×

Encapsulation, compression and encryption of PCM data

  • US 6,700,964 B2
  • Filed: 07/23/2002
  • Issued: 03/02/2004
  • Est. Priority Date: 07/23/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A virtual private switched telecommunications network system for providing encrypted transport of a call across a public switched telephone network (PSTN) from a first enterprise location to a second enterprise location, said network system being located between one or more end-user stations at the first enterprise location and one or more end-user stations at the second enterprise location, said network system comprising:

  • at least one security rule in a database at the first enterprise location, said at least one security rule specifying at least one action to be performed based on at least one attribute of an incoming or of an outgoing call to/from the first enterprise location;

    at least one security rule in a database at the second enterprise location, said at least one security rule specifying at least one action to be performed based on at least one attribute of an incoming or of an outgoing call to/from the second enterprise location;

    at least one first telephony appliance associated with said database at the first enterprise location;

    at least one second telephony appliance associated with said database at the second enterprise location;

    said at least one first telephony appliance and said at least one second telephony appliance including means for determining said at least one attribute of an incoming or outgoing call, said at least one attribute of the incoming or outgoing call being selected from a group including;

    call direction, call source number, call destination number, call type, call date, call time, and call duration, said call type attribute being defined as one of voice, fax, or data transfer (modem);

    said at least one first telephony appliance and said at least one second telephony appliance each further including means for individually performing said at least one action specified in the at least one security rule defined in its associated database, said at least one action being based upon said at least one determined attribute of the incoming or outgoing call, said at least one action being selected from a group including;

    allowing the call, denying the call, conducting the call in encrypted mode, sending a tone, sending a message, logging the call, generating a report, and providing an alert;

    wherein said action of conducting the call in encrypted mode is provided without encrypting actions being taken by either the calling party using the one or more end-user stations within the first enterprise location or by the called party using the one or more end-user stations within the second enterprise location.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×