Telephony security system
First Claim
1. A telephony security system located within an enterprise, at one or more of said enterprise'"'"'s locations, for monitoring and/or controlling calls, wherein said calls is understood to refer to an inbound call, an outbound call, or any combination thereof, between end-user stations within said enterprise and said end-user stations'"'"'respective circuits into a Public Switched Telephone Network (PSTN), said system comprising:
- one or more rules controlled by a system administrator, said one or more rules designating one or more actions, said one or more actions to include allowing or denying a call, said one or more actions to be performed based upon at least one attribute of said call;
one or more line sensors, said one or more line sensors including;
determining said at least one attribute of said call, andperforming said one or more actions based upon said at least one attribute of said call;
said one or more line sensors being constructed and arranged to not interrupt said call unless designated to do so in said one or more rules; and
wherein said one or more rules designating said one or more actions comprises at least one of;
a. redirecting said call,b. logging said call,c. recording said call,d. encrypting said call,e. generating a report,f. providing an alert,g. removing a number, wherein said number is understood to refer to a source number of said call, a destination number of said call, an alias or identifier associated with said call, or any combination thereof, from a current group associated with said number and placing said number into a different group not previously associated with said number,h. monitoring said call, a plurality of said call, or any combination thereof, for one or more patterns of interest,i. monitoring said call for one or more data of interest,j. authenticating said call for remote access, andk. monitoring said call for one or more sequences of digital data.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method of telephony resource management and security for monitoring and/or controlling and logging access between an enterprise'"'"'s end-user stations and their respective circuits into the public switched telephone network (PSTN). One or more rules are defined which specify actions to be taken based upon at least one attribute of a call. Calls are detected and sensed to determine attributes associated with each call. Actions are then performed on selected calls based upon their attributes in accordance with the defined rules.
99 Citations
30 Claims
-
1. A telephony security system located within an enterprise, at one or more of said enterprise'"'"'s locations, for monitoring and/or controlling calls, wherein said calls is understood to refer to an inbound call, an outbound call, or any combination thereof, between end-user stations within said enterprise and said end-user stations'"'"'respective circuits into a Public Switched Telephone Network (PSTN), said system comprising:
-
one or more rules controlled by a system administrator, said one or more rules designating one or more actions, said one or more actions to include allowing or denying a call, said one or more actions to be performed based upon at least one attribute of said call; one or more line sensors, said one or more line sensors including; determining said at least one attribute of said call, and performing said one or more actions based upon said at least one attribute of said call; said one or more line sensors being constructed and arranged to not interrupt said call unless designated to do so in said one or more rules; and wherein said one or more rules designating said one or more actions comprises at least one of; a. redirecting said call, b. logging said call, c. recording said call, d. encrypting said call, e. generating a report, f. providing an alert, g. removing a number, wherein said number is understood to refer to a source number of said call, a destination number of said call, an alias or identifier associated with said call, or any combination thereof, from a current group associated with said number and placing said number into a different group not previously associated with said number, h. monitoring said call, a plurality of said call, or any combination thereof, for one or more patterns of interest, i. monitoring said call for one or more data of interest, j. authenticating said call for remote access, and k. monitoring said call for one or more sequences of digital data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of monitoring and/or controlling call access between an enterprise'"'"'s end-user stations and said end-user stations'"'"' respective circuits into a Public Switched Telephone Network (PSTN), said method comprising the steps of:
-
using a system administrator for defining one or more rules, said one or more rules designating one or more actions, said one or more actions including at least allowing or denying said call access, said one or more actions to be performed based upon at least one attribute of a call, wherein said call is understood to refer to an inbound call, an outbound call, or any combination thereof; determining said at least one attribute of said call; performing said one or more actions based upon said at least one attribute of said call, wherein said call is not interrupted unless said one or more actions designate to interrupt said call; and wherein said one or more rules designating said one or more actions comprises at least one of; a. redirecting said call, b. logging said call, c. recording said call, d. encrypting said call, e. generating a report, f. providing an alert, g. removing a number, wherein said number is understood to refer to a source number of said call, a destination number of said call, an alias or identifier associated with said call, or any combination thereof, from a current group associated with said number and placing said number into a different group not previously associated with said number, h. monitoring said call, a plurality of said call, or any combination thereof, for one or more patterns of interest, i. monitoring said call for one or more data of interest, j. authenticating said call for remote access, and k. monitoring said call for one or more sequences of digital data. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for monitoring and/or controlling call access between an enterprise'"'"'s end-user stations and said end-user stations'"'"' respective circuits into a Public Switched Telephone Network (PSTN), said system comprising:
-
means for defining one or more rules, said one or more rules designating one or more actions to include allowing or denying said call access, said one or more actions to be performed based upon at least one attribute of a call, wherein said call is understood to refer to an inbound call, an outbound call, or any combination thereof; means for determining said at least one attribute of said call; means for performing said one or more actions based upon said at least one attribute of said call, wherein said means for performing said one or more actions does not interrupt said call unless designated to do so in said one or more rules; and wherein said one or more rules designating said one or more actions comprises at least one of; a. redirecting said call, b. logging said call, c. recording said call, d. encrypting said call, e. generating a report, f. providing an alert, g. removing a number, wherein said number is understood to refer to a source number of said call, a destination number of said call, an alias or identifier associated with said call, or any combination thereof, from a current group associated with said number and placing said number into a different group not previously associated with said number, h. monitoring said call, a plurality of said call, or any combination thereof, for one or more patterns of interest, i. monitoring said call for one or more data of interest, j. authenticating said call for remote access, and k. monitoring said call for one or more sequences of digital data. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification