Systems and methods for account establishment and transaction management using interrupt messaging

ABSTRACT

Disclosed are systems and methods which provide techniques providing account setup, management and transaction authorization determinations in real-time using transaction interrupt messaging. Embodiments preferably take into consideration the quality of one or more parties to the transaction and the means by which charges may be rendered to them when making account setup, management, and/or transaction authorization determinations. Accordingly, transactions, such as collect calls, meeting at least some minimal risk threshold may be completed on a first call attempt, even where a pre-arranged billing agreement or other business relationship is not previously in place.

RELATED APPLICATIONS

The present application is related to concurrently filed and commonly assigned U.S. patent application Ser. No. 10/360,442 entitled “Systems and Methods for Transaction Authorization Determination,” the disclosure of which is hereby incorporated herein by reference. The present application is also related to co-pending and commonly assigned U.S. patent application Ser. No. 10/135,883 entitled “Optimizing Profitability in Business Transactions,” filed Apr. 29, 2002, Ser. No. 10/190,315 entitled “System and Methods for Offering a Service to a Party Associated with a Blocked Call,” filed Jul. 3, 2002, Ser. No. 10/135,878 entitled “Information Management and Movement System and Method,” filed Apr. 29, 2002, and Ser. No. 10/022,946 entitled “Method for Determining an Entity Responsible for Billing a Called Party,” filed Dec. 17, 2001, the disclosures of which are hereby incorporated herein by reference.

TECHNICAL FIELD

The invention relates generally to account setup and management and, more particularly, to techniques for transaction establishment and management, such as with respect to authorizing calls and/or commerce in a telecommunication system.

BACKGROUND OF THE INVENTION

The generation of revenue and profit is the driving force behind most business models. To supplement the cash purchasing methods in today's credit-based society, most businesses depend on some form of credit or entitlement authorization mechanism allowing for customers to purchase products, services, or other such items without the immediate physical exchange of cash. Inherent in such business models is the reality that a percentage of parties who purchase on credit or entitlement authorizations may eventually not pay, thus, diminishing the business' overall profitability.

In order to balance the risk of such losses against the benefits of maintaining credit entitlement systems, businesses go to great lengths in making credit worthiness or other transaction authorization/verification determinations (collectively referred to herein as “transaction authorization determinations”), such as requiring lengthy applications including a wealth of personal information, accessing databases storing information about the potential borrower, and the like. This process is typically relatively slow and often-times results in a poor transaction authorization determination. For example, in order to minimize losses associated with poor credit risks, a transaction authorization determination implemented according to many business models may error on the conservative side, thereby foregoing a transaction having a collectable debt situation associated therewith because of a lack of information or insufficient analysis of decision criteria.

One example of a business model that requires not only that there be a transaction authorization determination made, but that such transaction authorization determinations be made very quickly, is the telecommunication provider industry. Of particular interest in such telecommunication provider transaction authorization determinations are the determinations made with respect to services provided in association with areas of relatively high volume reverse charged and/or third party charged calls (referred to collectively herein as “collect calls”), where such calls tend to be associated with individuals or entities of dubious credit merit.

Telecommunication services provided with respect to controlled-environment facilities, such as prisons, is one such area of relatively high volume collect calls where the credit worthiness of the individuals involved is suspect. Prisoners are generally given some form of access to telephones, but the calls must be paid for. However, prisoners, in general, do not have ready access to cash; therefore, calls are typically made collect. As with other credit/authorization systems, some of the collect calls may never be paid for by the responsible parties, i.e., the called parties or indicated third parties. In such circumstances, the telecommunication service provider fails to recover the costs of providing the call, which, in turn, causes a loss of profitability.

Bad debt losses may sometimes reach into the tens of millions of dollars for each telecommunication service provider with the industry total well over $1 billion. To address the risk of loss on some of the attempted calls, telecommunication service providers sometimes obtain information and/or store information with respect to the called parties in order to provide call verification/authorization.

For example, when an inmate at a particular correctional facility attempts to make a collect call, the call or transaction request may go through a validation process. The telecommunication service provider may access its own customer database and/or an external database, such as a line information database (LIDB), to determine (1) can this call be billed (i.e., is there a billing arrangement with the local exchange carrier (LEC) or the called party), (2) if the destination number is already in the service provider's files, has the allotted credit limit been reached, and (3) has there been any information received from the LEC indicating that the called party has not been paying its bills. Depending on the extensiveness of the service provider's internal resources, the service provider may not be able to determine all three of these validation criteria. If favorable information is retrieved for each of the available validation criteria, the call may be completed. Conversely, if the inmate attempts to call a destination number that is not already on the customer database, or negative information is retrieved from the validation process, the service provider typically blocks the call from being completed.

While the above mentioned blocked calls save the telecommunication provider from losses for unpaid calls, some of those blocked calls represent lost potential revenue and profit that the provider would have generated. Most solutions that have been used to address this problem have been post the first transaction. That is, when there is a telecommunications demand to a telephone number that is blocked, any mechanisms to try to obtain revenue instead of blocking future transactions, such as a customer service representative placing a call to the blocked number in an attempt to establish a business relationship, are implemented after the transaction has been blocked.

Accordingly, a need exists in the art for the making of reliable transaction authorization determinations which do not unnecessarily block transactions. Moreover, a need exists for such reliable transaction authorization determinations to be made rapidly, such as during real-time processing of a transaction.

SUMMARY OF THE INVENTION

The present invention is directed to systems and methods which provide techniques providing account setup, management, and transaction authorization determinations in real-time taking into consideration the quality of one or more parties to the transaction (i.e., the customer, which may include the called party, the calling party, or both) and the means by which charges may be rendered to them. According to preferred embodiments, there are number of ways that charges may be rendered to a party to a transaction, such as on a prepaid basis, through an existing business relationship, or through direct billing. Each one of these charge rendering alternatives may have different bad debt risks associated therewith and targeted populations to which they are directed. Embodiments of the present invention have the ability to understand the quality of a party to the transaction, make determinations with respect to charge rendering alternatives available with respect to the party (e.g., whether or not a valid billing address is available), and evaluate which charge rendering alternative to implement with respect to the party (e.g., whether a prepaid or a post paid product is to be implemented), all in real-time.

Preferred embodiments of the present invention implement transaction interrupt techniques, wherein a call or other transaction may be suspended, blocked, prefaced, and/or followed by messaging and/or interaction (e.g., via interactive voice response (IVR) and/or customer service representative), for establishing and maintaining accounts or other customer information and providing transaction authorization determinations. Such transaction interrupts may be implemented for a number of reasons and at various points in a transaction according to the present invention, such as for any reason to interact with a party to the transaction, to influence a party's behavior, to provide customer care, to establish customer accounts, to manage existing customers, etcetera.

Transaction authorization determinations are made according to embodiments of the present invention using a hierarchy of decision criteria, to facilitate conducting transactions which might otherwise be blocked or prevented. According to embodiments of the present invention, a real-time decision tree is implemented with respect to the hierarchy of decision criteria to allow transactions, such as collect calls, commissary based transactions, etcetera, meeting at least some minimal risk threshold to be completed on a first attempt, even where a pre-arranged billing agreement or other business relationship is not in place.

An embodiment of the present invention provides a hierarchy of decision criteria in which a primary transaction authorization determination is made, followed by one or more transaction authorization determinations if the primary transaction authorization determination is negative. For example, collect calls being placed to a dialed number associated with a competitive local exchange carrier (CLEC) or other entity having no billing agreement with a telecommunication service provider initiating the call may result in a negative determination being made by a primary transaction authorization determination. However, such collect calls may be authorized by implementation of a secondary transaction authorization determination of an embodiment of the present invention, provided the called number otherwise meets some threshold risk assessment. Charges associated with such calls may be billed using a direct bill from the telecommunication service provider to the called party, with the confidence that the called party meets a target credit risk threshold.

According to embodiments of the present invention, a transaction may be completed, or partially completed, even where a primary and/or a secondary transaction authorization determination result in a negative determination, such as in an attempt to demonstrate a need for the offered transaction and/or to facilitate a business relationship suitable for conducting further transactions in the future. For example, collect calls being placed to a dialed number associated with a CLEC or other entity having no billing agreement with a telecommunication service provider initiating the call and for which the called party does not meet a desired threshold of risk may result in a negative determination being made by a primary and secondary transaction authorization determination. However, such calls may be completed or a message delivered from a caller, whether at no charge or charged as originally attempted, for a controlled amount of time to allow communication between the called and calling parties and thereby establish the need for additional calling services. The called party in such a situation may be solicited to establish a business relationship, such as by creating a pre-paid account, with the telecommunication service provider initiating the call. Subsequent calls to the called party and/or by the calling party may be permitted according to the aforementioned business relationship.

The foregoing has outlined rather broadly the features and technical advantages of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features and advantages of the invention will be described hereinafter which form the subject of the claims of the invention. It should be appreciated by those skilled in the art that the conception and specific embodiment disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the invention as set forth in the appended claims. The novel features which are believed to be characteristic of the invention, both as to its organization and method of operation, together with further objects and advantages will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present invention.

BRIEF DESCRIPTION OF THE DRAWING

For a more complete understanding of the present invention, reference is now made to the following descriptions taken in conjunction with the accompanying drawing, in which:

FIG. 1 shows a diagram illustrating call attempts as may be experienced in a day in association with a particular facility;

FIG. 2 shows a block diagram of a transaction system adapted according to a preferred embodiment of the present invention;

FIGS. 3A and 3B show a flow diagram of operation of the transaction system of FIG. 2 according to a preferred embodiment of the present invention; and

FIG. 4 shows a block diagram of operation of a transaction system adapted according to an embodiment of the present invention.

DETAILED DESCRIPTION OF THE INVENTION

Various filters or decision criteria may be implemented with respect to making a transaction authorization determination. For example, filter criteria that may be utilized in making a transaction authorization determination with respect to a call attempt is a line information database (LIDB) query providing responsive information with respect to a dialed or destination telephone number. LIDB is a federally-managed database local exchange carriers (LECs) populate with a variety of data, such as telecommunication service provider, service profile, name and address, and credit card validation information. It should be noted that for purposes of this disclosure, LEC is intended to include not only local exchange carriers, but also CLECs, inter-exchange carriers (IXCs), and the like.

According to a typical scenario, a LIDB query response may be translated into an affirmative or negative result, such that a negative LIDB response results in completion of the call being prevented. However, the LIDB response alone, may not always provide an accurate indication with respect to the collectability of telecommunication debt.

There may be any number of reasons that a LIDB response is negative with respect to a call attempt. For example, the dialed number may not be a legitimate telephone number, such that the LIDB query cannot identify useful data records associated therewith. The dialed number may be associated with a number for which collect calling services are not typically allowed by a telecommunication service provider, such as cell phones, pagers, or other numbers a LEC has implemented specific restrictions with respect to the telephone line. For example, telephone lines with only basic services are often installed in the inner city or other areas, primarily for safety reasons, which do not provide for long distance and collect calling.

Another of the filter criteria that may be utilized in making a transaction authorization determination with respect to a call attempt is whether or not a billing agreement or other business arrangement is available between telecommunications service providers, such as the telecommunication service provider associated with the calling party and the telecommunication service provider associated with the called party. This type of transaction authorization filter criteria may be referred to as an operating company number (OCN) deny, and are often associated with a CLEC. For example, in providing collect calls, the service provider typically sends the collect call bill to the LEC that services the called number for collection. LECs, such as Southwestern Bell, Verizon, BellSouth, Ameritech, and the like generally maintain accurate billing, name, and address (BNA) information, and may be authorized to bill third-party-provided telecommunication services if billing arrangements exist. However, CLECs often provide local service without extending billing agreements to anyone for any reason outside of their own services. Accordingly, when a collect call is attempted to a customer of such a CLEC, the call may be prevented from being completed because the telecommunication service provider initiating the call is unable to bill to the CLEC.

Yet another of the filter criteria that may be utilized in making a transaction authorization determination with respect to a call attempt is relationship history. For example, based upon previous calling transactions, information may be available to the telecommunications service provider initiating the call useful in making a transaction authorization determination with respect to the called party. Such information may be that a previous call attempt has been blocked with respect to the called number because of some abnormal activity (e.g., detection of fraudulent calling attempts or invoking unallowed services such as three-way calling or remote call forwarding), the called number is experiencing an unusually high velocity of collect calls, a credit limit or ceiling has been reached with respect to the called party, etcetera. Historical information may be analyzed not only with respect to a called party, but information with respect to a calling party may be utilized as filter criteria. For example, even where a calling party station is shared, unique identifiers such as personal identification numbers (PINs) and/or bio-signatures (e.g., voice prints, finger print vectors, iris scan vectors, and the like) may be used to identify a calling party. The calling party information may be used to reference a database for historical information with respect to that party and/or transactions conducted thereby. For example, although a current called party meets other filter criteria, the calling party may have a history of uncollectable transactions associated therewith, thereby suggesting that a current call attempt should be declined.

Traditionally, call processing systems have blocked a call attempt if any of the transaction authorization determination filter criteria, such as those set forth above, resulted in a negative determination. That is, the call attempt would be analyzed according to the pre-established filter criteria and, if any aspect of the call analyzed did not meet the filter criteria the call would not be completed and further processing with respect to that call attempt stopped.

Experience has shown, however, that in some situations, such as where calling services are provided with respect to a prison facility, very large numbers of calls (and thus sources of revenue) may be blocked by more traditional filter criteria. For example, on the order of 30–50% of unique called telephone numbers might be denied service at a single facility.

Accordingly, embodiments of the present invention provide for further processing of transactions, such as by implementing transaction interrupt techniques, to facilitate completion of transactions even where filter criteria otherwise provides negative indications with respect to the transaction. Such transaction interrupts may be utilized according to the present invention to analyze customers and their needs, to target appropriate products (e.g., calling and account services) to the customers, to demonstrate a need for services, to establish an appropriate business relationship with customers, to maintain and manage customer business relationships (perhaps altering the business relationship when particular situations or activities are detected), and the like.

The systems and methods of the above referenced patent applications entitled “Optimizing Profitability in Business Transactions” and “System and Methods for Offering a Service to a Party Associated with a Blocked Call” provide further processing with respect to a call attempt which does not otherwise meet one or more filter criteria. Specifically, the systems and methods disclosed therein provide for further processing with respect to a call attempt to thereby contact a called party for which a call attempt has been blocked in an attempt to establish a business relationship therewith. For example, a telecommunications service provider which has blocked a call, such as one having been placed from an inmate at a prison facility to a friend or family member outside of the prison facility, may call the number dialed by the calling party, stating that a call attempt has been blocked from a particular location and ask that a pre-paid account be established, that billing information be provided, that credit card information be given, and/or the like in order for the called party to receive such calls in the future.

Embodiments of the present invention provide further processing with respect to a call attempt which does not otherwise meet one or more filter criteria by providing transaction authorization determinations in real-time which take into consideration the quality of one or more parties to the transaction (i.e., the customer, which may include the called party, the calling party, or both) and the means by which charges may be rendered to them. Preferably, transaction interrupt techniques, wherein a call or other transaction may be suspended, blocked, prefaced, and/or followed by messaging and/or interaction (e.g., via IVR and/or customer service representative), are implemented with respect to establishing and maintaining accounts or other customer information and providing transaction authorization determinations.

Preferred embodiments of the invention make transaction authorization determinations using a hierarchy of decision criteria, to facilitate conducting transactions which might otherwise be blocked or prevented. For example, a real-time decision tree may be implemented with respect to a hierarchy of decision criteria to allow transactions, such as collect calls, meeting at least some minimal risk threshold to be completed on a first call attempt, even where a pre-arranged billing agreement or other business relationship is not in place.

Quality determinations with respect to parties to a transaction may be made in a number of ways according to the present invention. For example, parties may be rated on a scale of 10, referred to herein as deciles with decile zero being the highest quality customer (low bad debt risk) and decile 9 being the lowest quality customer (higher bad debt risk), based upon various information which may be collected about the party, the location of the party, the historical transaction patterns of the party, etcetera.

For example, a quality metric with respect to a called party may be derived from information with respect the called party's LEC payment history, the location of the called party, the length of time the called party has had service, the features of the called party's service, the frequency of calls received from a facility or facilities, etcetera. A quality metric with respect to a calling party may be derived from information with respect to the length of time the calling party has stayed or is to stay at a facility from which the call is placed, the behavior or activity of the calling party at the facility from which the call is placed, the calling party's historical call activity such as may include frequency of calls, quality of called parties called by the calling party, the criminal or other history of the calling party, etcetera. Details with respect to implementing customer quality analysis and determination systems and methods are shown and described in the above referenced patent application entitled “Optimizing Profitability in Business Transactions.” The techniques disclosed therein are utilized according to preferred embodiments of the present invention in analyzing and making determinations with respect to quality of a party to a transaction. Details with respect to information associated with a calling party as may be utilized in deriving a quality metric according to embodiments of the present invention are shown and described in the above referenced patent application entitled “Information Management and Movement System and Method.”

Experience has shown that, when implementing a customer quality decile rating technique according to a preferred embodiment, in most cases the distribution of call demand is substantially equally distributed. That is, approximately 10% of call demand falls within each decile. Moreover, analysis has revealed that, in those situations for which blocked calls have been further analyzed in development of the present invention, a large number of calls associated with a party to the transaction having a high customer quality rating were being blocked using filter criteria as described above. Accordingly, revenue opportunities have been recognized and addressed with respect to relatively high quality customers as well as relatively low quality customers which otherwise fail one or more filter criteria according to embodiments of the present invention.

Directing attention to FIG. 1, a diagram showing an example of call attempts as may be experienced in a day in association with a prison facility are shown. Specifically, box 100 represents the total number of call attempts in a day from a particular facility, wherein the horizontal axis represents a number or quantity of call attempts (it being appreciated that the illustrated hash marks are exemplary and not intended to represent any particular number or percentage of call attempts) and the vertical axis represents the quality decile associated with each particular call attempt. Area 110 represents those call attempts that meet primary call authorization determination filter criteria and, therefore, may be completed according to typical call processing implementations. Areas 120, 130, and 140 represent those call attempts that fail one or more filter criteria and, therefore, may be blocked according to more typical call processing implementations.

For example, area 120 may be associated with call attempts which, although a party thereto meets desired customer quality criteria and for which valid BNA information is available, the telecommunication service provider associated with the called party does not have a billing agreement in place with the telecommunication service provider associated with the calling party. Area 130 may be associated with call attempts which, although a party thereto meets desired customer quality criteria, the telecommunication service provider associated with the called party does not have a billing agreement in place with the telecommunication service provider associated with the calling party and no valid BNA information is available. Line 101, associated with decile 5 in the illustration, represents a filter criteria of a primary call authorization determination, such that if the customer quality associated with a party to the call is below this line (having a higher decile), the primary call authorization determination would result in a negative determination. Accordingly, area 140 may be associated with call attempts which, irrespective of any agreement in place between the telecommunication service provider associated with the called party and the telecommunication service provider associated with the calling party and/or the availability of BNA information, no party thereto meets desired customer quality criteria. As can be seen in FIG. 1, areas 120, 130, and 140 represent an appreciable amount of call attempts that, according to more typical call processing techniques, would be blocked and, therefore, the revenue associated therewith foregone.

In addressing the various reasons for a call attempt failing a primary call authorization determination, embodiments of the present invention provide a bifurcated or decision branching approach to further processing of transaction attempts. Because the transaction closing rate with respect to the aforementioned technique of post transaction blocked call processing, wherein a number for which a call attempt has been blocked is contacted for an opportunity to establish a business relationship, is often times disappointingly low, embodiments of the present invention present alternatives implemented in real-time when a transaction attempt results in a negative primary transaction authorization determination.

Accordingly, embodiments of the present invention will preferably initially make a determination as to whether a transaction attempt meets primary filter criteria, such as criteria for allowing a collect call to be billed through the called party's LEC (e.g., the call attempt falls into area 110 of FIG. 1). If the primary filter criteria are met, the transaction may be allowed to be completed and the transaction dealt with through conventional channels.

However, if the primary transaction authorization determination results in a negative determination, but the called party is otherwise associated with at least a minimum level customer quality, preferred embodiments of the present invention operate to determine in real-time if BNA or similar billing information is available to facilitate the telecommunication service provider associated with the calling party to direct bill the called party (e.g., the call attempt falls into area 120 of FIG. 1). If this secondary transaction authorization determination provides an affirmative determination, the transaction may be allowed to be completed and the transaction billed directly by the telecommunication service provider. According to this embodiment, if a called party is within a certain customer quality, and reliable information is available with respect to a billing name and address, where historically that transaction would have been blocked, the transaction will be completed during the first attempt.

However, if the secondary transaction authorization determination results in a negative determination (e.g., the call attempt falls into areas 130 or 140 of FIG. 1), preferred embodiments of the present invention operate in real-time to demonstrate a need for transaction services to the called party. For example, a preferred embodiment of the present invention may implement a transaction interrupt technique which allows a qualified transaction to be conducted, such as to allow a call to be completed for a limited period of time, such as less than 1 minute, to allow the called party and calling party to converse, possibly at no charge to either party. The calling party may, during this call period, explain to the called party the situation and therefore demonstrate a need for additional calling services. Alternatively, embodiments of the present invention may implement a transaction interrupt technique which allows the calling party to record a message of limited duration, such as less than 1 minute, to allow a call processing system to contact the called party and play the message to demonstrate the need for calling services.

The present invention may provide instructions in association with the aforementioned qualified transaction for the called party to establish a business relationship with the service provider or other host to the transaction, or otherwise provide information in order to prevent future transaction attempts from being blocked. For example, the called party, if otherwise associated with at least a minimum level customer quality, may provide BNA information to allow direct billing for such services. Additionally or alternatively, the called party may establish a prepaid account, such as by providing credit card information to a customer care agent or providing a check image via the Internet, to allow debiting for such services.

The aforementioned business relationships may facilitate the provision of such services as telephone communications, whether to or by a particular party or parties. For example, an account may be established to allow a particular prison inmate to place phone calls from the prison facility in which they are incarcerated. Additionally or alternatively, an account may be established to allow calls from a particular prison facility to be made to a particular party residing outside of the prison facility. Moreover, business relationships established and maintained according to embodiments of the present invention may facilitate the provision of services in addition to or in the alternative to telephone communications, such as to facilitate the purchase of goods, whether by or for a particular party or parties. For example, an account may be established to allow a particular prison inmate to purchase commissary goods, preferably using a call processor adapted according to the present invention to order such goods, for their own use and/or for delivery to others (perhaps even parties residing outside of the prison facility). Similarly, an account may be established to allow a party residing outside of a prison facility to purchase commissary goods, preferably using a call processor adapted according to the present invention to order such goods, for delivery to prisoners incarcerated within a particular prison facility.

The aforementioned interaction between the calling party and the call processor as well as the interaction between the called party and the call processor may be under control of a human operator, or other customer service representative, placed in communication with one or more of these parties. However, preferred embodiments of the invention implement IVR technology to automate such interaction. Accordingly, embodiments of the present invention may provide a substantially “no-touch” administration free, secure, transaction processing system providing account establishment and maintenance.

It should be appreciated that, although embodiments have been described above with reference to transaction authorization determinations and transaction interrupts made with respect to initial call attempts, the concepts of the present invention are applicable to other transaction situations as well. For example, although a particular call may be completed based upon a particular transaction authorization determination, aspects of the present invention may be implemented in response to detecting fraud activity or other undesired behavior. With respect to prison facility calling services, call behavior such as automatic call forwarding and three-way calling with respect to a completed call as well as high call velocity (a relatively large number of calls in a short period of time) with respect to a particular called party are highly indicative of resulting bad debt. Accordingly, a transaction interrupt technique may be implemented in which calls in process may be released with respect to one party to the call, such as the calling party, keeping a link to the other party to the call to offer an appropriate product to them, such as a prepaid account, to allow further calling services.

Directing attention to FIG. 2, a system adapted according to a preferred embodiment of the present invention is shown as transaction system 200. Shown in transaction system 200 are originating party stations 211 and end party station 240, such as may comprise any number of communication devices such as telephones, cellular telephones, facsimile machines, computers, personal digital assistants (PDAs), etcetera. It should be appreciated that the designations “originating party station” and “end party station” as used herein are for convenience and are not intended to set forth any limitations with respect to which stations may be utilized in initiating or otherwise conducting transactions according to the present invention.

As an example of transactions that may be provided according to the present invention, parties at originating party stations 211 may be desirous of communicating with a party at end party station 240 by placing a collect call. Additionally or alternatively, a party at originating party stations 211 may be desirous of obtaining a commissary item using commissary system 250, where such a commissary item may be for delivery to and use by the party at station 211 making an order, another party associated with originating party stations 211, or a party associated with end party station 240. Similarly, a party at end party station 240 may be desirous of obtaining a commissary item using commissary system 250, where such a commissary item may be for delivery and use by the party at station 240 or a party associated with originating party stations 211.

Although calling services and the purchase and delivery of commissary items are specifically set forth above, it should be appreciated that transaction systems adapted according to the present invention are not limited to any particular goods and/or services. For example, a plurality of goods and services providers may be included with respect to a particular transaction system, such as florists and pharmacists, where a transaction system is deployed with respect to a hospital or medical facility, or restaurants and media providers (e.g., cable television, pay-per-view, Internet service providers, etcetera), where a transaction system is deployed with respect to a hotel or apartment facility.

Originating party stations 211 of the illustrated embodiment are coupled to the public switched telephone network (PSTN) 201 via transaction processor 210, which preferably arbitrates completion of transaction attempts in accordance with operation of embodiments of the present invention. For example, transaction processor 210 may comprise call processing apparatus disposed at a calling party location, such as at a prison facility, such as shown and described in the above referenced patent application entitled “Information Management and Movement System and Method”. Of course, there is no requirement according to the present invention that a call processor be disposed as shown in FIG. 2. For example, rather than being disposed between a calling party and the PSTN, a call processor utilized according to the present invention may be coupled to a calling party via the PSTN, such as in an enhanced calling service configuration, if desired. Moreover, various of the functional aspects attributed to transaction processor 210 according to embodiments described herein may be provided by systems external thereto, such as commissary system 250, transaction validation engine 220, and/or customer service center 230, if desired.

Although communication via the PSTN is shown in the illustrated embodiment, it should be appreciated that there is no limitation with respect to use of the PSTN according to the present invention. Accordingly, network 201 providing communication between parties and/or systems in accordance with the present invention may comprise any number of communication networks, such as a local area network (LAN), a metropolitan area network (MAN), a wide area network (WAN), a cable transmission system, the Internet, and/or combinations thereof. For example, voice communication may be provided via the PSTN while data communication is provided via the Internet. Of course, voice communication may be provided via networks other than the PSTN, such as by using voice over internet protocols (VoIP). Similarly, data communication may be provided using the PSTN and/or other networks, as desired.

Commissary system 250, transaction validation engine 220, and customer service center 230 of the illustrated embodiment are coupled to transaction processor 210 via PSTN 201 to provide transaction authorization determinations and/or transaction processing support with respect to operation of transaction processor 210. Of course, there is no requirement according to the present invention that a transaction validation engine and/or customer service center be disposed as shown in FIG. 2. For example, any one or more of commissary system 250, transaction processor 210, transaction validation engine 220, customer service center 230, and/or aspects thereof may be combined at a common location. Accordingly, various of the functional aspects attributed to any of commissary system 250, transaction processor 210, transaction validation engine 220, and/or customer service center 230 according to embodiments described herein may be provided various ones of the systems of transaction system 200, if desired. Additionally or alternatively, various embodiments of the present invention may omit one or more of these aspects.

Transaction validation engine 220 of the illustrated embodiment includes primary authorization filter 224, secondary authorization filter 225, and transaction service need demonstrator 226, as may be implemented in a hierarchical transaction authorization determination technique according to preferred embodiments of the present invention. Additionally, transaction validation engine 220 of the illustrated embodiment includes account maintenance/modification system 260 as may be utilized in maintaining and/or changing accounts according to the present invention. Transaction database 221 may be utilized to store information with respect to particular transactions, accounts, and/or parties to transactions. LEC billing system 223 may be utilized in establishing, maintaining, and/or servicing accounts which are billed through a third party, such as a LEC. Customer quality identifier 228 may be utilized in determining a quality metric with respect to a party to a transaction. BNA system 222 may be utilized to identify, obtain, and/or store billing information. Direct billing system 227 may be utilized in establishing, maintaining, and/or servicing accounts which are directly billed. Prepaid accounting system 229 may be utilized in establishing, maintaining, and/or servicing accounts which are prepaid. The operation of these functional aspects of transaction validation engine 220 according to embodiments of the present invention are described in further detail herein below.

According to embodiments of the present invention, transaction processor 210 recognizes an attempted transaction to be managed according to the present invention and communicates with transaction validation engine 220. Accordingly, transaction processor 210 may contain logic to interact with a party at originating party stations 211 and/or end party station 240 to obtain transaction information or may recognize initiation of a transaction and provide a communication conduit between a party at originating party stations 211 and/or end party transaction station 240 to transaction validation engine 220 for transaction processing according to the present invention. Transaction engine 220 may operate to authorize, control, and/or facilitate transactions associated with transaction processor 210, such as by establishing accounts, managing previously established accounts, providing transaction validation determinations, and/or accounting and billing for transaction services. Transaction engine 220 may interact with other systems or parties, such as commissary system 250, database 270, customer service center 230, and/or end party station 240, in providing the aforementioned authorization, control, and/or facilitation of transactions. Transaction validation engine 220 may interact with, or include, an IVR unit to solicit information from one or more party to a transaction. Such interaction with parties to the transaction may be via separate communication to the parties by systems of transaction system 200 or may be provided by “conferencing-in” systems of transaction system 200 to communications between the parties. Various systems of transaction system 200 may transfer communication links between one or both parties to a transaction to various systems in order to provide transaction processing as described herein.

Directing attention to FIGS. 3A and 3B, a flow diagram of operation of system 200 according to a preferred embodiment of the present invention is shown. Specifically, at box 301 a call attempt is made by a party at one of originating party stations 211 with transaction processor 210 arbitrating the call attempt and attempting validation before completing the call. Accordingly, transaction processor 210 may communicate with transaction validation engine 220 via PSTN 201. Information with respect to the call attempt, such as the location of the call, the called number, identification of the calling party, and/or the like, may be provided to primary authorization filter 224 of transaction validation engine 220. Primary authorization filter 224 may operate to make a primary transaction authorization determination substantially as described above. For example, primary authorization filter 224 may access call database 221 to determine if the called party or calling party has a negative data associated therewith (such as history of nonpayment, excessive call velocity, indications of fraudulent activity or other undesired behavior, refusal to accept collect charges, request to have calls blocked, and/or the like) or positive data associated therewith (such as a prepaid account, credit card information, and/or the like) for a determination of whether the attempted call should be completed. Additionally or alternatively, primary authorization filter 224 may cause transaction validation engine 220 to issue a query to LIDB 270 for a determination of whether the attempted call should be completed. For example, a query to LIDB 270 may provide an OCN of the telecommunication service provider associated with end party station 240. This OCN may be compared to a list of OCNs having billing agreements with the telecommunication service provider associated with transaction processor 210.

At box 302 a determination is made as to whether the call should be denied, i.e., the criteria analyzed by primary authorization filter 224 results in a negative determination. If it is determined that the call should not be denied processing proceeds to box 303 wherein the call is permitted to be completed, e.g., originating party station 211 is coupled to end party station 240 via transaction processor 210 and PSTN 201, and the calling services are billed according to criteria determined by primary authorization filter 224. For example, if traditional collect calling is permitted to the called party station, LEC billing system 223 may be invoked. Alternatively, if it was determined that a prepaid account is to be used or that a direct billing arrangement has been previously established with respect to the called or calling party, such as by reference to call database 221, prepaid accounting system 229 or direct billing system 227, respectively, may be invoked. Thereafter, further call authorization determination processing may terminate at box 304.

If, however, it is determined that the call should be denied at box 302, the illustrated embodiment of the present invention proceeds to box 305 for a determination as to whether a secondary transaction authorization determination is to be made. There may be a number of factors which determine whether or not the secondary transaction authorization determination is to be made, such as whether corresponding logic is incorporated into the particular transaction processor associated with the call attempt, whether particular information (such as called party BNA information) is available, a quality metric associated with the called and/or calling party, the gross margin or revenue potential of the calling service, etcetera.

If it is determined that a secondary transaction authorization determination should be performed, processing according to the illustrated embodiment proceeds to box 306 for a secondary transaction authorization determination using secondary authorization filter 225. Secondary authorization filter 225 may operate to make a secondary transaction authorization determination substantially as described above. For example, secondary authorization filter 225 may utilize information provided by customer quality identifier 228 to determine if the called party or calling party meets a minimum risk criteria for providing direct billed collect calling. Additionally or alternatively, secondary authorization filter 225 may utilize information provided by BNA system 222 to determine if suitable billing information with respect to the called party is available for providing direct billed collect calling.

If, at box 306, it is determined that the call should not be denied, processing proceeds to box 307 wherein the call is permitted to be completed, e.g., originating party station 211 is coupled to end party station 240 via transaction processor 210 and PSTN 201, and the calling services are billed according to criteria determined by secondary authorization filter 225. For example, if it was determined that sufficient BNA information is available with respect to the called party, direct billing system 227 may be invoked. Thereafter, further call authorization determination processing may terminate. However, preferred embodiments of the present invention provide additional call authorization determination, such as to rescore the customer quality metric based upon later acquired information and/or more thorough analysis at box 308. For example, the real-time determination of a customer quality metric utilized in processing an initial call attempt may have been based upon a limited set of data available in the circumstances. To limit exposure to credit risk, subsequent quality metric analysis may be performed with respect to a particular party, such as may be made in the background during the call between the calling and called party, and the determination to allow services using secondary billing techniques may be reconsidered (box 309). If it is determined that calls based upon the secondary validation criteria should continue to be allowed, processing according to the illustrated embodiment proceeds to box 310. However, if it is determined that calls based upon the secondary validation criteria should not continue to be allowed, processing continues to box 311.

At box 311 a determination is made as to whether transaction system 200 supports operation of a transaction service need demonstrator of an embodiment of the present invention. For example, corresponding logic may not be present in transaction processor 210, transaction validation engine 220 may not have transaction service need demonstrator 226 associated therewith, customer service center 230 may not be included with respect to a particular embodiment, etcetera. If transaction system 200 does support operation of a transaction service need demonstrator, processing according to the illustrated embodiment proceeds to box 319, as is described in detail below. If, however, transaction system 200 does not support operation of a transaction service need demonstrator, processing according to the illustrated embodiment proceeds to box 312 wherein the connection between the calling and called parties is terminated in favor of post transaction processing. For example, a message may be played to the called party to provide information as to how to contact customer service center 230 to facilitate future calling services. Alternatively, customer service center 230 may be coupled to end party station 240 for facilitating future calling services. Post call processing techniques useful according to the present invention are shown and described in the above referenced patent application entitled “Systems and Methods for Offering a Service to a Party Associated with a Blocked Call.”

If, at box 305, it is determined that a secondary transaction authorization determination should not be performed or if, at box 306, it is determined that a particular call attempt does not qualify for secondary transaction authorization, processing according to the illustrated embodiment proceeds to box 314 for demonstration of the need for transaction services to the called party using transaction service need demonstrator 226. Transaction service need demonstrator 226 may operate to demonstrate the need for calling services to a called party substantially as described above. For example, transaction service need demonstrator 226 may allow limited communication between the called and calling parties to allow the called party to identify who is calling, to allow the calling party to explain the situation requiring calling services, etcetera.

At box 314 a determination is made as to whether a transaction service need demonstration is to be made. There may be a number of factors which determine whether or not the transaction service need demonstration is to be made, such as whether corresponding logic is incorporated into the particular transaction processor associated with the call attempt, the call validation engine may not have transaction service need demonstrator logic operable with respect thereto, a customer service center may not be included with respect to a particular embodiment, etcetera. If a transaction service need demonstration is not to be made, processing according to the illustrated embodiment proceeds to box 315 wherein the call attempt is denied and post transaction processing is performed. For example, a message may be played to the called party to provide information as to how to contact customer service center 230 to facilitate future calling services. Alternatively, customer service center 230 may be coupled to end party station 240 for facilitating future calling services.

However, if it is determined, at box 314, that a transaction service need demonstration is to be made, processing according to the illustrated embodiment proceeds to box 316. At box 316 the attempted call is allowed to be placed to the called party and a determination is made with as to whether end party station 240 is answered. If the call to end party station 240 goes unanswered, then processing according to the illustrated embodiment proceeds to box 317 wherein the call is terminated. It should be appreciated that termination at step 317 may invoke post transaction processing, such as that described above with respect to box 315, if desired.

If, at box 316, it is determined that end party station 240 has been appropriately answered (e.g., end party station 240 goes off hook, a particular identified individual or individual meeting a requirement such as age or competency answers end party station 240, and/or the like), processing preferably proceeds to box 318 wherein a conversation between the called and calling parties is allowed for a limited time. For example, a courtesy call (i.e., neither the called nor the calling party are charged for the calling service) lasting on the order of 40–50 seconds may be allowed, perhaps preceded and/or followed by an announcement as to the fact that the call is a courtesy call and providing instructions as to how future calls may be facilitated. Alternatively, a message may be recorded from the calling party for replay to the called party, or a one-way communication link established from the calling party to the called party, to allow the calling party to communicate a need for calling services and/or for the called party to identify the calling party, without establishing two-way communication between the calling and called parties. Preferred embodiments of the present invention limit such courtesy calls or communications to approximately 40 seconds to keep the telecommunication costs associated therewith under one minute, which is typically the billing increment, and because experimentation has shown that this length of communication provides sufficient time for the parties to establish that a need for communication services exists but insufficient time to exhaust additional demand for service.

At box 319 a determination is made as to whether the called party has responded to the call demonstrating a need for calling services. For example, prior to being disconnected, the called party may be instructed to speak or dial a response indicating they would like to facilitate future calling services and thereafter connected to an IVR or live agent for further processing. Alternatively, the called party may be given a contact number (e.g., telephone number and/or e-mail address) of a customer service center to contact in order to facilitate future calling services. If, at box 319, it is determined that the called party has not responded to the call demonstrating a need for calling services, processing according to the illustrated embodiment proceeds to box 320 wherein future call attempts to the called party number are blocked. For example, call database 221 may be updated to reflect that transaction validation engine 220 should deny future call attempts.

However, if it is determined at box 319 that the called party has responded to the call demonstrating a need for calling services, processing preferably proceeds to box 321 were the called party is placed in communication with customer service center 230 to facilitate future calling services, e.g., establishment of an account and identification of the transactions and/or parties for which the account is to be utilized. It should be appreciated that customer service center 230 may comprise an automated system, such as an IVR unit, and/or live operators to interact with a party in facilitating calling services according to the present invention.

At box 321, customer service center 230 may attempt to establish a prepaid account for providing future services, such as calling services, purchase of commissary items, etcetera. For example, deposit of funds to a cooperating field office, such as a Western Union office etcetera, may be solicited. Additionally or alternatively, credit card information may be taken to provide for guaranteed payment of services. It should be appreciated that such prepaid accounts may be associated with a particular calling party, a particular called party, or combinations thereof, irrespective of the party establishing the prepaid account, as authorized by the party establishing the prepaid account. Additionally or alternatively, the prepaid account may be utilized to facilitate transactions other than the aforementioned calling services. For example, a prepaid account of the present invention may be utilized with respect to commissary transactions by an inmate in a prison facility.

At box 322 it is determined if solicitation of account prepayment has been successful. If so, appropriate accounts are established, such as in prepaid accounting system 229, and/or database records, such as within call database 221, are updated to reflect the prepaid status.

However, if it is determined at box 322 that solicitation of account prepayment has not been successful, processing according to the illustrated embodiment proceeds to box 324 wherein a customer quality determination is made. If it is determined that the party falls below a particular minimum level of customer quality, processing according to the illustrated embodiment proceeds to box 325 wherein future call attempts to the called party number are blocked. For example, call database 221 may be updated to reflect that transaction validation engine 220 should deny future call attempts.

However, if it is determined at box 324 that the party meets a particular minimum level of customer quality, processing according to the illustrated embodiment proceeds to box 326 wherein a determination is made as to whether BNA or similar information is available or may be obtained from the party. If it is determined that no BNA or similar information is available or may be obtained from the party, processing according to the illustrated embodiment proceeds to box 327 wherein future call attempts to the called party number are blocked. For example, call database 221 may be updated to reflect that transaction validation engine 220 should deny future call attempts.

However, if it is determined at box 326 that BNA or similar information is available or may be obtained from the party, processing preferably proceeds to box 328 wherein a business relationship using secondary billing techniques, such using direct billing system 227, is established.

It should be appreciated that the steps of the above described flow diagram may be implemented with respect to a number of transaction processor configurations. For example, by falling back to post transaction processing where logic complementary to that of transaction validation engine 220 is not present in transaction processor 210, such as where transaction processor 210 comprises a class 5 switch, a class 4 switch, a central office switch, a pay telephone, an alternative inmate provider's call processor or the like, transaction validation engine 220 of the preferred embodiment is provided flexibility to provide transaction authorization processing with respect to a wide variety of transaction systems. Accordingly, transaction validation engine 220 and/or other systems of transaction system 200, such as customer service center 230, may provide a centralized platform for processing transactions. Moreover, by properly configuring transaction validation engine 220 and/or the other systems of transaction system 200 forming such a centralized platform, a transaction processor agnostic system may be implemented in which any number of transaction processor configurations may be accommodated.

Although the flow diagram above has been described with respect to initiating a transaction and establishing an account for a party to the transaction, it should be appreciated that embodiments of the present invention provide transaction processing implementing operations as described above in performing various transaction initiation, maintenance, and facilitation functional aspects. For example, transaction interrupt messaging and/or interaction as described above may be implemented with respect to a party to a transaction to provide information to the party with respect to a transaction or account status, such as a transaction limit, such as an account limit, a transaction velocity limit, etcetera, is being reached. Additionally or alternatively, transaction interrupt messaging and/or interaction may be implemented upon detection of undesired behavior, such as a party to the transaction performing an unpermitted act or attempting an activity indicative of fraudulent behavior. Accordingly, a transaction, such as a call, may be preceded, followed, and/or interrupted by a message regarding transaction and/or account status, perhaps invoking interaction with the party to replenish an account balance, establish a new business relationship with the service provider or other host to the transaction, and/or the like.

Directing attention to FIG. 4, a block diagram of transaction system 400 operable according to an embodiment of the present invention is shown. As illustrated in FIG. 4, a call request or other transaction request is initiated at box 410, such as may be initiated at transaction processor 210 by originating party stations 211 or end party station 250. Thereafter, box 420 provides transaction analysis with respect to the request, preferably utilizing transaction filtering such as may comprise authorization filters 224 and/or 225 and as may utilize various intelligence and information. Processing according to box 420 of the illustrated embodiment provides a transaction service product targeting decision based upon the quality of one or more parties to the transaction and the means by which charges may be rendered to them, e.g., post pay third party billing, post pay direct bill, or prepaid. If the available information and/or a quality metric indicates the transaction should otherwise be blocked or that interaction with one or more of the parties to the transaction is needed, box 420 may determine that transaction interruption for such interaction is desirable. Box 430 provides for transaction enablement according to the targeting decision of box 420. Accordingly, transaction interruption and customer interaction may be implemented at box 430, such as may include soliciting information and/or payment from a party, invoking transaction service need demonstrator 226, utilizing customer service center 230, etcetera, according to the targeting decision of box 420 in order to facilitate the transaction. Likewise, post pay processes, perhaps including intelligent bill queuing for administrative efficiency and revenue optimization, or direct bill and prepay processes, such as may be invoked for existing account situations or where sufficient information is available to establish such accounts, may be implemented at box 430 according to the targeting decision of box 420. Box 440 provides transaction processing, wherein various transactions may be processed as desired by customers with payment for the transactions and/or transaction services being accounted for by payment system intelligence in cooperation with appropriate billing systems, e.g., LEC billing system 223, direct billing system 227, and prepaid accounting system 229.

According to embodiment illustrated in FIG. 4, parties to the transactions may continue to be rescored, e.g., during a particular transaction and/or subsequent to completing a transaction, to update the targeting decision. For example, an initial targeting decision made in box 420 may be changed based upon subsequent rescoring and/or interaction at box 450.

It should be appreciated that embodiments of the present invention as described above provide a “no-touch transaction process” in which accounts may be established and managed, and transactions may be authorized and revenues optimized, without human intervention on behalf of the service provider or other host to the transaction. Additionally, such functionality is provided in real-time to thereby provide superior service to the parties utilizing the system.

Having described features and functionality of preferred embodiment commissary systems, transaction processors, transaction validation engines, and customer service centers herein, it should be readily appreciated that such features and functionality may be implemented as code operable upon processor-based systems. Accordingly, embodiments of any or all of commissary system 250, transaction processor 210, transaction validation engine 220, and customer service center 230 may comprise a central processing unit (CPU), having memory associated therewith, such as random access memory (RAM), read only memory (ROM), disk memory, and/or the like, storing instruction sets to control operation as described herein. For example, transaction validation engine 220 of an embodiment of the present invention may be implemented upon a general purpose computer system platform, such as a computer system based upon the Intel PENTIUM family of processors as are well known in the art.

Although preferred embodiments have been described herein with respect to calling systems, it should be appreciated that the concepts of the present invention are not so limited. Accordingly, embodiments of the present invention may be applied to a variety of transaction systems, such as commissary transaction systems.

Likewise, the present invention is not limited to use with respect to providing for collect calls. For example, embodiments of the present invention may be applied to telecommunications transaction in the casual calling market, such as with respect to 10—10 type 1 plus calling.

Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present invention. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps. 

1. A method, comprising: receiving a request related to a transaction attempt, the transaction attempt associated with an originating party, an end party, and a requested service; determining if at least one charge rendering alternative is suitable for charging at least one party for the requested service; performing at least one transaction interrupt to attempt to implement a suitable charge rendering alternative if no suitable charge rendering alternative has been implemented; implementing a suitable charge rendering alternative for both the purpose of providing the requested service during the transaction attempt and the purpose of providing future requested services associated with at least one of said originating party and said end party; and providing the requested service associated with the transaction attempt after the suitable charge rendering alternative is implemented.
 2. The method of claim 1, wherein the transaction attempt is further associated with at least one additional party.
 3. The method of claim 1, wherein at least one of the charge rendering alternatives comprises a prepaid account associated with the originating party, a prepaid account associated with the end party, a prepaid account associated with a third party, a direct billing account associated with the originating party, a direct billing account associated with the end party, a direct billing account associated with a third party, or a billing account associated with a carrier serving the end party.
 4. The method of claim 1, wherein determining if at least one charge rendering alternative is suitable for charging at least one party for the requested service comprises performing at least one transaction authorization.
 5. The method of claim 4, wherein performing the at least one transaction authorization comprises: performing a primary transaction authorization; and performing a secondary transaction authorization when the primary transaction authorization fails to authorize the requested service.
 6. The method of claim 5, wherein: performing the primary transaction authorization comprises determining if the requested service represents a collect call and the end party is served by a carrier having no billing agreement with a service provider receiving the request; and performing the secondary transaction authorization comprises determining if the end party meets a minimal risk threshold.
 7. The method of claim 5, wherein performing the at least one transaction interrupt comprises delivering a message to the end party when at least one of the primary and secondary transaction authorizations fails to authorize the requested service.
 8. The method of claim 5, wherein performing the at least one transaction interrupt comprises at least one of: delivering a message to the end party and providing the requested service for a limited amount of time, when at least one of the primary and secondary transaction authorizations fails to authorize the requested service.
 9. The method of claim 8, wherein said at least one of delivering a message to the end party and providing the requested service for a limited amount of time comprises demonstrating a need for the requested service.
 10. The method of claim 5, wherein the requested service is provided if authorized by the secondary transaction authorization, the secondary transaction authorization performed using a limited set of data; and further comprising performing an additional transaction authorization using additional data collected as the requested service is being provided.
 11. The method of claim 8, further comprising: changing the charge rendering alternative implemented for the requested service based upon said additional data collected.
 12. The method of claim 1, further comprising providing the requested service associated with the transaction attempt without performing any transaction interrupts in response to determining that at least one of the charge rendering alternatives is suitable for charging at least one of the parties for the requested service.
 13. The method of claim 1, wherein: receiving the request comprises receiving the request at a first service provider network; and providing the requested service comprises providing the requested service through a second service provider network.
 14. The method of claim 1, wherein said transaction attempt comprises attempting to establish communication between said originating party and said end party.
 15. The method of claim 1, wherein said transaction attempt comprises attempting a commissary transaction.
 16. A system, comprising: a transaction processor receiving a request related to a communication attempt from an originating party, the communication attempt associated with an end party and a requested service; and a transaction validation engine operable to determine if at least one of a plurality of charge rendering alternatives is suitable for charging at least one party for the requested service, and perform at least one transaction interrupt to implement a suitable one of the charge rendering alternatives if none of the charge rendering alternatives has been implemented; wherein the transaction processor implements a suitable one of the charge rendering alternatives for the communication attempt and future communication attempts and provides the requested service associated with the communication attempt after the suitable charge rendering alternative is implemented.
 17. The system of claim 16, wherein implementing the suitable one of the charge rendering alternatives and providing the requested service are completed in real-time with respect to receiving the request.
 18. The system of claim 16, wherein at least one of the plurality of charge rendering alternatives comprises a prepaid account associated with the originating party, a prepaid account associated with the end party, a prepaid account associated with a third party, a direct billing account associated with the originating party, a direct billing account associated with the end party, a direct billing account associated with a third party, or a billing account associated with a carrier serving the end party.
 19. The system of claim 16, wherein the transaction validation engine determines if at least one of the plurality of charge rendering alternatives is suitable for charging at least one party for the requested service by performing at least one transaction authorization.
 20. The system of claim 19, wherein the transaction validation engine performs the at least one transaction authorization by: performing a primary transaction authorization; and performing a secondary transaction authorization when the primary transaction authorization fails to authorize the requested service.
 21. The system of claim 20, wherein: the transaction validation engine causes the transaction processor to provide the requested service if authorized by the secondary transaction authorization, the secondary transaction authorization performed using a limited set of data; and the transaction validation engine performs an additional transaction authorization using additional data collected as the requested service is being provided.
 22. The system of claim 21, wherein the transaction processor implements a different one of the charge rendering alternatives for the communication attempt based upon the additional transaction authorization.
 23. The system of claim 16, wherein said transaction interrupt performed by said transaction validation engine comprises said transaction validation engine causing at least one of a message to be delivered from the originating party to the end party, and allowing communication between the originating party and the end party for a limited amount of time.
 24. The system of claim 23, wherein the at least one of message delivered from the originating party and the end party and the communication between the originating party and the end party demonstrates a need for the requested service for facilitating implementing the suitable one of the charge rendering alternatives.
 25. A transaction validation engine, comprising: one or more billing system for implementing a plurality of charge rendering alternatives; a plurality of filters used in determining if at least one of the plurality of charge rendering alternatives is suitable for charging at least one of a plurality of parties for a requested service; and at least one interrupt unit establishing at least one account in the one or more billing system if none of the charge rendering alternatives has been implemented with respect to the at least one of the plurality of parties, the at least one account associated with one or more of the plurality of parties.
 26. The transaction validation engine of claim 25, wherein: the at least one billing system comprises at least one of: a direct billing system, a prepaid accounting system, and a billing system associated with a carrier serving at least one of the parties.
 27. The transaction validation engine of claim 25, wherein: the at least one interrupt unit comprises an interactive voice response unit.
 28. The transaction validation engine of claim 25, wherein the plurality of filters comprises at least one primary authorization filter and at least one secondary authorization filter.
 29. The transaction validation engine of claim 28, wherein: the at least one primary authorization filter determines if the requested service represents a collect call and the party receiving the call is served by a carrier having no billing agreement with a service provider receiving a request for the service; and the at least one secondary authorization filter determines if the party receiving the call meets a minimal risk threshold.
 30. The transaction validation engine of claim 28, further comprising a requested service need demonstrator establishing the requested service for a limited amount of time when at least one of the primary and secondary transaction authorization filters fails to authorize the requested service.
 31. The transaction validation engine of claim 28, further comprising a requested service need demonstrator delivering a message when at least one of the primary and secondary transaction authorization filters fails to authorize the requested service.
 32. The transaction validation engine of claim 28, wherein: the at least one secondary authorization filter is capable of initially authorizing the requested communication service based on a limited set of data; and the at least one secondary authorization filter is capable of performing an additional transaction authorization using additional data collected as the requested communication service is being provided.
 33. The transaction validation engine of claim 25, further comprising a requested service need demonstrator.
 34. The transaction validation engine of claim 33, wherein the requested service need demonstrator performs at least one of delivering a message and allowing said requested service for a limited time if none of the charge rendering alternatives has been implemented with respect to the at least one of the plurality of parties.
 35. The transaction validation engine of claim 25, wherein said requested service comprises a communication service.
 36. The transaction validation engine of claim 25, wherein said requested service comprises a commissary service.
 37. A method, comprising: receiving a request related to a communication attempt, the communication attempt associated with an originating party, an end party, and a requested service; determining if at least one of a plurality of charge rendering alternatives is suitable for charging at least one party for the requested service; performing at least one transaction interrupt to implement a suitable one of the charge rendering alternatives if a default one of the charge rendering alternatives is not suitable for implementation; implementing a suitable charge rendering alternative for both the purpose of providing the requested service during the communication attempt and the purpose of providing services in response to future communication attempts; and providing the requested service associated with the communication attempt after the suitable charge rendering alternative is implemented.
 38. The method of claim 37, wherein the communication attempt is further associated with at least one additional party.
 39. The method of claim 37, wherein: the default charge rendering alternative comprises collect call billing; and the suitable charge rendering alternative comprises at least one of: a prepaid account associated with the originating party, a prepaid account associated with the end party, a prepaid account associated with a third party, a direct billing account associated with the originating party, a direct billing account associated with the end party, and a direct billing account associated with a third party.
 40. The method of claim 37, wherein determining if at least one of the plurality of charge rendering alternatives is suitable for charging at least one party for the requested service comprises performing at least one transaction authorization.
 41. The method of claim 40, wherein performing the at least one transaction authorization comprises: performing a primary transaction authorization; and performing a secondary transaction authorization when the primary transaction authorization fails to authorize the requested service.
 42. The method of claim 41, wherein: performing the primary transaction authorization comprises determining if the requested service represents a collect call and the end party is served by a carrier having no billing agreement with a service provider receiving the request; and performing the secondary transaction authorization comprises determining if the end party meets a minimal risk threshold.
 43. The method of claim 41, wherein performing the at least one transaction interrupt comprises at least one of: delivering a message to the end party and providing the requested service for a limited amount of time.
 44. The method of claim 43, wherein said at least one of delivering a message to the end party and providing the requested service for a limited amount of time comprises demonstrating a need for the requested service.
 45. The method of claim 41, wherein the requested service is provided if authorized by the secondary transaction authorization, the secondary transaction authorization performed using a limited set of data; and further comprising performing an additional transaction authorization using additional data collected as the requested service is being provided.
 46. The method of claim 45, further comprising: changing the charge rendering alternative implemented for the requested service based upon said additional data collected.
 47. The method of claim 1, wherein said determining if at least one charge rendering alternative is suitable comprises: analyzing said at least one party with respect to a quality metric.
 48. The method of claim 47, wherein said quality metric comprises a minimum quality threshold.
 49. The system of claim 16, wherein said transaction validation engine operates to determine if at least one of said plurality of charge rendering alternatives is suitable as a function of a quality metric associated with said at least one party.
 50. The system of claim 25, wherein at least one of said filters references a quality metric associated with said at least one of said plurality of parties.
 51. The method of claim 37, wherein said determining if at least one of said plurality of charge rendering alternatives is suitable comprises: analyzing said at least one party with respect to a quality metric. 