Class / Patent application number | Description | Number of patent applications / Date published |
379203010 | Operator control | 7 |
20100124322 | NEGOTIATING CONTENT CONTROLS - Access to an electronic conference may be administered by receiving an electronic instruction configured to establish the electronic conference, enabling more than one user to generate content restrictions that limit content rendered during the electronic conference, analyzing one or more participant devices to ensure compliance with the content restrictions, establishing the electronic conference in accordance with the content restrictions, and enabling user access to the electronic conference consistent with the content restrictions. | 05-20-2010 |
20110007887 | CONTEXTUAL PHONE NUMBER VALIDATION - A validation service offers the ability to validate a telephone conference. The validation service can verify that a telephone number and a pass code can be used to access the telephone conference at the time the telephone conference is scheduled. The validation service can also inform users about changes to the scheduled telephone conference, and provide alternative telephone numbers that can be used to access the telephone conference. | 01-13-2011 |
20110135080 | METHOD TO IMPROVE FRAUD DETECTION ON CONFERENCE CALLING SYSTEMS BY DETECTING RE-USE OF CONFERENCE MODERATOR PASSWORDS - An embodiment of the invention provides a method for detecting fraudulent use of a moderator passcode in a conference calling system. The method sets a threshold number of moderator passcodes permitted in a conference call. The total number of moderator passcodes entered into the conference call is determined and compared to the threshold number with a processor. The conference call is allowed to continue if the threshold number exceeds the total number of moderator passcodes entered into the conference call. If, however, the total number of moderator passcodes exceeds the threshold number of moderator passcodes, the processor performs validation actions and/or alert actions. | 06-09-2011 |
20110135081 | METHODS TO IMPROVE FRAUD DETECTION ON CONFERENCE CALLING SYSTEMS BY DETECTION OF NON-TYPICAL USEAGE OF MODERATOR PASSCODE - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more access parameters are received, wherein the access parameters include an authorized day of week parameter, an authorized time of day parameter, and/or an authorized location parameter. One or more requests to access the conference calling system are received, wherein each request includes a user passcode and one or more request parameters. A processor determines whether the request parameters match the access parameters. Access to the conference calling system is granted when the request parameters match the access parameters; however, the processor performs actions when a request parameter does not match an access parameter. | 06-09-2011 |
20110135082 | METHODS TO IMPROVE SECURITY OF CONFERENCE CALLS BY OBSERVATION OF ATTENDEES' ORDER AND TIME OF JOINING THE CALL - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. A threshold period is received, wherein the threshold period indicates the maximum allowable time period for a participant of a conference call to enter the conference call prior to the entry of the moderator of the conference call. A monitor detects the entry of the moderator into the conference call and entry of the participants into the conference call. A waiting period is determined for one or more of the participants, wherein the waiting period represents the time period between the entry of the moderator and the entry of the participant. A processor compares the waiting period to the threshold period. If the threshold period exceeds the waiting period, the conference call is allowed to continue. In at least one embodiment, actions are performed with the processor if the waiting period exceeds the threshold period. | 06-09-2011 |
20110135083 | Methods to Improve Fraud Detection on Conference Calling Systems Based on Observation of Participants' Call Time Durations - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds. | 06-09-2011 |
20120002798 | MANAGING PARTICIPATION IN A TELECONFERENCE - A computer implemented method manages participation in a teleconference. Teleconference inputs from participants of a teleconference are monitored for use of an unrelated term, which is a term that has been deemed unrelated to a topic of the teleconference. Upon determining that an errant participant is using the unrelated term in at least one of the teleconference inputs, an alert is generated to prompt the errant participant to limit future teleconference inputs to the topic of the teleconference. | 01-05-2012 |