Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


CALL OR TERMINAL ACCESS ALARM OR CONTROL

Subclass of:

379 - Telephonic communications

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
379188000CALL OR TERMINAL ACCESS ALARM OR CONTROL45
20080304643Telecommunication call management and monitoring system - A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account or other related limitations. The system includes management software capable of implementing widespread or local changes to the system and is further capable of modifying or setting any number of user account parameters.12-11-2008
20090080629SYSTEM AND METHOD FOR CONTROLLING FREE PHONE CALLS THROUGH AN INSTITUTIONAL PHONE SYSTEM - A method of controlling free phone calls placed from within a secured premises through an institutional phone system generally includes assigning a unique access identifier to an individual caller upon entry into the secured premises; receiving a destination number from the individual caller within the secured premises, the destination number being associated with a telephone located outside the secured premises; determining if the destination number is a per se free number, and, if the destination number is not determined to be a per se free number: receiving the unique access identifier from the individual caller; validating the unique access identifier; and, if the unique access identifier is valid, processing a telephone call to the destination number.03-26-2009
20090207987Method and apparatus for treating potentially unauthorized calls - The present invention seeks to avoid origination or continuation of unauthorized calls, while also avoiding the inconvenience, expense and uncertainty for call parties resulting from premature termination of calls because of erroneous or ill-founded suspicions that unauthorized activities are occurring. By permitting one or more parties to a call that is deemed suspicious to provide information establishing proper authorization, or innocent mistake, security procedures can be assured while avoiding improper false-positive determinations that unauthorized calling activities have occurred. When suspicions cannot be overcome, the called party is requested to terminate the call and a separate continuation link is established to the called party.08-20-2009
20110261941MONITORING INMATE CALLS USING SPEECH RECOGNITION - A system and method for monitoring telephone activity and conversation content in a correctional facility comprises providing a communicative connection between a caller and a recipient, alerting at least one of the caller and the recipient that the communications may be recorded, delivering the conversation between the caller and the recipient over the communicative connection and storing the conversation into a call record memory. After the communicative connection has been terminated, speech recognition software is executed to identify a plurality of conversation words within the call record memory. By comparing the conversation words with a database of trigger words, a determination can be made as to whether the conversation is of interest to the correctional facility. Based on that comparison step, a detection response is executed.10-27-2011
20120039452Communication Connection Establishment Control for Preventing Unsolicited Communication - There is proposed a mechanism for controlling a communication connection establishment to a subscriber using service including blacklisting, whitelisting, authentication request and/or Turing test for unsolicited communications prevention. Furthermore, there is proposed a management system used to configure a corresponding communication connection establishment control on the basis of an interface for the subscriber for defining a personalized communication connection establishment control profile.02-16-2012
20120039453EVENT IDENTIFICATION IN PEER TO PEER NETWORKS - A system and method for event notification and access control for Distributed Hash Tables (DHTs) using an event triggering mechanism for DHT-based Peer-to-Peer (P2P) overlay networks is described. According to an embodiment of the invention, a user interested in certain event can insert a trigger into the DHT. When the event occurs, the trigger fires and causes a pre-defined action to be executed. According to another embodiment of the invention, a user peer inserts a trigger resource record, which includes instructions to execute a specified action upon occurrence of the event, into the DHT. A monitored resource record, with which the event is or will be associated, is identified. A monitoring peer, responsible for maintaining the monitored resource record, is then identified. The trigger resource record is maintained at the monitoring peer.02-16-2012
20130010943System and Method for Controlling Free Phone Calls Through an Institutional Phone System - A method of controlling free phone calls places from within a secured premises through an institutional phone system generally includes assigning a unique access identifier to an individual caller upon entry into the secured premises; receiving a destination number from the individual caller within the secured premises, the destination number being associated with a telephone located outside the secured premises; determining if the destination number is a per se free number, and, if the destination number is not determined to be a per se free number: receiving the unique access identifier from the individual caller; validating the unique access identifier; and, if the unique access identifier is valid, processing a telephone call to the destination number.01-10-2013
20130177146METHODS AND APPARATUS FOR AUTHORIZATION AND/OR ROUTING OF OUTDIAL COMMUNICATION SERVICES - Example methods disclosed herein include parsing a request to obtain input criteria associated with the request, the request for authorizing an outdial communication service call initiated by a message center. Such example methods also include retrieving authorization rules correlating the input criteria to an authorization result for the outdial communication service call, the input criteria comprising a first input criterion having one of at least two values, a first value indicating that the outdial communication service call is for a real-time outdial service initiated in response to an indial communication service received at the message center, a second value indicating that the outdial communication service call is for a non-real-time outdial service initiated by an application server associated with the message center. Such example methods further include evaluating the authorization rules using the input criteria to determine whether the outdial communication service call is authorized.07-11-2013
20140270124INDIVIDUAL LOCATION TRACKING IN DETENTION ENVIRONMENTS - Methods for permitting a log in to a restricted access communications terminal are provided. In one aspect, a method includes receiving a request from a user to access a communications terminal, the request including a first authentication provided by the user, and verifying the first authentication provided by the user. The method also includes identifying the user based on the verified first authentication, determining, based on an actual location of the communications terminal, that the user is restricted from accessing the communications terminal, and requesting a second authentication from the user when the user is attempting to access the communications terminal from an unauthorized or undocumented location. The method further includes receiving the second authentication from the user, verifying the second authentication provided by the user, and providing access to the user to the communications terminal based on the verified second authentication. Systems, terminals, and machine-readable media are also provided.09-18-2014
20150023486TELEPHONIC COMMUNICATION REDIRECTION AND COMPLIANCE PROCESSING - Processing telephonic communication is disclosed. A request to establish communication is received from a first communication participant. A first identifier associated with the request is mapped to a second identifier associated with a second communication participant. The second identifier is used to establish communication between the first and the second participant in a manner that allows at least a portion of the communication between the first and second participants to be monitored. Compliance processing is performed with respect to at least a portion of said at least a portion of the communication between first and the second participant. The first identifier is made available to the first participant in a manner that causes the first participant to associated the first identifier with the second participant, the first identifier cannot be used to reach the second participant directly, and the second identifier is not provided to the first participant.01-22-2015
20150023487METHOD AND SYSTEM FOR ENHANCED CONFERENCE CALL SECURITY - A method for controlling access by of communication devices to a conference call, the method comprising associating proximity settings with a conference call, the proximity settings indicating a acceptable proximity of other communication devices relative to a selected communication device; sensing by the selected communication device proximity of the other devices within its proximity of the communication device to obtain proximity information; and determining, by a processor, from the obtained proximity information and the proximity settings an action to be performed with reference to the conference call.01-22-2015
20150078543SYSTEM AND METHOD FOR RECONNECTING A DEVICE TO A GROUP CALL - A system and method for reestablishing a voice communications session moderated by a group call server between two or more telephony devices. The method is performed by a processor monitoring the communications session. The method comprises: storing one or more data records representing group call information; detecting disconnection of at least one participating telephony device from the group communications session, and determining that the disconnection was not intentionally initiated; accessing the stored call group information data and causing signals to enable reestablishment of participation by the disconnected device to be sent to the disconnected device; and upon receipt by the group call server from the disconnected device of signals representing a request to reconnect the disconnected device, outputting command signals for reestablishing a communications session between the disconnected device and at least one other device participating in the group communications session.03-19-2015
20150365522METHODS AND SYSTEMS FOR MULTI-FACTOR AUTHENTICATION IN SECURE MEDIA-BASED CONFERENCING - Methods and apparatuses, including computer program products, are described for multi-factor authentication of media-based (e.g., video and/or audio) conferencing between a plurality of end point devices. The methods and apparatuses provide for analysis of an end point media stream using a matrix of authentication factors, where the authentication factors include user-specific factors, environment factors, and technical factors, to determine an authentication score for the first end point device.12-17-2015
20160021243TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION - A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.01-21-2016
20160036986Usage Parameters for Communication Content - In one aspect, a method related to data management. In addition, other method, system, and program product aspects are described in the claims, drawings, and/or text forming a part of the present application.02-04-2016
379189000 Fraud or improper use mitigating or indication (e.g., "blue box", "black box") 13
20080267375System and method for real-time fraud detection within a telecommunication network - Real time detection of the fraudulent use of a telecommunications network is accomplished by analyzing data for each call that is occurring within the network. A signal protocol receiver is used to collect signaling protocol for each call that is occurring within the network. The signaling protocol data is collected, decoded and formatted into call information records (CIRs). The CIRs contain various operator specified parameters for each call that is occurring within the network. The CIRs are compared to operator defined thresholds. If any of the CIRs exceeds the thresholds, an alert is generated. The alerts are stored in a database where the operator can analyze them and take the appropriate corresponding action to resolve the alert. The alerts and the CIRs are archived in a database so that trends of fraudulent use can be detected and prevented. This method of fraud detection provides for the effective analysis of every call that is occurring within the network. Accordingly, no call goes unanalyzed and ideally no fraud goes undetected. Additionally, the method does not impose an additional load on the network switching equipment and therefore results in a better quality of transmissions.10-30-2008
20080298573SYSTEM, APPARATUS AND METHODS FOR COMPARING FRAUD PARAMETERS FOR APPLICATION DURING PREPAID CARD ENROLLMENT AND TRANSACTIONS - An apparatus is disclosed. The apparatus is for comparing a set of production fraud parameters with one or more sets of test or proposed fraud parameters run against prepaid card production data in a prepaid card analysis. The apparatus may include a system for uploading a set of production fraud parameters and one or more sets of test fraud parameters, a processing engine for receiving the uploaded parameters for running production data against the set of production fraud parameters in tandem with the one or more sets of test fraud parameters to produce a set of suspected fraud cases triggered by each set of fraud parameters, and one or more databases integrated with or in communications with the processing engine for card validation12-04-2008
20090046841Telecommunication call management and monitoring system with voiceprint verification - Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.02-19-2009
20090129573SYSTEM AND METHOD FOR DETECTING AND MANAGING FRAUD - A system, method and computer program product for processing event records. The present invention includes a detection layer, an analysis layer, an expert systems layer and a presentation layer. The layered system includes a core infrastructure and a configurable, domain-specific implementation. The detection layer employs one or more detection engines, such as, for example, a rules-based thresholding engine and a profiling engine. The detection layer can include an AI-based pattern recognition engine for analyzing data records, for detecting new and interesting patterns and for updating the detection engines to insure that the detection engines can detect the new patterns. In one embodiment, the present invention is implemented as a telecommunications fraud detection system. When fraud is detected, the detection layer generates alarms which are sent to the analysis layer. The analysis layer filters and consolidates the alarms to generate fraud cases. The analysis layer preferably generates a probability of fraud for each fraud case. The expert systems layer receives fraud cases and automatically initiates actions for certain fraud cases. The presentation layer also receives fraud cases for presentation to human analysts. The presentation layer permits the human analysts to initiate additional actions.05-21-2009
20110013763False Answer Supervision Management System - A computer implemented method and system is provided for managing false answer supervision (FAS) in a telephony network. A call record recording multiple call events occurring at a terminal gateway is accessed. FAS events originating at the terminal gateway are detected. Suspect illegitimate call events are analyzed based on a combination of conditions. The suspect illegitimate call events are filtered for detecting events suspected of FAS. The FAS events are confirmed after discounting the suspected FAS events based on whether a proportion of the suspected FAS events is within a FAS threshold. A statistical inference of current behavior and past behavior of the terminal gateway is inferred. Threshold values are established for acceptable number of FAS events. A non-compliant behavior of the terminal gateway is inferred when the FAS events exceed the established threshold values. A service provider associated with the terminal gateway is notified for remedying the non-compliant behavior.01-20-2011
20120224678MONITORING INMATE CALLS USING SILENCE RECOGNITION SOFTWARE TO DETECT UNAUTHORIZED CALL CONNECTING - A system and method for managing and controlling telephone activity in a correctional facility comprises providing a first communicative connection between a caller and a recipient, delivering the conversation between the caller and the recipient over the first communicative connection and executing silence recognition software to identify a plurality of periods of conversation silence delivered over the first communicative connection. By comparing the periods of conversation silence with a silence threshold, a determination can be made as to whether the recipient is attempting to create an unauthorized call connection. Based on that comparison step, a detection response is executed.09-06-2012
20120263285SYSTEMS, METHODS, AND MEDIA FOR DISAMBIGUATING CALL DATA TO DETERMINE FRAUD - Systems, methods, and media for disambiguating call data are provided herein. Some exemplary methods include receiving, via a fraud notification system, notification of a fraud event associated with a customer account, the fraud event comprising a time stamp, determining, via a call selection module, unique voice samples or models from call events obtained within a time frame that is temporally proximate the fraud event, and generating a timeline presentation that includes each unique voice sample or model identified in the call events based upon a time stamp associated with the call events.10-18-2012
20140270125Admission Control Of A Communication System - Aspects of the disclosure relate to admission control of a communication session in a network. The admission control can be implemented by a network node at the boundary of the network or a subsystem thereof. In one aspect, the admission control can be implemented during a predetermined period and can be based at least on an admission criterion, which can be specific to an end-point device, e.g., a target device or an origination device. The admission criterion can be configurable and, in certain implementations, it can be obtained from historical performance associated with establishment of communication session. Such historical performance can be assessed within a period of a configurable span.09-18-2014
20140270126CALL MANAGEMENT FOR SECURE FACILITIES - A method for controlling a call in a first controlled facility includes connecting an inmate in the first controlled facility to the call when each party of the call is verified, testing incoming audio on the call to detect a controlled facility tone from a second controlled facility, and transmitting a notification of a violation by the inmate when the controlled facility tone is detected in the incoming audio.09-18-2014
20150131790Admission Control Of A Communication System - Aspects of the disclosure relate to admission control of a communication session in a network. The admission control can be implemented by a network node at the boundary of the network or a subsystem thereof. In one aspect, the admission control can be implemented during a predetermined period and can be based at least on an admission criterion, which can be specific to an end-point device, e.g., a target device or an origination device. The admission criterion can be configurable and, in certain implementations, it can be obtained from historical performance associated with establishment of communication session. Such historical performance can be assessed within a period of a configurable span.05-14-2015
20160021242TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION - Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.01-21-2016
20160112562CALLER AUTHENTICATION - In order to authenticate a caller, a callee generates a code, such as, an alphanumeric code that is sent to a code manager via an electronic communication channel. The generated code is for authenticating a caller in a communication session to be made by the caller to the callee. The code manager stores the code in a memory. After the communication session has been initiated from the caller to the callee and then established, the code is sent to the callee so the callee can verify the caller is authentic.04-21-2016
20190149665MANAGEMENT SERVER, COMMUNICATION SYSTEM, NOTIFICATION METHOD AND PROGRAM05-16-2019
379194000 Lockout or double use signalling 2
20140270127SHARED LOCK CONTROL - The present disclosure is directed to methods and systems for setting a lock state for a second device in a system, where the system includes a server, a first device in communication with the server, and the second device in communication with the server, the method including: (a) a user setting a lock state for the first device; and (b) the system setting a lock state for the second device in response to the user setting the lock state for the first device.09-18-2014
20160044161System and Method for Detecting Three-Way Call Circumvention Attempts - Disclosed is a three-way call detection system and method for use with a telephone management system. Specifically, a three-way call detection system and method for detecting continuous noise indicative of an attempt to mask a three-way call attempt. The continuous noise detection system and method may be stand alone or used in conjunction with any existing three-way call detection system and method.02-11-2016
379196000 At switching center 14
20090028311CHANGING A STATE OF A REMOTE SWITCH BOX WHICH CONNECTS A PHONE TO A NETWORK - A computer implemented method, and apparatus for changing a state of a remote switch box. On a master switch box, a request is received from a user to set a state of the remote switch box to a selected state. A request to change the remote switch box to the selected state is transmitted from the master switch box to the remote switch box. The remote switch box connects a remote phone to a phone line. The master switch box receives a confirmation from the remote switch box of the change to the selected state. The confirmation contains the state of the remote switch box. The state of the remote switch box is displayed on the master switch box.01-29-2009
20100014652Method and Apparatus for Controlling Restriction on Call Connections - Restriction on call connections is controlled by grouping a plurality of terminals. One or more groups each including one or more terminals are provided. Each of the one or more groups is associated with the maximum number of calling terminals and a group restriction relaxing ratio indicating a relaxing degree of restriction with respect to a predetermined normal restriction ratio. Restriction on a call connection of a terminal belonging to a group is controlled on the basis of a group restriction ratio assigned to the group when the number of terminals being making phone calls is less than the maximum number of calling terminals that is provided for the group. The group restriction ratio is calculated using the predetermined normal restriction ratio and the group restriction relaxing ratio associated with the group.01-21-2010
20110280386SYSTEM AND METHOD FOR CONTROL OF COMMUNICATIONS CONNECTIONS AND NOTIFICATIONS - A method and system for selectively establishing a communications connection between an origin and destination in a communications network based on one or mediations rules and one or more lists of prohibited and exempted destination identifiers either in real-time using a control unit or with a pre-check using an analysis unit while also providing notification messages associated with the allowed or designated allowed communications connections.11-17-2011
20130251130System and Method for Control of Communications Connections and Notifications - A method and system for selectively establishing a communications connection between an origin and destination in a communications network based on one or mediations rules and one or more lists of prohibited and exempted destination identifiers including preferences either in real-time using a control unit or with a pre-check using an analysis unit while also providing notification messages associated with the allowed or designated allowed communications connections.09-26-2013
20130301819METHOD, SYSTEM AND DEVICE FOR CALL PROCESSING - A method, a system and a device for call processing are disclosed in the embodiments of the present invention. The method includes: obtaining, by a call initiator, address information of all or part of call managers in a network domain that processes a call, where the all or part of the call managers include a call manager that processes the call and is adjacent to the call initiator; sending, by the call initiator, a first call creating request message to an adjacent call manager according to the address information of the all or part of the call managers; and receiving, by the call initiator, a first call creating response message from the adjacent call manager. In the case that a service at a client side is required to be sent through multiple networks at a server side, inter-domain link selection and admission control may be implemented through section call processing.11-14-2013
20130343531VOICE TRAFFIC GATEWAY - A voice traffic gateway including: a voice traffic input, a voice traffic output, a first domain router, non-secure warning (NSW) tone application apparatus and a signalling filter. The input receives voice traffic including voice messages and signalling messages from a first traffic domain. The output delivers output voice messages and signalling messages to a second, different traffic domain. The first domain router routes voice messages to the NSW apparatus and routes signalling messages to the signalling filter. The NSW apparatus applies a NSW tone to a received voice message to form an output voice message. The signalling filter compares a feature of a received signalling message with a reference feature. The signalling filter will pass a signalling message if the signalling message feature is the same as the reference feature and will block a signalling message if the signalling message feature is not the same as the reference feature.12-26-2013
20140153707DIALED STRING MATCHING AND CALL COST MINIMIZATION IN DIAL PLAN - A method for processing dialed outgoing calls in a contact center includes a method for matching a dialed string and a method for translating the dialed string. A method for matching includes identifying a set of available number categories based on a calling profile with which the dialing agent device is configured, matching the dialed string against each of a set of patterns in each of the categories, and translating the dialed string according to the category, if any category matches and if no blocked category matches the dialed string. The number may then be translated to a translated number including a PSTN telephone number and routing characters specifying how the call is to be routed from an IP network to the PSTN. The routing may be selected to minimize the cost of the call.06-05-2014
20140219432TELECOMMUNICATIONS TECHNOLOGY - A telecommunications system for use in a secure facility such as a jail, prison or the like. The systems, devices and methods disclosed provide telecommunications, email, other messaging, financial services, vending, and commissary or canteen services for inmates of a secure facility with respect to family, friends and others. The system includes a phone server adapted to be communicatively connected to an external service provider; a monitoring station communicatively connected to the phone server; an account manager server communicatively connected to the phone server, and at least one telecommunications device disposed at the secure facility for use by the inmate and which is communicatively connected to the phone server. A method of telecommunicating, including receiving incomming calls at the secure facility, via the system is also disclosed.08-07-2014
20140341365DIALED STRING MATCHING AND CALL COST MINIMIZATION IN DIAL PLAN - A method for processing dialed outgoing calls in a contact center includes a method for matching a dialed string and a method for translating the dialed string. A method for matching includes identifying a set of available number categories based on a calling profile with which the dialing agent device is configured, matching the dialed string against each of a set of patterns in each of the categories, and translating the dialed string according to the category, if any category matches and if no blocked category matches the dialed string. The number may then be translated to a translated number including a PSTN telephone number and routing characters specifying how the call is to be routed from an IP network to the PSTN. The routing may be selected to minimize the cost of the call.11-20-2014
20160142545SYSTEM AND METHOD TO DETECT AND CORRECT IP PHONE MISMATCH IN A CONTACT CENTER - Detecting an IP address mismatch in a contact center includes receiving a workstation login request from a workstation of the center that include login credentials associated with an agent of the center for logging into the workstation. The method also includes retrieving from a database a predetermined first IP address assigned to the agent; receiving an application login request related to an application from a workstation of the center on which the application is executing; extracting a second IP address from the application login request; and comparing the predetermined first IP address with the second IP address and granting the agent access if the addresses match.05-19-2016
20160198042SYSTEM AND METHOD FOR CONTROLLING FREE PHONE CALLS THROUGH AN INSTITUTIONAL PHONE SYSTEM07-07-2016
379198000 PBX 3
20100128862CLICK-TO-CALL ATTACK PREVENTION - System and methods for preventing abusive use of a click-to-call callback function of virtual PBX services are disclosed. In some implementations, a challenge-response procedure can be implemented, and a click-to-call request is allowed when a correct response is timely received. In some implementations, one or more system wide policies can be applied in determining whether a click-to-call request should be allowed or denied. A system policy for blocking and unblocking requests having a particular request parameter (e.g., source IP address) is disclosed. An account specific policy for setting the state of a particular account targeted by a click-to-call request as normal, warning, or blocked, based on the current status of the particular account is also disclosed.05-27-2010
20100158228System and Method for Extending Services - The system and method associate a room telephone number with a guest telephone number. A predetermined time period is associated with the guest telephone number. Once a call is received from a telephone number, the system verifies that the calling telephone number matches the guest telephone number and that the call is within the predetermined time period. If there is a match between the calling telephone number and the guest telephone number and the call is within the predetermined time period, the call is enabled so that the guest can connect to one or more services.06-24-2010
20130101105METHOD AND SYSTEM FOR DETERMINING AUTHORIZATION LEVELS IN A VIRTUAL PRIVATE NETWORK (VPN) - Example methods, apparatus and articles of manufacture to determine authorization levels in a virtual private network are disclosed. A disclosed example method includes determining whether a call originated from an originating station associated with a virtual private network, the call originating via a private branch exchange associated with the virtual private network by a first user of a plurality of users associated with the virtual private network, querying a private-number table based on at least one of a switch identifier representing a service switching point, a trunk group identifier representing the private branch exchange, or an originating station identifier representing the originating station to obtain a private number assigned to the first user, and providing an authorization level associated with the private number to the service switching point, the service switching point to process the call according to the authorization level.04-25-2013
379199000 At substation 1
379200000 Restrictive dialing circuit 1
20150319279SYSTEM AND METHOD FOR BLOCKING UNAUTHORIZED OUTGOING CALL ON A COMMUNICATION NETWORK - The various embodiments herein provide a system and method for blocking unauthorized outgoing calls made by an unauthorized user. The system is programmed by the user to block any attempt made to call an unauthorized number. Incase of a landline system, the system is connected to a telephone line that powers up the unit from the landline and blocks any unauthorized outgoing calls. The system is programmed to inhibit dialing any prefixes or any individual numbers. The system disconnects the phone line from the network and does not allow continuation of dialing when the prefix or the dialing number matches with the unauthorized dialing list/database.11-05-2015

Patent applications in class CALL OR TERMINAL ACCESS ALARM OR CONTROL

Patent applications in all subclasses CALL OR TERMINAL ACCESS ALARM OR CONTROL

Website © 2025 Advameg, Inc.