Controlled recorded 3-way calling
First Claim
1. A computer based method comprising:
- receiving authentication information from a target telephonic device in response to a request for administrating a controlled call with a virtual number, the controlled call established through the virtual number and enabling an operator device to monitor and control audio communications between a first contact device and a second contact device;
authenticating the target telephonic device as the operator device based on agreement of authentication information received from the target telephonic device and authentication data stored in association with the virtual number in a mapping table;
receiving, from the operator device, device information corresponding to the first contact device and the second contact device for setting up the controlled call and a command to begin the controlled call; and
transmitting, in response to receiving the command, instructions for;
establishing, through the virtual number, a connection enabling the audio communications between the first contact device and the second contact device to begin the controlled call, the second contact device receiving device information associated with the first contact device when receiving a request to establish the connection such that the connection request appears to be from the first contact device;
transmitting the audio communications between the first contact device and the second contact device received over the connection to the operator device; and
disabling audio communications from the operator device to the first contact device and the second contact device.
2 Assignments
0 Petitions
Accused Products
Abstract
Agencies issue recording devices to personnel for administrating and monitoring controlled calls during the course of their duties. To provide flexible capabilities to agencies, a virtual number is provisioned and configured to enable an operator to administrate controlled calls without dedicated recording devices. Using the virtual number, the operator may setup a controlled call between a victim and a baddie. The victim is contacted via the virtual number by the operator and optionally informed about the controlled call process. In turn, the baddie is contacted using number information of the victim'"'"'s phone and connected with the victim. Call audio between the victim and baddie is transmitted to the operator. When necessary, the operator may terminate the call remotely from the telephonic device the operator used to setup the call.
67 Citations
21 Claims
-
1. A computer based method comprising:
-
receiving authentication information from a target telephonic device in response to a request for administrating a controlled call with a virtual number, the controlled call established through the virtual number and enabling an operator device to monitor and control audio communications between a first contact device and a second contact device; authenticating the target telephonic device as the operator device based on agreement of authentication information received from the target telephonic device and authentication data stored in association with the virtual number in a mapping table; receiving, from the operator device, device information corresponding to the first contact device and the second contact device for setting up the controlled call and a command to begin the controlled call; and transmitting, in response to receiving the command, instructions for; establishing, through the virtual number, a connection enabling the audio communications between the first contact device and the second contact device to begin the controlled call, the second contact device receiving device information associated with the first contact device when receiving a request to establish the connection such that the connection request appears to be from the first contact device; transmitting the audio communications between the first contact device and the second contact device received over the connection to the operator device; and disabling audio communications from the operator device to the first contact device and the second contact device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for administrating a controlled call between a first contact device and a second contact device using a virtual number, the system comprising:
a server comprising one or more processors and a non-transitory computer-readable storage medium storing computer program code, the computer program code when executed by a processor performing steps to; receive authentication information from a target telephonic device in response to a request for administrating a controlled call with a virtual number, the controlled call established through the virtual number and enabling an operator device to monitor and control audio communications between a first contact device and a second contact device; authenticate the target telephonic device as the operator device based on agreement of authentication information received from the target telephonic device and authentication data stored in association with the virtual number in a mapping table; receive, from the operator device, device information corresponding to the first contact device and the second contact device for setting up the controlled call and a command to begin the controlled call; and transmit, in response to receiving the command, instructions to; establish, through the virtual number, a connection enabling the audio communications between the first contact device and the second contact device to begin the controlled call, the second contact device receiving device information associated with the first contact device when receiving a request to establish the connection such that the connection request appears to be from the first contact device; transmit the audio communications between the first contact device and the second contact device received over the connection to the operator device; and disable audio communications from the operator device to the first contact device and the second contact device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
Specification