Controlled recorded 3-way calling
First Claim
1. A computer based method comprising:
- provisioning a virtual number based on number information received for the virtual number;
receiving mapping information for the virtual number, the mapping information comprising authentication data for identifying at least one of an authorized operator of a given telephonic device and an authorized telephonic device;
storing the virtual number in the mapping table in association with the authentication data;
receiving authentication information from a target telephonic device in response to a request for administrating a controlled call with the virtual number, the controlled call established through the virtual number and enabling an operator device to monitor and control audio communications between a first contact device and a second contact device;
authenticating the target telephonic device as the operator device based on agreement of the authentication information received from the target telephonic device and the authentication data stored in association with the virtual number in the mapping table;
receiving, from the operator device, device information corresponding to the first contact device and the second contact device for setting up the controlled call, a first command to begin the controlled call, and a second command to end the controlled call; and
transmitting, in response to receiving the first command, instructions for;
establishing, through the virtual number, a connection enabling the audio communications between the first contact device and the second contact device to begin the controlled call, the second contact device receiving device information associated with the first contact device when receiving a request to establish the connection such that the connection request appears to be from the first contact device;
transmitting the audio communications between the first contact device and the second contact device received over the connection to the operator device; and
disabling audio communications from the operator device to the first contact device and the second contact device; and
transmitting, in response to receiving the second command, instructions for terminating the connection enabling the audio communications between the first contact device and the second device to end the controlled call.
2 Assignments
0 Petitions
Accused Products
Abstract
Agencies issue recording devices to personnel for administrating and monitoring controlled calls during the course of their duties. To provide flexible capabilities to agencies, a virtual number is provisioned and configured to enable an operator to administrate controlled calls without dedicated recording devices. Using the virtual number, the operator may setup a controlled call between a victim and a baddie. The victim is contacted via the virtual number by the operator and optionally informed about the controlled call process. In turn, the baddie is contacted using number information of the victim'"'"'s phone and connected with the victim. Call audio between the victim and baddie is transmitted to the operator. When necessary, the operator may terminate the call remotely from the telephonic device the operator used to setup the call.
35 Citations
20 Claims
-
1. A computer based method comprising:
-
provisioning a virtual number based on number information received for the virtual number; receiving mapping information for the virtual number, the mapping information comprising authentication data for identifying at least one of an authorized operator of a given telephonic device and an authorized telephonic device; storing the virtual number in the mapping table in association with the authentication data; receiving authentication information from a target telephonic device in response to a request for administrating a controlled call with the virtual number, the controlled call established through the virtual number and enabling an operator device to monitor and control audio communications between a first contact device and a second contact device; authenticating the target telephonic device as the operator device based on agreement of the authentication information received from the target telephonic device and the authentication data stored in association with the virtual number in the mapping table; receiving, from the operator device, device information corresponding to the first contact device and the second contact device for setting up the controlled call, a first command to begin the controlled call, and a second command to end the controlled call; and transmitting, in response to receiving the first command, instructions for; establishing, through the virtual number, a connection enabling the audio communications between the first contact device and the second contact device to begin the controlled call, the second contact device receiving device information associated with the first contact device when receiving a request to establish the connection such that the connection request appears to be from the first contact device; transmitting the audio communications between the first contact device and the second contact device received over the connection to the operator device; and disabling audio communications from the operator device to the first contact device and the second contact device; and transmitting, in response to receiving the second command, instructions for terminating the connection enabling the audio communications between the first contact device and the second device to end the controlled call. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for administrating a controlled call between a first contact device and a second contact device using a virtual number, the system comprising:
a server comprising one or more processors and a non-transitory computer-readable storage medium storing computer program code, the computer program code when executed by a processor performing steps to; provision a virtual number based on number information received for the virtual number; receive mapping information for the virtual number, the mapping information comprising authentication data for identifying at least one of an authorized operator of a given telephonic device and an authorized telephonic device; store the virtual number in the mapping table in association with the authentication data; receive authentication information from a target telephonic device in response to a request for administrating a controlled call with the virtual number, the controlled call established through the virtual number and enabling an operator device to monitor and control audio communications between the first contact device and the second contact device; authenticate the target telephonic device as the operator device based on agreement of the authentication information received from the target telephonic device and the authentication data stored in association with the virtual number in the mapping table; receive, from the operator device, device information corresponding to the first contact device and the second contact device for setting up the controlled call, a first command to begin the controlled call, and a second command to end the controlled call; and transmit, in response to receiving the first command, instructions to; establish, through the virtual number, a connection enabling the audio communications between the first contact device and the second contact device to begin the controlled call, the second contact device receiving device information associated with the first contact device when receiving a request to establish the connection such that the request appears to be from the first contact device; transmit the audio communications between the first contact device and the second contact device received over the connection to the operator device; and disable audio communications from the operator device to the first contact device and the second contact device; and transmit, in response to receiving the second command, instructions for terminating the connection enabling the audio communications between the first contact device and the second device to end the controlled call. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
Specification