Telephone toll call fraud has become a prevalent problem for many telephone service companies and their subscribers in many telephone markets, including the United States and Canada. Call fraud arises when a thief uses a telephone subscriber's telephone line without authorization to place outgoing telephone calls or accept incoming collect calls such that the subscriber, and not the thief, incurs the costs charged by the telephone network operator.
A thief may perpetrate telephone fraud by connecting a telecommunication device to an unsuspecting telephone service subscriber's line at a location outside the subscriber's premises. A thief may simply plug a telephone into an outside telephone jack such as may be found by a backyard patio or may go to the extreme step of physically tapping into a telephone company's electrical junction box usually mounted on the outside of a subscriber's home or office. When the subscriber is away from his or her home or office, thieves may utilize the subscriber's telephone line without authorization with all charges being billed to the subscriber. The telephone line may be improperly used for many applications, such as making long-distance telephone calls, sending facsimile machine transmissions or computer communications or accepting incoming telephone calls from a thiefs accomplice who reverses the telephone charges such that they are billed to the subscriber.
Exacerbating this problem is the fact that telephone lines and junction boxes are generally not well secured—indeed, many junction boxes are not even locked such that tampering is often easy. Additionally, many thieves will utilize the seized line at night and other hours, when the subscriber is not likely to attempt to use the telephone line thereby minimizing the likelihood of being discovered. Unauthorized use of a telephone line can often continue to go undetected until the subscriber receives his or her telephone bill at the end of the billing cycle. Unless long distance charges appear itemized on the telephone bill the subscriber may still not detect the call fraud.
Telephone fraud results in great inconvenience to the subscriber, and significant monetary loss to the telephone company. The subscriber must go through the trouble of contacting the telephone company, perhaps filing a report, and then sorting through the often lengthy list of telephone calls to determine which calls are fraudulent or otherwise attempt to establish that bulk billed time is not all attributable to calls placed by the subscriber. Meanwhile, as the telephone company is unable to directly recover the cost of fraudulent telephone calls, which typically involve expensive long distance or international service, all subscriber's typically pay for such losses through increased telephone tariff rates approved by local regulatory agencies.
It is therefore an object of this invention to provide an apparatus and method for the detection and prevention of unauthorized telephone calls.
It is also an object of this invention to provide prompt notification to the telephone company when a line is being used without authorization in order to minimize the cost of unauthorized use of a telephone line.
It is a further object of the present invention to provide for the apprehension of those engaging in call fraud, and to assist the subscriber in determining which calls were placed without authorization by logging the time, date, and/or dialed number for each unauthorized call.
These and other objects of the present invention shall become apparent in light of the present specification and drawings
The present invention comprises a method and apparatus for detecting and preventing unauthorized use of a telephone line. The call fraud detector is connected to the telephone line. The device monitors the telephone line to determine when a second device connected to the line goes off hook. Once the second device goes off hook, the call fraud detector also goes off hook in parallel. Because two devices are in parallel, the second unauthorized device cannot dial out using pulse dialing.
The device may include a security switch for activating and deactivating the call fraud detector. The device may also be activated and/or deactivated by an external circuit, such as a timer circuit or security alarm system.
The call fraud detector may function to preclude DTMF dialing on the line by detecting DTMF signals, generating a constant DTMF signal, and applying the constant DTMF signal to the telephone line, thereby blocking any other device's attempt to dial. The call fraud detector may also be set to block dialing by generating a DTMF tone only after detecting a programmable dialing sequence on the line, thereby for example blocking only long distance calls, or calls to a specific number or area code. Furthermore, the detector can log the date, time, and/or dialed number for each use of the telephone line.
The call fraud detector can provide warning when a call on the line is in progress by triggering visual, audible, and/or tactile indicators. The detector may also alert the telephone company as to the occurrence of unauthorized use of the line by extended DTMF signaling or a digital data transmission or by any other signaling means.
While this Invention is susceptible to embodiment in many different forms, there are shown in the drawings and will be described in detail herein several specific embodiments, with the understanding that the present disclosure is to be considered as an exemplification of the principle of the invention and is not intended to limit the invention to embodiments illustrated.
The telephone line voltage is provided to telephone line monitor 150 via connection 142. Telephone line monitor 150 determines when the telephone line 141 is in use by a device connected to telephone line 141 e.g. when any telephone device attached to the subscriber's line goes off-hook. Monitor 150 may in one embodiment comprise a current monitor, which upon detecting a change in the loop current from the telephone central office serves to provide an electrical signal indicating to microcontroller 100 via connection 151 that a parallel extension has changed hook status—thereby signaling that a telephone device may be attempting to make or receive a telephone call using the subscriber's line.
Upon receipt of a signal via connection 151 indicating that a parallel extension has gone off-hook, microcontroller 100 provides a control signal to the telephone line interface 140 via connection 101 to change the switch hook in interface 140 to the off-hook position. By taking interface 140 “off hook” in parallel with the unauthorized device, the unauthorized device is unable to utilize the telephone line to make an unauthorized telephone call using pulse dialing.
The embodiment of
The embodiment of
In the embodiment of
The embodiments of
Connection 260 may also be electrically connected to a clock circuit, such that the clock could enable and/or disable the device at specified times and/or days. For example, a home user could program a timer circuit to use connection 260 to automatically enable the call fraud detector after the time at which the user goes to sleep for the evening, and then disable the device in the morning. Similarly, a business owner could program the timer to automatically enable the call fraud detector after normal business hours, and disable the device prior to the start of normal business hours the following day.
The embodiment of
The embodiment of
In the embodiment of
The embodiment of
The embodiment of
The embodiment of
The foregoing description and drawings merely explain and illustrate the invention and the invention is not limited thereto except insofar as the appended claims are so limited, inasmuch as those skilled in the art, having the present disclosure before them will be able to make modifications and variations therein without departing from the scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
2279684 | Aug 1999 | CA | national |
Number | Name | Date | Kind |
---|---|---|---|
3899640 | Piacente et al. | Aug 1975 | A |
4085302 | Zenk et al. | Apr 1978 | A |
4313108 | Yoshida | Jan 1982 | A |
4816811 | Bogatin et al. | Mar 1989 | A |
4885767 | Therrien | Dec 1989 | A |
4885768 | Genin | Dec 1989 | A |
4901074 | Sinn et al. | Feb 1990 | A |
4937854 | Sarakas | Jun 1990 | A |
4953202 | Newell | Aug 1990 | A |
4989239 | McGarry | Jan 1991 | A |
5003586 | Wright | Mar 1991 | A |
5086459 | Perry | Feb 1992 | A |
5418760 | Kawashima et al. | May 1995 | A |
5436959 | Dake et al. | Jul 1995 | A |
5559874 | Panosh | Sep 1996 | A |
5572573 | Sylvan et al. | Nov 1996 | A |
5584054 | Tyneski et al. | Dec 1996 | A |
5613137 | Bertram et al. | Mar 1997 | A |
5674018 | Kaufman et al. | Oct 1997 | A |
5742894 | Jambhekar et al. | Apr 1998 | A |
5805686 | Moller et al. | Sep 1998 | A |
5809125 | Gammino | Sep 1998 | A |
5818924 | King et al. | Oct 1998 | A |
5818931 | Movassaghi | Oct 1998 | A |
5887995 | Holehan | Mar 1999 | A |
5889836 | Nataf | Mar 1999 | A |
5909211 | Combs et al. | Jun 1999 | A |
5910099 | Jordan, Jr. et al. | Jun 1999 | A |
5917906 | Thornton | Jun 1999 | A |
5991881 | Conklin et al. | Nov 1999 | A |
6396916 | Jordan | May 2002 | B2 |
6442265 | Harlow et al. | Aug 2002 | B1 |
Number | Date | Country |
---|---|---|
2116462 | Apr 1995 | CA |
2236086 | Dec 1998 | CA |
0 239 455 | Mar 1987 | EP |
0 813 328 | Dec 1997 | EP |
2274043 | Jul 1994 | GB |
402137566 | Nov 1988 | JP |
1091305 | Apr 1989 | JP |
WO 9741677 | Nov 1997 | WO |