The present application is related to co-pending, and commonly assigned U.S. patent application Ser. No. 10/646,638 filed Aug. 22, 2003, entitled “SYSTEM AND METHOD FOR CALL REDIRECT DETECTION AND TREATMENT”; U.S. patent application Ser. No. 10/252,956, filed Sep. 20, 2002, entitled “THREE-WAY TELEPHONE CALL PREVENTION SYSTEM AND METHOD”; U.S. patent application Ser. No. 10/642,532 filed Aug. 15, 2003, entitled “CENTRALIZED CALL PROCESSING”; U.S. patent application Ser. No. 10/800,473 filed Mar. 15, 2004, entitled “CALL PROCESSING WITH VOICE OVER INTERNET PROTOCOL TRANSMISSION”; and U.S. patent application Ser. No. 09/905,014 filed Jul. 13, 2001, entitled “PUBLIC TELEPHONE CONTROL WITH VOICE OVER INTERNET PROTOCOL TRANSMISSION”; the disclosures of which are hereby incorporated herein by reference.
The present invention relates to the field of telecommunications and in particular to systems and methods for detecting and/or preventing the unauthorized use of call features in a Voice over Internet Protocol (VoIP) environment.
Private premise-based telephone systems, such as those installed at correctional facilities or other controlled-environment facilities, have created a need to monitor various events occurring on the telephone lines of the system. Telephone systems at correctional facilities or other controlled-environment facilities may comprise a microprocessor-based call processing system having operational software that is capable of allowing control over telephones connected to the system. For example, the system may be programmed to prevent inmates or residents from contacting unauthorized parties or using the telephone system for fraudulent purposes. An authorization mechanism may be utilized to prevent residents from dialing unauthorized numbers directly.
Additionally, a call processing system my prevent a resident from initiating a three-way call, taking part in a conference call, or the like. However, a particular problem that is encountered in these systems is the placement of a three-way call, or the like, by a party that is authorized to be called by the resident. Once the resident is connected to an authorized number, the resident may be connected to a third party at an unauthorized number via the three-way call feature by a party at the authorized number. Care may be taken to insure that a resident does not call an unauthorized party. However, once a call is connected through the Public Switched Telephone Network (PSTN) it becomes very difficult to control the actions of the called party. Therefore, to preserve this screening activity, it is desirable to insure that the called party is in fact the person to whom the call is terminating. Therefore, it is desirable to have control of the call with respect to all the parties who are on the phone call. In short, it is desirable to prevent addition of an unknown third party to a resident call in order to preserve the integrity of the initial call screening
A three-way call may be initiated when the originally called party (e.g. an authorized party outside the private telephone system) depresses the hook switch on the telephone, generating a hook flash signal. This signals the telephone central office to put the resident on hold and provide a dial tone to the originally called party. On receipt of the dial tone, the originally-called party dials the number of an unauthorized third party, and when the connection is completed, the resident and the unauthorized third party can communicate through the connection established outside the private system.
Three-way call monitoring systems which have been developed to prevent unauthorized calls according to the foregoing scenario rely on the detection of telephone signals. They typically monitor the local telephone connection for the hook flash “click” signal or associated central office signals that fall in a frequency band outside the range of frequencies produced by the human voice. These systems typically monitor signals on the local telephone line through a frequency filter designed to pass audio signals in this frequency band. A three-way call attempt may be indicated whenever signals in the frequency band have energies above a selected threshold. Some systems compare the signals with a hook flash reference signal utilizing sampling techniques implemented with a digital signal processor (DSP).
Even in a more or less conventional telephone environment these systems may not be very accurate for a number of reasons. The underlying assumptions about the frequency profile of three-way call events, i.e. the hook flash and signals generated by activating central office switches, are often wrong. For example, the hook flash signals are often modified by transmission through switches and along loaded lines, and even if assumptions about the frequency characteristics of the initial signal are accurate, these characteristics may be substantially distorted by the time the “hook flash” signal reaches a call processing system implementing three-way call detection, or the like.
Other systems and methods for detecting undesired call activity are disclosed in Salibrici, U.S. Pat. No. 5,768,355 and above-incorporated commonly owned, co-pending U.S. patent application Ser. No. 10/252,956, filed Sep. 20, 2002 and entitled THREE-WAY TELEPHONE CALL PREVENTION SYSTEM AND METHOD. Salibrici teaches using digital signal processing to identify a third-party connection. Salibrici operates by establishing a baseline ambient, or background, noise level, and detecting when the signal noise level drops below the ambient noise level. When the current signal noise level drops below the ambient noise level, the system assumes that a three-way conference call has been attempted by the called party. U.S. patent application Ser. No. 10/252,956 discloses an exemplary technique for detecting three-way calls, which in general includes detecting a call signal level, determining if the call signal level is below a predetermined silence level threshold, and measuring a duration the call signal level remains below the predetermined silence level threshold.
Internet protocol (“IP”) is a routing protocol designed to route traffic within a network or between networks. VoIP is a method for providing voice capabilities over an IP network, such as the Internet or an intranet. In such networks data packets are sent to and from communication sites to facilitate communication. In communication systems utilizing a VoIP protocol, the packets are commonly referred to as datagrams. In typical VoIP networks, each communication site sends datagrams to other communication sites with which they are in communication. There are different approaches to sending datagrams. Control signals per ITU recommendation H.323, and audio-based media streams using Real-Time Transport Protocol (RTP) per Internet RFC 1889, may be applied. Alternatively, control signals could be applied using other protocols such as Session Initiation Protocol (SIP) per Internet RFC 2543.
Embodiments of the present invention are directed generally to systems and methods for detecting and/or preventing unauthorized call activity in a VoIP environment. According to certain embodiments, a call is connected in which at least one party is a VoIP call party, and resulting VoIP signals for the call are monitored for detecting unauthorized call activity. In a first situation wherein a call is an interconnection between a PSTN-based call and a VoIP call, such as a SIP-based or RTP-based call, different methods for detection of VoIP signals that indicate or include suspend and resume events may be used to detect unauthorized call activity, such as initiation of a three-way call. For example, when the user on a PSTN line attempts to activate a traditional form of three-way calling, or undertakes similar unauthorized call activity, embodiments of the present invention detect various VoIP signals from which the three-way call attempt may be determined. As used herein, the phrase “VoIP signals” may refer to various out-of-band and/or in-band signaling, either of which may be a part of VoIP data packets or may be separate VoIP-related instructions. Appropriate action may then be taken by calling systems employing an embodiment of the present invention upon detection of unauthorized call activity, such as intervening in the call to warn the parties to not participate in a three-way call (e.g., via an interactive voice response unit or the like), disconnecting the call, monitoring the call for investigative purposes, and/or the like. As an example of use of in-band signals for three-way call detection, the return of Voice Activation Detection (VAD) idle noise is used by an embodiment of the present invention, where VAD idle noise being received may be treated as a silence period and used as an indicator of initiation of a three-way call. Examples of out-of-band signaling that might be used to detect unauthorized call activity might include Signaling System 7 (SS7) signaling, or the like.
In situations wherein both parties to a call are employing VoIP, signaling that occurs between traditional VoIP devices may be monitored to determine when one VoIP device invites another party or another gateway to join into the existing VoIP call. Again, a call processing system employing an embodiment of the present invention may take appropriate action in response to detection of an attempt to initiate a three-way call. Alternatively, in a VoIP-only environment, the addition of third parties to a call may be disallowed at the time the call is established to avoid the need to later detect attempts to initiate three-way calling.
Certain embodiments of the present invention also employ an ability to monitor a call for cadence, frequency, amplitude, phonetics, tonal combinations, and/or other attributes that occur in speech, and to use such information to determine the number of voices taking part in a call. Thus, in accordance with an embodiment of the present invention, the addition of a unique set of voice variables may show that a third party has joined a call. Again, a system employing an embodiment of the present invention may take appropriate action such as intervening to warn the parties to not participate in a three-way call, disconnecting the call, monitoring the call for investigative purposes or the like. An ability to monitor a call may be used to monitor for and identify other sounds of interest (e.g., from background sounds of one or more parties on the call), such as that of a gunshot, a scream, outdoor sounds (birds, wind noise, etc.), DTMF, recording tones, alarms, sirens, etcetera. An investigator may be alerted as a result of the detection of the sound of the call flagged for investigation.
Embodiments of the present invention have particularly advantageous applicability within controlled-environment facilities. Examples of controlled-environment facilities include correctional facilities (e.g., municipal jails, county jails, state prisons, federal prisons, military stockades, juvenile facilities, and detention camps), healthcare facilities (e.g., hospitals, nursing homes, mental health facilities, and rehabilitation facilities, such as drug and alcohol rehabilitation facilities), restricted living quarters (e.g., hotels, resorts, camps, dormitories, and barracks), and the like. Certain controlled-environment facilities may be thought of as a small community or city, perhaps walled or otherwise access restricted, wherein various activities occur within the community and between the community and those outside the community in the daily operation thereof. Such a community includes a number of individuals and enterprises directly associated therewith, including management, staff, and inmates, residents, patients, or guests (herein referred to as “residents”), and a number of individuals and enterprises indirectly associated therewith, including friends and family of residents, vendors, government agencies, providers of services to residents, and individuals with a connection to the facility or its residents. As described further herein, embodiments of the present invention have particular applicability within correctional facilities, but the concepts described herein may likewise be employed in other controlled-environment facilities.
Certain embodiments of the present invention make use of data concerning a resident of a controlled-environment facility that is placing a call, and/or data related to a called party or number, to determine if there is a propensity for a three-way call situation to arise in a call placed by the resident of the facility. This information may be provided by a controlled-environment facility's call management system, a controlled-environment facility's information management system, or the like associated with a controlled-environment facility in which the resident resides.
As a result of a determination that an elevated propensity for a three-way calling situation exists, sensitivity of three-way call detection methods and/or systems, such as discussed above and/or disclosed in the incorporated references, may be elevated for a call placed by that resident and/or a call placed to a party or number. Alternatively or additionally, if a call has a heightened propensity for a three-way call situation to arise, the response applied by a system employing an embodiment of the present invention may be elevated. For example, if a three-way call attempt would normally only be logged or otherwise noted for possible further investigation, the parties to the call may be warned, and in a situation where the call's parties might normally only be warned, a call may be disconnected when an attempt to initiate a three-way call is detected.
The foregoing has outlined rather broadly the features and technical advantages of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features and advantages of the invention will be described hereinafter which form the subject of the claims of the invention. It should be appreciated by those skilled in the art that the conception and specific embodiment disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the invention as set forth in the appended claims. The novel features which are believed to be characteristic of the invention, both as to its organization and method of operation, together with further objects and advantages will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present invention.
For a more complete understanding of the present invention, reference is now made to the following descriptions taken in conjunction with the accompanying drawing, in which:
In a VoIP environment, particular problems arise for detecting three-way calls. Triggers that might normally be used to detect initiation of a three-way call in a conventional PSTN environment, or the like, may not be passed in a VoIP-based call. For example, in a packetized VoIP environment it is very difficult to detect a hook flash or silence. Packets oftentimes will not pass a hook flash, or similar sound, or pass silence. Similarly, lower so-called “levels of silence” are typically screened out of packets during the creation of the packets.
As for “level of silence” or similar triggers that may be used in three-way call detection within a VoIP environment, typically when sound drops below some threshold level it is deemed to be silence and not transmitted. VoIP data transmission bandwidth usage may be minimized through the use of Voice Activation Detection (VAD), or other methods. VAD allows a data network carrying voice traffic over the Internet to detect the absence of audio and conserve bandwidth by preventing the transmission of “silent packets” over the network. Most conversations include about 50% silence. VAD (also called “silence suppression”) can be enabled to monitor signals for voice activity so that when silence is detected for a specified amount of time, the application informs the Packet Voice Protocol and prevents the encoder output from being transported across the network. VAD may also be used to forward idle noise characteristics (sometimes called ambient or comfort noise) to a remote IP telephone or gateway. A standard for digitized voice, 64 Kbps, is a constant bit rate whether the speaker is actively speaking, is pausing between thoughts, or is totally silent. Without idle noise giving the illusion of a constant transmission stream during silence suppression, the listener would be likely to think the line had gone dead. As a result, sounds at different levels of silence are not passed in a VoIP call. Therefore, since conventional three-way call detection may analyze different “thresholds of silence” to determine whether or not a caller is “away” setting up a three-way call, conventional three-way call detection in VoIP calls is problematic.
As for a hook flash or similar triggers, a sharp click occurs when a switch hook is depressed. This click is usually proceeded by a period of silence, and since a VoIP system would not necessarily be transmitting encoded sound packets during the silence period, the sharp click is typically the first sound that starts the VoIP system transmitting encoded sound packets again. However, a VoIP system will not typically react fast enough to catch the click, and therefore the VoIP system may not transmit the click at all or truncate the click rendering it unrecognizable by a conventional three-way call detection system. For example, a rising edge of the click may trigger a VoIP filter to start passing packets again, yet not transmit the click itself. More specifically, VoIP systems may have jittering timing and as a result a hook flash click may be completely screened out in the VoIP transmission, similar to the “levels of silence” discussed above, together making both silence detection and/or click detection problematic for use in three-way call detection in a VoIP environment. Therefore, use of VoIP creates new issues in regards to detecting and/or preventing three-way call activity.
In order to better aid the reader in understanding the concepts of the present invention, telephone communications systems and methods of the present invention are described herein with reference to configuration and use in providing calling services to a correctional facility, such as a jail, a prison or a similar controlled-environment facility. However, it should be appreciated that call processing systems and methods of the present invention are not necessarily limited to use with respect to such correctional facilities. For example, embodiments of the present invention may likewise be utilized with respect to any number of other environments, such as hospitals, nursing homes, camps, dormitories, businesses, residences, kiosks, etcetera.
Telephone terminals 110-113 may not only comprise telephone handsets but may also include general-purpose processor-based devices such as personal computers (PCs), personal digital assistants (PDAs), kiosks, or the like. Terminals 110-113 are preferably connected to processor-based call processing system 120 by wire lines or wireless links, broadly designated 140. Processor-based call processing system 120 may comprise a programmable computer having a central processing unit (whether general purpose or application specific), memory, and appropriate input/output interfaces, which are operable under an instruction set defining operation as described herein. All or any portion of call processing system 120 may be disposed within a facility it serves, in an outside central location, or the processes shown provided by processor-based call processing system 120 may be provided in a decentralized manner by distributed processing outside and/or inside the facility. Communications links 140 may comprise analog voice lines, such as those associated with plain old telephone service (POTS), digital communication links such as those used between a digital private branch exchange (PBX) and its associated user stations, and/or Ethernet or wireless communications links (e.g. for VoIP communication where terminals 110-113 are multimedia terminals, VoIP phones, or the like), as examples. Line interface 123 provides interfacing between the signals native to terminals 110-113 and a processor or processors of call processing system 120.
VoIP gateway 126 may provide voice connectivity via WAN 180. WAN 180 may comprise any data network, such as an intranet, an extranet, the Internet, a public network, a private network, and/or the like. Although illustrated as a WAN, it should be appreciated that embodiments of the present invention may utilize data networks such as a local area network (LAN), a metropolitan area network (MAN), an intranet, an extra net, the Internet, and/or the like, in combination with, or in the alternative to, a WAN.
Terminals 110-113 may be placed in voice communication with any of a number of user terminals via VoIP gateway 126 and WAN 180. For example, telephone terminal 155 connected to PSTN 160 may be placed in communication with telephone terminal 110, via VoIP gateway 126 and WAN 180, perhaps using a corresponding VoIP gateway, such as may be disposed at an edge of WAN 180 and coupled to PSTN 160, or otherwise associated with WAN 180 and/or PSTN 160. Additionally or alternatively, terminals 110-113 may be placed in communication with devices such as video phones, multi-media computers, cellular phones, personal digital assistants (PDAs), and/or the like via VoIP gateway 126 and WAN 180, whether such devices are coupled to WAN 180 or PSTN 160.
VoIP gateway 126 includes compressor and packetizer 125 and network interface 127. Compressor and packetizer 125 produces compressed data packets from the telephony signals. These packets are processed in network interface 127 so that they can be applied through WAN 180 to corresponding VoIP gateway. The telephone signals may be decompressed and depacketized by VoIP gateway and distributed to a public switch of PSTN 160. VoIP gateway 126 may also decompress and depacketize incoming VoIP data packets to provide telephony signals to terminals 110-113, particularly where terminals 110-113 are not capable of decompression and depacketization.
In operation according to embodiments of the present invention, terminals 110-113 are selectively connected to offsite PSTN 160 via WAN 180 and VoIP gateway 126. Processor-based system 120 preferably selectively connects appropriate ones of terminals 110-113 with the VoIP gateway 126 for completion of desired calls. VoIP gateway 126 utilizes internet protocols to establish a packet-switched network connection (in contrast to a circuit-switched network connection of the PSTN) between a calling and called party to thereby connect a desired call.
VoIP gateway 126 of a preferred embodiment is provided to service and control VoIP communications. Various types of VoIP communications may be effectively managed and controlled in accordance with embodiments of the present invention by VoIP gateway 126. Voice data may be processed by means of a vocoder (Voice Coder/Decoder), as may be provided in VoIP gateway 126. Voice coding and decoding as utilized according to embodiments of the invention may implement one or more of several standard schemes, such as ITU recommendation G.723.1, G.729, or G.711 among others.
The illustrated embodiment of
A user of one of telephones 110-113 may place the telephone in an off-hook condition and dial or otherwise provide user and/or account identification information, in addition to providing a destination number or other information with respect to a desired call to be placed. Validation control block 128, perhaps in cooperation with a call application management system and/or a call treatment system, may operate to verify a) the identity of the calling party, b) that the calling party is authorized to place a call, and c) that the called party will receive calls or is authorized to receive calls from the calling party.
Unauthorized call activity detection control block 129 is preferably operable to monitor a connected call to provide call intelligence for use in determinations with respect to allowing a particular call to be continued and/or other call control features to be invoked. According to embodiments of the present invention, unauthorized call activity detection control block 129, such as the aforementioned agent, provides real-time intelligence with respect to fraudulent or otherwise unauthorized activity being attempted during a call, such as unauthorized three-way call detection, as discussed in greater detail below.
It should be appreciated that call processing functionality may be provided in a call flow at one or more points based upon various considerations. For example, VoIP gateway 126 and/or unauthorized call detection functionality 129 may be disposed in a number of configurations and/or locations, such as disclosed in above incorporated U.S. patent application Ser. No. 10/800,473, entitled “CALL PROCESSING WITH VOICE OVER INTERNET PROTOCOL TRANSMISSION.” The illustrated embodiment shows unauthorized call activity detection control block 129 coupled to line interface 123, disposed in the call flow external to the VoIP data stream, to operate with respect to telephony signals which have been decompressed and depacketized by VoIP gateway 126. However, as discussed in greater detail below, embodiments of the present invention may gather information from the VoIP data stream to provide at least one aspect of three-way call detection. Thus, embodiments of the present invention may dispose various aspects of call processing functionality, particularly unauthorized call activity detection control block 129, in a call flow differently, whether inside or outside of the VoIP data stream, than as shown in
At 201 a resident of a controlled-environment facility picks up a phone, such as one of phones 110-113 of controlled phone system 100 illustrated in
Data concerning the resident, such as may be maintained by a controlled-environment facility call management system, a controlled-environment facility information management system, or the like, and/or data related to a called party or number may be used at 204, to determine if there is a propensity for a three-way call situation to arise in a particular call Some of the variables that could be considered at 204 might include past attempts to initiate a three-way call or other unauthorized call activity; past attempts at other types of fraud; the resident's payment status, billing activity, payment history, calling activity, calling history; the nature of the facility the resident is calling from (e.g. the average length of stay in the facility); and/or the like. As a result of a determination at 204 that an elevated propensity for a three-way calling situation exists for a particular call, various steps may be taken. For example, if it is determined at 204 that the resident or called party has participated in calls in the past in which an attempt to invoke a three-way call was detected, a sensitivity of three-way call detection may be elevated at 204.
At 204 a determination may also be made that a three-way call or other call features are allowed for a particular call. For example, if the called party is an attorney or bail bondsman, three-way calling may be allowed in order for the called attorney or bail bondsman to “conference-in” needed parties (e.g. a witness, surety, etc.)
Otherwise, when the PSTN call goes off hook to initiate a three-way call or the like, there are different types of out-of-band signaling coming from an SS7 environment of the PSTN-based call indicating a suspend event reaches the gateway and then is translated to out-of-band signaling in a SIP environment. In the example of
By way or example, use of in-band signals for three-way call detection might include monitoring return of VAD idle noise at 207 as the equivalent of silence. For example, at 207 one embodiment of the present invention may treat the period where VAD idle noise being received as a time frame of silence period for detection of an attempt to initiate a three-way call. VAD typically will cut a call in and out rather quickly to conserve bandwidth. Thus, the present systems and methods for unauthorized call activity detection may look for longer periods of VAD activity, such as would be generated by a VoIP gateway as a result of a party hook flashing off of a call, which would result in the VoIP gateway only receiving silence from the PSTN connected caller. Embodiments of the present invention may, as mentioned, treat the VAD as silence for purposes of unauthorized call activity detection, which might also look for timing windows of such silence periods indicative of establishing a three-way call. In certain embodiments, such in-band VAD detection of idle noise may be compared against a simulated model of an approximate description of the interaction between sources and the underlying network. The interaction of a source with the rest of the system may be derived through an iterative procedure that evaluates feedback that a source receives from the network, for example.
An example of out-of-band signaling that may be used to detect three-way calling activity may include monitoring of SS7 PSTN signaling that indicates the outside party has done something, such as a flashhook (208), to initiate a three-way call. Within the PSTN environment, initiating a three-way or answering a call waiting call, such as by use of a flash hook, may generate an SS7 suspend event within the network. The generated SS7 suspend message is an indication to the opposite end of the call, in this case the calling system associated with the resident of the controlled-environment facility that the other end point in the call, the outside party, is going to stop sending information. At a later point in time when the hook flash happens a second time to either come back on the call with another party or to resume this call from a call waiting event, there will be a resume event that is sent. When the VoIP gateway receives these events, it will transfer those events into the SIP network.
As another example, in certain embodiments a three-way call attempt may be deduced from a model of unacceptable packet loss which persists from a predetermined time period. For example, the packet loss for a monitored call may be compared against a simulated model of an approximate description of the interaction between sources and the underlying network. The interaction of a source with the rest of the system may be derived through an iterative procedure that evaluates feedback that a source receives from the network.
The method of transfer into the SIP network varies depending on the gateway. For example, a Generic Description Table (GDT) might be used to translate the SS7 signaling into a SIP message, which may take the form of ASCII text. Another method of transfer of the suspend and resume event into the SIP network might employ a variation on the SIP protocol known as SIP Trunking (SIP-T), which is adapted to carry SS7 network information over the SIP network such that the information may be converted back into SS7 information. A third method used to transfer a suspend and resume event into an SIP network might be termed a direct correlation. The SIP protocol carries the call setup information, but the protocol that carries the voice information is RTP. Within the RTP information there is a new signaling sent out that indicates that a new set of RTP information that describes the voice content is being received. A suspend event may be identified within the RTP information which might take the form of an indication that the target data is being sent to is no longer present. This may result in an SIP message that a terminal is going into a receive only mode and no longer transmitting data. A resume event may take the form of an RTP message that resumes the entire connection.
In accordance with an embodiment of the present invention, a call involving a resident may be monitored to listen to all of the voices engaged in the call. Thus, additionally or alternatively, at 225 the exemplary embodiment may also monitor the call established at 204 for cadence, frequency, and/or other attributes that occur in speech, and capture data related thereto at 226. At 227 the captured data may be analyzed to determine the number of voices taking part in a call. Using information gathered from the voices such as frequencies, cadence, amplitude and other variables that might occur, detection capabilities that are able to recognize the difference between foreground and background voices may be used at 227 to determine the number of parties that are engaged in the call. For example, systems employing an embodiment of the present invention might have certain voice characteristics data for the resident and voice characteristics data for the outside called party might have been previously gathered during earlier calls or at the beginning of the current call. This data may be used to make a determination at 227 that a third party, who's voice characteristics data does not match the resident or called party has joined the call. If at 227 it is determined that an additional set of unique voice variables has joined a call, via a prohibited three-way call or by other means, appropriate action may be taken at 210, as discussed in greater detail below.
In identifying the number of parties on a call it may be helpful to differentiate the call legs and what call leg a voice appears on. For example, a call from a resident of a prison or similar facility may contain many echo voices, due to the physical properties of the facility and the proximity of other individuals. Therefore, at 225-227 it may be more advantageous to monitor the leg of the call coming from the called party to the resident for an additional voice or voices.
Monitoring a call at 225-227 may also, or alternatively, include monitoring to identify other sounds of interest, such as a gunshots, a scream, people in very panicked states or any other things that might be of interest to an investigator. An investigator may be alerted at 214 as a result of the detection of such a sound of interest or the call flagged for investigation at 211, as discussed in greater detail below.
Upon detection of an attempt to initiate a three-way call at 206, or detection of a new voice or sound of interest at 225-227, appropriate action may be taken by calling systems employing an embodiment of the present invention at 210. Such appropriate action might include flagging the call for investigation at 211, intervening at 212 to warn the parties to not participate in a three-way call, disconnecting the call at 213, monitoring the call for investigative purposes at 214, alerting authorities at 215, and/or the like. Alternatively or additionally, if it is determined at 204 that a call has a heightened propensity for a three-way call situation to arise, the response applied at 210 upon detection of an attempt to initiate a three-way call at 206, may be elevated. For example, if a three-way call attempt would normally only be logged or otherwise noted for possible further investigation at 211, the call parties may be warned (212), and in a situation where the call parties might normally only be warned at 212, a call may be disconnected (213) when an attempt to initiate a three-way call is detected.
Another method embodiment, 300, is illustrated in
Similar to as discussed above concerning step 204 of
At 304 a determination may also be made that a three-way call or other call features are allowed for a particular call. For example, if the called party is an attorney or bail bondsman, three-way calling may be allowed in order for the called attorney or bail bondsman to “conference-in” needed parties (e.g. a witness, surety, etc.)
At 305 in the illustrated example of
In-band unauthorized call activity detection may also be employed in accordance with certain embodiments of the present invention for VoIP-to-VoIP calls. The RTP stream, or the like that is transmitted as voice data might include a sequence numbers commonly referred to as internal session identifiers or internal sequence numbers, per Internet RFC specifications. Whenever a remote gateway reinitiates some element of a data stream, even though it may not have changed terminating information, the gateway may change internal session identifiers or internal sequence numbers per RFC specifications. Thus, if at 306 a determination is made that internal session identifiers, internal sequence numbers, or the like of a voice data stream has changed in a manner consistent with initiation of unauthorized call activity, such as a three-way call, it may be determined that unauthorized call activity is taking place. For example a jump in sequence numbers that does not correlate in time, or a change in session IDs, can be used in accordance with an embodiment of the present invention as an indication that a remote point in a VoIP-to-VoIP call has substantially changed the content of the stream.
Alternatively, in a VoIP-only environment, such as employed in the exemplary operational flow 300 of one embodiment, unauthorized call activity, such as the addition of third parties to a call, may be disallowed (320) at the time the call is established, such as at 304, to completely block, and possibly avoid the need to detect, attempts to initiate three-way calling. The disallowance at 320 may be accomplished by setting call features enabled for the VoIP call parties to not include unauthorized call features, such as three-way calling.
Similar to as discussed above concerning steps 225-227 of
At 310, the call processing system 120 employing an embodiment of the present invention may take appropriate action in response to detection of an attempt to initiate a three-way call at 306, such as flagging the call for investigation at 311, intervening at 312 to warn the parties to not participate in a three-way call, disconnecting the call at 313, monitoring the call for investigative purposes at 314, alerting authorities at 315, and/or the like. Alternatively or additionally, if it is determined at 304 that a call has a heightened propensity for a three-way call situation to arise, the response applied at 310, upon detection of an attempt to initiate a three-way call at 306, may be elevated. For example, if a three-way call attempt would normally only be logged or otherwise noted for possible further investigation at 311, the call parties may be warned (312), and in a situation where the call parties might normally only be warned at 312, a call may be disconnected (313) when an attempt to initiate a three-way call is detected.
Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present invention. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.
Number | Name | Date | Kind |
---|---|---|---|
3096404 | Semon | Jul 1963 | A |
3113185 | Semon | Dec 1963 | A |
3350515 | Semon | Oct 1967 | A |
3397288 | Semon | Aug 1968 | A |
3398288 | Sanders et al. | Aug 1968 | A |
3626107 | Armstrong et al. | Dec 1971 | A |
3660610 | Hestad et al. | May 1972 | A |
3676605 | Johnson | Jul 1972 | A |
3798382 | Hoven | Mar 1974 | A |
3813495 | Conerly | May 1974 | A |
3829617 | Caithamer et al. | Aug 1974 | A |
3851121 | Marvin | Nov 1974 | A |
3864519 | Owen | Feb 1975 | A |
3952160 | Pasternack et al. | Apr 1976 | A |
3985956 | Monti et al. | Oct 1976 | A |
3997731 | Wilmot et al. | Dec 1976 | A |
4001513 | Naylor | Jan 1977 | A |
4002848 | Stein | Jan 1977 | A |
4027109 | Smith et al. | May 1977 | A |
4054756 | Comella et al. | Oct 1977 | A |
4055730 | Stapleford et al. | Oct 1977 | A |
4122308 | Weinberger et al. | Oct 1978 | A |
4156799 | Cave | May 1979 | A |
4188508 | Rogers et al. | Feb 1980 | A |
4196317 | Bartelink | Apr 1980 | A |
4310726 | Asmuth | Jan 1982 | A |
4319091 | Meri | Mar 1982 | A |
4326123 | Hosterman | Apr 1982 | A |
4333056 | Cave | Jun 1982 | A |
4371752 | Matthews et al. | Feb 1983 | A |
4387274 | Stein et al. | Jun 1983 | A |
4405833 | Cave et al. | Sep 1983 | A |
4439636 | Newkirk et al. | Mar 1984 | A |
4445211 | Webber | Apr 1984 | A |
4477698 | Szlam et al. | Oct 1984 | A |
4518825 | Brinkerhoff et al. | May 1985 | A |
4538030 | Fossett et al. | Aug 1985 | A |
4540855 | Szlam et al. | Sep 1985 | A |
4552996 | de Bergh | Nov 1985 | A |
4559416 | Theis et al. | Dec 1985 | A |
4585904 | Mincone et al. | Apr 1986 | A |
4593157 | Usdan | Jun 1986 | A |
4595983 | Gehalo et al. | Jun 1986 | A |
4602129 | Matthews et al. | Jul 1986 | A |
4626630 | Waldman | Dec 1986 | A |
4629829 | Puhl et al. | Dec 1986 | A |
4644109 | Takeda et al. | Feb 1987 | A |
4686699 | Wilkie | Aug 1987 | A |
4696028 | Morganstein et al. | Sep 1987 | A |
4696031 | Freudberg et al. | Sep 1987 | A |
4698840 | Dively et al. | Oct 1987 | A |
4712230 | Rice et al. | Dec 1987 | A |
4723273 | Diesel et al. | Feb 1988 | A |
4726057 | Doerry et al. | Feb 1988 | A |
4727577 | Frey et al. | Feb 1988 | A |
4731818 | Clark, Jr. et al. | Mar 1988 | A |
4736405 | Akiyama | Apr 1988 | A |
4737982 | Boratgis et al. | Apr 1988 | A |
4746786 | Heberle et al. | May 1988 | A |
4763350 | Immendorfer et al. | Aug 1988 | A |
4766604 | Axberg | Aug 1988 | A |
4768223 | Kinoshita et al. | Aug 1988 | A |
4768227 | Dively et al. | Aug 1988 | A |
4769834 | Billinger et al. | Sep 1988 | A |
4777647 | Smith et al. | Oct 1988 | A |
4782516 | Maybach et al. | Nov 1988 | A |
4791640 | Sand | Dec 1988 | A |
4794642 | Arbabzadah et al. | Dec 1988 | A |
4797910 | Daudelin | Jan 1989 | A |
4799255 | Billinger et al. | Jan 1989 | A |
4802207 | Uchida | Jan 1989 | A |
4803718 | Neil et al. | Feb 1989 | A |
4815120 | Kosich | Mar 1989 | A |
4825460 | Carter et al. | Apr 1989 | A |
4839917 | Oliver | Jun 1989 | A |
4850011 | Delmege et al. | Jul 1989 | A |
4868873 | Kamil | Sep 1989 | A |
4885765 | Shirakawa | Dec 1989 | A |
4890317 | Hird et al. | Dec 1989 | A |
4896348 | Grantland et al. | Jan 1990 | A |
4899358 | Blakley | Feb 1990 | A |
4899375 | Bauer et al. | Feb 1990 | A |
4901341 | Carter et al. | Feb 1990 | A |
4908852 | Hird et al. | Mar 1990 | A |
4916733 | Smith et al. | Apr 1990 | A |
4920562 | Hird et al. | Apr 1990 | A |
4922519 | Daudelin | May 1990 | A |
4922520 | Bernard et al. | May 1990 | A |
4924488 | Kosich | May 1990 | A |
4924501 | Cheeseman et al. | May 1990 | A |
4932062 | Hamilton | Jun 1990 | A |
4933966 | Hird et al. | Jun 1990 | A |
4933967 | Lo et al. | Jun 1990 | A |
4935956 | Hellwarth et al. | Jun 1990 | A |
4937856 | Natarajan | Jun 1990 | A |
4937862 | Kosich | Jun 1990 | A |
4943995 | Daudelin et al. | Jul 1990 | A |
4944001 | Kizuik et al. | Jul 1990 | A |
4947422 | Smith et al. | Aug 1990 | A |
4947425 | Grizmala et al. | Aug 1990 | A |
4979214 | Hamilton | Dec 1990 | A |
4991203 | Kakizawa | Feb 1991 | A |
4993062 | Dula et al. | Feb 1991 | A |
4993068 | Piosenka et al. | Feb 1991 | A |
5003595 | Collins et al. | Mar 1991 | A |
5008923 | Kitamura et al. | Apr 1991 | A |
5020095 | Morganstein et al. | May 1991 | A |
5022067 | Hughes | Jun 1991 | A |
5023869 | Grover et al. | Jun 1991 | A |
5023906 | Novas | Jun 1991 | A |
5033088 | Shipman | Jul 1991 | A |
5054059 | Stern et al. | Oct 1991 | A |
5063593 | Kwon | Nov 1991 | A |
5093858 | Hird et al. | Mar 1992 | A |
5109405 | Morganstein | Apr 1992 | A |
5131024 | Pugh et al. | Jul 1992 | A |
5134651 | Ortiz et al. | Jul 1992 | A |
5150357 | Hopner et al. | Sep 1992 | A |
5153907 | Pugh et al. | Oct 1992 | A |
5155761 | Hammond | Oct 1992 | A |
5163083 | Dowden et al. | Nov 1992 | A |
5164989 | Brandman et al. | Nov 1992 | A |
5181237 | Dowden et al. | Jan 1993 | A |
5187740 | Swaim et al. | Feb 1993 | A |
5193110 | Jones et al. | Mar 1993 | A |
5200995 | Gaukel et al. | Apr 1993 | A |
5210789 | Jeffus et al. | May 1993 | A |
5216702 | Ramsden | Jun 1993 | A |
5218636 | Hamilton | Jun 1993 | A |
5220501 | Lawlor et al. | Jun 1993 | A |
5222120 | McLeod et al. | Jun 1993 | A |
5229764 | Matchett et al. | Jul 1993 | A |
5247569 | Cave | Sep 1993 | A |
5255305 | Sattar | Oct 1993 | A |
5274698 | Jang | Dec 1993 | A |
5276731 | Arbel et al. | Jan 1994 | A |
5283825 | Druckman et al. | Feb 1994 | A |
5283829 | Anderson | Feb 1994 | A |
5287401 | Lin | Feb 1994 | A |
5305312 | Fornek et al. | Apr 1994 | A |
5309505 | Szlam et al. | May 1994 | A |
5311589 | Bennett et al. | May 1994 | A |
5319701 | Hird et al. | Jun 1994 | A |
5319702 | Kitchin et al. | Jun 1994 | A |
5321754 | Fisher et al. | Jun 1994 | A |
5323448 | Biggs et al. | Jun 1994 | A |
5325421 | Hou et al. | Jun 1994 | A |
5325427 | Dighe | Jun 1994 | A |
5327489 | Anderson et al. | Jul 1994 | A |
5329578 | Brennan et al. | Jul 1994 | A |
5333181 | Biggs | Jul 1994 | A |
5335266 | Richardson, Jr. et al. | Aug 1994 | A |
5345501 | Shelton | Sep 1994 | A |
5345595 | Johnson et al. | Sep 1994 | A |
5351285 | Katz | Sep 1994 | A |
5351287 | Bhattacharyya et al. | Sep 1994 | A |
5355403 | Richardson, Jr. et al. | Oct 1994 | A |
5369699 | Page et al. | Nov 1994 | A |
5375161 | Fuller et al. | Dec 1994 | A |
5381474 | Lahdemaki et al. | Jan 1995 | A |
5394465 | Jo | Feb 1995 | A |
5416831 | Chewning, III et al. | May 1995 | A |
5425087 | Gerber et al. | Jun 1995 | A |
5428662 | Hamilton | Jun 1995 | A |
5442696 | Lindberg et al. | Aug 1995 | A |
5450485 | Hamilton | Sep 1995 | A |
5452347 | Iglehart et al. | Sep 1995 | A |
5455819 | Sugiyama | Oct 1995 | A |
5461665 | Shur et al. | Oct 1995 | A |
5465293 | Chiller et al. | Nov 1995 | A |
5465387 | Mukherjee | Nov 1995 | A |
5471519 | Howe et al. | Nov 1995 | A |
5473686 | Virdee | Dec 1995 | A |
5483582 | Pugh et al. | Jan 1996 | A |
5483593 | Gupta et al. | Jan 1996 | A |
5485507 | Brown et al. | Jan 1996 | A |
5497414 | Bartholomew | Mar 1996 | A |
5504810 | McNair | Apr 1996 | A |
5524141 | Braun et al. | Jun 1996 | A |
5524145 | Parker | Jun 1996 | A |
5535261 | Brown et al. | Jul 1996 | A |
5539812 | Kitchin et al. | Jul 1996 | A |
5544231 | Cho | Aug 1996 | A |
5566229 | Hou et al. | Oct 1996 | A |
5577116 | Townsend et al. | Nov 1996 | A |
5583920 | Wheeler, Jr. | Dec 1996 | A |
5583934 | Zhou | Dec 1996 | A |
5606604 | Rosenblatt et al. | Feb 1997 | A |
5617471 | Rogers et al. | Apr 1997 | A |
5619561 | Reese | Apr 1997 | A |
5627887 | Freedman | May 1997 | A |
5634126 | Norell | May 1997 | A |
5651056 | Eting et al. | Jul 1997 | A |
5655013 | Gainsboro | Aug 1997 | A |
5682386 | Arimilli et al. | Oct 1997 | A |
5722418 | Bro | Mar 1998 | A |
5724404 | Garcia et al. | Mar 1998 | A |
5742905 | Pepe et al. | Apr 1998 | A |
5745553 | Mirville et al. | Apr 1998 | A |
5745558 | Richardson, Jr. et al. | Apr 1998 | A |
5757781 | Gilman et al. | May 1998 | A |
5768355 | Salibrici et al. | Jun 1998 | A |
5777558 | Pennypacker et al. | Jul 1998 | A |
5796811 | McFarlen | Aug 1998 | A |
5799068 | Kikinis et al. | Aug 1998 | A |
5805685 | McFarlen | Sep 1998 | A |
5809125 | Gammino | Sep 1998 | A |
5844978 | Reuss et al. | Dec 1998 | A |
5859907 | Kawahara et al. | Jan 1999 | A |
5862519 | Sharma et al. | Jan 1999 | A |
5867559 | Jorgensen et al. | Feb 1999 | A |
5875230 | Ganley et al. | Feb 1999 | A |
5883945 | Richardson, Jr. et al. | Mar 1999 | A |
5907602 | Peel et al. | May 1999 | A |
5923746 | Baker et al. | Jul 1999 | A |
5926533 | Gainsboro | Jul 1999 | A |
5937042 | Sofman | Aug 1999 | A |
5943403 | Richardson, Jr. et al. | Aug 1999 | A |
5946386 | Rogers et al. | Aug 1999 | A |
5960064 | Foladare et al. | Sep 1999 | A |
6031895 | Cohn et al. | Feb 2000 | A |
6052454 | Kek et al. | Apr 2000 | A |
6064963 | Gainsboro | May 2000 | A |
6072860 | Kek et al. | Jun 2000 | A |
6075843 | Cave | Jun 2000 | A |
6097804 | Gilbert et al. | Aug 2000 | A |
6134320 | Swan et al. | Oct 2000 | A |
6141406 | Johnson | Oct 2000 | A |
6169789 | Rao et al. | Jan 2001 | B1 |
RE37073 | Hammond | Feb 2001 | E |
6188751 | Scherer | Feb 2001 | B1 |
6249570 | Glowny et al. | Jun 2001 | B1 |
6320946 | Enzmann et al. | Nov 2001 | B1 |
6320948 | Heilmann et al. | Nov 2001 | B1 |
6324280 | Dunn et al. | Nov 2001 | B2 |
6363065 | Thornton et al. | Mar 2002 | B1 |
6366653 | Yeh et al. | Apr 2002 | B1 |
6381321 | Brown et al. | Apr 2002 | B1 |
6404764 | Jones et al. | Jun 2002 | B1 |
6404857 | Blair et al. | Jun 2002 | B1 |
6404870 | Kia | Jun 2002 | B1 |
6445682 | Weitz | Sep 2002 | B1 |
6480590 | Ku | Nov 2002 | B1 |
6487200 | Fraser | Nov 2002 | B1 |
6496477 | Perkins et al. | Dec 2002 | B1 |
6529500 | Pandharipande | Mar 2003 | B1 |
6529602 | Walker et al. | Mar 2003 | B1 |
6553336 | Johnson et al. | Apr 2003 | B1 |
6560323 | Gainsboro | May 2003 | B2 |
6560325 | Brown et al. | May 2003 | B2 |
6611583 | Gainsboro | Aug 2003 | B1 |
6621812 | Chapman et al. | Sep 2003 | B1 |
6654722 | Aldous et al. | Nov 2003 | B1 |
6665380 | Cree et al. | Dec 2003 | B1 |
6687360 | Kung et al. | Feb 2004 | B2 |
6731630 | Schuster et al. | May 2004 | B1 |
6788775 | Simpson | Sep 2004 | B1 |
6795444 | Vo et al. | Sep 2004 | B1 |
6816469 | Kung et al. | Nov 2004 | B1 |
6876647 | Celi, Jr. | Apr 2005 | B2 |
6904139 | Brown et al. | Jun 2005 | B2 |
6920209 | Gainsboro | Jul 2005 | B1 |
6985478 | Pogossiants et al. | Jan 2006 | B2 |
7039171 | Gickler | May 2006 | B2 |
7042992 | Falcone et al. | May 2006 | B1 |
7046782 | Miller | May 2006 | B2 |
7075922 | Mussman et al. | Jul 2006 | B2 |
7085359 | Crites et al. | Aug 2006 | B2 |
7203186 | Fuller et al. | Apr 2007 | B1 |
7302053 | Chang et al. | Nov 2007 | B2 |
7333798 | Hodge | Feb 2008 | B2 |
7360087 | Jorgensen et al. | Apr 2008 | B2 |
7360090 | Doskow et al. | Apr 2008 | B1 |
7505406 | Spadaro et al. | Mar 2009 | B1 |
20010028649 | Pogossiants et al. | Oct 2001 | A1 |
20010036821 | Gainsboro et al. | Nov 2001 | A1 |
20010041590 | Silberfenig et al. | Nov 2001 | A1 |
20010047333 | Kim et al. | Nov 2001 | A1 |
20020071537 | Gainsboro | Jun 2002 | A1 |
20020141386 | Minert et al. | Oct 2002 | A1 |
20020159440 | Mussman et al. | Oct 2002 | A1 |
20020176403 | Radian | Nov 2002 | A1 |
20030002639 | Huie | Jan 2003 | A1 |
20030023714 | Zeigler et al. | Jan 2003 | A1 |
20030091028 | Chang et al. | May 2003 | A1 |
20030126470 | Crites et al. | Jul 2003 | A1 |
20030133558 | Kung et al. | Jul 2003 | A1 |
20030185204 | Murdock | Oct 2003 | A1 |
20040052218 | Knappe | Mar 2004 | A1 |
20060209797 | Anisimov et al. | Sep 2006 | A1 |
20060285650 | Hodge | Dec 2006 | A1 |
20060286962 | Davis | Dec 2006 | A1 |
20070041545 | Gainsboro | Feb 2007 | A1 |
20070071206 | Gainsboro et al. | Mar 2007 | A1 |
20070115924 | Schneider et al. | May 2007 | A1 |
20070242658 | Rae et al. | Oct 2007 | A1 |
20070263812 | Polozola et al. | Nov 2007 | A1 |
20080040780 | Reinhold | Feb 2008 | A1 |
Number | Date | Country |
---|---|---|
0185365 | Jun 1986 | EP |
0814583 | Dec 1997 | EP |
1175074 | Jan 2002 | EP |
2600850 | Dec 1987 | FR |
2134749 | Aug 1984 | GB |
5-30193 | Feb 1993 | JP |
63-03305 | Oct 1994 | JP |
63-033054 | Dec 1994 | JP |
2002157327 | May 2002 | JP |
2003110758 | Apr 2003 | JP |
WO 9620448 | Jul 1996 | WO |
WO 9722208 | Jun 1997 | WO |
WO 9813993 | Apr 1998 | WO |
WO 0054491 | Sep 2000 | WO |
Number | Date | Country | |
---|---|---|---|
20070242658 A1 | Oct 2007 | US |