the request to purchase communication serviceto the server layer.
 19. The computer system of claim 18, wherein theclient layer comprises: a secure web module for evaluating the useridentification information; and an account management module forperforming account management functions associated with the clientlayer.
 20. The computer system of claim 19, wherein the accountmanagement module manages at least one of the following: home telephoneservice and one or more calling cards.
 21. The computer system of claim17, wherein the server layer further comprises: a receive module forreceiving a request for the communication service; a customer filtermodule for receiving customer identification information and fordetermining whether the user is trustworthy by identifying apre-existing communication service from the customer information; aprocess order module for processing the request for the newcommunication service after the customer filter module has determinedthat the user is trustworthy, the new communication service being apost-paid debit communication product; and a communication module forenabling the post-paid debit communication service in response to therequest.
 22. The computer system of claim 17, wherein the server layervalidates the customer information by checking the customer informationassociated with the received request to purchase communication serviceagainst a list of trusted client information.
 23. The computer system ofclaim 22, wherein the server layer determines whether the user has anexisting account when validating the customer information.
 24. Thecomputer system of claim 17, wherein the platform layer comprises: adata store for storing customer information; a number/pin generationmodule for generating a pin/new number combination for use in providingcommunication service; and a billing module for charging the user whenthe number/pin generation module generates a pin/new number combinationfor association with the user.
 25. A computer-readable medium whichstores a set of instructions which when executed performs a method forpurchasing post-paid communication service, the method executed by theset of instructions comprising: receiving a request to purchase thepost-paid communication service, the post-paid communication servicecomprising a post-paid debit account; receiving user identificationinformation on the user; determining whether the user is trustworthy byvalidating the user identification information; and upon determiningthat the user is trustworthy based on the user identificationinformation, providing the user with communication service accessinformation so that the user can use the post-paid communicationservice.
 26. The computer-readable medium of claim 25 whereindetermining if the user is deemed trustworthy comprises receiving useridentification information that establishes that the user has anexisting account.
 27. The computer-readable medium of claim 26 furthercomprising billing the user for the post-paid communication service. 28.The computer-readable medium of claim 25 wherein receiving the requestcomprises receiving a telephone call containing a platform access numberand a personal identification number.
 29. The computer-readable mediumof claim 25, further comprising billing the user in a predeterminedmanner for the communication service and for other services associatedwith an existing account.
 30. The computer-readable medium of claim 26,wherein determining that the user is trustworthy comprises determiningthat the existing account has a positive billing history.
 31. Thecomputer-readable medium of claim 25, wherein determining whether theuser is trustworthy comprises determining if the user has an existingphysical billing address for a separate account.
 32. Thecomputer-readable medium of claim 25, wherein determining whether theuser is trustworthy comprises determining if the user has an existingemail address.
 33. The computer-readable medium of claim 25, wherein thecommunication service comprises a long distance telephony service. 34.The computer-readable medium of claim 25, wherein the post-paid debitaccount provides a limited amount of communication services forpredefined period of time.
 35. A system for providing a voicecommunication service to a user, comprising: means for establishing auser account for the voice communication service; means for defining theuser account as a post-paid debit account; means for creating apredefined limited amount of usage for the voice communication servicefor a certain period of time; means for receiving a request from theuser to initiate the voice communication service; means for verifyingthat the request is associated with the user account; means forfacilitating the voice communication service for the user; means fordebiting usage of the voice communication from the limited amount ofusage; and after expiration of the certain period of time, means forinvoicing the user for the usage of the voice communication serviceduring the certain period of time.
 36. The system of claim 35, whereinthe request is received at a platform and wherein a valid PIN from theuser is used to verify the request.