Secure detection of an intercepted targeted IP phone from multiple monitoring locations
First Claim
1. A method of secure surveillance of a target IP telephone from a plurality of monitoring stations;
- comprising the steps of;
initiating a request for surveillance of a target IP telephone from one of a plurality of surveillance stations each of which may be serviced by a network of different technology from those of other surveillance stations;
generating a plurality of duplicate calls to each of the plurality of monitoring stations in response to the initiating a request;
authenticating each of the monitoring stations seeking to join in the surveillance by entry of a password for each monitoring station;
muting the duplicate calls from any of the monitoring stations not having achieved authentication; and
formatting intercepted messages of the monitored target IP phone for conforming to delivery over networks having a different technology than that of the target IP telephone by;
establishing a database of monitoring stations and a technology of their connecting networks at a central monitoring center associated with the IP network of the target IP telephone.
1 Assignment
0 Petitions
Accused Products
Abstract
Secure monitoring of a target IP telephone may be obtained simultaneously at a plurality of monitoring stations by requiring authentication to be provided by each of the monitoring stations prior to granting access permission to monitor the call. A single request generates multiple duplicate calls to a plurality of different monitoring location, each of which must be authenticated. When the monitored call arrives at each of the multiple monitoring stations a password is used to achieve authentication permission. The password is entered at each monitoring station by a touchtone keypad that generates Dual Tone Multi-frequency (DTMF) signals (e.g., each signal is a combination of two tones at different frequencies) which is sent to an IP monitoring center, which grants surveillance permission.
-
Citations
8 Claims
-
1. A method of secure surveillance of a target IP telephone from a plurality of monitoring stations;
- comprising the steps of;
initiating a request for surveillance of a target IP telephone from one of a plurality of surveillance stations each of which may be serviced by a network of different technology from those of other surveillance stations;
generating a plurality of duplicate calls to each of the plurality of monitoring stations in response to the initiating a request;
authenticating each of the monitoring stations seeking to join in the surveillance by entry of a password for each monitoring station;
muting the duplicate calls from any of the monitoring stations not having achieved authentication; and
formatting intercepted messages of the monitored target IP phone for conforming to delivery over networks having a different technology than that of the target IP telephone by;
establishing a database of monitoring stations and a technology of their connecting networks at a central monitoring center associated with the IP network of the target IP telephone. - View Dependent Claims (2, 3)
transmitting the DTMF signal to an IP monitoring center, which is operative to grant surveillance intercept permission.
- comprising the steps of;
-
4. A surveillance system for the monitoring of a target IP telephone from a plurality of monitoring stations, comprising:
-
a first and second monitoring station, each connected to at least one of a plurality of telephone networks;
a target IP telephone connected to a specific one of the plurality of telephone networks;
an IP Address Mapping Check Point (IP-AMCP) connected to service at least the specific one of the plurality of telephone networks by determining a voice signal type to be forwarded to each of the monitoring stations and further including a WatchDog function to identify activity of the target IP telephone; and
an IP monitoring center connected to interconnect monitoring stations connected to a different network from the specific one of the plurality of telephone networks to the specific one of the plurality of telephone networks. - View Dependent Claims (5, 6, 7, 8)
an IP Phone Intercept List (IP-PIL) included with the IP-AMCP for maintaining a database of target telephones to be monitored.
-
-
6. The surveillance system of claim 4, wherein the specific one of the plurality of telephone networks is an IP network.
-
7. The surveillance system of claim 6, wherein at least one of the at least one of a plurality of telephone networks is a PSTN system.
-
8. The surveillance system of claim 7, further including:
a PSTN Check Point (PCP) connected between the PSTN system and the IP monitoring center for translating between IP and PSTN signal formats.
Specification