Controlled recorded 3-way calling
First Claim
1. A computer based method comprising:
- identifying an operator device requesting to administrate a controlled call between a first contact device and a second contact device;
receiving, from the operator device, a first transmitting number corresponding to a first contact device, a second transmitting number corresponding to a second contact device, and instructions to provide, to the second contact device, when initiating the controlled call on behalf of the operator device, spoofed number information corresponding to the first contact device;
requesting a first connection to the first contact device through a virtual number based on the first transmitting number; and
requesting a second connection to the second contact device through the virtual number based on the second transmitting number, the second connection request having the spoofed number information corresponding to the first contact device;
wherein establishment of the first connection and the second connection enables controlled audio communications between the first contact device and the second contact device and disables audio communications from the operator device to the first contact device and the second contact device, the operator device receiving the audio communications between the first contact device and the second contact device and controlling the audio communications.
2 Assignments
0 Petitions
Accused Products
Abstract
Agencies issue recording devices to personnel for administrating and monitoring controlled calls during the course of their duties. To provide flexible capabilities to agencies, a virtual number is provisioned and configured to enable an operator to administrate controlled calls without dedicated recording devices. Using the virtual number, the operator may setup a controlled call between a victim and a baddie. The victim is contacted via the virtual number by the operator and optionally informed about the controlled call process. In turn, the baddie is contacted using number information of the victim'"'"'s phone and connected with the victim. Call audio between the victim and baddie is transmitted to the operator. When necessary, the operator may terminate the call remotely from the telephonic device the operator used to setup the call.
-
Citations
20 Claims
-
1. A computer based method comprising:
-
identifying an operator device requesting to administrate a controlled call between a first contact device and a second contact device; receiving, from the operator device, a first transmitting number corresponding to a first contact device, a second transmitting number corresponding to a second contact device, and instructions to provide, to the second contact device, when initiating the controlled call on behalf of the operator device, spoofed number information corresponding to the first contact device; requesting a first connection to the first contact device through a virtual number based on the first transmitting number; and requesting a second connection to the second contact device through the virtual number based on the second transmitting number, the second connection request having the spoofed number information corresponding to the first contact device; wherein establishment of the first connection and the second connection enables controlled audio communications between the first contact device and the second contact device and disables audio communications from the operator device to the first contact device and the second contact device, the operator device receiving the audio communications between the first contact device and the second contact device and controlling the audio communications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable storage medium storing computer program code for administration of controlled calls, the computer program code when executed by a processor performing steps comprising:
-
identifying an operator device requesting to administrate a controlled call between a first contact device and a second contact device; receiving, from the operator device, a first transmitting number corresponding to a first contact device, a second transmitting number corresponding to a second contact device, and instructions to provide, to the second contact device, when initiating the controlled call on behalf of the operator device, spoofed number information corresponding to the first contact device; requesting a first connection to the first contact device through a virtual number based on the first transmitting number; and requesting a second connection to the second contact device through the virtual number based on the second transmitting number, the second connection request having the spoofed number information corresponding to the first contact device; wherein establishment of the first connection and the second connection enables controlled audio communications between the first contact device and the second contact device and disables audio communications from the operator device to the first contact device and the second contact device, the operator device receiving the audio communications between the first contact device and the second contact device and controlling the audio communications. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification