Method for acquiring services on a multiplicity of devices

ABSTRACT

A system and method are disclosed for acquiring services on a multiplicity of devices. A system that incorporates teachings of the present disclosure may include, for example, a service management center (SMC) ( 100 ) that has a plurality of service centers ( 102 - 110 ) for supplying services to a corresponding plurality of devices ( 120 - 128 ), and a controller ( 112 ) for managing operations of the service centers. The controller is programmed to receive ( 202 ) from a select one of the devices an identification reference in response to a request for service by an end user, search ( 210 ) for one or more services associated with the identification reference, select ( 212 ) from the search results one or more services appropriate for the requesting device, and enable ( 220 ) the one or more services on the selected device.

FIELD OF THE DISCLOSURE

The present disclosure relates generally to service management centers,and more specifically to a method for acquiring services on amultiplicity of devices.

BACKGROUND

As consumers grow accustomed to ubiquitous communications, a need arisesfor a method to acquire services subscribed to by consumers on anydevice in any location.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a service management center (SMC) accordingto teachings of the present disclosure;

FIG. 2 depicts a flowchart of a method operating in the SMC according toteachings of the present disclosure; and

FIG. 3 is a diagrammatic representation of a machine in the form of acomputer system within which a set of instructions, when executed, maycause the machine to perform any one or more of the methodologiesdiscussed herein.

DETAILED DESCRIPTION

Embodiments in accordance with the present disclosure provide a methodfor acquiring services on a multiplicity of devices.

In a first embodiment of the present disclosure, a computer-readablestorage medium in a service management center (SMC) manages operationsof a plurality of service centers. The storage medium has computerinstructions for enabling a selection of one or more services of theservice centers on a select one of a plurality of devices according to asingle identification reference supplied by an end user to enable any ofthe services of the service centers.

In a second embodiment of the disclosure, the SMC has a plurality ofservice centers for supplying services to a corresponding plurality ofdevices, and a controller for managing operations thereof. Thecontroller can be programmed to receive from a select one of the devicesan identification reference in response to a request for service by anend user, search for one or more services associated with theidentification reference, select from the search results one or moreservices appropriate for the requesting device, and enable the one ormore services on the selected device.

In a third embodiment of the disclosure, a computer-readable storagemedium in a select one of a plurality of devices has computerinstructions for acquiring access to a select one or more services froma plurality of service centers on the selected device according to asingle identification reference transmitted by the selected device.

FIG. 1 is a block diagram of the SMC 100 according to teachings of thepresent disclosure. The SMC 100 comprises one or more service centerssuch as a streaming audio and video service center 102, an InternetProtocol Television (IPTV) service center 104, a gaming service center106, a payment service center 107, a central office service center 108,and a wireless communications service center 110, just to mention a few.Each of the service centers is coupled by landline or wirelesscommunication means to a controller 112 that manages the centers. Thecontroller 112 can be a scalable server with one or more databasesmanaged by applications such as a customer relationship management (CRM)system. Although the service centers 102-110 are shown separately, itwould be apparent to one of ordinary skill in the art that portions ofthe service centers can be integrated with each other and the controller112.

The streaming audio and video service center 102 can utilize commonstreaming technology for supplying services such as streaming televisionprogramming, streaming radio service, streaming video on demand, and soon. The IPTV service center 104 can supply consumers a higher qualityservice such as broadband high definition television (HDTV). The gamingservice center 106 can provide consumers game services similar to thoseavailable for GameBoy™, GameCube™, PlayStation®, and other gamingapplications. The payment service center 107 can support credit or debitpayment transactions as commonly offered by companies such asMasterCard®, Visa®, American Express®, PayPal®, and so on. The paymentservice center 107 can offer consumers a means to pay for servicesand/or consumer goods on demand at any location.

The central office service center 108 provides common landline servicessuch as POTS (Plain Old Telephone Services), voice over IP (VoIP),and/or broadband services such as cable, or xDSL (Digital SubscriberLine). The wireless communications service center 110 can support commonwireless services such as cellular communications, dispatch services,WiFi, and/or WiMax.

There are numerous devices available to an end user for interacting withthe aforementioned service centers 102-110—some of which are illustratedby way of example in FIG. 1. For example, the end user can have adigital and/or analog television set 120 residing in a residence withintegrated or combined functions such as those found in a set top box.Alternatively, an end user can have a device that operates in thecontext of merchandizing such as, for example, a merchant's cashregister 121 for conducting sales of consumer goods and services. Inanother embodiment, the end user can utilize a portable device such as acell phone 122 (or multimode device) capable of voice, locationservices, and high-speed data communications across one or more accesstechnologies such as cellular, WiFi, and WiMax. In yet anotherembodiment, an end user can utilize a laptop or desktop computer 124capable of processing over the Internet multimedia services such asstreaming video and audio.

An end user's automobile 126 can include telematics services whichcollectively can support vehicle tracking and positioning, on-linevehicle navigation and information systems with emergency assistance,and/or broadband entertainment services such as movies, network TVprogramming, and/or games on demand. Similarly, a merchant's fuelstation can include one or more devices for accepting payment fromconsumers on credit at a fuel pump 127. An end user can also utilize acommon gaming device 128 for playing 2-D and 3-D interactive gamesdownloaded from, or operating at the gaming service center 106 withmultiple players competing at single or remote sites.

Each of these devices 120-128 can include a user interface which cansupport among other things means for biometric identification, amagnetic card reader, a smart card reader, an RFID reader, a barcodereader, or an electromechanical input such as a keypad. In the case ofbiometrics, the devices 120-128 can include common biometric technologyfor identifying an end user by audible or image recognition. Thus, anend user can identify him or herself by voice recognition, a thumbprint, retinal scanning, facial scanning, or any other biometric featureavailable for identification purposes. For increased security, thebiometric signature of the end user can be a hybrid of identifiers suchas, for example, an out of ordinary audible phrase and/or alpha-numericcode dictated by the end user combined with a thumb print. Accordingly,the more identifiers the end user provides the more secure theidentification process.

For those devices that cannot afford the sophistication of biometrics,an RFID reader, a magnetic card reader for credit or debit cards, asmart card reader, a barcode reader, or a keypad interface can be used.A passive or active RFID tag can be integrated in the end user'skeychain, wallet, cell phone, clothing article, or any other suitablelocation which can be readily accessed by the RFID reader.Alternatively, the end user can use a credit or debit card, a smart cardsuch as subscriber identity module (SIM) card commonly used in cellphones, or a card with a barcode ID for identification purposes. The enduser can also enter an identifier by way of a keypad.

As noted earlier, combinations of identifiers can be used for increasedsecurity. With a single or combination of identifiers one or moreidentification references can be established for the end user for thepurposes of acquiring access to the service centers 102-110 from aselect one of the devices 120-128. Given the likelihood that not all ofthe devices will have the same means for identification, the end usercan carry multiple means for submitting an identification reference. Forexample, the end user can carry a credit or debit card which whencombined with a coded entry supplies an identification reference for thecontroller 112 of the SMC 100 to process. For other devices 120-128 thatsupport a smart card or biometric interface, other identificationreferences can be supplied.

The controller 112 can thus be programmed with each of theidentification references available to the end user, therebycollectively establishing a single identification reference for the enduser to access any of the services that s/he has subscribed to with theservice centers 102-110. To limit the inconvenience to the end user incarrying or memorizing a number of identification references, theservice provider of the SMC 100 can promote not more than two andperhaps a single means of identification (such as biometrics or RFID)among the service centers 102-110 that support the aforementioneddevices 120-128.

Thus, for example, the payment service center 107 can offer theircustomers (e.g., retailers 121, fuel stations 127, and others)commercial incentives to install an RFID reader or biometric reader attheir location to support end users of the SMC 100. Similarly,manufacturers of consumer electronics (cell phones 122, telematicssystem 126 for automobiles, computers 124, television sets 120, gamingdevices 128) can also be offered commercial incentives to provide acommon interface for processing end user identification. Alternatively,accessories can be designed by third party manufacturers for thesedevices to support a single user interface.

Connectivity between the devices 120-126 and the SMC 100 can beaccomplished by way of a wired and/or wireless communication link 103 toa communication system 101. The communication system 101 can utilizecircuit-switched or packet-switched network technology, or combinationsthereof. As a hybrid system, the communication system 101 can supportdisparate communication technologies such as cellular (or any generationthereof), WiFi, WiMax, landline, or optical communications. Each of theaforementioned service centers 102-110 can therefore provide by way ofthe communication system 101 interactive two-way communications, orpassive services that terminate at any of the devices 120-128 accessibleto the end user.

FIG. 2 depicts a flowchart of a method 200 operating in the SMC 100according to teachings of the present disclosure. Method 200 begins withstep 202 where the controller 112 is programmed to receive from a selectone of the devices 120-128 an identification reference. Theidentification reference can be entered by any of the input meansdiscussed earlier for devices 120-128. Thus, for example, when the enduser needs to purchase fuel for her automobile, she can swipe her creditcard at the fuel pump 127 on a magnetic reader and for added securityprovide additional identification such as a coded entry (PIN and/or zipcode) on a keypad of the fuel pump 127. The identification referenceprovided for the fuel pump can similarly be shared across any devicemade available to the end user.

Given the ubiquitous service offerings of the SMC 100, it should beapparent to an artisan with skill in the art that the present disclosureis not limited to devices owned by the end user. An end user, forexample, can borrow a friend's or family member's cell phone 122 capableof accepting services from the SMC 100. The end user can then enter anidentification reference (SIM card, biometrics, RFID, etc.) specific tothe end user as a means for requesting service, which the controller 112in step 202 can intercept by way of the communication system 101.Similarly, an end user can be present at a neighbor's home and requestactivation of landline services and/or IPTV services by entering his/heridentification reference by any means available in the neighbor's home.

Upon receiving the identification reference in step 202, the controller112 authenticates it in step 204 if a matched entry is found in itsdatabase. If the identification reference is invalid, the controller 112in step 206 rejects the request for service. Otherwise, the controller112 proceeds to step 208 where it checks whether the service requestedis enabled for the end user on a device different from the selecteddevice. If service is enabled on a device different from the selecteddevice, the controller 112 rejects the request for service. This stepprovides the service provider of the SMC 100 a means to prevent sharingof services with unsubscribed users.

If there is no other device enabled with the requested service, thecontroller 112 proceeds to step 210 where it searches in its databasefor one or more services associated with the identification reference.From the search results the controller 112 in step 212 selects one ormore services appropriate for the requesting device. If the controller112 detects in step 214 a service mismatch with the device selected bythe end user, then the controller 112 proceeds to step 216 where itadapts the service to the selected device. This step can be useful whenthe service requested needs to be modified in order to function properlyon the selected device.

For example, the end user may be requesting the service s/he waspreviously operating on the gaming device 128 to now be operated on acell phone 122. In this instance, the controller 112 may require theservice center 106 to adapt the gaming service so that it is compatiblewith the dimensions and resolution of the display of the cell phone 122,and its data speed and computing and memory resources. These adjustmentswould take place before enabling gaming service on the cell phone 122 byway of a downloadable application or interactive streaming service.

For additional security, the controller 112 proceeds to step 218 whereit restricts access to the one or more services requested according to asecurity policy. This step can be used, for example, when the end userrequests for service(s) on a device not belonging to him, thus furthereliminating the possibility of an unsubscribed user gaining access toservice indefinitely. The security policy can dictate, for example, alimited period of use of the requested service. In the case ofdownloaded multimedia content such as movies, music, and ebooks, adigital rights management (DRM) policy can be attached to the content.The policy can also provide a limited period of use, a restriction toforward or copy content, and/or other common copyright restrictions.Once these restrictions have been established, the controller 112 causesin step 220 the one or more service centers associated with the servicesselected in step 212 to be enabled on the device selected by the enduser.

Method 200 as described above can be applied to countless applicationsand embodiments involving interactions between service centers 102-110and devices 120-128. Method 200 can also be varied substantially withoutdeparting from the scope and spirit of the claims described below. Forinstance, method 200 can be simplified within the scope of the claims sothat controller 112 processes one or more identification referencessubmitted by the end user from any number of devices and enables one ormore services that the end user has subscribed to on the requesteddevices independent of who owns the requesting device, or whether thesame service is enabled on other devices.

Method 200 also permits an end user to roam and enable services fromdevice to device independent of ownership. For example, an end user canacquire services at any time in any location so long as a device capableof processing services from the SMC 100 can be made available to the enduser. Additionally, when the end user enables services on a borroweddevice, the billing of such services will not affect the true owner ofthe device since the SMC 100 is aware of who the end user is at the timethe services are active.

It would be apparent to one of ordinary skill in the art that thefunctions operating in the SMC 100 can be modified in part so that theyoperate in any one of the aforementioned devices 120-128. Accordingly,said modifications can also be considered to be within the scope andspirit of the claims described below.

FIG. 3 is a diagrammatic representation of a machine in the form of acomputer system 300 within which a set of instructions, when executed,may cause the machine to perform any one or more of the methodologiesdiscussed above. In some embodiments, the machine operates as astandalone device. In some embodiments, the machine may be connected(e.g., using a network) to other machines. In a networked deployment,the machine may operate in the capacity of a server or a client usermachine in server-client user network environment, or as a peer machinein a peer-to-peer (or distributed) network environment.

The machine may comprise a server computer, a client user computer, apersonal computer (PC), a tablet PC, a laptop computer, a desktopcomputer, a control system, a network router, switch or bridge, or anymachine capable of executing a set of instructions (sequential orotherwise) that specify actions to be taken by that machine. It will beunderstood that a device of the present disclosure includes broadly anyelectronic device that provides voice, video or data communication.Further, while a single machine is illustrated, the term “machine” shallalso be taken to include any collection of machines that individually orjointly execute a set (or multiple sets) of instructions to perform anyone or more of the methodologies discussed herein.

The computer system 300 may include a processor 302 (e.g., a centralprocessing unit (CPU), a graphics processing unit (GPU, or both), a mainmemory 304 and a static memory 306, which communicate with each othervia a bus 308. The computer system 300 may further include a videodisplay unit 310 (e.g., a liquid crystal display (LCD), a flat panel, asolid state display, or a cathode ray tube (CRT)). The computer system300 may include an input device 312 (e.g., a keyboard), a cursor controldevice 314 (e.g., a mouse), a disk drive unit 316, a signal generationdevice 318 (e.g., a speaker or remote control) and a network interfacedevice 320.

The disk drive unit 316 may include a machine-readable medium 322 onwhich is stored one or more sets of instructions (e.g., software 324)embodying any one or more of the methodologies or functions describedherein, including those methods illustrated above. The instructions 324may also reside, completely or at least partially, within the mainmemory 304, the static memory 306, and/or within the processor 302during execution thereof by the computer system 300. The main memory 304and the processor 302 also may constitute machine-readable media.

Dedicated hardware implementations including, but not limited to,application specific integrated circuits, programmable logic arrays andother hardware devices can likewise be constructed to implement themethods described herein. Applications that may include the apparatusand systems of various embodiments broadly include a variety ofelectronic and computer systems. Some embodiments implement functions intwo or more specific interconnected hardware modules or devices withrelated control and data signals communicated between and through themodules, or as portions of an application-specific integrated circuit.Thus, the example system is applicable to software, firmware, andhardware implementations.

In accordance with various embodiments of the present disclosure, themethods described herein are intended for operation as software programsrunning on a computer processor. Furthermore, software implementationscan include, but not limited to, distributed processing orcomponent/object distributed processing, parallel processing, or virtualmachine processing can also be constructed to implement the methodsdescribed herein.

The present disclosure contemplates a machine readable medium containinginstructions 324, or that which receives and executes instructions 324from a propagated signal so that a device connected to a networkenvironment 326 can send or receive voice, video or data, and tocommunicate over the network 326 using the instructions 324. Theinstructions 324 may further be transmitted or received over a network326 via the network interface device 320.

While the machine-readable medium 322 is shown in an example embodimentto be a single medium, the term “machine-readable medium” should betaken to include a single medium or multiple media (e.g., a centralizedor distributed database, and/or associated caches and servers) thatstore the one or more sets of instructions. The term “machine-readablemedium” shall also be taken to include any medium that is capable ofstoring, encoding or carrying a set of instructions for execution by themachine and that cause the machine to perform any one or more of themethodologies of the present disclosure.

The term “machine-readable medium” shall accordingly be taken toinclude, but not be limited to: solid-state memories such as a memorycard or other package that houses one or more read-only (non-volatile)memories, random access memories, or other re-writable (volatile)memories; magneto-optical or optical medium such as a disk or tape; andcarrier wave signals such as a signal embodying computer instructions ina transmission medium; and/or a digital file attachment to e-mail orother self-contained information archive or set of archives isconsidered a distribution medium equivalent to a tangible storagemedium. Accordingly, the disclosure is considered to include any one ormore of a machine-readable medium or a distribution medium, as listedherein and including art-recognized equivalents and successor media, inwhich the software implementations herein are stored.

Although the present specification describes components and functionsimplemented in the embodiments with reference to particular standardsand protocols, the disclosure is not limited to such standards andprotocols. Each of the standards for Internet and other packet switchednetwork transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) representexamples of the state of the art. Such standards are periodicallysuperseded by faster or more efficient equivalents having essentiallythe same functions. Accordingly, replacement standards and protocolshaving the same functions are considered equivalents.

The illustrations of embodiments described herein are intended toprovide a general understanding of the structure of various embodiments,and they are not intended to serve as a complete description of all theelements and features of apparatus and systems that might make use ofthe structures described herein. Many other embodiments will be apparentto those of skill in the art upon reviewing the above description. Otherembodiments may be utilized and derived therefrom, such that structuraland logical substitutions and changes may be made without departing fromthe scope of this disclosure. Figures are also merely representationaland may not be drawn to scale. Certain proportions thereof may beexaggerated, while others may be minimized. Accordingly, thespecification and drawings are to be regarded in an illustrative ratherthan a restrictive sense.

Such embodiments of the inventive subject matter may be referred toherein, individually and/or collectively, by the term “invention” merelyfor convenience and without intending to voluntarily limit the scope ofthis application to any single invention or inventive concept if morethan one is in fact disclosed. Thus, although specific embodiments havebeen illustrated and described herein, it should be appreciated that anyarrangement calculated to achieve the same purpose may be substitutedfor the specific embodiments shown. This disclosure is intended to coverany and all adaptations or variations of various embodiments.Combinations of the above embodiments, and other embodiments notspecifically described herein, will be apparent to those of skill in theart upon reviewing the above description.

The Abstract of the Disclosure is provided to comply with 37 C.F.R.§1.72(b), requiring an abstract that will allow the reader to quicklyascertain the nature of the technical disclosure. It is submitted withthe understanding that it will not be used to interpret or limit thescope or meaning of the claims. In addition, in the foregoing DetailedDescription, it can be seen that various features are grouped togetherin a single embodiment for the purpose of streamlining the disclosure.This method of disclosure is not to be interpreted as reflecting anintention that the claimed embodiments require more features than areexpressly recited in each claim. Rather, as the following claimsreflect, inventive subject matter lies in less than all features of asingle disclosed embodiment. Thus the following claims are herebyincorporated into the Detailed Description, with each claim standing onits own as a separately claimed subject matter.

What is claimed is:
 1. A non-transitory computer-readable storagemedium, comprising computer instructions which, responsive to beingexecuted by a processor in a service management center for managingoperations of service centers, cause the processor to perform operationscomprising: enabling a selection of a service from among a group ofservices provided by the service centers on a target device; receiving,from the target device, a single identification reference associatedwith the selection of the service, wherein the single identificationreference is not associated with the target device, wherein the singleidentification reference is inputted into the target device by a uservia a user interface of the target device when a request for the serviceis generated by the target device, and wherein the single identificationreference is inputted into the target device via the user interfacewithout utilizing an identity module of the target device;authenticating the single identification reference; determining if theservice is enabled for the user on a second device; responsive to afirst determination that the single identification reference is validaccording to the authenticating and responsive to a second determinationthat the service is not enabled for the user on the second device,providing the target device with access to the service; determiningwhether the target device is associated with a subscription plan of theuser; and responsive to a determination that the target device is notassociated with the subscription plan of the user, limiting the accessof the target device to the service by preventing copying, sharing or acombination thereof of content provided to the target device via theservice.
 2. The non-transitory computer-readable storage medium of claim1, wherein the authenticating of the single identification referencecomprising analyzing the single identification reference in comparisonto a group of identification references associated with the user,wherein any of the group of identification references enables the firstdetermination that the single identification reference is valid.
 3. Thenon-transitory computer-readable storage medium of claim 1, wherein theoperations further comprise adapting the content according tocapabilities of the target device.
 4. The non-transitorycomputer-readable storage medium of claim 1, wherein the limiting of theaccess of the target device to the service comprises limiting the accessto a time period.
 5. The non-transitory computer-readable storage mediumof claim 1, wherein the target device is a merchant device, and whereinthe service is a sale to the user.
 6. The non-transitorycomputer-readable storage medium of claim 1, wherein the singleidentification reference comprises facial scanning performed by thetarget device.
 7. The non-transitory computer-readable storage medium ofclaim 6, wherein the single identification reference comprises voicescanning performed by the target device.
 8. A service management system,comprising: a memory that stores executable instructions; and acontroller coupled with the memory, wherein the controller, responsiveto executing the instructions, performs operations comprising:receiving, from a target device, an identification reference inassociation with a request for service by a user, wherein theidentification reference is provided to the target device when therequest for service is generated by the target device; authenticatingthe identification reference; determining if the service is enabled forthe user on a second device; responsive to a first determination thatthe identification reference is valid according to the authenticatingand responsive to a second determination that the service is not enabledfor the user on the second device, providing the target device withaccess to the service; determining whether the target device isassociated with the user; and responsive to a determination that thetarget device is not associated with the user, limiting the access ofthe target device to the service according to a security policy.
 9. Theservice management system of claim 8, wherein the operations furthercomprise adapting content provided via the service according tocapabilities of the target device.
 10. The service management system ofclaim 8, wherein the security policy prevents copying, sharing or acombination thereof of content provided to the target device via theservice.
 11. The service management system of claim 8, wherein theidentification reference is not associated with the target device, andwherein the identification reference is inputted into the target devicevia a user interface without utilizing an identity module of the targetdevice.
 12. The service management system of claim 8, wherein theidentification reference comprises a biometric signature, a smart cardsignature, a magnetic signature, a barcode signature, an RFID signature,or any combination thereof.
 13. The service management system of claim12, wherein the biometric signature comprises an audible recognition, animage recognition, or any combination thereof.
 14. The servicemanagement system of claim 8, wherein the target device is a merchantdevice, and wherein the service is a sale to the user.
 15. The servicemanagement system of claim 8, wherein the identification reference is asingle identification reference.
 16. A service management system,comprising: a memory that stores executable instructions; and acontroller coupled with the memory, wherein the controller, responsiveto executing the instructions, performs operations comprising: enablinga selection of a service from among a group of services provided byservice centers on a target device by a user; receiving, from the targetdevice, an identification reference associated with the selection of theservice, wherein the identification reference is provided to the targetdevice when a request for service is generated by the target device;authenticating the identification reference; determining if the serviceis enabled for the user on a second device; responsive to a firstdetermination that the identification reference is valid according tothe authenticating and responsive to a second determination that theservice is not enabled for the user on the second device, providing thetarget device with access to the service; determining whether the targetdevice is associated with the user; and responsive to a determinationthat the target device is not associated with the user, limiting theaccess of the target device to the service by preventing copying,sharing or a combination thereof of content provided to the targetdevice via the service.
 17. The service management system of claim 16,wherein the identification reference is not associated with the targetdevice, wherein the identification reference is inputted into the targetdevice by a user via a user interface of the target device, and whereinthe identification reference is inputted into the target device via theuser interface without utilizing an identity module of the targetdevice.
 18. The service management system of claim 16, wherein theidentification reference is a single identification reference.
 19. Theservice management system of claim 16, wherein the target device is amerchant device, and wherein the service is a sale to the user.
 20. Theservice management system of claim 16, wherein the authenticating of theidentification reference comprising analyzing the identificationreference in comparison to a group of identification referencesassociated with the user, wherein any of the group of identificationreferences enables the first determination that the identificationreference is valid.