Telephony security system
First Claim
1. A method for centrally monitoring and/or controlling communications between a public packet-switched communications network and an enterprise packet-switched communications network, the method comprising:
- centrally configuring at least one rule designating at least one action to be performed based on at least one attribute associated with at least one real-time packet-switched call between the public packet-switched communications network and the enterprise packet-switched communications network;
downloading the at least one rule to an in-line device connected to the enterprise packet-switched communications network, the in-line device collocated or integrated into at least one packet-switched network element selected from the group of packet-switched network elements comprising;
a media gateway, an Internet-Protocol firewall, an Internet-Protocol telephone, a gateway router, a Channel Service Unit, a network hub, and a bridged router;
routing the at least one real-time packet-switched call through the in-line device;
determining, at the in-line device, the at least one attribute associated with the at least one real-time packet-switched call;
generating, at the in-line device, a call event record associated with determining the at least one attribute associated with the at least one real-time packet-switched call;
performing, at the in-line device, the at least one action in accordance with the at least one rule;
generating, at the in-line device, at least one later call event record associated with performing the at least one action in accordance with the at least one rule; and
generating an alert and/or a report based on either the call event record or the at least one later call event record generated in association with the at least one real-time packet-switched call.
5 Assignments
0 Petitions
Accused Products
Abstract
A system and method of telephony resource management and security for monitoring and/or controlling incoming and outgoing calls between an enterprise'"'"'s end-user stations and a public circuit-switched network and/or a public packet-switched network. A security policy is made up of one or more rules designating at least one action to be performed based on at least one attribute of the incoming or outgoing call. Calls are detected and sensed on the line, trunk and/or cabling, and analyzed to determine attributes associated with each call. Actions are performed based upon the determined attributes, in accordance with the security policy rules.
-
Citations
20 Claims
-
1. A method for centrally monitoring and/or controlling communications between a public packet-switched communications network and an enterprise packet-switched communications network, the method comprising:
-
centrally configuring at least one rule designating at least one action to be performed based on at least one attribute associated with at least one real-time packet-switched call between the public packet-switched communications network and the enterprise packet-switched communications network; downloading the at least one rule to an in-line device connected to the enterprise packet-switched communications network, the in-line device collocated or integrated into at least one packet-switched network element selected from the group of packet-switched network elements comprising;
a media gateway, an Internet-Protocol firewall, an Internet-Protocol telephone, a gateway router, a Channel Service Unit, a network hub, and a bridged router;routing the at least one real-time packet-switched call through the in-line device; determining, at the in-line device, the at least one attribute associated with the at least one real-time packet-switched call; generating, at the in-line device, a call event record associated with determining the at least one attribute associated with the at least one real-time packet-switched call; performing, at the in-line device, the at least one action in accordance with the at least one rule; generating, at the in-line device, at least one later call event record associated with performing the at least one action in accordance with the at least one rule; and generating an alert and/or a report based on either the call event record or the at least one later call event record generated in association with the at least one real-time packet-switched call. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A centrally administered system for monitoring and/or controlling communications between a public packet-switched communications network and an enterprise packet-switched communications network, the system comprising:
-
a centrally administered database comprising at least one rule designating at least one action to be performed based on at least one attribute associated with at least one real-time packet-switched call; an in-line device operable to; determine the at least one attribute associated with the at least one real-time packet-switched call; generate a call event record associated with determining the at least one attribute associated with the at least one real-time packet-switched call; perform the at least one action in accordance with the at least one rule; generate a later call event record associated with performing the at least one action in accordance with the at least one rule; at least one management server and/or separate computer system operable to generate an alert and/or a report based on the call event record generated in association with the at least one real-time packet-switched call; wherein the at least one action performed in accordance with the at least one rule includes at least one action selected from a group of actions comprising; allowing the call; denying the call; redirecting the call; redirecting an in-progress copy of the call; recording a call content; encrypting the call; playing a tone to the called party; playing a tone to the calling party; playing a message to the called party; playing a message to the calling party; logging the call; generating a report; generating an alert; adjusting a security policy; monitoring the call content for keywords; and monitoring the call for patterns of interest; wherein the in-line device is collocated or integrated into at least one packet-switched network element; and wherein the at least one packet-switched network element is connected to the enterprise packet-switched communications network. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for centrally monitoring and/or controlling communications between a public packet-switched communications network and an enterprise packet-switched communications network, the method comprising:
-
collocating or integrating an in-line device into at least one packet-switched network element selected from a group of packet-switched network elements comprising;
a media gateway, an Internet-Protocol firewall, an Internet-Protocol telephone, a gateway router, a Channel Service Unit, a network hub, and a bridged router;centrally configuring at least one rule designating at least one action to be performed based on at least one call attribute associated with at least one real-time packet-switched call; downloading the at least one rule to the in-line device; determining, at the in-line device, the at least one call attribute associated with the at least one real-time packet-switched call; performing, at the in-line device, the at least one action in accordance with the at least one rule; performing, at the in-line device, at least one additional action, wherein the at least one additional action is performed responsive to the result from performing the at least one action in accordance with the at least one rule; wherein the in-line device performs the at least one action and the at least one additional action selected from a group of actions comprising; allowing the call; denying the call; redirecting the call; redirecting an in-progress copy of the call; recording the call content; encrypting the call; playing a tone to the called party; playing a tone to the calling party; playing a message to the called party; playing a message to the calling party; logging the call; generating a report; generating an alert; adjusting the security policy; monitoring the call content for keywords; monitoring the calls for patterns of interest; and wherein the at least one packet-switched network element is located within the enterprise packet-switched communications network. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification