Apparatus and method for management of policies on the usage...

Telephonic communications – Call or terminal access alarm or control – Fraud or improper use mitigating or indication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C379S196000, C379S201010, C379S220010, C379S243000, C379S386000

Reexamination Certificate

active

06574321

ABSTRACT:

BACKGROUND
This invention enables end user enterprises to achieve specific objectives in the management and enforcement of policies related to the use of telecommunications services. It involves active measurement of the properties of traffic on a communications channel, and the use of such knowledge in strategic management of access to telecommunications services. It was conceived for use in connection with traditional telephone networks that carry voice, facsimile or voice-band-data (VBD) traffic, though it is not necessarily limited to such networks.
The term end user represents enterprises that make use of telecommunications services. Enterprises that act as an intermediary for access to telecommunications services are also considered to be end users.
Herein, the terms “facsimile” or “fax” represent Group 3 facsimile, which is a ubiquitous international standard for communicating facsimiles of documents over telephone networks. The term “voice-band-data” represents machine-generated information transported over a standard telecommunications voice channel. While facsimile is a form of voice-band-data, it is mentioned separately in this document to highlight the fact that it may be separately classified in the invention.
Voice-Band-Data traffic is usually generated by devices called modems. Correspondingly, the terms “voice-band-data traffic” and “modem traffic” are used interchangeably, and statements such as “the threat of modems” should be interpreted as the “threat of devices that facilitate the generation and communication of voice-band-data”.
“Audible network signaling” signals are carried on traditional telephone networks that carry voice, facsimile or VBD. Such signals are intended to inform listeners about network status or to convey information to network terminal equipment. Dial tone and busy signal are examples of audible network signaling.
“Network Signaling” is a general term for the collection of protocols and procedures used for communication of control signals within a telecommunications network. There are two main classes of network signaling: channel associated signaling (CAS) and common channel signaling (CCS). CAS encompasses protocols and procedures where the signaling is passed over the same channel as is used to carry the service user's traffic. CCS encompasses protocols and procedures where the signaling and the service user's traffic do not share the same communications channel.
Dual-Tone Multi-Frequency (DTMF) signals represent the “dialed digits” of a phone number. DTMF signals are also used in some network signaling protocols to convey the calling number and called number to network terminal equipment. A typical example of the type of digital signal processing techniques that can be used for DTMF detection and classification can be found in U.S. Pat. No. 5,353,346.
End user enterprises have a need for placing restrictions on specific types of telecommunications service usage. For example, restrictions on the use of modems are needed to minimize the threat that unauthorized modems represent to computer security. Anyone using modems to dial in to a computer can gain relatively unfettered access to computer networks if the computer is connected to the network. The problem is that conventional data security measures, such as Internet firewalls, are bypassed by modems. A “hacker”, i.e., any person seeking covert access to the computer network, will immediately resort to searching for modems once an Internet firewall is encountered.
Hackers are also aware that certain modems can be made to generate a “flash-hook” to the organization's private branch exchange (PBX). PBXs are essentially telephone network switches located at the customer's premises. Since about 1980 they have become commonplace in enterprises of more than about 50 people. This opens the door for the hacker to then dial another call (e.g. an overseas call), which originates from the enterprise, and as such is billed to the enterprise. A second example of the need for restricting telephone service usage is long-distance calling over fax machines. Without restrictions, employees can pick up the handset on the fax machine to originate unauthorized long distance calls. Finally, in some circumstances there is a need to restrict the number of lines occupied by VBD calls at a given time. This is useful for organizations such as universities, who face the risk of having their telecommunications facilities entirely consumed by VBD calls. People on campus can be stranded without the ability to call out even if there is an emergency.
Enterprises have a need for selecting from among a number of telecommunications service offerings based on the nature of the intended service usage. The telecommunications service offerings available to an enterprise may differ in terms of reliability, transmission delay, usage cost or other factors. The suitability of each such service offering depends on the nature of the intended usage. For example, interactive voice communication is noticeably degraded by transmission delays of as little as a few hundred milliseconds, whereas similar delays have no noticeable effect on facsimile or VBD. It is thus advantageous to use knowledge of the properties of the communications traffic in selection of the most suitable telecommunications service offering.
A device called the Faxcom device was described by Randall A. Law, Terrence W. Holm and Neil B. Cox in an article entitled “Real-Time Multi-Channel Monitoring of Communications on a T1 Span”; published in the Proceedings of the 1991 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing at pages 306 to 309, and is incorporated herein by reference. This FaxCom device was deployed by telecommunications service providers across Canada in 1990 to support a reduced-rate facsimile-and-VBD-only service called FaxCom. The FaxCom device imposes a voice message and terminates the call when voice is detected. The FaxCom device has been demonstrated and sold to various international telecommunications service providers since 1990, and it has been offered as a vehicle for implementing class-based billing, where customers are billed differently based on whether their calls are voice, facsimile or voice-band-data. The present invention differs in that it terminates the call or otherwise blocks communication when “illegal” traffic is detected, where “illegal” may be Voice, Facsimile, VBD or any combination thereof. The Faxcom device is ineffective for modem blocking. Moreover, the Faxcom device is used by telecommunications service providers whereas the present invention is intended for telecommunications service users.
Co-pending U.S. patent application Ser. No. 08/848431, filed May 8, 1997 by a common inventor is herein incorporated by reference. This Patent Application describes embodiments for use by telecommunications service providers for control of certain types of telecommunications signaling fraud, and for policing of specialized service offerings. The present invention differs in that it empowers users of telecommunications services to detect and mitigate patterns of service utilization that are deemed to be undesirable. Components for classifying telephone signals are disclosed in other patents such as U.S. Pat. Nos. 5,539,804, 4,809,272, 4,815,137, 4,815,136 and 4,720,862. However, none disclose comparable combination of signal property measurement and service use control.
Therefore, there is a need for a system and method to actively measure the properties of telecommunications traffic for the purpose of managing policies on the selection and usage of telecommunications services within an enterprise. Specifically, there is a need for separate service access policies for Voice, Facsimile and Modems, and for actively performing the necessary monitoring and policing to ensure compliance with these policies. “Not-Modem” lines are needed to block usage of unauthorized modems, thereby mitigating the associated threat to computer security. “Modem-only” lines are needed to reduce the threat of

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Apparatus and method for management of policies on the usage... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Apparatus and method for management of policies on the usage..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Apparatus and method for management of policies on the usage... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3088471

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.