×

Telephony security system

  • US 6,760,421 B2
  • Filed: 10/19/2001
  • Issued: 07/06/2004
  • Est. Priority Date: 12/11/1998
  • Status: Expired due to Term
First Claim
Patent Images

1. A security breach alert system located in the connections between the end user stations and the PBX of an enterprise or between the PBX of an enterprise and a Public Switched Telephone Network, to enable said security breach or alert system to monitor both incoming and outgoing telecommunications directed to or originating from an enterprise, said security breach alert system comprising:

  • an access control device located in the connections between the end-user stations and the PBX of an enterprise or between the PBX of an enterprise and the Public Switched Telephone Network;

    said access control device including a set of security rules defining one or more security actions to be applied to the incoming and outgoing telecommunications passing through said access control device wherein said one or more security actions are based on the one or more attributes of the incoming and outgoing telecommunications passing through said access control device;

    said set of security rules defining one or more security actions to be applied to the incoming and outgoing calls passing through said access control device being selected from a group including;

    no data transfer calls permitted on designated voice lines;

    no outbound modem calls permitted on designated voice lines;

    no modem calls permitted during a designated time period;

    no outbound calls permitted to a certain destination identified by a predetermined numerical sequence;

    no long distance calls permitted during a designated time period; and

    no outbound calls permitted from non-designated sources;

    a computer telephony integration device, said computer telephony integration device being constructed and arranged for connection between said access control device and the PBX of the enterprise;

    whereby said one or more security actions to be applied to said incoming and outgoing calls according to said set of security rules originate with said access control device and are passed to said computer telephony integration device for execution at the PBX of the enterprise.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×