摘要:
Secure monitoring of a target IP telephone may be obtained simultaneously at a plurality of monitoring stations by requiring authentication to be provided by each of the monitoring stations prior to granting access permission to monitor the call. A single request generates multiple duplicate calls to a plurality of different monitoring location, each of which must be authenticated. When the monitored call arrives at each of the multiple monitoring stations a password is used to achieve authentication permission. The password is entered at each monitoring station by a touchtone keypad that generates Dual Tone Multi-frequency (DTMF) signals (e.g., each signal is a combination of two tones at different frequencies) which is sent to an IP monitoring center, which grants surveillance permission.
摘要:
Surveillance of IP telephony may be performed through the use of conventional telephone equipment, according to principles of the invention while preventing giving indication to the monitored phone by alerting the user of the monitoring phone to such surveillance use prior to pick up by an agent for engagement of the monitoring phone in response to the alert. Such alerts may assume many forms such as ringing, visual indicators, data readouts, activating ancillary equipment, various flags, etc. This alert prior to surveillance is distinct from alerts used for normal non-surveillance calls, which the monitoring phone is capable of receiving.
摘要:
Monitored calls are intercepted and rerouted to a changed location number of a called party while appearing to be at the same directory number by intervention of an IP Address Mapping check Point (IP-AMCP) which duplicates the voice to a monitoring location, automatically identifies the types of networks to be traversed to the new location and adapts the duplicated voice message to traverse such network types. Surveillance is enabled to be conducted at more than one monitoring location each of which many are widely separated from the other.
摘要:
Monitored calls are intercepted and rerouted to plural selected monitoring stations by intervention of an IP phone monitor center (IPMC) which duplicates the voice to a monitoring location and automatically identifying the types of networks to be traversed and adapting the voice message to such a network type to communication with monitoring stations connected to these networks. Surveillance is, therefor, enabled to be conducted at more than one monitoring location each of which many are widely separated from the other. In a particular embodiment an authorized surveillance agent transmits a valid request to an IP phone monitor center (IPMC) which in response intercepts voice packets to and from the targeted IP phone. The duplicated voice packets are transmitted to the designated monitoring location. The IPMC determines the type of voice signal to be transmitted to the terminal monitoring station. If the monitoring location is serviced by an IP telephony network the monitored traffic is duplicated by the IP-AMCP in IP format to an IP DN as programmed by the IP-PIL. If the monitoring location is serviced by a PSTN network a PSTN check point (PSTN-CP) establishes a trunk connection with the local directory service (LDS) and receives incoming voice packets at the IP-AMCP which the PSTN-CP converts to voice trunk (i.e., T1) to communicate with the LDS.
摘要:
A monitoring network is able to provide surveillance of IP phone calls, which span plural backbone networks, which may embody different transmission techniques. An agent connected through a monitor center to one backbone network enters a request for surveillance (i.e. wiretapping) of a particular network connected to another backbone network. A WatchDog program is associated with each backbone network. These WatchDogs all communicate with other watchdogs associated with other backbone networks. All these watchdogs interact with one another to set up the surveillance connections. The watchdog of the requester's backbone network receives the surveillance request and flows/transmits the request to a watchdog function of the terminating backbone network of the specific caller to be monitored establishing a point-to-point connection, through as many backbone networks as needed. The terminating WatchDog of the termination backbone network flows/transmits the request to a destination WatchDog associated with an IP address mapping checkpoint of the target telephone number to be surveillanced. The destination watchdog communicates with the requesting WatchDog using predefined protocols spanning the intervening backbone networks. The destination WatchDog replicates the packets of the target telephone and transmits them to the originating monitor center.
摘要:
Surveillance of IP telephony may be performed through the use of conventional telephone equipment, according to principles of the invention while preventing giving indication to the monitored phone by alerting the user of the monitoring phone to such surveillance use prior to pick up by an agent for engagement of the monitoring phone in response to the alert. Such alerts may assume many forms such as ringing, visual indicators, data readouts, activating ancillary equipment, various flags, etc. This alert prior to surveillance is distinct from alerts used for normal non-surveillance calls, which the monitoring phone is capable of receiving.
摘要:
Surveillance of IP voice calls over a public communication IP link is achieved by a WatchDog program, associated with an IP Address Mapping Check Point translating IP phone numbers into IP addresses, that are connected to a head end hub connected in turn to a Hybrid Fiber Coax (HFC) link of IP phone users or to a backbone network carrying IP voice packets.
摘要:
The present invention provides for an activity log which may include user proactive billing management for use in a broadband communications system that guarantees voice, data and video communication reliability and security to users for an integrated telephone, television and data network. The activity log and user proactive billing management may log incoming calls directory numbers (DNs) and outgoing call DNs in a database that may be provided at a central system location, such as the IP Central Station or at the system subscriber's customer premises equipment. The activity log may also log incoming and outgoing email interactive sessions (e.g., instant message (IM) email) and log multimedia video and audio calls. According to a variation of the invention, the user may access the activity log(s) and identify any communication the cost of which should be billed to a different party. The activity log may also be sorted based on user preferences and set to direct calls to low cost alternatives.
摘要:
In an internet telephony system, toll-free service and the calls that are accepted and paid for can be specified by the IP telephony system user to be limited according to the calling party's identity, time of day, day of week or other criteria. Data that is used to screen or filter incoming calls is programmed into a call manager by the IP telephone system user's broadband residential gateway. Using such a system the user can carefully screen calls that are paid for and more closely control telecommunications service costs. More generally, the user has the ability to store predefined call handling criteria, which may be executed by the broadband residential gateway and/or the call manager.
摘要:
A chase me method of routing a variable bit rate communication between a first terminal and a distant terminal over alternative networks including a circuit switched network and a packet network permits changing routing parameters remotely in response to user inputs including user requested changes in chasing parameters. A chase me system permits setting a chase me bit when a call is not immediately deliverable and chasing a subscriber even if the message is to be delivered by converting the message to text for delivery by paging the subscriber. A method of routing via alternative networks a calendar message, predetermined by the user for delivery at a prescribed date and time, may comprise the steps of receiving calendar input information regarding an event and a schedule; composing an event message; and chasing the user according to the reminder schedule and according to a predetermined priority of alternative network locations and terminal configurations to deliver the event message, wherein the alternative networks comprise a circuit-switched network and a packet based network.