摘要:
Surveillance of IP telephony may be performed through the use of conventional telephone equipment, according to principles of the invention while preventing giving indication to the monitored phone by alerting the user of the monitoring phone to such surveillance use prior to pick up by an agent for engagement of the monitoring phone in response to the alert. Such alerts may assume many forms such as ringing, visual indicators, data readouts, activating ancillary equipment, various flags, etc. This alert prior to surveillance is distinct from alerts used for normal non-surveillance calls, which the monitoring phone is capable of receiving.
摘要:
Monitored calls are intercepted and rerouted to a changed location number of a called party while appearing to be at the same directory number by intervention of an IP Address Mapping check Point (IP-AMCP) which duplicates the voice to a monitoring location, automatically identifies the types of networks to be traversed to the new location and adapts the duplicated voice message to traverse such network types. Surveillance is enabled to be conducted at more than one monitoring location each of which many are widely separated from the other.
摘要:
Monitored calls are intercepted and rerouted to plural selected monitoring stations by intervention of an IP phone monitor center (IPMC) which duplicates the voice to a monitoring location and automatically identifying the types of networks to be traversed and adapting the voice message to such a network type to communication with monitoring stations connected to these networks. Surveillance is, therefor, enabled to be conducted at more than one monitoring location each of which many are widely separated from the other. In a particular embodiment an authorized surveillance agent transmits a valid request to an IP phone monitor center (IPMC) which in response intercepts voice packets to and from the targeted IP phone. The duplicated voice packets are transmitted to the designated monitoring location. The IPMC determines the type of voice signal to be transmitted to the terminal monitoring station. If the monitoring location is serviced by an IP telephony network the monitored traffic is duplicated by the IP-AMCP in IP format to an IP DN as programmed by the IP-PIL. If the monitoring location is serviced by a PSTN network a PSTN check point (PSTN-CP) establishes a trunk connection with the local directory service (LDS) and receives incoming voice packets at the IP-AMCP which the PSTN-CP converts to voice trunk (i.e., T1) to communicate with the LDS.
摘要:
A monitoring network is able to provide surveillance of IP phone calls, which span plural backbone networks, which may embody different transmission techniques. An agent connected through a monitor center to one backbone network enters a request for surveillance (i.e. wiretapping) of a particular network connected to another backbone network. A WatchDog program is associated with each backbone network. These WatchDogs all communicate with other watchdogs associated with other backbone networks. All these watchdogs interact with one another to set up the surveillance connections. The watchdog of the requester's backbone network receives the surveillance request and flows/transmits the request to a watchdog function of the terminating backbone network of the specific caller to be monitored establishing a point-to-point connection, through as many backbone networks as needed. The terminating WatchDog of the termination backbone network flows/transmits the request to a destination WatchDog associated with an IP address mapping checkpoint of the target telephone number to be surveillanced. The destination watchdog communicates with the requesting WatchDog using predefined protocols spanning the intervening backbone networks. The destination WatchDog replicates the packets of the target telephone and transmits them to the originating monitor center.
摘要:
Surveillance of IP telephony may be performed through the use of conventional telephone equipment, according to principles of the invention while preventing giving indication to the monitored phone by alerting the user of the monitoring phone to such surveillance use prior to pick up by an agent for engagement of the monitoring phone in response to the alert. Such alerts may assume many forms such as ringing, visual indicators, data readouts, activating ancillary equipment, various flags, etc. This alert prior to surveillance is distinct from alerts used for normal non-surveillance calls, which the monitoring phone is capable of receiving.
摘要:
A method and system for providing call forwarding in an IP telephone network is disclosed. First, when a telephone number for a first telephone from a second telephone is dialed, the call is routing to a call manager. Call setup procedures with a BRG responsible for the first telephone are then initiated. The BRG then checks stored call forwarding profiles to determine whether there is an active call forwarding profile for the first telephone. The call is connected to the first telephone if an active call forwarding profile is not found. However, if an active call forwarding profile is found, the call forwarding information is sent to the call manager. The call is routed to at least a third telephone based on the call forwarding information.
摘要:
A method and system for providing call forwarding in an IP telephone network is disclosed. First, when a telephone number for a first telephone from a second telephone is dialed, the call is routing to a call manager. Call setup procedures with a BRG responsible for the first telephone are then initiated. The BRG then checks stored call forwarding profiles to determine whether there is an active call forwarding profile for the first telephone. The call is connected to the first telephone if an active call forwarding profile is not found. However, if an active call forwarding profile is found, the call forwarding information is sent to the call manager. The call is routed to at least a third telephone based on the call forwarding information.
摘要:
Secure monitoring of a target IP telephone may be obtained simultaneously at a plurality of monitoring stations by requiring authentication to be provided by each of the monitoring stations prior to granting access permission to monitor the call. A single request generates multiple duplicate calls to a plurality of different monitoring location, each of which must be authenticated. When the monitored call arrives at each of the multiple monitoring stations a password is used to achieve authentication permission. The password is entered at each monitoring station by a touchtone keypad that generates Dual Tone Multi-frequency (DTMF) signals (e.g., each signal is a combination of two tones at different frequencies) which is sent to an IP monitoring center, which grants surveillance permission.
摘要:
A method and system for providing call forwarding in an IP telephone network is disclosed. First, when a telephone number for a first telephone from a second telephone is dialed, the call is routing to a call manager. Call setup procedures with a BRG responsible for the first telephone are then initiated. The BRG then checks stored call forwarding profiles to determine whether there is an active call forwarding profile for the first telephone. The call is connected to the first telephone if an active call forwarding profile is not found. However, if an active call forwarding profile is found, the call forwarding information is sent to the call manager. The call is routed to at least a third telephone based on the call forwarding information.
摘要:
Surveillance of IP telephony may be performed through the use of conventional telephone equipment, according to principles of the invention while preventing giving indication to the monitored phone by alerting the user of the monitoring phone to such surveillance use prior to pick up by an agent for engagement of the monitoring phone in response to the alert. Such alerts may assume many forms such as ringing, visual indicators, data readouts, activating ancillary equipment, various flags, etc. This alert prior to surveillance is distinct from alerts used for normal non-surveillance calls, which the monitoring phone is capable of receiving.