System and Method for Message-Based Access

ABSTRACT

A method and system for providing message-based access to services includes receiving a request message from a mobile subscriber relating to a service that is desired by the mobile subscriber, routing the request message for processing, performing one or more activities in accordance with the requested service, returning a response message to the mobile subscriber, and facilitating/enabling/etc. access to the requested service.

This application is a continuation of U.S. application Ser. No.12/120,327, filed May 14, 2008, which is a continuation of U.S.application Ser. No. 11/244,065, filed Oct. 6, 2005, which claims thebenefit of U.S. Provisional Patent Application No. 60/616,122, filed onOct. 6, 2004, all of which are incorporated herein by reference in theirentireties.

BACKGROUND

1. Field of the Invention

The present invention relates generally to telecommunications services.More particularly, the present invention relates to the utilization ofvarious wireless messaging paradigms, including, inter alia, ShortMessage Service (SMS), Multimedia Message Service (MMS), wirelesselectronic mail (e-mail) and Instant Messenger (IM), to facilitateaccess to services, including, inter alia, the increasingly popularwireless fidelity (Wi-Fi).

2. Background of the Invention

While the ‘wireless revolution’ continues to march forward it carrieswith it a range of untapped, or under-exploited, potentials. As thevarious technological (e.g., ubiquitous cross-carrier interoperability),social (e.g., user or subscriber inertia), etc. impediments arebreached, wireless data services continue to grow and continue toprovide significant revenue opportunities to wireless carriers. Tosustain that growth a continual stream of new ‘singular’ wireless dataproducts and services is required.

One such product/service is the immensely popular Wireless Fidelity orWi-Fi.

Private Wi-Fi environments are frequently deployed by individuals withintheir homes to provide un-tethered network access within their home.Additionally, private Wi-Fi environments have been, and continue to be,deployed by companies and other organizations within their buildings andcampus complexes to provide their employees and workers with wirelessnetwork access.

Wi-Fi ‘hotspots’ or access points have been deployed at a variety ofpublic locations, and new hotspots are being raised at anever-increasing rate at, amongst other public locations, airports,hotels, conference centers, coffee shops, fast food restaurants, sportsstadiums, etc.

As a potential service user moves about from one public location toanother it is not always clear or obvious to that user what services maybe available at any given location. To address this challenge mechanismshave become available that identify for a potential service user thelocation, availability, etc. of a desired service.

While mechanisms have begun to appear that identify the location and theavailability of services such as public Wi-Fi hotspots, no mechanismsyet exist to address the many challenges that inevitably arise from thefact that each public Wi-Fi hotspot is effectively a separate service‘island,’ distinct and apart from other (proximate or distant) Wi-Fihotspots. Two of the many challenges are (1) payment and (2) access.

The present invention addresses the payment and access challenges andthus aids significantly in the further adoption and use of public Wi-Fiand other services that are similarly situated.

SUMMARY OF THE INVENTION

According to one exemplary aspect, the present invention relates to amethod for providing access to a service, comprising receiving a requestmessage from a mobile subscriber relating to a service that is desiredby the mobile subscriber, routing the request message for processing,performing one or more processing steps on the request message inaccordance with said service including generating a temporary User IDand Password, returning a response message to the mobile subscriber, andfacilitating access to the desired service.

According to another exemplary aspect of the present invention, a systemis disclosed for facilitating access to a service. The system includes amobile wireless device, a provider network, an inter-carrier vendornetwork, and a service. The system is operable to route a requestmessage relating to a service that is desired by the user of the mobilewireless device from the mobile wireless device through the providernetwork and to an inter-carrier vendor resulting in an appropriate setof processing activities in accordance with the requested service andthe dispatch of a response message to the mobile wireless device withthe response message facilitating access to the desired service.

These and other features of embodiments of the present invention will bemore fully explained below in conjunction with the drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagrammatic presentation of an exemplary user experiencethat may be realized through the instant invention.

FIG. 2 is a schematic diagram illustrating the relative locations of aninter-carrier vendor, wireless carriers and a service provider, inaccordance with embodiments of the invention.

DETAILED DESCRIPTION

To better understand the particulars of the present invention considerfor a moment the following hypothetical example.

In this example, Alice is a potential service user who is traveling onbusiness and finds herself with an hour of time during which she wouldlike to access her company's e-mail facility from her laptop computer sothat she can check for new e-mail messages and manage (respond to,delete) existing e-mail messages.

Nearby Alice notices a posted sign describing the presence of a publicWi-Fi hotspot at her location (any one of, for example, an airport, ahotel, a conference center, a coffee shop, a fast food restaurant,etc.). The sign indicates that one may pay for access to the hotspot(e.g., in one hour increments), and receive credentials for accessingthe hotspot, by sending an SMS message to a particular destinationaddress (e.g., a Telephone Number [TN]).

On her mobile telephone Alice composes an SMS message, directed to theindicated destination address and requesting one hour of access to thehotspot, and dispatches the message. Following the successful receiptand processing of Alice's SMS message (described in detail below), Alicereceives a reply SMS message thanking her for her use of the hotspot andincluding a temporary User ID and Password that she may use to accessthe hotspot.

On her laptop computer Alice enters the temporary User ID and Passwordthat she received in the reply SMS message, gains access to the hotspot,and reaches her company's e-mail facility through the Internet (as madeavailable via the hotspot).

The hypothetical example that was just presented may be better and morefully understood through the following discussion of FIG. 1.

At Step A 132, Alice 110, our potential service user, observes a sign106 that is posted near her that describes the presence of a Wi-Fihotspot 102. Alice follows the instructions that are presented on thesign 106, composes on her mobile telephone 108 a request SMS message 130soliciting one hour of access to the hotspot 102, and dispatches therequest SMS message 130. (It is important to note that other wirelessmessaging paradigms, including inter alia MMS, may be employed as analternative to SMS; to simplify the description that follows anSMS-based model will be employed.)

The instructions that are presented on the sign 106 may indicate thatAlice should address (direct) her request SMS message 130 to a TN, e.g.,703-555-1234.

Alternatively, the instructions that are presented on the sign 106 mayindicate that Alice should address (direct) her request SMS message 130to a Common Short Code (CSC), e.g., 12345. A description of a common(i.e., universal) short code environment may be found in pending U.S.patent application Ser. No. 10/742,764 entitled “UNIVERSAL SHORT CODEADMINISTRATION FACILITY.”

The instructions that are presented on the sign 106 may indicate thatAlice should specify in her request message 130 the desired amount ofaccess time in numerical form with a unit of measure (e.g., hour,minute, etc.) qualifier.

At Step B 136, Alice's Wireless Carrier (WC) 112 receives Alice'srequest SMS message 130, examines the destination address (e.g., the TNor the CSC), identifies the destination address as residing outside ofits network, and passes the request message 134 along to its messagingInter-Carrier Vendor (ICV) 114 for processing.

At Step C 140, a Gateway (GW) 116 at Alice's WC's 112 messaging ICV 114receives Alice's request SMS message 134. reference is made to pendingU.S. patent application Ser. No. 10/426,662, entitled “AN INTERMEDIARYNETWORK SYSTEM AND METHOD FOR FACILITATING MESSAGE EXCHANGE BETWEENWIRELESS NETWORKS,” for a description of a messaging ICV 114 and asummary of various of the services/functions/etc. that are performed bysame. This application is incorporated herein by reference.

The use of messaging ICV 114, although not required, providessignificant advantages. As shown, for example, in FIG. 2, messaging ICV114 is disposed between multiple wireless carriers 205 a, 205 b on oneside and a service provider 210 (in this case a Wi-Fi service provider)on the other side. Consequently, as long as the messaging ICV 114 has arelationship with “Alice's” particular wireless carrier, Alice will beable to obtain access to the services offered by service provider 210.

Referring again to FIG. 1, the messaging ICV 114 examines thedestination address of the received request SMS message 134, determinesthat the message should be processed by a Service Access Subsystem (SAS)118, and appropriately routes the request SMS message 138.

The SAS 118 receives Alice's request SMS message 138 and, possiblyamongst other activities, extracts key data elements (e.g., Alice's TNas the source address of the message, the requested amount of accesstime) from the message, validates the extracted data elements (e.g., isAlice's TN on any ‘blacklist’ of users who are to be denied service, oris the requested amount of access time structurally correct andreasonable in size?), completes the required billing transaction 120(this will be further explained below), generates a temporary User ID126 and Password 128 (or credentials) that are unique to Alice and whichare configured to expire/die at the end of the requested accessinterval, and associates in its internal data store 122 Alice's TN 124with, at a minimum, the temporary credentials (i.e., User ID 126 andPassword 128).

As described above, as part of its processing activities the SAS 118completes the required billing transaction 120 so that Alice mayactually pay for her upcoming access to the hotspot. The billingtransaction 120 may take any number of forms including, inter alia:

1) The appearance of a line item charge on the bill or statement thatAlice receives from her WC. Exemplary mechanics and logistics associatedwith this approach are described in pending U.S. patent application Ser.No. 10/837,695 entitled “SYSTEM AND METHOD FOR BILLING AUGMENTATION,”which is incorporated herein by reference. Other ways of line itembilling are easily implemented by those skilled in the art.

2) The charging of a credit card or the debiting of a debit card. Theparticulars (e.g., number, expiration date) of the card that is to beused may be included in the originating SMS message (i.e., the SMSmessage that Alice composed requesting access to the hotspot, asdescribed above for Step A 132). Alternatively, the particulars of thecard that is to be used may be retrieved from an account that Aliceestablished previously through a publicly-available Web site (or othermeans) that is associated (in some way) with the hotspot serviceprovider.

3) The decrementing of a pre-paid account that Alice establishedpreviously through a publicly-available Web site (or other means) thatis associated (in some way) with the hotspot service provider.

4) Other means including, inter alia, pre-paid or ‘countdown’ cards,redemption coupons, etc.

At Step D 144, the SAS 118 constructs a reply SMS message 142 that isaddressed to Alice (i.e., to the TN of Alice's mobile telephone) andthat contains Alice's temporary User ID 126 and Password 128. Themessage 142 is dispatched to the ICV GW 116.

The generated reply message 142 may optionally contain an informationalmessage—e.g., ‘Thank you for visiting our hotspot!’ or ‘Please visit oneof our other nearby hotspots at . . . ’, etc. The informational messagemay be selected statically (e.g., all generated reply messages areinjected with the same informational message), randomly (e.g., agenerated reply message is injected with an informational message thatis randomly selected from a pool of available informational messages),or location-based (i.e., a generated reply message is injected with aninformational message that is selected from a pool of availableinformational messages based on the current physical location of therecipient of the reply message).

The generated reply message 142 may optionally contain advertising—e.g.,textual material if an SMS model is being utilized, or multimedia(images of brand logos, sound, video snippets, etc.) material if an MMSmodel is being utilized. The advertising material may be selectedstatically (e.g., all generated reply messages are injected with thesame advertising material), randomly (e.g., a generated reply message isinjected with advertising material that is randomly selected from a poolof available material), or location-based (i.e., a generated replymessage is injected with advertising material that is selected from apool of available material based on the current physical location of therecipient of the reply message).

At Step E 148, the GW 116 at Alice's WC's 112 messaging ICV 114 receivesthe SAS's 118 reply SMS message 142, examines the destination address(i.e., the TN of Alice's mobile telephone), identifies the destination(i.e., Alice's) WC 112, and appropriately routes the message 146.

At Step F 152, Alice's WC 112 receives the reply SMS message 150,examines the destination address (i.e., the TN of Alice's mobiletelephone 108), and delivers the message 150 to Alice's mobile telephone108. Alice retrieves the temporary User ID 126 and Password 128 from thereceived SMS message 150 and on her laptop computer 104 enters thetemporary credentials to gain access to the hotspot 102.

Although not explicitly depicted in FIG. 1, the hotspot 102 that Aliceconnects to is in communication, either directly or indirectly, with theSAS 118 (e.g., using any of the numerous publicly available InternetProtocol [IP]-based communication mechanisms, using an SS7-basedcommunication mechanism, etc.) to, amongst other activities, validatethe temporary credentials (User ID 126 and Password 128) that areentered by Alice and identify the validity period for those credentials(i.e., at what specific time will those credentials expire or die andAlice's hotspot access cease). It will be readily apparent to one ofordinary skill in the relevant art that this may be accomplished throughnumerous arrangements or configurations.

Numerous enhancements, extensions, etc. to the model that was justdescribed are easily possible. For example, as a user's access time isabout to expire the SAS may dispatch an SMS message to the user (a)politely reminding them of the upcoming expiration of their access timeand (b) asking if they would like to purchase another block of accesstime (at a quantity equal to, or possibly different from, their previouspurchase).

It is important to note that the hypothetical example that was presentedabove, which was described in the narrative and which was illustrated inthe accompanying FIG. 1, is exemplary only. It will be readily apparentto one of ordinary skill in the relevant art that numerous alternativesto the presented example are easily possible and, indeed, are fullywithin the scope of the present invention.

The discussion that was just presented employed two specific wirelessmessaging paradigms—SMS and MMS. These paradigms potentially offer anincremental advantage over other paradigms, such as e-mail, in thatnative support for SMS and/or MMS is commonly found on the mobiletelephone that a potential service user would be carrying; for example,e-mail may not be available to a consumer until the consumer hadestablished access to a public Wi-Fi hotspot and launched their Webbrowser or their e-mail client application to reach their e-mailfacility. However, it is to be understood that it would be readilyapparent to one of ordinary skill in the relevant art that otherparadigms such as, inter alia, e-mail and instant messaging (IM), arefully within the scope of the present invention.

While the discussion that was just presented focused on Wi-Fi, it willbe readily apparent to one of ordinary skill in the relevant art thatthe application of the present invention to numerous other services iseasily possible and indeed is fully within the scope of the presentinvention.

The following list defines acronyms as used in this disclosure.TABLE-US-00001 Acronym Meaning CSC Common Short Code GW Gateway ICVInter-Carrier Vendor IM Instant Messenger IP Internet Protocol MMSMultimedia Message Service SAS Service Access Subsystem SMS ShortMessage Service TN Telephone Number WC Wireless Carrier Wi-Fi WirelessFidelity

The foregoing disclosure of the preferred embodiments of the presentinvention has been presented for purposes of illustration anddescription. It is not intended to be exhaustive or to limit theinvention to the precise forms disclosed. Many variations andmodifications of the embodiments described herein will be apparent toone of ordinary skill in the art in light of the above disclosure. Thescope of the invention is to be defined only by the claims appendedhereto, and by their equivalents.

Further, in describing representative embodiments of the presentinvention, the specification may have presented the method and/orprocess of the present invention as a particular sequence of steps.However, to the extent that the method or process does not rely on theparticular order of steps set forth herein, the method or process shouldnot be limited to the particular sequence of steps described. As one ofordinary skill in the art would appreciate, other sequences of steps maybe possible. Therefore, the particular order of the steps set forth inthe specification should not be construed as limitations on the claims.In addition, the claims directed to the method and/or process of thepresent invention should not be limited to the performance of theirsteps in the order written, and one skilled in the art can readilyappreciate that the sequences may be varied and still remain within thespirit and scope of the present invention.

1. A server-based method for providing message-based access to awireless access point, the server-based method comprising: receiving arequest message from a Wireless Device (WD) of a Mobile Subscriber (MS),the request message (a) being a first communication indicative of adesire by the MS to gain access to the access point and (b) comprisingan indicia of the WD and an indicia of a desired access time; performinga plurality of processing steps on the request message including atleast (a) generating temporary, time-sensitive User Information (UI) and(b) preserving in a repository an association between the UI and atleast the indicia of the WD; and returning a response message to the WD,the response message comprising the temporary UI.
 2. The server-basedmethod of claim 1, wherein the request message is one of (a) a ShortMessage Service message or (b) a Multimedia Message Service message. 3.The server-based method of claim 1, wherein the processing steps employone or more of (a) information previously supplied by the MS and (b)information on the current physical location of the WD.
 4. Theserver-based method of claim 1, wherein the processing steps include abilling transaction.
 5. The server-based method of claim 4, wherein thebilling transaction includes one of (a) the generation of a line-itemcharge for inclusion on a telephone bill for the MS, (b) the charging ofa credit card, (c) the debiting of a debit card, or (d) the decrementingof a pre-paid account.
 6. The server-based method of claim 1, whereinthe temporary, time-sensitive UI comprises (a) a user ID and (b) aPassword.
 7. The server-based method of claim 1, wherein the responsemessage is one of (a) a Short Message Service message or (b) aMultimedia Message Service message.
 8. The server-based method of claim1, wherein the response message further comprises one of (a) aninformational message or (b) an advertisement.
 9. The server-basedmethod of claim 1, further comprising: responsive to an approachingexpiration of the temporary, time-sensitive UI, dispatching a remindermessage to the WD.
 10. A processor-based system on a server configuredto provide message-based access to an access point, the processor-basedsystem comprising: a first server-based gateway configured to receive arequest message from a Wireless Device (WD) of a Mobile Subscriber (MS),the request message (a) being a first communication indicative of adesire by the MS to gain access to the access point and (c) comprisingan indicia of the WD and an indicia of a desired access time;server-based processing logic configured to perform a plurality ofprocessing steps on the request message including at least (a)generating temporary, time-sensitive User Information (UI) and (b)preserving in a repository an association between the UI and at leastthe indicia of the WD; and a second server-based gateway configured toreturn a response message to the WD, the response message comprising thetemporary UI.
 10. The processor-based system of claim 9, wherein therequest message is one of (a) a Short Message Service message or (b) aMultimedia Message Service message.
 11. The processor-based system ofclaim 9, wherein the processing steps employ one or more of (a)information previously supplied by the MS and (b) information on thecurrent physical location of the WD.
 12. The processor-based system ofclaim 9, wherein the processing steps include a billing transaction. 13.The processor-based system of claim 12, wherein the billing transactionincludes one of (a) the generation of a line-item charge for inclusionon a telephone bill for the MS, (b) the charging of a credit card, (c)the debiting of a debit card, or (d) the decrementing of a pre-paidaccount.
 14. The processor-based system of claim 9, wherein thetemporary, time-sensitive UI comprises (a) a user ID and (b) a Password.15. The processor-based system of claim 9, wherein the response messageis one of (a) a Short Message Service message or (b) a MultimediaMessage Service message.
 16. The processor-based system of claim 9,wherein the response message further comprises one of (a) aninformational message or (b) an advertisement.
 17. The processor-basedsystem of claim 9, further comprising: a third server-based gatewayconfigured to dispatch, responsive to an approaching expiration of thetemporary, time-sensitive UI, a reminder message to the WD.