CA2259367A1 - Method and system for allocating costs in a distributed computing network - Google Patents

Method and system for allocating costs in a distributed computing network Download PDF

Info

Publication number
CA2259367A1
CA2259367A1 CA002259367A CA2259367A CA2259367A1 CA 2259367 A1 CA2259367 A1 CA 2259367A1 CA 002259367 A CA002259367 A CA 002259367A CA 2259367 A CA2259367 A CA 2259367A CA 2259367 A1 CA2259367 A1 CA 2259367A1
Authority
CA
Canada
Prior art keywords
originating station
communication
duration
program module
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002259367A
Other languages
French (fr)
Inventor
Barbara J. Roden
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AT&T Delaware Intellectual Property Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2259367A1 publication Critical patent/CA2259367A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • G06Q20/0855Payment architectures involving remote charge determination or related payment systems involving a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/10Tax strategies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • H04L12/1432Metric aspects
    • H04L12/1439Metric aspects time-based
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • H04L12/1453Methods or systems for payment or settlement of the charges for data transmission involving significant interaction with the data transmission network
    • H04L12/1471Methods or systems for payment or settlement of the charges for data transmission involving significant interaction with the data transmission network splitting of costs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/109Time management, e.g. calendars, reminders, meetings or time accounting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access

Abstract

A method and system for providing an end-user with Internet access and allocating a cost associated with that access among the end-user and Internet sites (18) accessed by the end-user. A supervisory program module (58), such as a "JAVA" applet, resides on an originating station (24), such as a personal computer, operated by the end-user. The supervisory program module (58) may be activated by transmitting the supervisory program module to the originating station (24) from an Internet point of presence (22) operated by a local access provider. Alternatively, a trigger may be transmitted from the point of presence (22) to the originating station (24) to activate a supervisory program module (58) already residing on the originating station (24). The supervisory program module (58) monitors the duration of connections with specific Internet sites, and transmits messages to the point of presence (22) indicating the duration of these connections. The local access provider uses the information received in these messages to allocate a cost associated with the access, such as the cost associated with using a telephone network (30), among the end-user and Internet sites accessed by the end-user. Unique keys and time stamps are used as security measures. Unique keys are random identification numbers or codes generated by the point of presence (22). Time stamps are clock readings generated by the originating station, the point of presence, or other network components, are used as security measures.

Description

W 098102828 PCTrUS97112171 METHOD AND ~YSTEM FOR ALLOCATING COSTS IN
A DISTRIBUTED COMPUTING NETWORK

Technical Field The present invention relates to distributed computing networks such as the Internet. More specifically, the present invention is a method and system for providing an end-user with Internet access and allocating a cost associated with that access among the end-user and Internet sites accessed by the end-user.
Background of the Invention The in~ormation age is upon us. The proliferation of computers has brought sweeping changes in the way our society lives, works, and interacts. For businesses, the information age 2s presents tremendous new opportunities and challenges. On-line communications unite geographically dispersed resources and dissemin~te complex infor nation with ever increasing speed and efficiency. In this fast-growing market place known as cyberspace, receiving and transmitting inforrnation in a timely and cost-effective manner is of immense importance. At the heart of cyberspace lies the Internet.
Formerly a little known resource available only to the military and a small community of academics, the lnternet has in recent years become a mainstream commercial communication re~source. The Internet provides a real-time, paper-free, cost-effective mode of comrnunication and resource sharing through which sellers of goods and services can reach millions of potential customers. E-mail and remote access to computer server~; are currently widely used tools for reaching computer literate potential customers. But the market place of cyberspace is in its infancy.
On-line teleconferencing, interactive television, video web sites, virtual reality, and myriad other technological advances are sure to 1 5 develop.
The participants in the Internet are a wide variety of machines, org~ni7~tions~ and individuals, all able to communicate and share information. Physically, the Internet is an interconnected collection of thousands of computer networks, tens of thousands of computers, and tens of millions of individual stations operated by end-users. The Internet works because all of these computers share compatible communication protocols and addressing schemes that make e-mail, remote resource access, file transferring, and file sharing possible throughout the ~ystem.
The backbone of the Internet is a group of networks fo~ning an international grid of high-speed, high-capacity data communication ~ines interconnecting a number of massive computers that serve as large-scale processing points or nodes.

W O 98102828 PCT~US97112171 These backbone networks are interconnected with each other through a plurality of interconnection points known as network access points. The backbone nodes are collectively responsible for capturing and sorting incoming information, routing information s to its intended destination, and forwarding data between backbone nodes.
The Internet was originally used only for ~cademic and governmental purposes. In recent years, however~ the Intemet h;~s been opened to commercial traffic -- and commercial tra~fic has boomed. In the United States, commercial access to the Internet may be obtained at tens of thousands of hosts located throughout the country. A host is a computer connected to the lnternet and configured with Internet routing software. A host may be a massive super computer, a main-frame processing machine, a minicomputer, a workstation, or even a personal computer. Hosts serve three principal functions. First, they send and receive Internet communication traffic. Second, they provide the gateway between the Internet and end-users. And third, they provide web servers that operate as repositories of information and resource~;
that may be accessed over the Internet. For example, these web servers provide ~'home pages" to be visited, files to be read or downloaded, applications to be shared, and the like.
The physical structure of Internet is therefore tremendously complex, but to the end-user it appears to be a virtually seamless 2~ network in which the computer on the desk next door may be accessed as easily as that of a commercial supplier in another city, or that of university in another country. To access any Internet site, an end-user need only transmit the site's universal resource W O 9~ 2~28 PCT~US97112171 locator (URL) created in accordance with the standardized Domain Narne System (DNS). The Internet hosts and nodes respond to the URL by connecting the end-user's station with the Internet site associated with the requested URL.
At present, the operator of each Internet site is responsible for paying the cost of obtaining a communication channel with the Internet. Once an end-user establishes a cornmunication channel with the Internet, connections may be rnade with other Internet sites by transmitting URLs in accordance with the DNS system.
1() An Internet site may therefore be establishcd by providing a host and obtaining a communication channe1 between that host ;md the Internet.
Although commercial users must now pay a fee to use the Internet, the Internet is immensely popular with commercial users and individuals, at least in part, because it is very cost effective.
~t present, each cornmercial user typically pays the cost of physically obt~inin,e. a connection to the Internet, plus a relatively modest monthly Internet connection fee based on the capacity of the connection and in some cases the actual data transfer volume.
In general, no connect-time-based, destination-based7 or other incremental charges are culTently impo~ed for browsing, e-mail, and resource sharing. Thus, a dedicated connection to the Internet effectively serves as a flat-rate international browsing, messaging, and resource sharing service.
An Internet site may be connected to the Internet through a wide range of physical communication channels providing various levels of information carrying capacity. The minimum service available that gives the Internet site access to the full array of W O 98/02828 PCTAUS97~12171 S

Internet services 24 hours-a-day is a single "dial-up" Internet communication channel typically costing about $15-30 per-month.
Hi~her capacity communication channels are available at higher cost. For example, optical fiber, wireless, and leased telephone S lines ranging from 56 kilo-bits-per-second to 1.544 mega-bits-per-second (Tl ) are typical options available to an Internet site.
Internet access charges for these communication channels at present cost roughly $500-5,000 per month. ln addition to these access charges, the operator of an Internet site must also pay the cost of obtaining a physical communication channel with the ~nternet.
Many Internet sites are operated by commercial suppliers that sell products and services. These commercial suppliers may use the Internet to cost-effectively comrnunicate with existing and prospective consumers. To a comrnercial supplier, the cost of maintaining an Internet site is a cost of doing business, much lil~e postage, electricity, and advertising Indeed, the Internet may be one of the most cost-effective marketing resources available to a commercial entity.
Other Internet sites are points of presence operated by local access providers that, in turn, provide Internet access to millions of end-user Internet sites. Obtaining access through a local access provider is currently the least expensive way for an individual end-user to access the Internet. These points of presence therefore operate as gateways between the Internet sites of commercial suppliers and millions of end-users. A local access provider recovers the cost of its Intemet communication channel and earns its profits through Internet access fees charged to its customers.

W O 98/02828 PCT~US97/12171 For example, an local access provider may charge an end-user a flat rate of $25 per-month, or $5 per-month plus S cents per-connect-minute.
Between an individual end-user and a local access provider's point of presence lies a communications networ~, such as a telephone network, a cable television network, a wireless communications network, or the like. Thi~ communications network is typically operated by a for-profit enterprise. An end-user therefore pays a cost for using the communications network.
In the United States, most homes and busillesses are already connected to a telephone network. These telephone netwo~ks are therefore convenient options for end-users desiring comrnunication channe~s with the Internet. Other communications networks, however, may equivalently be used to provide Internet access.
IS The economics of using a communications network, particularly the telephone network, is therefore an important factor in the operation of the Intemet as a commercial resource.
For an end-user lucky enough to have a local access provider's point of presence located within the same telephone exchange area, the Internet is only a local telephone calJ away. For other less fortunate end-users, long-distance telephone charges are incurred.
For these end-users, even moderate Internet use of a few hours a week can result in significant }ong-distance telephone charges.
These long-distance telephone charges confer a significant 2~ competitive advantage on a local access provider having a point of presence in a particular telephone exchange area. To compete effectively within that local exchange area, another local access provider would have to locate a point of presence within that W 098/02828 PCT~US97/12171 telephone exchange area. But locating a separate point of presence in every telephone exchange area would avoid economies of scale that could be enjoyed by providing a centralized point of presence.
Moreover, it may be advantageous to locate a centralized point of s presence near an Internet interface to minimize the cost of obt~inin~ a physical comm~-nication channel between the point of presence and the Internet.
A local access provider can address this long-distance telephone charge problem by purchasing a nation-wide toll-free telephone service from a long-distance carrier. The local access provider can then locate its point of presence in an advantageous location from a physical connection standpoint, and allow end-users to obtain toll-free telephone connections with the point of presence. The cost of the toll-free telephone service is typically rolled into the local access provider's monthly access charges.
Virtually any end-user in the United States with telephone service may therefore obtain Internet access by paying a local access provider a negotiated rate for Internet access.
At present, this "all or nothing" option, wherein either an end-user or a third party pays the entire cost of providing the end-user with Internet access, is the only cost-shifting option available.
A more flexible allocation methodology for costs associated with Internet access is not currently available. From the commercial supplier' s standpoint, this Internet access paradigm presents a 2~ significant drawback. Namely, the Internet cannot be used to reach a potential customer that is not willing to pay at least the cost of obtaining Internet access via a local access provider. Many potential customers users therefore remain unconnected, and there ~ CA 022=,9~67 1998-12-29 is no effective way for a commercial supplier to use the Internet to reach these unconnected potential customers.
This drawback limits the effectiveness of the Internet as a marketing tool because, in some cases, a commercial suppIier may s be willing to bear the entire cost of communicating with a particular end-user via the Internet. For example, a commercial supplier is typically responsible for marketing costs associated with commercial television advertisements, direct mail advertisements, billboard advertisements, and the like. This commercial supplier may also be willing to pay the entire cost associated with providing a particular end-user with access to its Internet site. This commercial supplier may not, however, be willing to pay the cost associated with providing the end-user with access to other Internet sites, such as those operated by its competitors.
lS Other Internet site operators may also be willing~to bear the entire cost of providing a particular end-user with access to a specific Internet site. A city or county, for example, may wish to provide residents with free access to a web server providing information regarding road closings, weather conditions, emergency services, garbage pick-up, and the like. Similarly, a church may wish to provide parishioners with free access to a web server providing information regarding devotional services, social functions, and the like. Many org:~ni7~tions could sirnilarly make effective use of a selective supplier-paid Lnternet access regime.
2s PCT Application No. PCT/GB95/00421, International Publication No. WO95/23483, entitled "Service Provision In Communication Networks," describes the provision of services through a telecommunications network. The intelligence for AME~ ED SHEET

CA 022~9367 1998-12-29 S~a providing the services lies in a Service Control Point and, thus, is independent of the switching architecture. International Publication No. W095/23483 describes using the billing system for the telecommunications network to charge subscribers for the services provided through the telecommunications net~vork.
But International Publication No. W095/23483 does not describe a system in which a subscriber may place a telephone call to an Internet service provider, establish connections with multiple Intemet sites during the telephone call, and then allocate costs, such as a cost associated with the telephone call or a cost irnposed by an Internet site for a service provided to the subscriber, based on the Internet connections established during the telephone call. Nor does International Publication No. W095/23483 describe a system that allocates a cost associated with the telephone call based on the duration of multiple Internet connections established during the telephone call.
PCT Application No. PCT/US95/06399, International Publication No. W095/33236, entitled "Computer-Irnplemented Transport Of Electronic Information Objects," describes client interface software for on-line server-based information distribution services, such as those provided over the Internet. The client interface software allows the cost of a telephone call established to access the server-based information distribution services to be reversed, or charged to the information service provider rather than the party accessing the services.
But International Publication No. W095/33236 does not describe a system in which a subscriber may place a telephone call to an Internet service provider, establi-sh connections with multiple 'LET

CA 022~9367 1998-12-29 8~
Internet sites during the telephone call, and then allocate costs, such as a cost associated with the telephone call or a cost imposed by an Internet site for a service provided to the subscriber, based on the Internet connections established during the telephone call. Nor does Intemational Publication No. W095/33236 describe a system that allocates a cost associated with the telephone call based on the duration of multiple Internet connections established during the telephone call.
Thus, the cost-allocation methodologies available through these prior systems are limited to having either the subscriber (i.e., a party placin~ a telephone call to an Internet ~ervice Provider) or a single service provider (i.e., an Internet site accessed during the telephone call) pay the cost of the telephone call. But other more sophisticated cost allocation methodologies, such as split-cost allocations, time-based allocations, and destination-based allocations would be possible if an end-user's cost of Internet access could be allocated based on (The remainder of this page intentionally left blank) Al~/lENûED SI~EET

W O 98/02828 PCTAUS97~12171 various allocation parameters including Internet sites accessed.
Thus, there is a need for flexible methods and systems for allocating costs associated with Internet access.

~ummary of the Invention The present invention meets the above-described needs by providing a method and system for providing an end-user with Internet access and allocating a cost associated with that access among the end-user and Internet sites accessed by the end-user.
In More specifically, the present invention provides a supervisory progr~m module that resides on an originating station operated by the end-user. The supervisory program module monitors the duration of connection~ with specific Internet sites, and transmits messages to an Internet point of presence indicating the duration of these connections. The local access provider uses the information received in these messages to allocate a cost associated with the access arnong the end-user and the Internet sites accessed by the end-user. Unique keys including random identification numbers or codes generated by the point of presence, and time stamps such as clock readings generated by the originating ~tation, the point of presence, or other network components, are used as security measures.
Generally described, the present invention is a method for providing an ori~ tin~ station, such as a personal computer, with 2s access to a distri~outed computing network, such as the Internet. A
corrununication, such as a telephone call, including a request for access to the distributed computing network is received from the originating station via a communications network, such as a telephone network. The cornmunication is routed to provide access to the distributed computing network, including a connection between the origin~tirlg station and a monitored network site on the distributed computin~ network, such as an Internet site web selver.
The duration of the communication and the duration of the connection with the monitored network site are determined, and a cost associated with the comrnunication is allocated between a first account associated with the monitored network site and a second account associated with the originating station. The allocation is based on the duration of the communication and the duration of the connection between the originating ~tation and the monitored network site.
The duration of the connection between the end-u~er station and the monitored network site is determined by activ;ltin~ ~
~upervisory program, such as a "JAVA" applet, residing on the ori~in~ting station. The supervisory program module is activated by transmitting the supervisory program module to the originating station. Alternatively, a trigger transmitted to the originating station activates a supervisory program module already residing on the originating station. The supervisory program module is operative to transmit a message indicating the duration of the connection.
A directory, such as a list of Internet sites in a "free zone,"
may also be transmitted to the originating station. The directory includes an item corresponding tv the monitored network site. The item is displayed on a display screen coupled to the ori~inating station, and the originating station is connected with the monitored network site in response to a user command selecting the item.

CA 02259367 l998-l2-29 W 098/02828 PCT~US97J12171 A unique key, such as a randomly generated number, may be used as a security device. The key is generated and transmitted to the originating station along with the supervisory pro~ram module.
A cost associated with the communication, such as a cost of using the telephone network, is allocated between the first account associated with the monitored network site and the second account associated with the originating station only if the me~isage transmitted by the supervisory prograrn module includes the key.
Time stamps, such as clock readings, may also used to lû provide a further measure of security. The supervisory program module transmits a first message including a first start time stamp indicating the beginning of the connection between the originating station and the monitored network site. In response to receiving the first message, a second start time stamp is generated. A second message including a first stop time stamp indicating the end of the connection between the originating station and the monitored network site is received. In response to receiving the second message, a second stop time stamp is generated. A first monitored duration based on the difference between the first stop time stamp and the first start time stamp is computed. Similarly, a second monitored duration based on the difference between the second stop time starnp and the second start time stamp is computed. The cost associated with the communication is allocated between the first and second accounts only if the first monitored duration is 2~ approximately equal to the second monitored duration.
The present invention also provides a computer-readable medium storing a supervisory program module operable for monitoring access to a distributed computing network. The W O 98102828 PCT~US97/12171 supervisory program module includes instructions that may be executed by the originating station. According to these instructions, a directory, including an item corresponding to a monitored network site on the distributed computing network, is displayed on a display device coupled to the ori~in~tin3~ station. A
user command selecting the item is detected, and the duration of a connection between the ori~.in~ting station and the selected network site is determined. A message is then transmitted indicating the duration of the connection.
o The present invention also provides a point of presence including a receiver for receiving a communication from an originating station. A terminal server/router, coupled to the receiver, routes the communication to provide the originating station with access to a distributed computing networ~. This access includes a connection between the originating station and a monitored network site on the distributed computing network. An authentication and accounting server, coupled to the terminal server/router, determines the duration of the communication. A
credit server, coupled to the termina~ server/router, determines the duration of the connection between the originating and the monitored network site. A billing system, coupled to the authentication and accounting server and to the credit server, allocates a cost associated with the communication between a first account associated with the monitored network site and a second account associated with the ori~in~tin~ station. This cost allocation is based on the duration of the communication and the duration of the connection.

The present invention therefore provides a method and system for providing an end-user with Internet access and allocating a cost associated with that access among the end-user and Internet sites accessed by the end-user. That the present invention improves over the drawbacks of the prior art and provides the advantages described herein will become apparent from the following detailed description of the preferred embodiment and the appended drawings and claims.

0 Brief Description of the Drawings FIG. 1 is a functional bl ock diagram of a distributed computing networ~ representing the operating enviromnent of the preferred embodiment of the present invention.
FIC~. 2 is a functional block diagram of a point of presence for providing end-users with access to a distributed computing network, as illustrated in FIG. 1.
FIG 3 is a functional block diagram of an end-user station for obt~inin~ access to a distributed computing network.
FIG. 4 is a logic flow diagram illustrating a method for providing an end-user with Internet access and allocating a cost associated with that access among the end-user and Internet sites accessed by the end-user in accordance with the preferred embodiment of the present invention.
FIG. S is a logic flow diagram illustrating a method for providing an end-user with Internet access and monitoring the duration of connection between an end-user and an Internet site in accordance with the preferred embodiment o~ the present invention.

~IG. 6 is a Iogic flow diagram illustrating a method for allocating a cost associated with Internet access among the accessing end-user and Internet sites accessed by the end-user in accordance with the preferred embodiment of the present s invention.

Detailed Description The embodiments of the present invention provide ~n end-user with Internet access and allocating ~ cost associ;~ted with that access among the end-user and Internet sites accessed by the end-user. A supervisory prograrn module, such as a "JAVA" applet, resides on an originating station, such as ~ personal computer, operated by the end-user. The supervisory program module may be activated by transmitting the supervisory program module to the ori~in~ting station from an Internet point of presence operated by a local access provider. Alternatively, a trigger may be transmitted from the point of presence to the originating station to activate a supervisory program module already residing on the origin~tin~ station. The supervisory program module monitors the duration of connections with specific ~nternet sites~ and trarlsmits messages to the point of presence indicating the duration of these connections. The local access provider uses the information received in these messages to allocate a cost associated with the access, such as the cost associated with using a telephone network, among the end-user and Internet sites accessed by the end-user.
Unique keys and time stamps are used as security measures.
Unique keys are random identification numbers or codes generated by the point of presence. Time stamps, or clock readings, are W 098/02828 PCT~US97/12171 generated by the originating station, the point of presence, or other network components, are used as security measures.
The following detailed description is presented largely in terms of processes and symbolic representations of operations of data bits manipulated by a processing unit and maintained within data structures supplied by one or more memory storage devices.
Such data structures impose a physical organization upon the collection of data b~ts stored within computer memory and represent speci~ic electrical or magnetic elements. These 1() algorithmic descriptions and symboltc representations are the means used by those skilled in the art of computer pro~ramming and computer construction to most effectively convey teachings ~nd discoveries to others skilled in the art.
For the purposes of this discussion, a method or process is generally conceived to be a sequence of computer-executed steps leading to a desired result. These machine-implemented steps, which can be m~int~ined in the form of a prograrn module, generally re~uire physical manipulations of physical quantities.
Usually, though not necessarily, these quantities take the fo~n of electrical, magnetic, or optical signals capable of being stored, transferred, combined, compared, or otherwise manipulated. It is conventional for those skilled in the art to refer to these signa~s as bits, values, elements, symbols, characters, terms, numbers, records, files, or the like. It should be kept in mind, however, that 2s these and similar terms are associated with physical quantities used in computer operations, and that these terms are merely conventional labels applied to these physical quantities that exist within the computer.

W O 98/02828 PCT~US97/12171 In addition, it should be understood that the programs, processes, methods, etc., described herein are not related or limited to any particular computer, single chip processor, or apparatus. Rather, various types of general purpose machines may be used with programs constructed in accordance with the teachings described herein. Similarly, it may prove advantageous to construct specialized appar~tus to perforrn the method steps described herein by way of dedicated computer systems with hard-wired logic or programs stored in nonvolatile memory, such as read only memory.

Description of the Operating Environment Referring now to the drawings~ in which like numerals indicate like elements throughout the several figures, FIG. 1 is a 1~ functional block diagram of the Internet 10, a distributed computing network that provides the operating environment for the preferred embodiment of the pre~ent invention. The Internet 10 includes a plurality of backbone networks 12a through 12n.
These backbone networks form an internation~l grid of high-speed, high-capacity data communication lines interconnecting a number of massive computers that serve as large-scale processing points or nodes. The backbone networks 12 are interconnected with each other through a plurality of network access points 14a through ~4n. These network access points ~re interfaces through which information is communicated from one backbone network to another. The configuration and operation of the Internet backbone is well known to those skilled in the art and will not be further described herein.

The participants in the Internet 10 are a wide variety of machines, org~ni7~tions, and individuals, all able to communicate and share information. For example, the Internet 10 includes a plurality of Internet sites 18a through 18n. These Internet sites S are generally operated by corporations, universities, and governmental organizations. Each Internet site may include one or more repositories of information and resources that may be accessed over the Internet. Each Internet site, as represented by the ~nternet site 18a, may include a plurality of web servers 20a through 20n. Each of these web servers may provide "home pages" to be visited, files to be read or downloaded, applications to be shared, and the like.
The Internet 10 also includes a plurality of points of presence 22a through 22n that are operated by local access providers. These local access providers are in the business of providing Internet access to end-user stations. As shown in FIG. l, the point of presence 22a provides Internet access to end-user stations 24a through 24n, the point of presence 22b provides Internet access to end-user stations 24a' through 24n', etc. All together, the points of presence 22 can provide Internet acce~s to numerous end-user stations 24. Each point of presence 22, and each end-user 24~ may, but need not, provide home pages for access by others on the Inte~net 10.

Description of the Embodiments FIG. 2 is a functional block diagram of a point of presence 22 ~or providing an end-user 24 with access to the Internet 10.
The end user 24 communicates with the point of presence 22 via a W O 9~02828 PCTAJS97112171 cornmunications network 30, such as a telephone network, a cable television network, a wireless cornrnunications network, or the like. The end-user 2 4 typically pays a cost for using the communications network 30. The embodiments of the present invention provide flexible methods and systems for allocating this cost. Specifically, the cost associated with using the communications network 30 to provide a connection between the end-user station 24 and an Internet site lX may be allocated between a first account associated with the end user station 24 and a second account associated with the accessed Internet site 18.
Computing this allocation requires information regarding the connection between the end-usemstation 24 and the Internet .~iite 18. ~ wide variety of factors may be used in this alloc~tion~ but the preferred allocation parameter is the connect time between th~
end-user station 24 and the Internet site 1 X. It is therefore necessary to deterrnine the duration of the connection between the end-user station 24 and the Internet site 18. The operator of the accessed Internet site 18 may then be allocated a cost associated with the use of the communications network 30 based on the duration of the cormection between the accessing end-user station 2 4 and the Internet site 18 . This charge for using the coIr~nunication network 30, currently paid by t~e end-user 24 or the operator of the point of presence 22 on 'oehalf of the end-user 24, may therefore be "reversed" to the operator of the accessed Internet site 18.
Although the disclosed embodirnents of the present invention operate in the m~nner described above, it should be understood that many other embodiments may be constructed in accordance W O 98~2828 PCT~US97/12171 with the teachings of the present invention. For example, an equivalent of the supervisory program module described herein could reside in a platform, such as a proxy server, that is electrically located between the end-user station 24 and the point S of presence 22. The present invention is therefore broadly understood as a method and system for allocating a cost associated with providing a particular originating station with acces~i to a distributed computing network based at least in part on the network sites accessed by the end-user. The originating station may be any device operable for accessing the distributed computing network. The distributed computing network may be any network accessible to the origin~tin~ station. The allocated cost may be any cost associated with the access, and the allocation may be based on any combination of allocation parameters.
In particular, it should be understood that costs other than the cost associated with using the communications network 30 m;~y be allocated. For example, the operator of an accessed Internet site 18 may charge the accessing end-user station 24 a fee for accessing the Internet site 18. This cost may be allocated to an 2() account associated with the end-user station 24, collected by the operator of the point of presence 22, and paid to the operator of the Internet site 18. Alternatively, the operator of the accessed Internet site 1~ may sell goods or services to the operator of the end-user station 24 (or vice-versa). The cost of these goods or services may be allocated to an account associated with the end-user station 24 (or the accessed Internet site 18~, co~lected by the operator of the point of presence 22, and paid to the operator of the Internet site 18 (or the end-user station 24).

W O 98/02828 PCT~US97/12171 In addition, the allocation methodology may consider other allocation parameters, such as the distance between the originating station and accessed site, the time of day, the data transfer volume, resources utilized, applicable mem~ership status, or any other s measurable parameter. For example, other embodiments of the present invention may use more elaborate cost allocation methodologies, such as time-based rate~, capacity-based rates, distance-based rates, usage-based ratex, content-based rates, and the like. As one alternative, the operator of an accessed site lX could be allocated the cost of the fir.st five minutes of acce~ss, and the accessing end-user 24 allocated the remainder. As another alternative, the operator of an accessed site 1X could be allocated a rel~tively small cost during peak usage hours and a larger cost during off-peak hours to encourage efficient usage patterns of its Internet resources.
Furthermore, a third party may be allocated a portion of a cost associated with providing a particular end-user with access to particular Internet sites. For example, a third party, such as a parent, might pay for a child's Internet access as a gift while the child is away at school. To do so, the parent establishes an account with the child's local access provider, and gives the local access provider a list of ~nternet sites for which the parent will accept "reversed" Internet access charges. The cost of providing the child with access to the Internet sites on the list, and only those on the list, is then allocated to the parent's account. It will therefore be appreciated that a wide variety of Internet-based commercial transactions may be facilitated in accordance with the teachings of the present invention.

W O 98/02828 PCT~US97fl2171 Referring still to FIG. 2, the local access provider's point of presence 22 preferably includes a modem pool 32, a teErninal server/router 34, and a local computing network 35. The loca}
network 35 includes a web server 36, an authentication and S accounting server 3X including a start/stop log 40, a credit server 42 including a credit log 44, and a billing system 46. The web server 36, which is maintained by the local access provider, provides a generally accessible Internet site similar to the Internet site 18. The start/stop log 40 documents each end-user's connect 1() time with the modem pool 32. The credit log 44 documents each end-user's allocation parameters, preferably the connect time with a predefined list of free Internet sites. The start/stop log 40 and the credit log 44 are periodically downloaded to the billing system 46. The billing system 46 allocates the costs associated with each ~s end-user's communications in accordance with the appropriate allocation methodologies, and renders the resulting invoices.
It should be understood that, although the disclosed embodiments of the present invention include a separate piece of equipment corresponding to each enumerated component of the point of presence 22 shown in FIG. 2, each component could equivalently be combined with other components into a single piece of equipment, or distributed among mul~iple pieces of equipment.
Thus, any configuration of equipment that performs the ~unction.s described herein should be considered within the scope of ~he ~s present invention.
In the disclosed embodiments of the present invention, the local network 35 may be any of a variety of commercially available network architectures such as a local area network W 098l02828 22 pcTrus97fl2l7 (LAN), a wide area network (WAN), Ethernet, A~ppletalk, or the like. The computing stations of the local network 35 may be any of a variety of commercially available cornputing stations. For example, the web server 36, the authentication and accounting server 38, the credit server 42, and the billing system 46 may each be a "SUN~' Sparc, "HP" series K, or "IBM" RS6000 computing system.
The modem pool 32 is operable for simultaneously m~int~ining a large number of communications with end-user stations 24 via the communications network 30. The modem pool 32 may be any of a variety commercially available modem pools, such as those manufactured by "US ROBOTICS" or "CI~CO"
having about 48 input lines. The authentication and accounting server 38 receives a "start_log" message whenever an end-user 24 successfully logs into the terminal server/router 34. The authentication and accounting server 38 also receives a "stop_log"
message whenever an end-user 24 discontinues a communication with the point of presence 22. These start_log and stop_log messages include the Internet Protocol (IP) address and user name associated with the logging-in or logging-out end-user station. The authentication and accounting server 38 stores the contents of the start_log and stop_log messages in the start/stop log 40 to provide a record of each end-user's connect time with the point of presence 22.
The modem pool 32 receives the incoming communication signals ~rom the end-users 24 and provides the communication signals to the terminal server/router 3 4 . The terminal server/router 34 routes these communications for connection with W 098102828 23 PCTrUS97/12171 various Internet sites 18 in accordance with URLs input by the end-users 24. All end-users connected with the terminal server/router 34 generally have unrestricted access to the Internet 10. Therefore, only authorized end-users -- generally those who s input valid user account and personal password or identi~1cation (ID) numbers -- are connected with the terrninal server/router 34.
Unauthorized end-users who connect with the modem pool 32 preferably receive an informational screen display and are subsequently disconnected. In other embodiments of the present invention, unauthorized end-users may be given limited access t~
the web server 36 and certain Internet sites.
The terminal server/router 34 may be any of a variety commercially avai lable terminal server/routers, such as those manufactured by "ASCEND" or"CISCO." These devices do not presently have the capability of monitoring the actual duration of a connection between a particular end-user 24 and a particular Internet si~e 18. Rather, only the actual connect time with the point of presence 22, and the total number of bytes transferred during a session, are presently monitored by the terrninal server/router 34. In addition, the web server 36 monitors the time required to respond to each URL request, and the time required to download data to the end user station 24. The portion of the actual connect time that the end-user spends reading information and performing other taslcs, however, is not presently 2s monitored on a site-by-site basis.
FIG. 3 is a functional block diagram of an end-user station 24 for obtaining access to a distributed computing network such as the lnternet 10. Referring to FIGS. 2 and 3, the end-user station 24 may be any of a variety of commercially available computing stations, such as "APPLE," "IBM," or"IBM"-compatib]e personal computers. The end-user station 24 includes a memory storage device 5(~, a clock 51, and a modem 52 for cornmunicating with the point of presence 22 via the communications network 30. The memory storage device 50 of end-user station 24 also includes Internet browser software 54, such as '~NETSCAPE" browser software or its equivalent.
The Inte,net browser software 54 within the memory storage device 50 supports a cookie 56 that maintains data at the end-user station 24. When an end-user .station initially connects witn the modem pool 32, the end-user is prompted for valid user account and ID numbers. Upon a valid log in, the credit server 42 may transmit the valid user account and ID number.s to the end-lS user station 24 for storage in the cookie 56. Thc credit server 42 then automatically checks the cookie 56 when the modem pool 32 receives a subse4uent communication from the end-user station 24.
~f the cookie 56 contains the valid account and ID numbers, the supervisory program module 58 is engaged, and the communication is routed to the terminal server/router 34. If the coolcie 56 does not contains the valid account and ID numbers, the end-user is again prompted for valid user account ID numbers.
The site-by-site monitoring operation of the preferred embodiment is performed by a supervisory program module 5X
that resides on the end-user station 24. The supervisory program module 58 may be a software module, such as a "JAVA" applet "JAVA" is a progr~mming language developed by Sun Microsystems. A "JAVA" applet is a portable capsule of object-W O 98/02828 PCTrUS97/12171 oriented architecture-neutral software code and }elated data. ~
"JAVA" applet is a flexible tool that may be programmed to perform a wide variety of functions. A customized "JAVA" applet may, but need not, be m~int~ined for each end-user station 24. In s the preferred embodiment of the present inventiorl, a-lmini~trative complexity is minimi7ed by utilizing a single "JAVA" applet or a small set of"JAVA" applets to provide service to tens of thousands of end-users stations.
The supervisory program module 5~ preferably operates in lo conjunction with a frame ~9 that is displayed on a display screen 60 associated with the end-user station 24. A frarne is a standard feature of the Internet browser software 5 4, such as the "NETSCAPE" browser, that al~ows the display screen to be divided into sections. The preferred frame 59 includes three sections: a free directory 62 including "hot links" 64 that correspond to Internet sites in a "free zone," a tool bar 6 6 including a free button 68, and a free page 70 that may include "hot links" 72 that correspond to Intemet sites in a "pay zone" or in the free zone.
The hot links 64 and 72 are items displayed on the screen 60, such as text or icons that are associated with "HYPERTEXT."
These "HYPERTEXT" items may be se~ected by an end-user to access Internet sites. Selecting a hot link automatically causes a URL request associated with an Internet site to be tr~n~mitted from 2s the end-user station 24 to the point of presence 22. The terminal server/router 34 responds to the URL request by routing the commllnication to the Internet site associated with the requested -W O 98102828 PCTrUS97~12171 URL. Selecting a series of these hot links allows the end-user to easily "surf" the Internet.
The frarne 59 thus divides the universe of Internet sites into two zones, the free zone and the pay zone. The cost of accessing s an Internet site in the free zone is allocated to an account associated with the operator of the accessed Internet site, and the cost of accessing an Internet site in the pay zone is allocated to an account associated with the end-user. For the preferred embodiment, the free directory 62 is displayed in a column on the left side of the ~) display screen 60, the tool bar 66 is displayed along the top or bottom of the display screen, and the free page 70 occupie~ the rem~ining area of the displ~y screen. lt ~hould b~ under~tood th~t the scope of the present invention i~ not limited to the disclosed frame 59.
There are at least two ways for the end-user to enter the free zone. First, the end-user may select the free button 68 within the tool bar 66. In response, the free directory 62 appears in a column on the left side of the display screen 60, and the home page of the web server 36 is displayed within the free page section 70 of the frame 59. If the end-user then selects a hot link 64 in the free directory 62, the home page of the selected Internet site appears in the free page section 70, while the free directory 62 continues to appear on the left side of the display screen 60. The frame 59 thus allows the end-user to surf among the Internet sites within the free zone by selecting the hot links 64 of the free directory 62. It should be understood that the scope of the present invention is not limited to the disclosed implementation for entering the free zone.

CA 02259367 l998-l2-29 Alternatively, the end-user may access an Internet site within the free zone without first accessing the home page of the web server 36 by directly transmitting a URL associated with an Internet site within the free zone. In this case, the home page of the selected Internet site appears in the free page section 70, and the free directory 62 appears on the left side of the display screen 60. The end-user may then surf among the ~nternet sites within the free zone by selecting the hot links 64 of the free directory 62.
The end-user may also access an ~nternet site in the pay zone lo by directiy transmitting a URL associated with an Internet site within the pay zone, or by selecting one of the hot links 7 2 associated with an Internet site within the pay zone. In response, the free directory 62 is deleted, and the home page of the selected Internet site is displayed on the display screen 60. The tool bar 66 remains on the display screen 60. The end-user may return to the free zone by selecting the free button 68, or by surfing directly to one of the Internet sites within the free zone.
The supervisory program module 58 monitors Internet activity conducted by the end-user station 2 4 and transmits messages to the credit server 42. More specifically, the supervisory program module SX monitors the end-user's access to an Internet site 18 in the free zone by transmitting a "start_free"
message to the credit server 42 when the end-user station 24 tr~n~mits a URL request for the Internet site 18. The supervisory 2~ program module 58 later tr~n~mits a "stop_l~ree" message upon the occurrence of a predefined event, typically transmission of a URL
request for another Internet site. These start_free and stop_free messages each include "time stamps" or clock readings generated W O 98/02828 PCTAUS97~12171 by the supervisory program module 5~ based on the clock 51 controlled by the end-user station 24, a}ong with the IP address and user name associated with the end-user station 24 and the URL
or IP address of the accessed Internet site 18. The credit server 42 stores the contents of the start_free and stop_free messages in the credit log 44 to provide a record of the end-user's connect time with the Internet site 18. When the credit log 44 is downloaded to the billing system 46, the end-user's connect time with the Internet site 18 is computed as the dif~erence between the lo time stamp of the stop_free message le~s the time starnp of the start_free message.
There are many possible options for monitoring an end-user's Internet activity. ~or example, the supervisory program module 58 may monitor the free zone, but not each Internet site within the free zone individually. ln this case, the supervisory program module ~8 only transmits a start_free or stop_free message when the end-user enters or exits the free zone. This option might be used, for example, if the operator of each Internet site within the free zone is charged a flat-r~te ~o that site-by-~ite connect-time-based allocation of costs is not necessary.
Alternatively, the supervisory program module 58 may monitor the connect time between each end-user station and each free Internet site individually. In this case, the supervisory program module 58 transmits a start_free or stop_free message 2s when the end-user enters or exits each free Internet site. This option allows site-by-site connect-time-based allocation of costs. In another alternative, the supervisory program module 58 may monitor each free and each pay Internet site individually. As W O 98/02828 PCT~US97/12171 discussed previously, many allocation parameters other than connect-time may also be monitored such as individual commands entered, files accessed, resources used, files transferred, goods or services purchased or sold, etc.
In addition to these alternatives, the disclosed embodiments of the present invention include various methods for activating the supervisory program module 58. In a first embodiment, a supervisory program module 5X that remains resident on the end-user station 24 is activated by a trigger transmitted from the point of presence 22. The trigger is a command sequence that activates a supervisory program module 58 residing on the end-user station 24. The trigger and the frame 59, including the free directory 62, are transmitted to the end-user station 24 whenever the end-user accesses an Internet site within the free ~one or selects the free button 68 on the tool bar 66. The frame 59 including the free directory 62 is deleted, and the supervisory program module 58 is closed, whenever the end-user accesses an Internet site within the pay zone, or when the communication is disconnected. The supervisory prograrn module 58, however, is not deleted from the memory storage device 50 of the end-user station 24.
In a second embodiment, a supervisory program module 58 only remains resident on an end-user station 24 while the end-user is connected with the web server 36 or an Intemet site within she free zone. In this embodiment, the supervisory program module 2s 58 is activated by transmitting the supervisory program module 58 from the web server 36 to the end-user station 24 in response to a U~L request for an Internet site within the free zone, or selection of the free button 68. The supervisory prograrn module -W O98J~2~h PCTrUS97112171 58 is preferably embedded within and transmitted with the frame 59 including the free directory 62. The frame 59 and the supervisory progr~m module 58 are deleted ~rom the memory storage device ~0 of the end-user station 24 whenever the end user s accesses an Internet site within the pay zone, or when the comml-nication is disconnected.
The disclosed embodiments of the present invention also include various methods for providing security and authenticating messages received by the credit server 42. A ~irst security measure includes a "key" generated by the web server 36. A key is a unique identification number or code assigned to a communication received from an end-user station 24. The key is transmitted to the end-user station 24 and stored in connection with the supervisory program rnodule 58. The supervisory S program module ~;X includes the key in subsequent messages transmitted back to the credit server 42. If the correct key is not included in a message, the end-user may be allocated the cost associated with the commllnication. A key may equivalently be assigned to a particular connection between an end-user station 24 and an Internet site 18, a particular message, or some other parameter in accordance with the allocation methodology in effect.
Another security measure involves time stamps in addition to those generated by the supervisory program module ~8, which were discussed previously. For example, the authentication and accounting server 38 generates a time stamp whenever a start_log or a stop_log message is received. These authentication and accounting server time stamps are recorded in the start/stop log 40. The credit server 42 also generates a time stamp each time a W O 98102828 PCT~US97/12171 st;~rt_free or stop_free message is received. These credit server time stamps are recorded in the credit log 44. When the start/stop log 40 and the credit log 44 are downloaded to the billing system 46, the credit server time stamps are compared witl~ the authentication and accounting server time stamps to verify that the messages received by the credit server 42 from a particular end-user station 24 were received at a time when the end-user station 24 was logged into the authentication and accounting server 3X.
As a further security measure, the credit server 4 2 lo generates time stamps that track the end-user station time stamps.
The end-user time stamps are included in mess~ges received from the end-user station 24 and include reading of the clock 51, which is controlled by the end-user station 24. The credit server time stamp~ include clock reading of a proprietary clock 48, i.e., a s clock controlled by the point of presence 22. Dual time stamps including clock readings generated both the end-user station 24 and the point of presence 22 are preferred, as the relationship between the two sets of time starnps may be used to define a unique signature identifying a specific end-user station.
For example, the ~upervisory progr~m module 58 tran~mits an end-user station time stamp along with each start_free and stop_free message. The supervisory prograrn module 5X may also transmit end-user station time stamps periodically in status messages while the end-user station 24 is connected with the point of presence 22. Upon receiving a message from the end-user station 24, the credit server 42 generates a second time stamp based on the proprietary clock 48 controlled by the point of presence 22.

W O 98/02828 PCTrUS97/12171 These dual time stamps generated by the end-u~er station 24 and the credit server 42 may be subsequently analyzed to authenticate messages and detect tampering by end-users. In particular, several types of potentially fraudulent events may 'oe detected including (1) end-user disconnection without logging out, for example by powering-off or line-dropping, (2~ end-user simultaneous operation of multiple supervisory program modules, (3) end-user messages including contrived time stamps, keys, URLs, or IP addresses (4) entries appearing in the credit log without valid end-user station and credit server tirne stamps, (5) manipulation of an end-user station clock 51 or the proprietary clock 48. It will be appreciated that many other potentially fraudulent events may detected through analy~i,s of the key~i and time stamp~ described herein.

Description of the Operation of the Disclosed Embodiments FIG. 4 is a logic flow diagram illustrating a method for providing an end-user with Internet access and allocating a cost associated with that access among the end-user and Internet sites accessed by the end-user. Turning now to FIG. 4, and also referring to FIGS. 2 and 3, in step 402 a communication ori~in~ting at an end-user station 24 is received at the modem pool 32 of the point of presence 22 operated by a local access provider.
The cornmunication received i~rom the end-u~er station 24 is held 2s at the modem pool 32 while the end-user attempts to log into the authentication and accounting server 38.
The end-user logs into the authentication and accounting server 38 in step 404. In decision step 406, it is deterrnined W O 98/02828 PCT~US97/12~1 whether the end-user completed a valid log in. If the end-user did not complete a valid log in, the "NO" branch is followed from step 406 to step 408 in which an informationaI frame is transmitted to the end-user station 24 for display on the display screen 60. The s informational frame may explain that Internet access is not available because the end-user did not complete a valid log in.
Other information may be displayed or limited access may be provided to the web server 3 6 or certain Internet sites.
Eventually, the communication between the end-user station 24 ;md the modem pool 32 is disconnected in step 410.
If it is deterrnined in step 4~6 that the end-user completed a valid log in, the "Y~S" branch is ~ollowed from step 406 to step 41 2 in which the authentication and accounting server 3 ~
generates a start_log message. The contents of the start_log message, along with a time stamp generated by the authentication and accounting server 38, are stored in the start/stop log 40. The communication is then routed ~rom the modem pool 32 to the terminal server/router 34. In routine 414, the end-user station 24 is p}ovided with access to the Internet 10. Routine 4 l 4 is described with more particularity with respect to FIG. S below.
In decision step 416, it is determined whether the comrnunication between the end-user station 24 and the point of presence 22 has been disconnected. If not, the "NO" branch loops back to step 414 and the end-user station 24 is provided access to 2s the Internet 10 until the communication is disconnected, as determined in decision step 416. Upon disconnection, the "Y~S"
branch is followed from step 416 to step 418 in which the authentication and accounting server 38 generates a stop_log W 098J'~2828 PCT~US97112171 message. The contents of the stop_log message, along with a time starnp generated by the authentication and accounting server 3X, are stored in the start/stop lol3 40. A cost associated with the communication between the end-user station 24 and the modem pool 32 is subsequently allocated in routine 420. Routine 420 is described with more particularity with respect to FIG. 6 below.
FIG. S is a logic flow diagram illustrating a 3nethod for providing an end-user with Internet access and monitoring the duration of connection between an end-user and an Internet site.
The logic flow diagram of FIG. S further describes routine 414 shown on FIG. 4. The process illustrated by FIG. 5 is terminated when the communication between the end-user ~tation 24 and the point of presence 22 is disconnected, indicated by the ~'YES"
branch from step 416 of FIG. 4. It should be understood that the communication may be disconnected at any time during the operation of the routine illustrated by FIG 5.
Turning now to FIG. 5, and also referr~ng to FIGS. 2 and 3, in step 502 the terminal server/router 34 receives a request for the free directory 62 (i.e., selection of the free button 68 in the 2() tool bar 66) or a URL request from the end-user station 24. In step 504, it is determined whether this request is for the free directory 62. If so, ~e "YES" branch is followed from step 504 to step 5~0. If the request is not for the free directory 62, the "NO" branch is followed from step 504 to decision step ~;06 in 2s which it is determined whether the request is for a URL
corresponding to an Internet site in the free ~one. If the UE~L is for an Internet site in the free zone, the "YES" branch is followed to step 508 in which the terminal server/router 34 routes the W 098102828 PCT~US97~12171 3~
co~nmunication to the free Internet site indicated by the URL
request.
ln step 510, the credit server 42 generates a key. In step il2, the key and the frame 59, which includes the free directory 62, are transmitted to the end-user station 24. In addition, a supervisory program module 58 is activated on the end-user station 24. The supervisory program module 58 is activated either by transmitting to the end-user station 24 the supeIvisory program module ~;8, or by transmitting a trigger to the end-user station 24 that activates a supervisory program module already resident on the end-user station 24.
In step 514, the supervisory program module 58 transmits a start_free message from the end-user station 24 to the credit server 42. The start_free message includes the key previously generated by the credit server 42 and a time stamp based on a clock ~il controlled by the end-user station 24. The credit server 42 generates a second time stamp based on a proprietary clock 48 contro51ed by the point of presence 22. The credit server 42 stores the contents of the start_free message and the second-time stamp in the credit log 44. The supervisory program module 58 may also periodically transmit status messages, the contents of which are also stored in the credit log 44.
In step ~;16, the terminal server/router 34 receives a URL
request from the end-~ser station 24. In decision step 518, it is determined whether the requested URL is associated with an Internet site in the free zone. If the rec~uested URL is associated with an Internet site in the free zone, the "YES" branch is followed from step 518 to step 520 in which the terminal server/router 34 W O 98/02828 PCT~US97/12171 routes the comrnunication to the requested Internet site. Step 520 is followed by 516 in which the end-user requests another URL.
The process illustrated by FIG. 5 loops through steps 516 through 52(~ as long as the end-user surfs among the Internet sites in the S free zone.
Referring again to decision step 518, if the requested URL
is not associated with an Internet site in the free zone, the end-user has surfed to the pay zone. The "NO" branch is therefore followed from step ~;18 to step 522 in which the .supervisory program module 5X transmits a stop_free message to the credit server 42.
The stop_free message includes the key previously generated by the credit server 42 and a time stamp based on a clock 51 controlled by the end-user station 24. The credit server 42 generates a second time stamp based on a proprietary clock 48 controlled by the point of presence 22. The credit server 42 stores the contents of the stop_~ree message and the second-time stamp in the credit log 44. In step 524, the free directory 62 i.
deleted and the supervisory program module 5~ is deactivated.
Referring again to decision step 506, if the requested URL
is not associated with an Internet site in ~he free zone, the end-user has surfed directly to an Internet site in the pay zone without first accessing the free directory 62 or an Internet site in the free zone.
Thus, the "NO" branch from step 506 is followed to step 526 in which the terminal server/router 34 routes the communication to the requested Internet site in the pay zone. Likewise, step 524 is followed to step 526. Step S26 is ~ollowed by step 502, in which the end-user requests the free directory 62 by selecting the free button 68, or the end-user transmits another URL request. The W O 98/02828 PCTrUS97112171 process illustrated by FIG. 5 loops through steps 502 through 526 until the communication is disconnected (FIG. 4 step 416).
FIG. 6 is a logic flow diagram illustrating a method for allocating a cost associated with ~nternet access among the accessing end-user and Internet sites accessed by the end-user. The logic flow diagram of FIG. 6 further describes routine 420 shown on FIG. 4. Turning now to FIG. 6, and also referring to FIGS. 2 and 3, in step 602 the credit server 42 receives a start_free or a stop_free message from the supervisory program module 5 8 residing on the end-user station 24. ln decision step 604, the credit server 42 verifies that the received message includes the correct key in step 604. If the received message does not includes the correct key, the "NO" branch is followed to step 605 in which the point of presence 22 responds to a potentially fraudulent message. For example, the communication may be disconnected, the end-user may be allocated the entire cost of the cormnunication, additional security measures may be activated, information may be stored relative to the message, a message may be transmitted to the end-user station 24, authorities may be notified, or other measures may be taken. The steps taken in step 605 may depend on many factors, such as the past history of comm~nications from the end-user station 24. Step 605 may therefore be followed by the L'END" step as shown in FIG. 6, or it may be followed by another step, such as step 606.
2s If the key is verified in step 604, the "YES" branch is followed to step 606, in which the credit server 42 generates a second time stamp based on a proprietary clock 48 controlled by the point of presence 22. The credit server 42 stores the contents of the message and the second-time stamp in the credit log 44. In step 6()8, the time stamp received in the message and the time starnp generated by the credit server 42 are cross-checked with each other. It will be appreciated that these time starnps may also be cross-checked with other time stamps associated with the comml-nication or the end-user station 24, such as the time stamp generated by the authentication and accounting server 38 upon log-in. In decision step 609, it is determined whether the time stamp is valid. If this analysis reveals tampering, the "NO" branch is ~ollowed from step 609 to step 605 in which the point of presence 22 responds to a potentially fraudulent message, as discussed previously.
If the time stamps are verified in ~step 609, the "YES"
branch is followed to ~tep 610 and 612, in which the start/stop log 40 and the credit log 44, respectively, are downloaded to the billing system 46. The authentication and accounting server time stamps and the credit server time starnps are then cross-checked in step 614. In decision step 615, it is determined whether the time stamps are valid. Again, if this analysis reveals tampering, he "NO" branch is followed from step 61~5 to step 60~5 in which the point of presence 22 responds to a potentially fraudu}ent message, as discussed previously. Further analysis of the data may be conducted to verify the authenticity of the data in the logs.
If the time stamps are verified in step 615, the "YES"
branch is followed to step 616 in which costs are allocated, and step 618 in which invoices are rendered. The procedures associated with implementing allocation methodologies and W O 98/02828 PCTrUS97/12171 rendering invoices are well known to those skilled in the art and therefore will not be further described herein.
In the manner described above, the present invention provides a method and system for providing an end-user with s Internet access and allocating a cost associated with that access among the end-user and Internet sites accessed by the end-user. lt should be understood that the foregoing relates only to specific embodiments of the present invention, and that numerous change.c;
may be made therein without departing from the spirit and scope lo of the invention as defined by the following claims.

Claims (26)

What is claimed is:
1. A method (FIGS. 4-6) for providing an originating station (24) with access to a distributed computing network (18a-n), including the steps of receiving a communication including a request for access to the distributed computing network from the originating station (402); determining the duration of the communication (412, 418); routing the communication to provide the network access (414), including a first connection between the originating station and a first monitored network site on the distributed computing network and a second connection between the originating station and a second monitored network site on the distributed computing network (508); CHARACTERISED BY
THE STEPS OF:
determining the duration of the first and second connections (514, 516, 610);
allocating a first portion of a cost associated with the communication to a first account associated with the first monitored network site based on the duration of the communication and the duration of the first connection (616); and allocating a second portion of the cost associated with the communication to a second account associated with the second monitored network site based on the duration of the communication and the duration of the second connection (616).
2. The method of Claim 1, further comprising the step of allocating a third portion of the cost associated with the communication to a third account associated with the originating station (616).
3. The method of Claim 2, wherein the third portion of the cost associated with the communication comprises time-based charges for the communication associated with connections to nonmonitored sites on the distributed computing network.
4. The method of Claim 2, wherein the third portion of the cost associated with the communication comprises a charge payable to the operator of the first monitored site for goods or services purchased during the first connection, further comprising the steps of:
debiting the charge to the third account associated with the originating station (616); and crediting the charge to first account associated with the first monitored network site (616).
5. The method of Claim 1, wherein the step of determining the duration of the first and second connections comprises activating a supervisory program module (58) residing on the originating station (512), the supervisory program module operative transmit a message indicating the duration of the first and second connections (514, 522).
6. The method of Claim 5, wherein the step of activating the supervisory program module (58) comprises transmitting the supervisory program module to the originating station (512).
7. The method of Claim 6, wherein the supervisory program module (58) comprises a portable capsule of object-oriented architecture-neutral software code and related data.
8. The method of Claim 5, wherein the step of activating the supervisory program module (58) comprises transmitting a trigger to the originating station to activate the supervisory program module (512).
9. The method of Claim 5, further comprising the steps of:
transmitting a directory (62) to the originating station (512), the directory comprising an item (64) corresponding to the monitored network site; and receiving a command from the originating station selecting the item (516).
10. The method of Claim 9, further comprising the step of:
displaying the item (64) on a display screen (60) coupled to the originating station; and receiving a user command from the originating station selecting the item (516).
11. The method of Claim 1, further comprising the steps of:
receiving a command requesting a connection between the originating station and the distributed computing network (502);
and in response to the command, assigning a key to identify the communication (510), transmitting the key to the originating station (512), activating a supervisory program module residing on the originating station (512), and receiving a message from the supervisory program module including the key and indicating the duration of the first and second connections (514, 522).
12. The method of Claim 11, wherein the step of assigning a key comprises generating a random number for use as a unique identifier for the communication.
13. The method of Claim 12, further comprising the steps of:
in response to receiving the user command requesting a connection between the originating station and the distributed computing network (502), transmitting a directory (62) to the originating station, the directory comprising a first item (64) corresponding to the first monitored network site and a second item (64) corresponding to the second monitored network site (512); and displaying the first and second items on a display screen (60) coupled to the originating station (24).
14. The method of Claim 1, further comprising the steps of:
receiving a command requesting a directory comprising a first item corresponding to the first monitored network site and a second item corresponding to the second monitored network site (502);
in response to the command requesting a directory comprising items corresponding to monitored network sites on the distributed computing network, assigning a key to the communication (510), transmitting the key to the originating station (512), activating a supervisory program residing on the originating station (512), and displaying the first and second items on a display device (60) coupled to the originating station (24);
receiving a command selecting one of the first item (516);
receiving a command selecting one of the second item(516);
and receiving a message from the supervisory program module including the key and indicating the duration of the first and second connection (514, 522).
15. The method of Claim 1, further comprising the steps of:
activating a supervisory program module residing on the originating station (512);
receiving a first message including a first start time stamp from the supervisory program module indicating the beginning of the first connection (514);
receiving a second message including a first stop time stamp from the supervisory program module indicating the end of the first connection (522);
receiving a third message including a second start time stamp from the supervisory program module indicating the beginning of the second connection (606);
receiving a fourth message including a second stop time stamp from the supervisory program module indicating the end of the second connection (606);
computing a first monitored duration based on a difference between the first stop time stamp and the first start time stamp (610); and computing a second monitored duration based on a difference between the second stop time stamp and the second start time stamp (612).
16. The method of Claim 15, wherein the first start time stamp comprises a start time defined by a clock (51) controlled by the originating station, and wherein the first start time stamp may be used to verify the authenticity of the message.
17. The method of Claim 16, further comprising step of generating a proprietary time stamp based on a proprietary clock (48), and wherein the proprietary time stamp may be used to verify the authenticity of the message.
18. In a distributed computing network comprising a plurality of network sites (18a-n), a point of presence (22a), and a backbone communications network (12a-n) interconnecting the network sites and the point of presence, a method for providing an originating station (24) with access to the distributed computing network, including the steps of receiving a communication including a request for the access at the point of presence from the originating station (402); and determining the duration of the communication (412, 418); CHARACTERISED BY THE STEPS
OF:
in response to receiving a user command (502) requesting a directory (62) comprising an item (64) corresponding to a monitored network site (18a-n) on the distributed computing network, assigning a key to the communication (510);
transmitting the key and the directory (62) from the point of presence to the originating station (512);
activating a supervisory program module residing on the originating station (512); and displaying the item (64) on a display device (60) coupled to the originating station;
in response to a user command selecting the item (516), routing the communication over the backbone communications network (12a-n) to provide the access, including a connection between the originating station and the monitored network site (520);
receiving a first message from the supervisory program module indicating the beginning of the connection, the first message including a first start time stamp (514);
in response to receiving the first message, generating a proprietary start time stamp (606);
receiving a second message indicating the end of the connection, the second message including a first stop time stamp (522);
in response to receiving the second message, generating a proprietary stop time stamp (606);
computing a first monitored duration based on a difference between the first stop time stamp and the first start time stamp (610);
computing a second monitored duration based on a difference between the proprietary stop time stamp and the proprietary start time stamp (612); and if the first monitored duration is approximately equal to the second monitored duration, and the first and second messages include the key, allocating a cost associated with the communication between a first account associated with the monitored network site and a second account associated with the originating station based on the duration of the communication and the duration of the connection (614, 616).
19. A point of presence (22) for accessing a distributed processing network (18a-n) comprising a receiver (32) for receiving a communication from an originating station (24); and a terminal server/router (34) coupled to the receiver for routing the communication to provide the originating station with access to the distributed computing network, including a first connection between the originating station and a first monitored network site on the distributed computing network and a second connection between the originating station and a second monitored network site on the distributed computing network; CHARACTERISED
BY:
an authentication and accounting server (38) coupled to the terminal server/router for determining the duration of the communication;
a credit server (42) coupled to the terminal server/router for determining the duration of the first connection with the first monitored network site and the second connection with the second monitored network site; and a billing system (46) coupled to the authentication and accounting server and to the credit server for allocating a first portion of a cost associated with the communication to a first account associated with the first monitored network site and a second account associated with the second monitored network site based on the duration of the communication, the duration of the first connection, and the duration of the second connection.
20. The point of presence of Claim 19, further comprising means (38) for transmitting a supervisory program module (58) to the originating station via a communications network (30), the supervisory program module operable for transmitting a message from the originating station to the point of presence indicating the duration of the first and second connections.
21. The point of presence of Claim 19, further comprising means (38) for transmitting a trigger via a communications network (30) for activating a supervisory program module (58) residing on the originating station, the supervisory program module operable for transmitting a message from the originating station to the point of presence indicating the first and second connections.
22. The point of presence of Claim 19, further comprising means (38) for transmitting a directory (62) comprising an item (64) corresponding to the monitored network site to the originating station, and for receiving from the originating station a command selecting the item.
23. The point of presence of Claim 19, further comprising means (38) for assigning a key to the communication, for transmitting the key to the originating station, and for determining whether a message indicating the duration of the communication received from the originating station includes the key.
24. The point of presence of Claim 19, further comprising means (40, 44) for receiving a first time stamp in the message, for generating a proprietary time stamp based on a proprietary clock (48), and for determining whether the first time stamp corresponds to the proprietary time stamp.
25. The point of presence of Claim 19, wherein the third portion of the cost associated with the communication comprises time-based charges for the communication associated with connections to non-monitored sites on the distributed computing network.
26. The method of Claim 19, wherein the third portion of the cost associated with the communication comprises a charge payable to the operator of the first monitored site for goods or services purchased during the first connection, further comprising the steps of:
debiting the charge to the third account associated with the originating station; and crediting the charge to first account associated with the first monitored network site.
CA002259367A 1996-07-15 1997-07-11 Method and system for allocating costs in a distributed computing network Abandoned CA2259367A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/679,965 1996-07-15
US08/679,965 US5970477A (en) 1996-07-15 1996-07-15 Method and system for allocating costs in a distributed computing network

Publications (1)

Publication Number Publication Date
CA2259367A1 true CA2259367A1 (en) 1998-01-22

Family

ID=24729103

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002259367A Abandoned CA2259367A1 (en) 1996-07-15 1997-07-11 Method and system for allocating costs in a distributed computing network

Country Status (11)

Country Link
US (1) US5970477A (en)
EP (1) EP0913050A2 (en)
JP (1) JP2000515282A (en)
AR (1) AR007889A1 (en)
AU (1) AU3660997A (en)
BR (1) BR9710459A (en)
CA (1) CA2259367A1 (en)
CO (1) CO4650146A1 (en)
PA (1) PA8433901A1 (en)
UY (1) UY24622A1 (en)
WO (1) WO1998002828A2 (en)

Families Citing this family (163)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9603582D0 (en) 1996-02-20 1996-04-17 Hewlett Packard Co Method of accessing service resource items that are for use in a telecommunications system
US7028088B1 (en) * 1996-04-03 2006-04-11 Scientific-Atlanta, Inc. System and method for providing statistics for flexible billing in a cable environment
US6154445A (en) 1996-04-18 2000-11-28 Bell Atlantic Network Services, Inc. Telephony communication via varied redundant networks
US6069890A (en) 1996-06-26 2000-05-30 Bell Atlantic Network Services, Inc. Internet telephone service
US7555458B1 (en) 1996-06-05 2009-06-30 Fraud Control System.Com Corporation Method of billing a purchase made over a computer network
US6553108B1 (en) * 1996-06-05 2003-04-22 David Felger Method of billing a communication session conducted over a computer network
US7013001B1 (en) * 1996-06-05 2006-03-14 David Felger Method of billing a communication session conducted over a computer network
US20030195848A1 (en) 1996-06-05 2003-10-16 David Felger Method of billing a purchase made over a computer network
US8229844B2 (en) 1996-06-05 2012-07-24 Fraud Control Systems.Com Corporation Method of billing a purchase made over a computer network
US6016307A (en) 1996-10-31 2000-01-18 Connect One, Inc. Multi-protocol telecommunications routing optimization
US6473404B1 (en) 1998-11-24 2002-10-29 Connect One, Inc. Multi-protocol telecommunications routing optimization
US6754181B1 (en) 1996-11-18 2004-06-22 Mci Communications Corporation System and method for a directory service supporting a hybrid communication system architecture
US6335927B1 (en) 1996-11-18 2002-01-01 Mci Communications Corporation System and method for providing requested quality of service in a hybrid network
US6690654B2 (en) 1996-11-18 2004-02-10 Mci Communications Corporation Method and system for multi-media collaboration between remote parties
US6078582A (en) 1996-12-18 2000-06-20 Bell Atlantic Network Services, Inc. Internet long distance telephone service
US6032118A (en) * 1996-12-19 2000-02-29 Northern Telecom Limited Virtual private network service provider for asynchronous transfer mode network
US6317742B1 (en) * 1997-01-09 2001-11-13 Sun Microsystems, Inc. Method and apparatus for controlling software access to system resources
US6731625B1 (en) 1997-02-10 2004-05-04 Mci Communications Corporation System, method and article of manufacture for a call back architecture in a hybrid network with support for internet telephony
US6137869A (en) 1997-09-16 2000-10-24 Bell Atlantic Network Services, Inc. Network session management
US6574216B1 (en) 1997-03-11 2003-06-03 Verizon Services Corp. Packet data network voice call quality monitoring
US6870827B1 (en) 1997-03-19 2005-03-22 Verizon Services Corp. Voice call alternative routing through PSTN and internet networks
US6292479B1 (en) 1997-03-19 2001-09-18 Bell Atlantic Network Services, Inc. Transport of caller identification information through diverse communication networks
FI972739A0 (en) 1997-06-25 1997-06-25 Ericsson Telefon Ab L M Foerfarande och system Foer komunikation
US6078956A (en) * 1997-09-08 2000-06-20 International Business Machines Corporation World wide web end user response time monitor
US6845102B1 (en) * 1997-10-09 2005-01-18 Cisco Technology, Inc. Method and system for network access over a low bandwidth link
SE510954C2 (en) * 1997-11-11 1999-07-12 Ericsson Telefon Ab L M Method and device for verification of voice port services
US6272115B1 (en) * 1998-01-28 2001-08-07 Sprint Communications Company, L.P. Interactive toll-free telephone service automation
IL125432A (en) 1998-01-30 2010-11-30 Easynet Access Inc Personalized internet interaction
IL123129A (en) * 1998-01-30 2010-12-30 Aviv Refuah Www addressing
US20050203835A1 (en) * 1998-01-30 2005-09-15 Eli Nhaissi Internet billing
US7260192B2 (en) * 1998-03-26 2007-08-21 Verizon Services Corp. Internet user finder
DE69919190T2 (en) 1998-06-05 2005-07-28 British Telecommunications P.L.C. COMMUNICATION NETWORK WITH A TARIFF BASED ON NETWORK LOAD
US6192132B1 (en) * 1998-06-26 2001-02-20 Avaya Technology Corp. Short term internet access
US6205480B1 (en) * 1998-08-19 2001-03-20 Computer Associates Think, Inc. System and method for web server user authentication
US6119160A (en) * 1998-10-13 2000-09-12 Cisco Technology, Inc. Multiple-level internet protocol accounting
US7165122B1 (en) 1998-11-12 2007-01-16 Cisco Technology, Inc. Dynamic IP addressing and quality of service assurance
US6539431B1 (en) 1998-11-12 2003-03-25 Cisco Technology, Inc. Support IP pool-based configuration
US6427174B1 (en) 1998-11-12 2002-07-30 Cisco Technology, Inc. Dynamic IP addressing and quality of service assurance
US7165117B1 (en) 1998-11-12 2007-01-16 Cisco Technology, Inc. Dynamic IP addressing and quality of service assurance
US7739159B1 (en) 1998-11-23 2010-06-15 Cisco Technology, Inc. Aggregation of user usage data for accounting systems in dynamically configured networks
US6427170B1 (en) * 1998-12-08 2002-07-30 Cisco Technology, Inc. Integrated IP address management
US6917617B2 (en) * 1998-12-16 2005-07-12 Cisco Technology, Inc. Use of precedence bits for quality of service
US6173269B1 (en) * 1998-12-16 2001-01-09 Zowi.Com, Inc Method and apparatus for executing electronic commercial transactions with minors
US6643260B1 (en) 1998-12-18 2003-11-04 Cisco Technology, Inc. Method and apparatus for implementing a quality of service policy in a data communications network
US6298383B1 (en) 1999-01-04 2001-10-02 Cisco Technology, Inc. Integration of authentication authorization and accounting service and proxy service
US6871224B1 (en) 1999-01-04 2005-03-22 Cisco Technology, Inc. Facility to transmit network management data to an umbrella management system
US6243754B1 (en) * 1999-01-08 2001-06-05 International Business Machines Corporation Dynamic selection of network providers
US6374307B1 (en) * 1999-02-12 2002-04-16 Steve A. Ristau Non-intrusive DWDM billing system
WO2000048079A1 (en) * 1999-02-12 2000-08-17 Kargman James B The creation of custom designed direct mail advertising via the internet
US6832250B1 (en) * 1999-04-13 2004-12-14 Lexmark International, Inc. Usage-based billing and management system and method for printers and other assets
US6529955B1 (en) 1999-05-06 2003-03-04 Cisco Technology, Inc. Proxy session count limitation
US6430619B1 (en) 1999-05-06 2002-08-06 Cisco Technology, Inc. Virtual private data network session count limitation
EP1054529A3 (en) * 1999-05-20 2003-01-08 Lucent Technologies Inc. Method and apparatus for associating network usage with particular users
US6549516B1 (en) 1999-07-02 2003-04-15 Cisco Technology, Inc. Sending instructions from a service manager to forwarding agents on a need to know basis
US6650641B1 (en) 1999-07-02 2003-11-18 Cisco Technology, Inc. Network address translation using a forwarding agent
US7409704B1 (en) * 1999-07-15 2008-08-05 Telefonaktiebolaget L M Ericsson (Publ) System and method for local policy enforcement for internet service providers
US6430739B1 (en) * 1999-07-16 2002-08-06 Acceleration Software International Corporation Software execution contingent on home page setting
US7627507B1 (en) * 1999-08-10 2009-12-01 Fmr Llc Providing one party access to an account of another party
WO2001013258A1 (en) * 1999-08-12 2001-02-22 Appliede, Inc. Professional time tracking and recouping system and software
US7222293B1 (en) * 1999-08-12 2007-05-22 Applieoe, Inc. Professional time tracking and reporting system
DE19939151A1 (en) * 1999-08-20 2001-03-01 Deutsche Telekom Mobil Process for displaying transmission and service costs when using telecommunications networks
DE19941461A1 (en) * 1999-08-31 2001-03-08 Deutsche Telekom Mobil Process for the preventive and / or current display of transmission costs for the data transmission of Internet and online data
DE19946556A1 (en) * 1999-09-29 2001-04-12 Deutsche Telekom Mobil Process for the ongoing and preventive display of transmission costs for the data transmission of Internet and online data
US6839684B1 (en) * 1999-12-06 2005-01-04 Nokia Corporation Host-sponsored data transmission billing system and method
IES991037A2 (en) * 1999-12-13 2001-11-14 Sherkin Comm Systems Ltd Data communication
US6798746B1 (en) 1999-12-18 2004-09-28 Cisco Technology, Inc. Method and apparatus for implementing a quality of service policy in a data communications network
US6577720B1 (en) * 1999-12-29 2003-06-10 Nortel Networks Corporation System and method for providing high-speed communications using a public terminal
JP3348714B2 (en) * 2000-02-15 2002-11-20 日本電気株式会社 Apparatus in mobile terminal company, billing method, and recording medium recording billing program
US7797373B1 (en) * 2000-03-03 2010-09-14 Martin S Berger System and method for promoting intellectual property
JP4002380B2 (en) * 2000-03-15 2007-10-31 日本電気株式会社 Multicast system, authentication server terminal, multicast receiver terminal management method, and recording medium
US6973489B1 (en) * 2000-03-21 2005-12-06 Mercury Interactive Corporation Server monitoring virtual points of presence
US20010027467A1 (en) * 2000-03-30 2001-10-04 Anderson David P. Massively distributed database system and associated method
US7039670B2 (en) * 2000-03-30 2006-05-02 United Devices, Inc. Massively distributed processing system with modular client agent and associated method
USRE42153E1 (en) * 2000-03-30 2011-02-15 Hubbard Edward A Dynamic coordination and control of network connected devices for large-scale network site testing and associated architectures
US6963897B1 (en) 2000-03-30 2005-11-08 United Devices, Inc. Customer services and advertising based upon device attributes and associated distributed processing system
US7082474B1 (en) 2000-03-30 2006-07-25 United Devices, Inc. Data sharing and file distribution method and associated distributed processing system
US6891802B1 (en) 2000-03-30 2005-05-10 United Devices, Inc. Network site testing method and associated system
US6847995B1 (en) 2000-03-30 2005-01-25 United Devices, Inc. Security architecture for distributed processing systems and associated method
US8010703B2 (en) * 2000-03-30 2011-08-30 Prashtama Wireless Llc Data conversion services and associated distributed processing system
US7092985B2 (en) * 2000-03-30 2006-08-15 United Devices, Inc. Method of managing workloads and associated distributed processing system
US6654783B1 (en) 2000-03-30 2003-11-25 Ethergent Corporation Network site content indexing method and associated system
US7254607B2 (en) * 2000-03-30 2007-08-07 United Devices, Inc. Dynamic coordination and control of network connected devices for large-scale network site testing and associated architectures
US7020678B1 (en) 2000-03-30 2006-03-28 United Devices, Inc. Machine generated sweepstakes entry model and associated distributed processing system
US20040148336A1 (en) * 2000-03-30 2004-07-29 Hubbard Edward A Massively distributed processing system architecture, scheduling, unique device identification and associated methods
US20090216641A1 (en) 2000-03-30 2009-08-27 Niration Network Group, L.L.C. Methods and Systems for Indexing Content
US7003547B1 (en) 2000-03-30 2006-02-21 United Devices, Inc. Distributed parallel processing system having capability-based incentives and associated method
GB2367204B (en) * 2000-06-06 2004-02-11 Ericsson Telefon Ab L M Accessing services and products via the internet
US6870900B1 (en) * 2000-06-16 2005-03-22 Bellsouth Intellectual Property Corporation Proactive maintenance application
US6771739B1 (en) * 2000-06-16 2004-08-03 Bellsouth Intellectual Property Corporation Pressure alarms and reports system module for proactive maintenance application
US7050547B1 (en) 2000-06-16 2006-05-23 Bellsouth Intellectual Property Corporation Digital loop carrier module for proactive maintenance application
JP2002092366A (en) * 2000-09-11 2002-03-29 Nec Corp Cpu time-division purchase-and-sale method and control server in cpu time-division purchase-and-sale system
EP1187443A1 (en) * 2000-09-12 2002-03-13 Peter Dr. Ziegler Method and system for billing the user via the telephone service provider for internet content
AU2002213430A1 (en) * 2000-09-28 2002-04-08 Ipdev Co. Method for simplified one-touch ordering of goods and services from a wired or wireless phone or terminal
US7117262B2 (en) * 2000-11-01 2006-10-03 Inktomi Corporation Cooperative management of distributed network caches
JP2002157524A (en) * 2000-11-17 2002-05-31 Nec Corp Device, system and method for providing map information, and recording medium recorded with map information providing program
US20020087483A1 (en) * 2000-12-29 2002-07-04 Shlomi Harif System, method and program for creating and distributing processes in a heterogeneous network
US6988148B1 (en) 2001-01-19 2006-01-17 Cisco Technology, Inc. IP pool management utilizing an IP pool MIB
US7600029B1 (en) * 2001-03-15 2009-10-06 Governing Dynamics Investment, Llc System and method for generating, monitoring and reporting performance information relating to data transmissions
FI112426B (en) * 2001-03-23 2003-11-28 Nixu Oy Content server mediation server
GB2373885A (en) * 2001-03-28 2002-10-02 World Information On Net A data processing system enabling users to access services without need of specifying payment means direct to each service provider
US20020169680A1 (en) * 2001-05-10 2002-11-14 International Business Machines Corporation Method and apparatus for building commercial distributed computing networks via computer cost subsidization
US7401146B1 (en) 2001-05-21 2008-07-15 Cisco Technology, Inc. Method and apparatus for tracking related information in a network
US7197549B1 (en) 2001-06-04 2007-03-27 Cisco Technology, Inc. On-demand address pools
US7788345B1 (en) 2001-06-04 2010-08-31 Cisco Technology, Inc. Resource allocation and reclamation for on-demand address pools
US6968389B1 (en) 2001-07-17 2005-11-22 Cisco Technology, Inc. System and method for qualifying requests in a network
US6981029B1 (en) 2001-07-17 2005-12-27 Cisco Technology, Inc. System and method for processing a request for information in a network
JP2003141419A (en) * 2001-11-01 2003-05-16 Pioneer Electronic Corp Charging server and charging method
JP3886362B2 (en) * 2001-11-13 2007-02-28 富士通株式会社 Content filtering method, content filtering apparatus, and content filtering program
US20030115316A1 (en) * 2001-12-07 2003-06-19 Siew-Hong Yang-Huffman System and method for network usage metering
US7672249B2 (en) * 2001-12-13 2010-03-02 Cisco Technology, Inc. Configurable network appliance
US7221684B1 (en) 2002-01-08 2007-05-22 Cisco Technology, Inc. Increasing network efficiency using packet compression and decompression
US7120148B1 (en) * 2002-02-12 2006-10-10 Cisco Technology, Inc. System and method for providing source awareness in a wireless application protocol network environment
AU2003219863C1 (en) * 2002-02-22 2009-03-05 Shire Llc Novel sustained release pharmaceutical compounds to prevent abuse of controlled substances
US20030208602A1 (en) * 2002-04-08 2003-11-06 Cisco Technology, Inc. System and method for pushing data in an internet protocol network environment
US7103659B2 (en) * 2002-04-09 2006-09-05 Cisco Technology, Inc. System and method for monitoring information in a network environment
US6965667B2 (en) * 2002-05-30 2005-11-15 Slingshot Communications, Inc. Method of accounting prepaid online internet service credit values
US7386632B1 (en) 2002-06-07 2008-06-10 Cisco Technology, Inc. Dynamic IP addressing and quality of service assurance
US7173933B1 (en) 2002-06-10 2007-02-06 Cisco Technology, Inc. System and method for providing source awareness in a network environment
US7296152B1 (en) 2002-07-09 2007-11-13 Cisco Technology, Inc. System and method for providing access to a network in a communications environment
US8150951B2 (en) * 2002-07-10 2012-04-03 Cisco Technology, Inc. System and method for communicating in a loadbalancing environment
US7546372B2 (en) * 2002-07-11 2009-06-09 Ibeam Systems, Inc. System and method for providing to multiple user computers concurrent telephonic access to multiple remote devices
US20040093295A1 (en) * 2002-11-13 2004-05-13 Spotware Technologies, Inc. Retail distributive computing
JP3886442B2 (en) * 2002-11-22 2007-02-28 Necインフロンティア株式会社 Internet connection system
GB0228367D0 (en) * 2002-12-05 2003-01-08 Bts Holdings Ltd System and method for management of communications resources
US7292538B1 (en) * 2002-12-06 2007-11-06 Cisco Technology, Inc. System and method for distributing information in a network environment
US7310307B1 (en) * 2002-12-17 2007-12-18 Cisco Technology, Inc. System and method for authenticating an element in a network environment
US7958238B1 (en) * 2003-02-07 2011-06-07 Cisco Technology, Inc. System and method for managing network access for an end user
US7305470B2 (en) * 2003-02-12 2007-12-04 Aol Llc Method for displaying web user's authentication status in a distributed single login network
US20040179555A1 (en) * 2003-03-11 2004-09-16 Cisco Technology, Inc. System and method for compressing data in a communications environment
US7650402B1 (en) 2003-06-25 2010-01-19 Cisco Technology, Inc. System and method for tracking end users in a loadbalancing environment
US20050027576A1 (en) * 2003-07-31 2005-02-03 Matthew Klipstein Method and system for cooperative research and for compensation distribution
US20050044138A1 (en) * 2003-08-21 2005-02-24 Cisco Technology, Inc. System and method for managing access for an end user in a network environment
US20050049887A1 (en) * 2003-08-29 2005-03-03 Bulleit Douglas A. Methods, systems, and computer program products for allocating costs in using a broadband communication network
US7733793B1 (en) 2003-12-10 2010-06-08 Cisco Technology, Inc. System and method for suppressing silence data in a network environment
US20090106139A1 (en) * 2004-03-04 2009-04-23 Henley Terry L Cost recovery billing system
US8315170B2 (en) * 2004-08-09 2012-11-20 Cisco Technology, Inc. System and method for signaling information in order to enable and disable distributed billing in a network environment
US8005954B2 (en) * 2004-08-27 2011-08-23 Cisco Technology, Inc. System and method for managing end user approval for charging in a network environment
US9232338B1 (en) * 2004-09-09 2016-01-05 At&T Intellectual Property Ii, L.P. Server-paid internet access service
US7450531B2 (en) * 2004-10-26 2008-11-11 Cisco Technology, Inc. System and method for allocating and distributing end user information in a network environment
US20060200566A1 (en) * 2005-03-07 2006-09-07 Ziebarth Wayne W Software proxy for securing web application business logic
US7340744B2 (en) * 2005-04-08 2008-03-04 Cisco Technology, Inc. System and method for optimizing sessions and network resources in a loadbalancing environment
US20080060069A1 (en) * 2005-08-12 2008-03-06 Slingshot Communications, Inc. Methods and apparatus for data transfer
US20070161150A1 (en) * 2005-12-28 2007-07-12 Intel Corporation Forming ultra dense 3-D interconnect structures
CN101496387B (en) 2006-03-06 2012-09-05 思科技术公司 System and method for access authentication in a mobile wireless network
US7715562B2 (en) 2006-03-06 2010-05-11 Cisco Technology, Inc. System and method for access authentication in a mobile wireless network
US20070208790A1 (en) * 2006-03-06 2007-09-06 Reuter James M Distributed data-storage system
PL2084868T3 (en) 2006-11-02 2019-01-31 Voip-Pal.Com, Inc. Producing routing messages for voice over ip communications
CA2670510C (en) * 2006-11-29 2020-12-22 Digifonica (International) Limited Intercepting voice over ip communications and other data communications
US20080154626A1 (en) * 2006-12-20 2008-06-26 Microsoft Corporation Aggregating and sharing trust-owned media
US7971228B2 (en) * 2007-02-07 2011-06-28 Cisco Technology, Inc. System and method for providing application-specific on-line charging in a communications environment
WO2008116296A1 (en) 2007-03-26 2008-10-02 Digifonica (International) Limited Emergency assistance calling for voice over ip communications systems
KR100960152B1 (en) * 2007-10-24 2010-05-28 플러스기술주식회사 Method for permitting and blocking use of internet by detecting plural terminals on network
US20090112996A1 (en) * 2007-10-25 2009-04-30 Cisco Technology, Inc. Determining Presence Status of End User Associated with Multiple Access Terminals
US20090112997A1 (en) * 2007-10-25 2009-04-30 Cisco Technology, Inc. Utilizing Presence Data Associated with Web Item
US20090107265A1 (en) * 2007-10-25 2009-04-30 Cisco Technology, Inc. Utilizing Presence Data Associated with a Sensor
JP4521448B2 (en) * 2008-01-31 2010-08-11 株式会社東芝 Remote monitoring / diagnosis system
EP2311246B1 (en) * 2008-07-07 2018-05-30 Telefonaktiebolaget LM Ericsson (publ) Real time correlation of parallel charging events
WO2010012090A2 (en) 2008-07-28 2010-02-04 Digifonica (International) Limited Mobile gateway
US8238538B2 (en) 2009-05-28 2012-08-07 Comcast Cable Communications, Llc Stateful home phone service
PL2478678T3 (en) 2009-09-17 2016-05-31 Digifonica Int Ltd Uninterrupted transmission of internet protocol transmissions during endpoint changes
CA2845809A1 (en) * 2011-08-25 2013-02-28 Smart Hub Pte. Ltd. System and method for provisioning internet access to a computing device
JP7297550B2 (en) * 2019-06-21 2023-06-26 エヌ・ティ・ティ・コミュニケーションズ株式会社 Policy decision device, policy decision method and program
CN112686683A (en) * 2020-12-08 2021-04-20 望海康信(北京)科技股份公司 Cost accounting system, and corresponding apparatus and storage medium

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE43038T1 (en) * 1985-02-20 1989-05-15 Siemens Ag METHOD OF DETERMINING DURATION OF A CONNECTION.
SG43031A1 (en) * 1994-02-28 1997-10-17 British Telecomm Service provision in communications networks
US5864604A (en) * 1994-05-20 1999-01-26 General Patent Corp Method of providing message service for limited access telecommunications
US5694546A (en) * 1994-05-31 1997-12-02 Reisman; Richard R. System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list
DE69511425T2 (en) * 1994-11-08 2000-03-09 Vermeer Tech Inc PRODUCTION AID FOR ONLINE SERVICES WITH CHARGING CHARGES
CA2195968C (en) * 1995-05-24 2001-11-20 Jay S. Walker 900 number billing and collection system and method for on-line computer services
US5717604A (en) * 1995-05-25 1998-02-10 Wiggins; Christopher Network monitoring system for tracking, billing and recovering licenses
FI99073C (en) * 1995-06-28 1997-09-25 Finland Telecom Oy Procedure for billing a computer system user as well as a computer system
US5745556A (en) * 1995-09-22 1998-04-28 At&T Corp. Interactive and information data services telephone billing system
DE19535378A1 (en) * 1995-09-25 1997-03-27 Sel Alcatel Ag Tariff rate determining method especially for communication path in telecommunication network
US5778182A (en) * 1995-11-07 1998-07-07 At&T Corp. Usage management system
US5870550A (en) * 1996-02-26 1999-02-09 Network Engineering Software Web server employing multi-homed, moldular framework
FI102427B (en) * 1996-02-09 1998-11-30 Ericsson Telefon Ab L M Billing on the Internet
US5815665A (en) * 1996-04-03 1998-09-29 Microsoft Corporation System and method for providing trusted brokering services over a distributed network

Also Published As

Publication number Publication date
BR9710459A (en) 1999-08-17
US5970477A (en) 1999-10-19
WO1998002828A2 (en) 1998-01-22
UY24622A1 (en) 1997-08-12
CO4650146A1 (en) 1998-09-03
WO1998002828A3 (en) 1998-03-05
AR007889A1 (en) 1999-11-24
PA8433901A1 (en) 2000-05-24
AU3660997A (en) 1998-02-09
JP2000515282A (en) 2000-11-14
EP0913050A2 (en) 1999-05-06

Similar Documents

Publication Publication Date Title
US5970477A (en) Method and system for allocating costs in a distributed computing network
US5899980A (en) Retail method over a wide area network
CA2260158C (en) System and method for providing customer contact services through a customer contact services node/internet gateway
US6570870B1 (en) Method and system for making a charged telephone call during an Internet browsing session
US5905736A (en) Method for the billing of transactions over the internet
US20040083125A1 (en) Method and system for delivering customer services to independent insurance agents
CA2410161A1 (en) System and method for providing prepaid services via an internet protocol network system
WO1998004065A9 (en) System and method for providing customer contact services through a customer contact services node/internet gateway
US20060242038A1 (en) Method for charging costs of enjoying contents transmitted over a telecommunications network, preferably by the internet network, and related system
EP1738322A2 (en) Intermediary content gateway system and method
WO2000014919A2 (en) Apparatus and methods for connecting a network user to a network service provider
CN100456712C (en) Method of realizing Internet contents paying
CA2375311C (en) Electronic bill presentment and payment
EP1391078B1 (en) Method for timing the duration of a session
US20010046283A1 (en) Arrangement for billing or billing authorization using a calling card
Botvich et al. On charging for Internet services provided over an ATM network
Rajala Service provisioning in IP/ATM Network
EP1330693A2 (en) System and method for internet communications
WO2005081489A1 (en) Improved secure web site access method and system
FI113725B (en) Procedure for billing a computer system user
Tejasophon Prepaid calling card online store
Gerdes et al. Mobile payment solutions
WO2000079420A2 (en) Electronic bill presentment and payment

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued