Method and System for Location-Dependent Billing for Services
20170302802 ยท 2017-10-19
Inventors
Cpc classification
H04M2215/0156
ELECTRICITY
H04W4/80
ELECTRICITY
H04M15/48
ELECTRICITY
H04M15/00
ELECTRICITY
G01S5/0054
PHYSICS
H04M2215/0164
ELECTRICITY
International classification
Abstract
A method for location-dependent billing for a services that are available to a mobile terminal, a local communication connection is set up to a fixably installed external location tag with a corresponding wireless interface between the fixably installed tag and the mobile terminal, the method including the steps of accessing the external location tag and transmitting a billing rate code from the external location tag to the mobile terminal, forwarding the billing rate code from the mobile terminal to a central unit of a mobile communication network, in which the mobile terminal is logged, determining a geographic location identification of the external location tag by evaluation of the billing rate code at the central unit, and selecting a billing rate for billing for the service available to the user based on the billing rate code at the central unit.
Claims
1-20. (canceled)
21. A tag, comprising: a storage operable to maintain data related to a network; and a transmitter operable to wirelessly provide the network-related data to a mobile terminal via a local communication connection, wherein the mobile terminal is operable to gain access to the network by transmitting the wirelessly-provided, network-related data to a control unit of the network and by causing payment of an access fee based on the wirelessly-provided, network-related data.
22. The tag of claim 21, wherein the network is a mobile communication network.
23. The tag of claim 21, wherein the mobile terminal is operable to setup the local communication connection via a wireless interface.
24. The tag of claim 21, wherein the transmitter is operable according to the ZigBee standard, the Bluetooth standard or a Near Field Communication (NFC) standard.
25. The tag of claim 21, wherein the local communication connection between the mobile terminal and the tag is secured.
26. The tag of claim 21, wherein the tag comprises a security component operable to secure the tag.
27. The tag of claim 21, wherein the tag is operably connected to a communication channel.
28. The tag of claim 21, wherein the wirelessly-provided, network-related data is associated with a location.
29. The tag of claim 21, wherein the wirelessly-provided, network-related data comprises an encrypted portion.
30. The tag of claim 29, wherein the control unit of the network is operable to decrypt the encrypted portion.
31. A method, comprising: maintaining, in a tag, data related to a network; wirelessly providing the network-related data from the tag to a mobile terminal via a local communication connection; transmitting the wirelessly-provided, network-related data from the mobile terminal to a control unit of the network; causing payment of an access fee based on the wirelessly-provided, network-related data; and gaining access to the network from the mobile terminal.
32. The method of claim 31, wherein the network is a mobile communication network.
33. The method of claim 31, wherein the method comprises initializing the local communication connection via a wireless interface of the mobile terminal.
34. The method of claim 31, wherein wirelessly providing is according to the ZigBee standard, the Bluetooth standard or a Near Field Communication (NFC) standard.
35. The method of claim 31, wherein the local communication connection between the mobile terminal and the tag is secured.
36. The method of claim 31, wherein the tag comprises a security component operable to secure the tag.
37. The method of claim 31, wherein the tag is operably connected to a communication channel.
38. The method of claim 31, wherein the wirelessly-provided, network-related data is associated with a location.
39. The method of claim 31, wherein the wirelessly-provided, network-related data comprises an encrypted portion.
40. The method of claim 39, wherein the method comprises decrypting the encrypted portion in the control unit of the network.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0019] Embodiment variants of the present invention will be described in the following with reference to examples. The examples of the embodiments are illustrated by the following attached figure:
[0020]
DETAILED DESCRIPTION OF THE INVENTION
[0021] in
[0022] Besides telecommunication connections of the mobile terminal 1, further services can be availed of by the user. Thus a user can avail of a SMS service (SMS: Short Message Service), with which SMS service the latest weather reports or stock market reports can be transmitted on the mobile terminal I to the user. Or the user can avail of a television service, the television news being transmitted to the user on the mobile terminal 1, for example. Or, using the mobile terminal 1, the user can make purchases via a web portal, such as orders for books or orders for food. Or the user can pay for use of a service using the credit card in a shop. Such services are debited to the user via corresponding billing devices. Thus a billing device can refer to a device for billing SMS messages, for transmitting MMS messages (MMS: Multimedia Message Service), for transmitting television clips or television news, for delivery of books or foods, for billing of an amount on a credit card account or to the billing of any other services.
[0023] In
[0024] In
[0025] As shown in
[0026] The identification module 2 can now be set up such that it is possible at definable points in time to check whether a local connection to a location tag can be set up via the wireless interface of the identification module 2. Thus, through the identification module 2, a request for transmission of data of a location tag may be transmitted at definable points in time, for example. Such a request can be based, for example, on a ZigBee standard or a Bluetooth standard, and can comprise, for instance, an identification or an encrypted identification. Such an identification or encrypted identification can be evaluated by correspondingly configured location tags. However, such an identification or encrypted identification cannot be sensibly evaluated by other devices despite a corresponding wireless interface. After the identification is evaluated by the location tag, data from the location tag are transmitted to the identification module 2, for instance. Such a transmission can be triggered by the location tag or by the transmission of a further request from the identification module 2 to the location tag. The data transmitted from the location tag to the identification module 2 may comprise a rate code, an encrypted rate code or geographic coordinates, for example.
[0027] The mobile terminal 1 is logged into the mobile communication network via the base station 50. Various generally known methods are used for logging in the mobile terminal 1. Following such methods, an authentication is thus carried out. The operator of the mobile communication network can thus in particular assign the mobile terminal to an authorized subscriber. In addition, a secured communication connection can be set up between the identification module 2 and any device of the mobile communication network.
[0028] Thus the data of the location tag can be transmitted via a secure connection of the identification module 2 to any device of the mobile telecommunication network, thus to the billing unit 53, for example. As mentioned, the data of the location tag 30 can comprise an encrypted rate code, for example. Stored on the billing unit 53 can be the corresponding electronic key for decryption of the encrypted rate code. After decryption of the encrypted rate code, a billing rate, assigned to the rate code, can be determined on the billing unit, or be selected from a definable number, for example from a table. Of course the billing rate can be selected such that a telephone apparatus of a second operator of a telecommunication network installed in the vicinity of the location tag can be competed with. The billing rate can also be determined according to any algorithm. Thus the data of the location tag can relate to geographic coordinates, a probability according to which a competitor is offering telecommunication services at this location being determined by means of an algorithm, the billing rate being determined according to this probability or being selected for the billing.
[0029] According to the invention, services availed of by a user are billed according to a billing rate that is selected based on the current location of the user. Thus a location tag can be installed on an advertising poster, an access address being printed on the advertising poster for the ordering of the product or service being advertised on the advertising poster. Upon ordering the product using the access address, a monetary amount can be debited to the user by means of a billing device, the user profiting from an especially inexpensive billing rate, for instance, because he is situated at the location of the advertising poster. A location tag can also be installed at a bus stop. To make use of the waiting time at the bus stop, the user can request the transmission from a service provider of the latest television news, for instance. Depending upon price policy of the service provider, such a transmission can now take place according to a selectable billing rate, the data stored on the location tag being taken into consideration in selecting the billing rate.
[0030] The location tags 30,31 can be secured using security means. Such security means can relate to mechanical means such as a lockable lock. These security means can also relate to electronic means. Thus a location tag can also be configured as USB (USB: Universal Serial Bus) stick, an identification of the computer being checked upon installation of the USB stick, and the described functions of the location tag being enabled only with a successful checking of this identification.
[0031] The wireless interface of the identification module 2 can be configured based on different embodiment variants. Thus the identification module 2 can be designed as common SIM card, for instance, all components of the wireless interface being installed on the SIM card, such as encoder, modulator, decoder, antenna, driver, etc., i.e. all components that are necessary in order to operate the wireless interface according to a ZigBee standard, for instance. Depending upon the application, the SIM card and the wireless interface can also be designed such that components of the wireless interface, such as the antenna, for instance, are installed on the housing of the mobile terminal. Of course further embodiment variants are known to one skilled in the art for installing an identification module 2 according to the invention on a mobile terminal, and for installing a wireless interface on the identification module 2.