Methods to improve security of conference calls by observation of attendees' order and time of joining the call
First Claim
1. A method for detecting fraudulent use in a conference calling system, said method including:
- receiving a threshold period, the threshold period indicating a maximum allowable time period for a participant of a conference call to enter the conference call prior to the entry of the moderator of the conference call;
detecting the entry of the moderator into the conference call;
detecting entry of at least one participant into the conference call;
determining a waiting period for the at least one participant, the waiting period including a time period between the entry of the at least one participant and the entry of the moderator;
comparing the waiting period to the threshold period with a processor; and
performing actions with the processor if the waiting period exceeds the threshold period.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. A threshold period is received, wherein the threshold period indicates the maximum allowable time period for a participant of a conference call to enter the conference call prior to the entry of the moderator of the conference call. A monitor detects the entry of the moderator into the conference call and entry of the participants into the conference call. A waiting period is determined for one or more of the participants, wherein the waiting period represents the time period between the entry of the moderator and the entry of the participant. A processor compares the waiting period to the threshold period. If the threshold period exceeds the waiting period, the conference call is allowed to continue. In at least one embodiment, actions are performed with the processor if the waiting period exceeds the threshold period.
-
Citations
25 Claims
-
1. A method for detecting fraudulent use in a conference calling system, said method including:
-
receiving a threshold period, the threshold period indicating a maximum allowable time period for a participant of a conference call to enter the conference call prior to the entry of the moderator of the conference call; detecting the entry of the moderator into the conference call; detecting entry of at least one participant into the conference call; determining a waiting period for the at least one participant, the waiting period including a time period between the entry of the at least one participant and the entry of the moderator; comparing the waiting period to the threshold period with a processor; and performing actions with the processor if the waiting period exceeds the threshold period. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for detecting fraudulent use in a conference calling system, said method including:
-
receiving a scheduled start time for a conference call of the conference calling system; receiving a threshold period, the threshold period indicating a maximum allowable time period for an attendee of the conference call to enter the conference call prior to the scheduled start time for the conference call; determining a waiting period for at least one attendee of the conference call, the waiting period including a time period between a time that the at least one attendee entered the conference call and the scheduled start time of the conference call; comparing the waiting period to the threshold period with a processor; and
performing actions with the processor if the waiting period exceeds the threshold period. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for detecting fraudulent use in a conference calling system, said system including:
-
a user interface for receiving a scheduled start time for a conference call of said conference calling system and a threshold period, the threshold period including a maximum allowable time period for an attendee of the conference call to enter the conference call prior to the scheduled start time for the conference call; and a processor operatively connected to said user interface, the processor; determines a waiting period for at least one attendee of the conference call, the waiting period including a time period between a time that the at least one attendee entered the conference call and the scheduled start time of the conference call; compares the waiting period to the threshold period, and performs at least one of validation actions and alert actions if the waiting period exceeds the threshold period. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25. A computer program product for detecting fraudulent use in a conference calling system, said computer program product including:
-
a non-transitory computer readable storage medium; first program instructions to receive a scheduled start time for a conference call of the conference calling system; second program instructions to receive a threshold period, the threshold period including a maximum allowable time period for an attendee of the conference call to enter the conference call prior to the scheduled start time for the conference call; third program instructions to determine a waiting period for at least one attendee of the conference call, the waiting period including a time period between a time that the at least one attendee entered the conference call and the scheduled start time of the conference call; fourth program instructions to compare the waiting period to the threshold period with a processor; and fifth program instructions to perform at least one of validation actions and alert actions with the processor if the waiting period exceeds the threshold period, wherein said first program instructions, said second program instructions, said third program instructions, said fourth program instructions, and said fifth program instructions are stored on said computer readable storage medium.
-
Specification