Telephony security system
First Claim
1. A security breach alert system located in the connections between the end user stations and the PBX of an enterprise or between the PBX of an enterprise and a Public Switched Telephone Network, to enable said security breach or alert system to monitor both incoming and outgoing telecommunications directed to or originating from an enterprise, said security breach alert system comprising:
- an access control device located in the connections between the end-user stations and the PBX of an enterprise or between the PBX of an enterprise and the Public Switched Telephone Network;
said access control device including a set of security rules defining one or more security actions to be applied to the incoming and outgoing telecommunications passing through said access control device wherein said one or more security actions are based on the one or more attributes of the incoming and outgoing telecommunications passing through said access control device;
said set of security rules defining one or more security actions to be applied to the incoming and outgoing calls passing through said access control device being selected from a group including;
no data transfer calls permitted on designated voice lines;
no outbound modem calls permitted on designated voice lines;
no modem calls permitted during a designated time period;
no outbound calls permitted to a certain destination identified by a predetermined numerical sequence;
no long distance calls permitted during a designated time period; and
no outbound calls permitted from non-designated sources;
a computer telephony integration device, said computer telephony integration device being constructed and arranged for connection between said access control device and the PBX of the enterprise;
whereby said one or more security actions to be applied to said incoming and outgoing calls according to said set of security rules originate with said access control device and are passed to said computer telephony integration device for execution at the PBX of the enterprise.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method of telephony security for controlling and logging access between an enterprise'"'"'s end-user stations and their respective circuits into the public switched telephone network (PSTN). A security policy, i.e., a set of security rules, are defined for each of the extensions, the rules specifying actions to be taken based upon at least one attribute of the call on the extension. Calls are detected and sensed on the extensions to determine attributes associated with each call. Actions are then performed on selected calls based upon their attributes in accordance with the security rules defined for those extensions.
-
Citations
6 Claims
-
1. A security breach alert system located in the connections between the end user stations and the PBX of an enterprise or between the PBX of an enterprise and a Public Switched Telephone Network, to enable said security breach or alert system to monitor both incoming and outgoing telecommunications directed to or originating from an enterprise, said security breach alert system comprising:
-
an access control device located in the connections between the end-user stations and the PBX of an enterprise or between the PBX of an enterprise and the Public Switched Telephone Network;
said access control device including a set of security rules defining one or more security actions to be applied to the incoming and outgoing telecommunications passing through said access control device wherein said one or more security actions are based on the one or more attributes of the incoming and outgoing telecommunications passing through said access control device;
said set of security rules defining one or more security actions to be applied to the incoming and outgoing calls passing through said access control device being selected from a group including;
no data transfer calls permitted on designated voice lines;
no outbound modem calls permitted on designated voice lines;
no modem calls permitted during a designated time period;
no outbound calls permitted to a certain destination identified by a predetermined numerical sequence;
no long distance calls permitted during a designated time period; and
no outbound calls permitted from non-designated sources;
a computer telephony integration device, said computer telephony integration device being constructed and arranged for connection between said access control device and the PBX of the enterprise;
whereby said one or more security actions to be applied to said incoming and outgoing calls according to said set of security rules originate with said access control device and are passed to said computer telephony integration device for execution at the PBX of the enterprise. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification