Destination device billing according to call recipient

ABSTRACT

A method, system, and program for billing for service provided to destination device according to the calling plan of the individual receiving the call. An authenticated identity for a callee answering a call placed to a destination device is received at an intermediary device. The intermediary device then accesses a billing plan for the authenticated identity of the callee and loads the billing plan for specifying charges for the call, such that telephone service billed to the callee is accessible at multiple destination devices.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.14/558,426, filed Dec. 2, 2014, which is a continuation of U.S.application Ser. No. 14/073,283, filed Nov. 6, 2013, which issued asU.S. Pat. No. 8,903,063, which is a continuation of U.S. applicationSer. No. 13/368,066, filed Feb. 7, 2012, which issued as U.S. Pat. No.8,588,384, which is a continuation of U.S. application Ser. No.12/181,728, filed Jul. 29, 2008 which issued as U.S. Pat. No. 8,139,736,which is a continuation of U.S. application Ser. No. 11/158,886, filedJun. 22, 2005 which issued as U.S. Pat. No. 7,426,263, which is adivisional of U.S. application Ser. No. 10/023,407, filed Dec. 17, 2001which issued as U.S. Pat. No. 6,977,998, the entirety of which areincorporated herein by reference.

TECHNICAL FIELD

The present invention relates in general to telecommunications and, inparticular, to voice identification. Still more particularly, thepresent invention relates to billing for services provided at adestination device according to the billing plan of the callee answeringthe device.

BACKGROUND OF THE INVENTION

Telephone service has created communication channels worldwide, andthose channels continue to expand with the advent of cellular and otherwireless services. A person can simply take a telephone off-hook anddial a destination number or press a send button and be connected to atelephone line around the world.

Today, the public switching telephone network (PSTN), wireless networks,and private networks telephone services are based on the identificationof the wireless telephone or wireline that a calling party uses.Services are personalized according to wireless telephone or wirelinetelephone number, where services associated with one telephone numberare not accessible for another telephone number assigned to the samesubscriber. For example, there is typically a first set of servicefeatures and billing options assigned to a home line number, a secondset of service features and billing options assigned to an office linenumber, and a third set of service features and billing options assignedto a cellular telephone number. The networks process calls to and fromeach of these different subscriber telephones based on a separatetelephone number.

One problem occurs where multiple people utilize a single wireless orwireline telephone number to receive calls. Only one set of services isprovided to the number, regardless of who receives the call. Therefore,callees are limited to the services selected by the subscriber of a linenumber.

In addition, where multiple people utilize a single wireless or wirelinetelephone number for receiving calls, the subscriber of the line isbilled for any charges incurred with use of the line. For example, acall return service that calls the number that last called, may bebilled per use of the service to the line subscriber.

One of the services often billed to a line number receiving a call is acollect calling service. With a collect call, a caller dials a number toaccess a collect calling service provider. The collect calling serviceprovider then prompts the caller to dial a number. The collect callingservice accesses the dialed number and requests an acceptance of thecollect call from the person answering the phone. Upon agreement toanswer the call, the cost of the call is billed to the subscriberassociated with the line number, whether or not that subscriber is theindividual agreeing to receive the collect call.

Therefore, in view of the foregoing, it would be advantageous to providea method, system, and program for specifying services available at adevice utilized to receive a call according to a particular caller,where multiple callers may utilize the device to receive calls. Inaddition, it would be advantageous to provide a method, system, andprogram for billing for the use of a line and the services providedthereto according to callee, rather than according to the linesubscriber, such that a callee's billing plan follows the callee tolines answered by the callee.

SUMMARY OF THE INVENTION

In view of the foregoing, it is therefore an object of the presentinvention to provide an improved telecommunications system.

It is another object of the present invention to provide a method,system and program for improved voice identification.

It is yet another object of the present invention to provide a method,system and program for billing for services provided at a destinationdevice according to the billing plan of the callee utilizing the device.

According to one aspect of the present invention, an authenticatedidentity for a callee answering a call placed to a destination device isreceived at an intermediary device. The intermediary device thenaccesses a billing plan for the authenticated identity of the callee andloads the billing plan for specifying charges for the call, such thattelephone service billed to the callee is accessible at multipledestination devices.

All objects, features, and advantages of the present invention willbecome apparent in the following detailed written description.

BRIEF DESCRIPTION OF THE DRAWINGS

The novel features believed characteristic of the invention are setforth in the appended claims. The invention itself however, as well as apreferred mode of use, further objects and advantages thereof, will bestbe understood by reference to the following detailed description of anillustrative embodiment when read in conjunction with the accompanyingdrawings, wherein:

FIG. 1 depicts a block diagram of a network environment in which thepresent invention may be implemented;

FIG. 2 illustrates a block diagram of the flow of a callee identityauthentication in accordance with the method, system, and program of thepresent invention;

FIG. 3 depicts a block diagram of the flow of billing plans inaccordance with the method, system, and program of the presentinvention;

FIG. 4 illustrates an illustrative representation of the informationwithin billing plans in accordance with the method, system, and programof the present invention;

FIGS. 5A and 5B depict a flow diagram of a signal flow and processing ofa call in accordance with the method, system, and program of the presentinvention;

FIG. 6 illustrates an illustrative embodiment of a telephone based orderin accordance with the method, system, and program of the presentinvention;

FIG. 7 depicts a high level logic flowchart of a process and program forcontrolling a billing service in accordance with the method, system, andprogram of the present invention; and

FIG. 8 illustrates a block diagram of the billing service in accordancewith the method, system, and program of the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

A method, system, and program for billing for telephone transactionsprovided at a destination device according to the billing plan of thecallee currently utilizing the device are provided.

For purposes of the present invention, telephone transactions mayinclude telephone and generic services available from within a trustedtelephone network and telephone and generic services available fromservers functioning outside the trusted telephone network, as will befurther described. Telephone service preferably includes the basicservice of connecting a voice and signal channel between an origindevice and a destination device. Generic services preferably includecall services, such as call forwarding, call waiting, and long distancecalling. In addition, generic services may include financial services,database management services, and other services accessible via a call.

In addition, telephone transactions may include orders initiated via atelephone. Preferably, a callee billing plan includes at least oneaccount provider to which a charge for an order may be placed. Inaddition, a callee billing plan may include shipping addresses, billingaddresses, and other distribution information.

First, an identity of a callee utilizing the destination device isauthenticated. Callee identity authentication may be initiated by theorigin device originating the call, the intermediary device processingthe call, or the destination device receiving the call. Each of thedevices may access a third party or external server to perform thecallee identity authentication. Performance of callee identityauthentication has different advantages depending on the deviceinitiating the callee identity authentication.

While in the present invention, authentication of a caller identity isdescribed with emphasis placed on voice authentication, other methods ofcaller identity authentication may also be performed. Voice samplesutilized for voice authentication are just one of multiple types ofbiometric sampling. For example, a caller may locally provide an eyescan, a fingerprint, and other biophysical identifiers that aretransmitted within or outside the trusted network to authenticate theidentity of the caller. Alternatively, keypad entries, such as a pincode, account number, password, or other secure transaction key may beentered by a caller and utilized to authenticate the identity of thecaller.

Next, a callee profile is accessed according to the authenticatedidentity of the callee utilizing the origin device. The callee profileincludes a billing plan and services requested by the callee. The calleeprofile may be accessed from a service provider within the trustedtelephone network and/or from external servers functioning outside thetrusted telephone network, where the callee has selected to disclosecallee profile information at those external servers.

A call received at the destination device is then processed according tothe billing plan of the callee. Advantageously, by specifying thebilling for use of a destination device according to the calleeutilizing the device, rather than the line subscriber, additionalservices may be provided for the call and the callee may be billed forany services rendered to the destination device.

According to one advantage of the present invention, where a wirelesstelephone line is utilized, billing is typically performed for eachminute of use, whether a call is originated or received at the wirelesstelephone line device. According to the present invention, the calleeutilizing the wireless telephone line device will be billed for theminutes utilized and for the services provided, rather than billing thewireless telephone line subscriber for those minutes utilized by thecallee. Thereby, multiple people may utilize a single wireless device,where billing for use is separated according to the person answering acall.

According to another advantage of the present invention, where a collectcall is accepted by a callee at a destination device, the callee isbilled for the collect call, rather than billing the line subscriber ofthe destination device. Therefore, the ability to answer calls and incurany charges associated with answering a call follows an individual toany telephony device at which the individual may answer a call. In anexample, where the line subscriber is a business, it is advantageous foran employee to incur charges on the employee's billing plan for personalcalls received at a telephony device accessible to the employee. Inanother example, a callee may forward calls to a friend's line numberand then accept charges for collect calls forwarded to the friend's linenumber.

For purposes of the present invention, a callee preferably subscribes toa telephone service from at least one service provider. That service maybe linked to a particular line number, but preferably follows the calleeto whatever telephone device the callee chooses to answer. The servicemay include a billing plan that provides for services in addition tobasic telephone service, at a flat rate. In addition, the billing planmay provide for other services, in addition to basic telephone service,that are billable according to use, such as a collect calling serviceand a wireless telephone service.

In addition, a billing plan may include a credit or debit accountprovider. Credit and debit accounts may be specified for use accordingto the type of charge or debit. For example, one debit account may bespecified for debits for long distance service. Another debit accountmay be specified for debits for personal orders placed via thetelephone. Yet another debit account may be specified for debits forbusiness orders placed via the telephone.

A debit or credit to a billing plan may include, but is not limited to,a monetary amount, a points amount, electronic coupons, electronicvouchers, and other electronic payments that may be transferred. Forexample, a callee may receive an electronic voucher for wireless serviceminutes. When the callee is charged for the minutes, the electronicvoucher may automatically be redeemed.

For purposes of the present invention, telephony devices are termedorigin devices when utilized for origination of a call to anintermediary device and are termed destination devices when utilized forreceipt of a call from an intermediary device. Subscribers to a call aretermed callers when originating a call and are termed callees whenreceiving a call. Callers and callees may or may not be line subscribersto the particular telephony device utilized.

In the following description, for the purposes of explanation, numerousspecific details are set forth to provide a thorough understanding ofthe present invention. It will be apparent, however, to one skilled inthe art that the present invention may be practiced without thesespecific details. In other instances, well-known structures and devicesare shown in block diagram form to avoid unnecessarily obscuring thepresent invention.

With reference now to the figures, and, in particular, with referencenow to FIG. 1, there is depicted a block diagram of a networkenvironment in which the present invention may be implemented. While thepresent invention is described with reference to one type of networkenvironment, it will be understood by one with skill in the art that thepresent invention may be implemented in alternate types of networkenvironments.

General Network Environment

First, the network environment incorporates a Public Switching TelephoneNetwork (PSTN) 10. As is known in the art the core of PSTN 10 mayinclude multiple telephone networks, each owned by one of multipleindependent service providers. Each telephone line is carried by anindependent service provider within PSTN 10 and is typically assigned toat least one subscriber.

Switching of a call within an independent service provider's telephonenetwork is considered trusted movement within a trusted network becausethe call remains within the company's telephone network infrastructure.However, calls may be transferred from one service provider's telephonenetwork to another service provider's telephone network in generallytrusted movement. Generally, service providers are in competition withone another and therefore there is general trust in transferring a call,but not trust in sharing of subscriber information beyond a subscribernumber and name from one service provider to the next without securityfeatures or other arrangements.

Advantageously, each telephone network within PSTN 10 may access a datanetwork functioning as an extension to PSTN 10 via an Intranet. Datanetworks may include, for example, subscriber profiles, billinginformation, and preferences that are utilized by a service provider tospecialize services. Transfer of information between a serviceprovider's data network and telephone network is trusted movement insharing of information.

Further, each telephone network within PSTN 10 may access server systemsexternal to PSTN 10 in the Internet Protocol over the Internet or anIntranet. Such external server systems may include an enterprise server,an Internet service provider (ISP), an access service provider (ASP), apersonal computer, and other computing systems that are accessible via anetwork. In the present embodiment, transfer of information between PSTN10 and server systems accessible via a network 20 is untrusted andtherefore may require verification and additional security. Network 20may be preferably considered an external network.

In the present invention, network 20 may comprise a private network, anIntranet, or a public Internet Protocol network. Specifically, telcoapplication server 22, generic application server 24, pervasiveapplication server 26, and systems management server 28 represent serversystems external to PSTN 10 that may be accessed by PSTN 10 over network20.

In particular, telco application server 22 preferably includes multipletelco specific service applications for providing services to callstransferred to a server external to PSTN 10, In particular, a call maybe transferred from PSTN 10 to telco application server 22 to receive atleast one service and then the call is transferred back to PSTN 10. PSTN10 preferably brokers the connection between the telephony device andtelco application server 22. Such services may also be provided to callswithin PSTN 10, however placing such services at a third party such astelco application server 22, is advantageous because adding services andinformation to PSTN 10 is time consuming and costly when compared withthe time and cost of adding the services through telco applicationserver 22.

In accord with an advantage of the present invention, as will be furtherdescribed, the identity of both the caller and the callee may beauthenticated by one of telephony devices 8 a-8 n, PSTN 10, or by telcoapplication server 22. By authenticating the actual identity of theperson making a phone call and the person receiving the phone call,rather than the identification of a device from which a call is made andreceived, an enhanced specialization of services to subscribers may beperformed.

An authentication service within telco application server 22 may includeidentification and verification of the identity of a caller and/orcallee of a particular call. Such a service may require that subscribersprovide voice samples when setting up a subscription. The stored voicesamples may then be compared against voice samples received for aparticular call in order to authenticate the identity of a currentcaller or callee of the particular call.

Generic application server 24 preferably accesses independent serversystems that provide services. For example, a messaging server, afinancial server, an Internal Revenue Service (IRS) server, and databasemanagement system (DBMS) server may be accessed in HTTP via network 20.Each of these servers may include a telco service application thatrequires authentication of the subscriber before access is granted. Forexample, a financial server may provide a telco service application thatallows an authenticated subscriber to access current financial recordsand request stock quotes from the financial server.

Pervasive application server 26 manages services for wirelesslynetworked devices. In particular, pervasive application server 26preferably handles distribution of wireless packets of voice and data towirelessly networked devices utilizing a standard such as shortmessaging service (SMS) messaging or other 3G standards.

Systems management server 28 manages subscriber personalization via theweb. In particular, systems management server 28 includes browsertechnology that includes a provisioning console 30 for establishing asubscriber profile and a management console 32 for managing and updatingthe subscriber profile. A subscriber preferably accesses the consoles ofsystems management server 28 via the Internet utilizing a computingsystem, such as computing systems 34 a-34 n.

The subscriber profile may be accessed at systems management server 28by other external servers and PSTN 10 via network 20. In addition, alocal copy of a subscriber profile updated in systems management server28 may be stored within a particular service provider's data network ortelephone network. Each service provider may specify the types ofpreferences and other information included within a subscriber profile.

In particular, a subscriber may provide a voice imprint whenestablishing a subscriber profile through provisioning console 30. Othertypes of authentication information may also be provided including, butnot limited to, a password, an eye scan, a smart card ID, and othersecurity devices. In addition, a subscriber may designate billingpreferences, shopping preferences, buddy list preferences, and otherpreferences that enable specialized service to the subscriber when thesubscriber's identity is authenticated from the voice imprint or otheridentification.

Advantageously, a management agent is built into each external server tomonitor the services provided by each server according to theauthenticated subscriber receiving the services. By monitoring serviceoutput according to subscriber, the subscriber may then be billedaccording to each use of a service.

PSTN 10 preferably includes both voice and data signaling networks thatinterface with network 20 via gateways. Each of the gateways acts as aswitch between PSTN 10 and network 20 that may compress a signal,convert the signal into Internet Protocol (other protocol) packets, androute the packets through network 20 to the appropriate server.

In particular, the voice network interfaces with network 20 throughmedia gateway 14 which supports multiple protocol gateways including,but not limited to, SIP. SIP is a signaling protocol for Internetconferencing, telephony, presence, events notification and instantmessaging.

In addition, in particular, the data signaling network interfaces withnetwork 20 through signaling gateway 12 which supports multiple protocolgateways including, but not limited to, parlay protocol gateways and SS7protocol gateways. Internet servers, such as telco application server 22may include protocol agents that are enabled to interact with multipleprotocols encapsulated in Internet Protocol packets including, but notlimited to, SS7 protocol, parlay protocol, and SIP.

Identity Authentication and Call Control

Looking into PSTN 10, a telephone network typically includes multipleswitches, such as central office switches 11 a-11 n, that originate,terminate, or tandem calls. Central office switches 11 a-11 n utilizevoice trunks for transferring voice communications and signaling linksfor transferring signals between signaling points.

Between signaling points, one central office switch sends signalingmessages to other central office switches via signaling links to setup,manage, and release voice circuits required to complete a call. Inaddition, between signaling points, central office switches 11 a-11 nquery service control points (SCPs) 15 to determine how to route a call.SCPs 15 send a response to the originating central office switchcontaining the routing number(s) associated with the dialed number.

SCPs 15 may be general purpose computers storing databases of callprocessing information. While in the present embodiment SCPs 15 aredepicted locally within PSTN 10, in alternate embodiments SCPs 15 may bepart of an extended network accessible to PSTN 10 via a network.

One of the functions performed by SCPs 15 is processing calls to andfrom various subscribers. For example, an SCP may store a record of theservices purchased by a subscriber, such as a privacy service. When acall is made to the subscriber, the SCP provides record of the privacyservice to initiate an announcement to a caller to identify themself tothe subscriber with the privacy service who is being called. Accordingto an advantage of the invention, authentication of the subscriberreceiving the call may be required before the privacy service isinitiated for that subscriber.

In particular, network traffic between signaling points may be routedvia a packet switch called an service transfer point (STP) 13. STP 13routes each incoming message to an outgoing signaling link based onrouting information. Further, in particular, the signaling network mayutilize an SS7 network implementing SS7 protocol.

Central office switches 11 a-11 n may also send voice and signalingmessages to intelligent peripherals (IP) 17 via voice trunks andsignaling channels. IP 17 provides enhanced announcements, enhanceddigit collection, and enhanced speech recognition capabilities.

According to an advantage of the present invention, the identity of acaller is authenticated according to voice authentication. Voiceauthentication is preferably performed by first identifying a subscriberby matching the name or other identifier spoken with a subscriber nameor identifier. Next, voice authentication requires verifying that thevoice audio signal matches that of the identified subscriber. However,in alternate embodiments, the identity of a caller may be authenticatedaccording to passwords, eye scans, encryption, and other securitydevices.

In particular, to perform subscriber authentication of audio signalsreceived from callers, IP 17 may include storage for subscriber specifictemplates or voice feature information, for use in authenticatingsubscribers based on speech. If a subscriber specific template is notstored on a local IP 17, then a remote IP containing the subscriberspecific template may be accessed via a network. In addition, local IP17 may access systems management server 28 or another repository forvoice imprints to access the subscriber specific template.

Where IP 17 authenticates the identity of a caller (e.g. the subscriberplacing a call), a voice identifier (VID) representing the authenticatedcaller identity is transferred as a signal for identifying the caller.In addition, where IP 17 authenticates the identity of a callee (e.g.the subscriber receiving a call), a reverse VID (RVID) including thecallee identity is transferred as a signal for identifying the callee.

Alternatively, to perform subscriber authentication of audio signalsreceived from callers, PSTN 10 may broker a caller identityauthentication service from telco application server 22. In particular,a signaling channel is opened between central office switches 11 a-11 nand telco application server 22 via signaling gateway 12. In addition, avoice channel is opened between central office switches 11 a-11 n andtelco application server 22 via media gateway 14.

Because telco application server 22 is located outside of the trustednetwork, there may be a time delay associated with establishing aconnection to telco application server 22 and authenticating theidentity of a caller that is longer than a time delay present where acaller identity is authenticated by IP 17.

In addition, because telco application server 22 is located outside ofthe trusted network, it is advantageous to establish a level of securityfor transactions between telco application server 22 and central officeswitches 11 a-11 n, wherein the level of security is suitable foruntrusted communications. A level of security may be implemented byutilizing security based protocols, such as the secure socket layer, andby applying ordinary encryption. In particular, the level of securitypreferably protects the communication channel between telco applicationserver and PSTN 10 and authenticates the identity of the server fromwhich a caller identity authentication service is accessed. Therefore anadditional feature of signaling gateway 12 and media gateway 14 issecurity verification.

Advantageously, VIDs indicate through text, voice, or video the identityof a caller. For example, a caller's name may be transferred as theidentity of a caller. Alternatively, a video clip stored with thesubscriber template may be transferred as the identity of a caller.Additionally, VIDs may indicate the identity of the device utilized by acaller to provide context for a call. Further, VIDs may indicate whichsystem or systems have authenticated the caller identity.

After a VID and/or RVID are determined by IP 17, IP 17 and SCP 15 maycommunicate to designate which services are available according to VIDand RVID. Advantageously, by designating services according to a VIDand/or RVID, subscribers are provided with services and billed for thoseservices independent of the devices utilized by subscribers. Inparticular, a 1129 protocol or other protocol may be utilized to enablesignal communications between IP 17 and SCPs 15.

In addition, as previously described, caller authentication to determineVIDs and RVIDs may be performed by an external system, such as telcoapplication server 22. The VID or RVID returned from telco applicationserver 22 may be transferred from central office switches 11 a-11 n toSCP 15 in order to access a subscriber profile associated with the VIDor RVID. Alternatively, the VID or RVID may first transfer to IP 17,where additional verification of the caller identity is performed. Forexample, IP 17 may control distribution of the VID to the caller, wherethe caller is prompted to enter a password or additional information. IP17 may then initiate loading the caller profile into central officeswitches 11 a-11 n if the additional caller input is verifiable for theVID.

An origin telephony device or destination telephony device may alsodetermine a VID and/or RVID for the caller and/or callee of a call. Inparticular, telephony devices 8 a-8 n and call centers 16 a-16 n mayfunction as origin and destination telephony devices. Each of thetelephony devices may include a database of voice templates that may bematched to authenticate the identity of a caller or callee. In addition,each of the telephony devices may access a third party, such as telcoapplication server 22, to authenticate the identity of the caller orcallee. In either case, the telephony device transmits a VID and/or RVIDwith a call to PSTN 10.

Telephony devices 8 a-8 n may include, but are not limited to wirelinedevices, wireless devices, pervasive device equipped with telephonyfeatures, a network computer, a facsimile, a modem, and other devicesenabled for network communication. Advantageously, as previouslydescribed, a voice authentication functioning device may be included ineach of telephony devices 8 a-8 n.

In addition, telephony devices 8 a-8 n may each incorporate a displaythat provides a visual output of a VID or RVID. Alternatively, such adisplay may be provided in a separate device connected to the line inparallel to telephones 8 a-8 n. According to one advantage of thepresent invention, the identity of the actual caller or actual calleeare output to a display in association with a call. In addition, othercontext information about the caller including, but not limited to, thedevice from which the call originates or is answered, ratings for acaller or callee, preferences for a call with the caller or callee, andother context information may be output to a display in association witha call.

Telephony devices 8 a-8 n are communicatively connected to PSTN 10 viawireline, wireless, ISDN, and other communication links. Preferably,connections to telephony devices 8 a-8 n provide digital transport fortwo-way voice grade type telephone communications and a channeltransporting signaling data messages in both directions betweentelephony devices 8 a-8 n and PSTN 10.

In addition to telephony devices 8 a-8 n, advanced telephone systems,such as call centers 16 a-16 n, may be communicatively connected to PSTN10 via wireline, wireless, ISDN and other communication links. Callcenters 16 a-16 n may include PBX systems, hold queue systems, privatenetwork systems, and other systems that are implemented to handledistribution of calls to multiple representatives or agents.

Returning to central office switches 11 a-11 n, typically, one centraloffice switch exists for each exchange or area served by the NXX digitsof an NXX-XXXX (seven digit) telephone number or the three digitsfollowing the area code digits (NPA) in a ten-digit telephone number.The service provider owning a central office switch also assigns atelephone number to each line connected to each of central officeswitches 11 a-11 n. The assigned telephone number includes the area code(NPA) and exchange code (NXX) for the serving central office and fourunique digits (XXXX).

Central office switches 11 a-11 n utilize office equipment (OE) numbersto identify specific equipment, such as physical links or circuitconnections. For example, a subscriber's line might terminate on a pairof terminals on the main distribution frame of one of central officeswitches 11 a-11 n. The switch identifies the terminals, and therefore aparticular line, by an OE number assigned to that terminal pair. For avariety of reasons, a service provider may assign different telephonenumbers to the one line at the same or different times. For example, alocal carrier may change the telephone number because a subscriber sellsa house and a new subscriber moves in and receives a new number.However, the OE number for the terminals and thus the line itselfremains the same.

On a normal call, a central office switch will detect an off-hookcondition on a line and provide a dial tone. The switch identifies theline by the OE number. The central office switch retrieves profileinformation corresponding to the OE number and off-hook line. Then, thecentral office switch receives the dialed digits from the off-hook lineterminal and routes the call. The central office switch may route thecall over trunks and possibly through one or more central officeswitches to the central office switch that serves the called party'sstation or line. The switch terminating a call to a destination willalso utilize profile information relating to OE number of thedestination, for example to forward the call if appropriate, to applydistinctive ringing, etc.

In the present invention, when a call is answered, IP 17 or telcoapplication server 22 may be initiated to authenticate the identity ofthe callee. Authentication of the identity of the caller is preferablyinitiated in IP 17 or telco application server 22. The authenticationservice may attach a verification number to the authenticated RVID thatidentifies that particular VID authorization. When the callee hangs up,the RVID authorization may be discarded. Different entitiesparticipating in a call may only receive portions of the RVID requiredfor processing the call. For example, the RVID ID may not be distributedto the callee. However, the callee may receive the verification numbersuch that the destination device may query the authentication service toverify the RVID.

When the switch terminating a call receives a RVID for the calleeanswering the call, the switch requests a profile for the callee. Thecallee profile replaces or supplements the destination line numberprofile, such that billing of services provided for the call are billedaccording to the callee billing plan. In particular, the RVID and calleeprofile may be filtered and portions of an RVID may be blocked fromreceipt by some entities.

As another alternative to dialed digits from the off-hook line terminal,a caller may utilize a voice calling function of a telephony device forindicating how the call should be routed. For example, a caller may saythe name of a preferred callee. The device or IP 17 may determine aperson within the caller's calling list that matches the voiced name.The matching person's digits are then utilized to route the call.

RVID Authentication Context

Referring now to FIG. 2, there is illustrated a block diagram of theflow of a callee identity authentication in accordance with the method,system, and program of the present invention. Origin device 40 isutilized by a caller to initiate a call. Intermediary device 42 receivesthe call initiation and facilitates a connection between origin device40 and a destination device 44.

The callee answering the call at destination device 44 is prompted by adevice performing caller authentication to provide a voice utterance. ARVID for the callee is provided to intermediary device 42 from thedevice performing caller authentication. The RVID is utilized to accessa callee profile that includes service preferences and billinginformation. In addition, the RVID is returned to origin device 40 foridentifying the callee.

In general, callee identity authentication is performed by receiving avoice utterance from a callee, analyzing the voice utterance for soundqualities and content, and attempting to match the sound qualities andcontent of a voice utterance to a voice template previously recorded fora callee, in order to authenticate the identity of the callee. If thereis a match between the voice utterance and a voice template, then a RVIDis determined for the callee and utilized to authenticate the calleeidentity for retrieving a callee profile and billing the callee.

Callee identity authentication may be initiated by origin device 40. Inparticular, origin device 40 may include voice templates and a featurefor performing the callee identity authentication. In addition, origindevice 40 may access a third party server 48 via network 20, where thirdparty server 48 may provide access to a database of voice templatesand/or perform the callee identity authentication. Origin device 40 willprompt a callee to provide a voice utterance at destination device 44,where intermediary device 42 facilitates communications between origindevice 40 and destination device 44. Origin device 40 then transmits aRVID determined for the callee to intermediary device 42 for use inspecifying services and billing for a call received at destinationdevice 44. Origin device 40 may include a caller telephony device, aPBX, a call center, a private switching system, network servers, featureservers, and other systems which provide call origination. Third partyserver 48 may include a telco application server, a generic applicationserver, a database management system server, and other systems thatfunction outside trusted telephone network 46. In particular,intermediary device 42 may facilitate communication between origindevice 40 and network 20.

In addition, callee identity authentication may be initiated byintermediary device 42. Intermediary device 42 may include databasesystems that store voice templates and an IP for performing calleeidentity authentication. In addition, intermediary device 42 may accesstelco application server 22 outside of trusted telephone network 46 vianetwork 20, where telco application server 22 provides a calleeauthentication service and/or provides access to a database of voicetemplates. Intermediary device 42 may include a PSTN switching networkor networks. However, intermediary device 42 may also include a PBX, acall center, or other private switching system. Further, intermediarydevice 42 may include network servers, Websphere7 (Websphere7 is aregistered trademark of International Business Machines Corporation)servers, and other systems which provide call processing.

Further, caller identity authentication may be initiated by destinationdevice 44. Destination device 44 may include voice templates and afeature for performing the callee identity authentication. In addition,destination device 44 may access a third party server 49 via network 20,where third party server 49 may provide access to a database of voicetemplates and/or perform the callee identity authentication. Destinationdevice 44 determines and transmits a RVID for the callee to intermediarydevice 42 for use in specifying services and billing for a call fromorigin device 40. Destination device 44 may include a callee telephonydevice, a PBX, a call center, a private switching system, networkservers, feature servers, and other systems which provide call receipt.Third party server 48 may include a telco application server, a genericapplication server, a database management system server, and othersystems that function outside trusted telephone network 46. Inparticular, intermediary device 42 may also facilitate communicationbetween destination device 44 and network 20.

In the present invention, a RVID preferably authenticates the identityof a callee. However, it is advantageous that the RVID also includeother information that provide a context for a call. Context for a callmay be determined by a context inference engine functioning within anIntelligent peripheral of trusted telephone network 46 or within a telcoapplication server (e.g. context inference engine 61) accessible vianetwork 20 outside of trusted telephone network 46. In particular, thecontext inference engine preferably determines context from the linesubscriber profile, VID, RVID, caller profile, callee profile, linenumbers accessed, and other information accessible for a call. Types ofcontext that may be determined for a call include, but are not limitedto, the GPS location or time zone of the callee location, the billingplan for the call, the device at which the call is received, the subjectmatter of the call including whether the call is personal or businessrelated, and whether the callee is answering on behalf of another.Further, the identity of the device that performed the calleeauthentication may be included in a RVID. The context inference enginepreferably filters the context for the parties receiving the contextaccording to callee preferences. Advantageously, a callee may specifybilling preferences for billing transactions with the caller accordingto VID, such that the billing preferences are filtered to specifybilling specifications for that call with the caller.

A RVID may be transferred in multiple protocols, including, but notlimited to, Interface Definition Language (IDL). A RVID may include arange of information, where each type of information may be tagged oridentified in some other manner. For example, the following tagged RVIDmay be transmitted to represent an authenticated identity of a callee:

[name] Jon Smith

[device] Jane Doe's cell phone

[location] Central Time zone

[billing plan selection] Jon's wireless provider G

[subject] Project A, business

[authenticated by] Jane Doe's cell phone (verification #4200201010),service provider G (verification #20302022202)

In another example, where the billing service filters the RVID accordingto the call context for placing an order, the following example of atagged VID may be transmitted:

[name] Jon Smith

[device] Jon Smith's business phone

[service billing plan selection] Business wireline provider C

[order billing plan selection] Business credit card account provider G

[subject] order for Project C

[authenticated by] service provider C (verification #2220000220)

Callee Billing Specification Context

With reference now to FIG. 3, there is depicted a block diagram of theflow of a billing plan in accordance with the method, system, andprogram of the present invention. As illustrated, origin device 40transfers a call request to intermediary device 42. The call request maybe an off-hook condition for a wireline device and a network serviceconnection request for a wireless device.

Initially, intermediary device 42 will respond to a call request byestablishing a call register 50 for the call. In particular, aparticular service provider preferably provides service for the linenumber associated with origin device. Call register 50 is preferablywithin the service provider switch that is accessed by the origin deviceline number.

Next, intermediary device 42 may determine the service provider for therequested call destination. The service provider for the requested calldestination may be the same service provider as provides the origindevice line number service or may be a different service provider thanthat accessed for the origin device line number service.

The call is switched to the call destination service provider, where acall register 52 is established for the call. A line subscriber billingplan 54 for the call destination line number may be accessed and loadedinto call register 52. Line subscriber billing plan 54 may be accessedfrom a database within intermediary device 42 or by accessing a databaseoutside trusted telephone network 46.

The call is then extended via the line number connection to destinationdevice 44. When a pickup of destination device 44 is detected,authentication of the callee identity is initiated.

Once a RVID is determined for the callee, intermediary device 42 willrespond by accessing the profile for the RVID. In the example, the RVIDprofile includes a RVID billing plan 56 that is accessed and loaded intocall register 52. RVID billing plan 56 may replace or supplement linesubscriber billing plan 54 within call register 52. The call is thenprocessed according to the billing plans available in call register 50and call register 52.

RVID billing plan 56 may be accessed from a RVID based callee profilestored within a database accessible within trusted telephone network 46.In addition, RVID billing plan 56 may be accessed from servers externalto trusted telephone network 46. In particular, a callee may choose todisclose billing information at multiple locations external to trustedtelephone network 46. In addition, a callee may choose to change billinginformation at systems management server 28 and other servers externalto trusted telephone network 46. For example, a callee may accessmanagement console 32 within systems management server 28 to updateservice and billing preferences according to RVID. Intermediary device42 may then access systems management server 28 to obtain billinginformation according to VID.

A billing service may be initiated by a service provider to handlebilling of a call according to the callee's billing plan. In theexample, a billing service 60 is accessible from the telco applicationserver via network 20 outside trusted telephone network 46. In addition,a billing service 62 is accessible within trusted telephone network 46within an Intelligent Peripheral.

In particular, a billing service may prompt a callee to indicate, fromthe callee's billing plan, which service provider should be utilized tohandle the call and where any additional charges for the call may beincurred. The billing service may negotiate charges between serviceproviders. In addition, the billing service may access an elected calleeaccount provider, such as callee account provider 64, to charge thecallee for services. A callee account provider may be located within oroutside trusted telephone network 46. In addition, an account providermay also be a service provider or may operate independent of a serviceprovider. For example, an account provider may manage a debit account, acredit account, or other type of account for a callee.

In addition, a billing service may negotiate payment for an order placedby the callee with a vendor according to callee's billing plan. Inparticular, a telemarketer, vendor, or automated service may call thecallee from a call center or other telephony device. Upon the calleeagreeing to a product or service offered by the caller, the callee mayauthorize an order that allows the caller to bill an account providerfor the callee. Advantageously, the caller needs only to initiate thebilling service that receives the RVID, callee account providerselection, where the billing service is then enabled to facilitatepayment from the callee account provider to a selected caller accountprovider.

In particular, the vendor receives the RVID and account providers fromthe callee billing plan. In addition, other callee profile informationmay indicate shipping and billing addresses. The vendor preferably loadsthe RVID and account providers into an order form, such that the calleeneed only select from among account providers to finish the order. Thevendor may select one of the account providers for the form where thecallee has the option to change to another account provider. Inaddition, in some cases only one debit account provider is available orthe callee may indicate a preference for a particular account providerfor orders with the vendor. Advantageously, by automatically filling inthe order form, the callee need only enter or say a confirmation for theorder to be processed.

Advantageously, the billing service receives the order and negotiatespayment from the callee account provider according to the RVID to avendor account provider. Alternatively, the vendor account provider maydirectly contact the callee account provider with the RVID. Either way,the callee account numbers may remain stored at the account provider andauthentication of access to the account is provided by the RVID.Authenticating a billing transaction according to an authenticated voiceidentification adds more security to a callee's account than istraditionally provided by a credit card number that any person couldutilized to place orders.

According to an advantage of the present invention, the vendor maytransmit the order to destination device 44 in text or other format,where destination device 44 is enabled to display the order information.From the display a callee may select from account providers, shippingaddresses, and other variables by keypad, voice, or touch selection. Theselections are preferably transmitted as digital signal selections tothe vendor for updating the order. A callee may be interacting with arepresentative and/or an interactive voice recognition unit (IVRU) forplacing the order.

Referring now to FIG. 4, there is an illustrative representation of theinformation within billing plans in accordance with the method, system,and program of the present invention.

In the example, in response to a destination line subscriber profilerequest, a subscriber profile 54 is returned and stored within callregister 50. In the example, subscriber profile 54 indicates the linenumber, the name of the subscriber assigned to a line number, andbilling plan 54.

Subscriber billing plan 54 may include information including, but notlimited to, selected service providers and other account providers. Abilling plan may include one service provider utilized for generalwireline service and another service provider utilized for long distanceservice. Further, a billing plan may include other account providers,such as a debit account provider for charging for use of a call returnservice or a collect call. Charges may be distributed to each of theservice providers and account providers depending on the type of chargeand the type of account.

According to an advantage of the present invention, the billinginformation for a call in call register 52 may be supplemented orreplaced by RVID billing plan 56. In the example, the billinginformation for the RVID replaces the billing information for the linesubscriber, such that service provided to the callee is billed to thecallee.

In addition to billing information, RVID and context information 58 mayalso remain in call register 52. In the example, RVID and contextinformation 58 includes a RVID ID, a RVID name, the line number, and anidentifier for the device. In alternate embodiments, additional billing,RVID, and call context information may be included in call register 52.In particular, where the destination line subscriber and the callee arethe same person, it is still advantageous to supplement call register 52with RVID and context information 58.

In the present example, RVID billing plan 56 indicates the providersselected by the callee. First, a wireless service provider is electedunder a “Plan C” offered by the wireless service provider. “Plan C” mayinclude, for example, a certain number of minutes per month at a flatrate. Preferably, those minutes are available to the callee at anywireless device accessible to the callee.

Next, a wireline service provider is elected, where the wireline serviceis provided according to “plan D”. “Plan D” may include, for example, aflat rate per month of use of wireline devices and several servicesselected by the callee. In this example, the callee has selected callwaiting, call messaging, and call forwarding, to be provided under “planD”.

Further, in the example, a debit account provider is selected, where thedebit account is established to pay for collect call service charges.The billing service will negotiate payment from the debit accountprovider to the collect caller service provider selected by a callermaking a collect call.

Additionally, a credit card account provider is selected, where thecredit card account is designated for charges incurred for orders placedduring the call. The callee is not required to reenter billinginformation for each different vendor at which an order is placed. Inaddition, the callee is not required to disclose account numbers, justthe account provider, where the authenticated RVID provides theauthentication for accessing the caller account at the account provider.In particular, only portions of a callee RVID, such as the callee name,account provider and shipping address may be provided to the vendor,however the other portions of the RVID may be accessible to the billingservice with the order to maintain the security of the RVID.

According to one advantage of the present invention, the charges for acollect call accepted by a callee through destination device 44 arebilled to the callee, rather than the line subscriber for destinationdevice 44. In addition, an individual may select to forward calls to afriend's house line number. Then when that individual receives a call atthe friend's house line number, billing associated with servicesrequested for the call are billed to the individual, as the callee,rather than billing the services associated with the call according tothe friend's house line number profile.

With reference now to FIGS. 5A & 5B, there is depicted a flow diagram ofa signal flow and processing of a call in accordance with the method,system, and program of the present invention. A standard telephonedevice is assumed for the “tel” origin device in the present example.However, a similar signal flow may be applied to other types of origindevices.

The caller lifts a handset creating an off-hook state in the origindevice and a corresponding change in state of an off-hook signal to theorigin central office (step S1). In response to detecting an off-hookstate in the origin device, the origin central office establishes aregister for the call and requests a line subscriber profile from theSCP and/or an external network server (step S2). A line subscriberprofile including preferred services and a billing plan is returned tothe origin central office (step S3). The origin central office loads theline subscriber profile into the call register (step S4) and extends adial tone to the origin device (step S5).

The origin device then transmits dialed digits to the origin centraloffice (step S6). A caller may utilize a keypad to enter a telephonenumber or utilize a voice dial feature if available. Dialed digits maybe received at other points in the process and loaded into the callregister until needed for processing the call.

Next, the origin central office determines the destination serviceprovider for dialed digits (step S7). The origin central office mayaccess a directory that indicates which service provider is assigned tothe dialed digits. The call is then transferred to the destinationservice provider central office (step S8). In particular, alternatively,the origin service provider and destination provider may be the same,such that a call need not be transferred.

The destination central office establishes a call register for the calland triggers a request to the SCP or an external network server for aline subscriber profile for the destination line number (step S9). Theline subscriber profile is returned, including billing information andservice preferences (step S10). The destination central office loads thedestination line subscriber profile into the call register (step S11)and extends a ring signal with the call to the destination device (stepS12).

In response to detecting a pickup of the destination device, an off-hookpickup signal is returned from the destination device to the destinationcentral office (step S13). Next, the destination central office extendsa callee authentication service request to an IP or to the telcoapplication server (step S14). The callee authentication server willprompt a callee to provide a voice utterance, match the voice utterancewith a voice template and authenticate the callee identity as a RVIDwhich is returned to the destination central office (step S15).Alternatively, the origin device or destination device may performcaller authentication, where the RVID is received at the destinationcentral office from the origin device or destination device.

The destination central office updates the call register with the RVIDand extends a request for a RVID based profile to the SCP and/orexternal network servers (step S16). The RVID based profile is returnedfrom locations where the caller has selected to make RVID basedinformation available (step S17). The destination central office thenloads the RVID based profile, including service preferences and billinginformation, into the call register (step S18). In addition, thedestination central office may initiate a billing service to negotiatebilling for services billable to a callee during a call (step S19). Inparticular, the billing service may be provided internally by an IP orexternally by a telco application server. For example, where acceptanceof a collect call charge is agreed to by the callee, the billing servicemanages negotiations between the service provider for a collect call andthe billing plan selected by the callee.

The call is then processed to facilitate communications between theorigin device and the destination device accessed in association withthe dialed digits (step S20). In particular, processing the call alsoincludes providing services designated in the RVID based callee profileand billing for services according to the callee billing plan.

Referring now to FIG. 6, there is illustrated an illustrative embodimentof a telephone based order in accordance with the method, system, andprogram of the present invention. As depicted, a vendor order center 58is in communication with destination device 44, utilized by a calleeidentified by a RVID.

In the example, the callee has placed an order from the vendor forproduct C. The callee name, product specification, shipping address, andaccount provider are loaded into the order form 70. A text or voiceautomated version of order form 70 may be transmitted to origin device40.

According to an advantage of the present invention, as previouslydescribed, the context for a call may be determined by a contextinference engine and forwarded to vendor order center 58 and billingservice 60. The context for the call may be utilized to filter a billingplan to determine the most likely selections by the callee for theorder.

An advantage of obtaining context for a call is that the context mayindicate whether the call is personal or business based. If the call ispersonal, then a personal billing address and personal account providermay be selected automatically. If the call is business, then a businessbilling address and business account provider may be selectedautomatically by an order controller 84 within vendor order center 58 orbilling service 60.

In addition, context may include scheduling information which mayindicate a date by which an ordered product or service is needed. Forexample, if the schedule indicates a wedding date and the order is for awedding gift, then the context indicates the number of days availablefor shipping. Vendor order center 58 or billing service 60 may select ashipping option that meets the target date. On a similar note, thecallee profile may indicate that the callee prefers a gift wrappingservice if available, such that vendor order center 58 may automaticallyadd gift wrapping to an order if the service is available.

In particular, where multiple options are available for an entry withinorder form 70, vendor order center 58 may fill in the entry with themost likely callee selection. The order form transferred to the calleepreferably includes the most likely selections, but provides the calleewith the option to change that selection to one of the others includedin the billing plan. By automatically filling in order form 70, thecheck-out process may be expedited. In particular, the callee ispreferably provided the option to enter a singleverification/authorization to complete the order during the check-outprocess.

Destination device 44 preferably includes a graphical user interface 76for graphical output of the text from of order form 70. Alternatively,destination device 44 preferably includes an earpiece 78 comprising aspeaker through which a voice automated version of order form 70 may beoutput.

The callee may provide inputs via keypad entry, voice entry or touchentry, such as with a stylus. In particular, the order received atdestination device 40 is filled in with selections from the calleebilling plan and callee profile. However, the callee may select fromother options in the callee billing plan to change the form.

Where the callee does not have changes to the selections made for theorder, the callee preferably verifies the order during the check-outprocess by a single entry. The single entry may comprise a keypad entry,a voice entry via microphone 79 or a stylus touch entry. The entrypreferably verifies that an order is correct and may be processed.

Once the order is confirmed by the callee, billing controller 86coordinates transmission of the order to billing service 60 with theRVID. In particular, while the RVID provided to vendor order center 58is filtered to only show the callee's name, billing service 60 may beauthorized to receive more portions of the RVID than vendor order center58.

Billing service 60 preferably accesses callee account provider 64 withthe RVID name, RVID ID, RVID verification number, charge amount andorder information. Callee account provider 64 preferably includes anaccount database 76 that includes account numbers, balances, andtransactions histories stored according to RVID. Callee account provider64 preferably renders a payment for the order to billing service 60.Billing service 60 then routes the payment to a vendor account provider80, where vendor account provider 80 include an account database 82 ofaccount numbers, balances, and transactions stored according to vendorID. Accordingly, payer and payee account information is protected fromany entity except billing service 60, which is preferably a secureservice.

It should be noted that while the present invention is described withreference to vendor order center 58 as a call center for controllingorders from a business entity, that business entity may be any size froma single individual to a multinational corporation. In addition, vendororder center 58 may facilitate a plurality of terminals or a singledestination device terminal. Moreover, order controller 84 preferablycontrols automatically filling in billing related information into orderform 70, but an IVRU or a representative may prompt the callee for theproducts and services to be ordered.

Further, it should be noted that while the present invention isdescribed with reference to billing a callee for payment of an orderplaced via telephone, all other money transactions between entitiesinitiated by a telephone call are incorporated into the presentinvention.

Moreover, while the present invention is described with reference topayments made by the callee, the present invention also incorporatesfinancial transactions from the caller to the callee. In addition, thecaller preferably provides information according to the RVID forupdating a callee profile to indicate the products or servicespurchased.

An advantage of the present invention is that a telemarketing companymay receive payment from a callee without requiring the callee toprovide a credit card number or other direct account number. In anotherexample, a child may call a parent, requesting money for an account. Thechild indicates the parent may authorize transfer of a particular amountof money from the parent's account to the child's account, withoutrevealing an account number or requiring an additional call to theaccount provider or sending a check to the child. Other examples willalso be understood to include situations where it is advantageous for afinancial transaction to occur during a call between two parties.

Referring now to FIG. 7, there is depicted a high level logic flowchartof a process and program for controlling a billing service in accordancewith the method, system, and program of the present invention. Asillustrated. As illustrated, the process starts at block 90 andthereafter proceeds to block 92. Block 92 depicts a determination as towhat event occurred when an event occurs. If a RVID/billing plan arereceived for a new call, then the process passes to block 94. If anorder is received, then the process passes to block 102.

Block 94 depicts filtering the callee billing plan according to the callcontext. Next, block 96 illustrates prompting the callee to select frommultiple options in the billing plan after filtering. For example, ifthe callee has multiple wireless providers for a wireless call, then thecallee may be prompted to select one wireless provider for providingtelephone services for the call. Thereafter, block 97 depictstransferring the billing selections to the current service provider,such that the call may be switched to the selected service provider orremain at the current service provider but charge the selected serviceprovider account. In particular, block 98 illustrates negotiatingbilling between service providers for the call, when needed. Next, block100 illustrates monitoring chargeable service utilized during the calland negotiating payment for those services from the callee accountproviders.

Block 102 depicts establishing a secure connection with the calleeaccount provider selected in an order. If more than one callee accountprovider is selected for an order for split billing, then multiplecallee account providers may be contacted. Next, block 104 illustratesnegotiating payment from the callee account provider to a vendor accountprovider. Thereafter, block 106 depicts returning an payment number andconfirmation to the vendor order center, and the process ends.

With reference now to FIG. 8, there is illustrated a block diagram ofthe billing service in accordance with the method, system, and programof the present invention. As depicted, billing service 60 preferablyincludes multiple selectable service controllers.

For controlling billing for general telephone services, generaltelephone service controller 120 is initiated. General telephone servicecontroller 120 preferably determines the service provider for a call andcoordinates transfer of the call to that service provider or payment tothe current service provider.

For controlling billing for billable telephone services, such as longdistance service, generic telephone service controller 122 is initiated.Generic telephone service controller 122 preferably monitors billableservices during a call and negotiates payment for those services by acallee account provider.

For controlling other financial transaction orders, callers may requestdifferent order services from among order services 124. Any of orderservices 124 may be initiated by a caller or callee. The billing serviceautomatically captures the caller VID and callee RVID to facilitate thetransaction.

In particular, a peer-to-peer service 126 preferably processes an orderfor a shift in financial funds from the callee to the caller, initiatedby either the caller or callee. Peer-to-peer service 126 may prompt thecallee to provide the transfer amount and select an account provider andprompt the caller to select an account provider.

In addition, a product/service purchase service 128 processes an orderfor a payment from the callee for a product or service purchased fromthe caller. Product/service purchase service 128 preferably receivesaccount provider selections and an order amount and description tofacilitate the transaction.

While the present invention has been described with reference to billinga single callee account provider, in alternate embodiments, multiplecallees may be billed during a call, where each callee logs onto thecall with a voice authentication and the RVIDs of each callee areutilized. For example, where a caller calls a callee and talks with thecallee for a particular amount of time, but then would like to speak toanother person available during the same call, the new callee preferablylogs on with an RVID and billing continues for the RVID billing plan.

It is important to note that while the present invention has beendescribed in the context of a fully functioning data processing system,those of ordinary skill in the art will appreciate that the processes ofthe present invention are capable of being distributed in the form of acomputer readable medium of instructions and a variety of forms and thatthe present invention applies equally regardless of the particular typeof signal bearing media actually used to carry out the distribution.Examples of computer readable media include recordable-type media, suchas a floppy disk, a hard disk drive, a RAM, CD-ROMs, DVD-ROMs, andtransmission-type media, such as digital and analog communicationslinks, wired or wireless communications links using transmission forms,such as, for example, radio frequency and light wave transmissions. Thecomputer readable media may take the form of coded formats that aredecoded for actual use in a particular data processing system,

While the invention has been particularly shown and described withreference to a preferred embodiment, it will be understood by thoseskilled in the art that various changes in form and detail may be madetherein without departing from the spirit and scope of the invention.

What is claimed is:
 1. A method comprising: receiving, by a financialservice, a first authenticated identifier for a first user from adestination device, associated with the first user, during a datatransmission between the destination device and at an origin deviceassociated with a second user; capturing the first authenticatedidentifier and a second authenticated identifier for the second user;retrieving financial information for the second user according to thesecond authenticated identifier; authenticating an identity of the firstuser using the first authenticated identifier through an authenticationservice in communication with the financial service; accessing financialinformation for the first user using the first authenticated identifier;receiving, during the data transmission, a fund transfer request for afund transfer between the first user and the second user; accessing anorder placed by the first user, wherein an amount of the funds transfercorresponds to a payment for the order; and processing the fund transferrequest using the financial information for the first user.
 2. Themethod of claim 1, further comprising: automatically filling in an orderform with the financial information for the first user for the fundtransfer request based on the order.
 3. The method of claim 2, furthercomprising: transmitting the order form to the destination device,wherein the order is operable to be completed by a single authorizationentry at the destination device to authorize the financial service toaccess and use the financial information for the first user with thefirst authenticated identifier.
 4. The method of claim 1, furthercomprising: accessing, by the financial service, the financialinformation for the first user with the first authenticated identifierto process the payment based on the financial information for the firstuser and the first authenticated identifier.
 5. The method of claim 1,further comprising: receiving a request by the first user at thedestination device to initiate the fund transfer request, where thefinancial service identifies an account provider for the second user;prompting the first user at the destination device to enter an amountfor the fund transfer request and a first account of the first user; andprocessing the amount to the account provider using the first accountand the first authenticated identifier.
 6. The method of claim 1,further comprising: receiving a request by the first user at thedestination device to initiate the order; prompting the first user atthe destination device to enter an amount for the order and a firstaccount, of the first user, at the financial information for the firstuser; and prompting the second user at the origin device to select asecond account, from wherein processing the fund transfer comprisesprocessing the amount from the first account to the second account. 7.The method of claim 1, wherein the first authenticated identifiercomprises a biophysical identifier.
 8. The method of claim 7, whereinthe biophysical identifier provided by the first user comprises one of avoice identifier, an eye scan, and a fingerprint of the first user. 9.The method of claim 7, wherein the financial service authenticates theidentity of the first user using the biophysical identifier.
 10. Afinancial service system, comprising: a non-transitory memory storinginstructions; one or more hardware processors coupled to thenon-transitory memory and configured to execute the instructions tocause the financial service system to perform operations comprising:receiving a first authenticated identifier for a first user from adestination device, associated with the first user, during a datatransmission between the destination device and an origin deviceassociated with the second user; capturing the first authenticatedidentifier and a second authenticated identifier for the second user;retrieving financial information for the second user according to thesecond authenticated identifier; authenticating an identity of the firstuser using the first authenticated identifier through an authenticationservice in communication with the financial service system; accessingfinancial information for the first user using the first authenticatedidentifier; receiving, during the data transmission, a fund transferrequest for a fund transfer between the first user and the second user;accessing an order placed by the first user, wherein an amount of thefunds transfer corresponds to a payment for the order; and processingthe fund transfer request using the financial information for the firstuser.
 11. The financial service system of claim 10, wherein theoperations further comprise: automatically filling in an order form withthe financial information for the first user for the fund transferrequest based on the order.
 12. The financial service system of claim11, wherein the operations further comprise: transmitting the order formthe destination device, wherein the order is operable to be completed bya single authorization entry at the destination device to authorize thefinancial service system to access and use the financial information forthe first user with the first authenticated identifier.
 13. Thefinancial service system of claim 10, wherein the operations furthercomprise: accessing, by the financial service system, the financialinformation for the first user with the first authenticated identifierto process the payment based on the financial information for the firstuser and the first authenticated identifier.
 14. The financial servicesystem of claim 10, wherein the operations further comprise: receiving arequest by the first user at the destination device to initiate the fundtransfer request, where the financial service system identifies anaccount provider for the second user; prompting the first user at thedestination device to enter an amount for the fund transfer request anda first account of the first user; and processing the amount to theaccount provider using the first account and the first authenticatedidentifier.
 15. The financial service system of claim 10, wherein theoperations further comprise: receiving a request by the first user atthe destination device to initiate the order; prompting the first userat the destination device to enter an amount for the order and a firstaccount at the financial information for the first user; and promptingthe second user at the origin device to select a second account whereinprocessing the fund transfer comprises processing the amount from thefirst account to the second account.
 16. The financial service system ofclaim 10, wherein the first authenticated identifier comprises abiophysical identifier.
 17. The financial service system of claim 16,wherein the biophysical identifier provided by the first user comprisesone of a voice identifier, an eye scan, and a fingerprint of the firstuser.
 18. The financial service system of claim 16, wherein thefinancial service system authenticates the identity of the first userusing the biophysical identifier.
 19. A non-transitory machine-readablemedium having stored thereon machine-readable instructions executable tocause performance of operations comprising: receiving, by a financialservice, a first authenticated identifier for a first user from adestination device, associated with the first user, during a datatransmission between the destination device and an origin deviceassociated with a second user; capturing the first authenticatedidentifier and a second authenticated identifier for the second user;retrieving financial information for the second user according to thesecond authenticated identifier; authenticating an identity of the firstuser using the first authenticated identifier through an authenticationservice in communication with the financial service; accessing financialinformation for the first user using the first authenticated identifier;receiving, during the data transmission, a fund transfer request for afund transfer between the first user and the second user; accessing anorder placed by the first user, wherein an amount of the funds transfercorresponds to a payment for the order; and processing the fund transferrequest using the financial information for the first user.
 20. Thenon-transitory machine-readable medium of claim 19, wherein the firstauthenticated identifier comprises a biophysical identifier.