Telephony security system
First Claim
1. A telephony security system for controlling and logging incoming and outgoing calls between end-user stations within an enterprise at one or more of its locations and their respective circuits into a Public Switched Telephone Network (PSTN), said system comprising:
- a database, controlled by system administrators at one or more enterprise locations;
containing security rules including the action of permitting or denying an incoming or an outgoing call for each of the end-user stations, said security rules specifying actions to be taken based upon at least one attribute of the call on the line, said at least one attribute being determined within the enterprise; and
a line sensor within the enterprise for periodically determining a call-type of the call, said line sensor including means for determining said at least one attribute of each call and for performing actions on selected calls based upon said at least one attribute of the call in accordance with said security rules;
said line sensor being constructed and arranged to sense both incoming and outgoing calls and to not interrupt calls unless specified in said security rules.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method of telephony resource management and security for monitoring and/or controlling and logging access between an enterprise'"'"'s end-user stations and their respective circuits into the public switched telephone network (PSTN). A set of security rules is defined for each of the extensions which specify actions to be taken based upon at least one attribute of the call on the extension. Calls are detected and sensed on the extensions to determine attributes associated with each call. Actions are then performed on selected calls based upon their attributes in accordance with the security rules defined for those extensions.
-
Citations
20 Claims
-
1. A telephony security system for controlling and logging incoming and outgoing calls between end-user stations within an enterprise at one or more of its locations and their respective circuits into a Public Switched Telephone Network (PSTN), said system comprising:
-
a database, controlled by system administrators at one or more enterprise locations;
containing security rules including the action of permitting or denying an incoming or an outgoing call for each of the end-user stations,said security rules specifying actions to be taken based upon at least one attribute of the call on the line, said at least one attribute being determined within the enterprise; and
a line sensor within the enterprise for periodically determining a call-type of the call, said line sensor including means for determining said at least one attribute of each call and for performing actions on selected calls based upon said at least one attribute of the call in accordance with said security rules;
said line sensor being constructed and arranged to sense both incoming and outgoing calls and to not interrupt calls unless specified in said security rules.- View Dependent Claims (2, 3, 4)
whereby options for said assessments may include one or more of the following;
authenticate an inbound call for remote access, or monitor call content for keywords.
-
-
4. The system of claim 1 wherein said security rules specify actions responsive to the determined result of said designated assessment that include one or more of the following:
- allow or deny the call, redirect the call, log the call, record the call content, generate a report, provide an alert, adjust the security policy, or perform additional designated assessments.
-
5. A method of monitoring and/or controlling call access between an enterprise'"'"'s end-user stations and their respective circuits into the PSTN, said method comprising the steps of:
-
using a system administrator for defining one or more rules, said one or more rules designating one or more actions, said one or more actions including at least allowing a call or denying a call, said one or more actions to be performed on an inbound or outbound call based upon at least one designated attribute of said inbound or outbound call;
using a line sensor located within the enterprise for;
determining said at least one attribute of said inbound or outbound call, and performing said one or more designated actions on said inbound or outbound call based upon said at least one determined attribute of said inbound our outbound call in accordance with said one or more rules, wherein said inbound or outbound call is not interrupted unless said one or more designated actions is to interrupt the call. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
redirecting the call, logging the call, recording the call content, encrypting and conducting the call within a VPSTN, generating a report, providing an alert, modifying said one or more rules, or performing one or more designated assessments including;
authenticating an inbound call for remote access, or monitoring the call content for keywords.
-
-
7. The method as defined in claim 6 wherein said step of using a system administrator for defining one or more rules further includes the step of:
-
designating one or more actions responsive to a determined result of the designated assessment, said one or more actions responsive to a determined result of the designated assessment including one or more actions selected from a group including;
allowing or denying the call, redirecting the call, logging the call, recording the call content, monitoring the call content for keywords, encrypting and conducting the call within a VPSTN, generating a report, providing an alert, modifying said one or more rules, and performing additional designated assessments.
-
-
8. The method as defined in claim 7 wherein said actions of:
-
logging the call, recording the call content, monitoring the call content for keywords, generating a report, providing an alert, and modifying said one or more rules are performed using a remote management server and/or other peripheral devices.
-
-
9. The method as defined in claim 6 wherein said step of generating a report includes generating at least one report selected from a group including:
- post-event report, schedule-generated report, ad hoc report, batch analysis report, trend report, and difference/comparison report.
-
10. The method as defined in claim 5 wherein said step of determining said at least one attribute of said inbound or outbound call includes:
-
determining one or more attributes from a group consisting of;
the call direction, the call source number, the call destination number, the call type, the PBX trunk group through which the call is processed, the channel through which call is processed, the start date of the call, the start time of the call, the digits dialed prior to the call connection, the digits dialed prior to the base phone number, the digits dialed after the base phone number, the caller ID identifier, the call connect time, the keywords detected in the call content via speech recognition or demodulated data, the digits dialed after the call connects, the date the call ended, and the time of day the call ended.
-
-
11. The method as defined in claim 10 wherein call type is selected from a group of call types including:
-
voice, fax, modem, STU-III-voice, STU-III-data, STU-III-unspecified, wideband, wideband video, busy, unanswered, and undetermined.
-
-
12. The method as defined in claim 5 wherein said step of performing said one or more designated action on said inbound or outbound call may be preempted and/or complemented by the system administrator with one or more action selected from a group including:
-
allowing the call, denying the call, redirecting the call, logging the call, recording the call content, encrypting and conducting the call within a VPSTN, generating a report, providing an alert, adjusting said one or more rules, or performing one or more assessments, wherein said assessments are either;
authenticating an inbound call for remote access, or monitoring the call content for keywords.
-
-
13. A system for monitoring and/or controlling call access between an enterprise'"'"'s end user stations and their respective circuits into a PSTN, said system comprising:
-
means for defining one or more rules, said one or more rules designating one or more actions, to include allowing or denying a call, said one or more actions to be performed on an inbound or outbound call based upon at least one designated attribute of said inbound or outbound call;
means, located within said enterprise, for;
determining said at least one attribute of said inbound or outbound call and performing said one or more designated action on said inbound or outbound call based upon said at least one determined attribute of said inbound or outbound call in accordance with said one or more rules, and wherein said inbound or outbound call is not interrupted unless said one or more designated actions is to interrupt the call. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
redirecting the call, logging the call, recording the call content, encrypting and conducting the call within a VPSTN, generating a report, providing an alert, adjusting said one or more rules, or performing one or more assessments, wherein said assessments are either;
authenticating an inbound call for remote access, or monitoring the call content for keywords.
-
-
15. The system as defined in claim 14 wherein said means for generating a report includes means for generating at least one report selected from a group including:
post-event report, schedule-generated report, ad hoc report, batch analysis report, trend report, and difference/comparison report.
-
16. The system as defined in claim 13 wherein said means for determining said at least one attribute of said inbound or outbound call includes determining one or more attributes selected from a group including:
-
the call direction, the call source number, the call destination number, the call type, the PBX trunk group through which the call is processed, the channel through which the call is processed, the start date of the call, the start time of the call, the digits dialed prior to the call connection, the digits dialed prior to the base phone number, the digits dialed after the base phone number, the caller ID identifier, the call connect time, the keywords detected in the call content using speech recognition or demodulated data, the digits dialed after the call connects, the date the call ended, and the time of day the call ended.
-
-
17. The system as defined in claim 13 wherein said means for determining at least one attribute of said inbound or outbound call periodically determines the type of call, wherein said type of call is selected from a group including:
-
voice, fax, modem, STU-III-voice, STU-III-data, STU-III-unspecified, wideband, wideband video, busy, unanswered, and undetermined.
-
-
18. The system as defined in claim 13 wherein said means for defining one or more rules further includes the capability to designate one or more actions responsive to a determined result of said designated assessment, said one or more actions responsive to a determined result of said designated assessment being selected from a group including:
-
allowing or denying the call, redirecting the call, logging the call, recording the call content, monitoring the call content for keywords, encrypting and conducting the call within a VPSTN, generating a report, providing an alert, adjusting said one or more rules, and performing additional designated assessments.
-
-
19. The system as defined in claim 18 wherein said actions of:
-
logging the call, recording the call content, monitoring the call content for keywords, generating a report, providing an alert, and adjusting said one or more rules may be performed using either a remote manager server and/or other peripheral devices.
-
-
20. The as defined in claim 13 further including means for a system administrator to preempt and/or complement performance of said designated one or more actions with one or more action selected from a group including:
-
allowing the call, denying the call, redirecting the call, logging the call, recording the call content, encrypting and conducting the call within a VPSTN, generating a report, providing an alert, adjusting said one or more rules, or performing one or more assessments, wherein said assessments are either;
authenticating an inbound call for remote access, or monitoring the call content for keywords.
-
Specification