Call security system

Telecommunications – Radiotelephone system – Security or fraud prevention

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C455S405000

Reexamination Certificate

active

07747243

ABSTRACT:
A method and apparatus for reducing the vulnerability of the telecommunications system to unauthorized use that is easy to implement and that can reduce the instances of unauthorized access even during periods when telecommunications personnel are not able to give attention to the traffic on the system. The telecommunications system collects statistics of each user's pattern of telecommunications usage. Typically, these statistics will be in the form of, say, the average number of calls per day or the average number of calls per day on given days of the week. It may also include the mean busy hour for the given days of the week. Moreover, daily averages may be taken not only for all calls but also for all calls of a particular type, e.g., of all international calls. These statistics are taken for a reference period, such as the preceding thirty days, and the corresponding quantity for the current day is also computed. If the current statistics are not excessive as compared with the reference statistics, then access to a communications resource—e.g., an outgoing trunk line—is granted to the call without any supplemental access restrictions. But if a predetermined deviation is detected between the current statistics and the reference statistics, then a supplemental restriction is placed upon the call.

REFERENCES:
patent: 4071698 (1978-01-01), Barger
patent: 4182934 (1980-01-01), Keys et al.
patent: 4463348 (1984-07-01), Sidebottom
patent: 4481384 (1984-11-01), Mattews
patent: 4534056 (1985-08-01), Feilchenfeld et al.
patent: 4792968 (1988-12-01), Katz
patent: 4799255 (1989-01-01), Billinger et al.
patent: 4827744 (1989-05-01), Namazue et al.
patent: 4829554 (1989-05-01), Barnes
patent: 4876717 (1989-10-01), Barron
patent: 4893330 (1990-01-01), Franco
patent: 4893335 (1990-01-01), Fuller
patent: 4896346 (1990-01-01), Belfield et al.
patent: 4908850 (1990-03-01), Masson
patent: 4935956 (1990-06-01), Hellwarth et al.
patent: 4953198 (1990-08-01), Daly et al.
patent: 4955049 (1990-09-01), Ghisler
patent: 4958368 (1990-09-01), Parker
patent: 5018190 (1991-05-01), Walker et al.
patent: 5091942 (1992-02-01), Dent
patent: 5109408 (1992-04-01), Greenspan et al.
patent: 5125022 (1992-06-01), Hunt et al.
patent: 5127043 (1992-06-01), Hunt et al.
patent: 5144649 (1992-09-01), Zicker et al.
patent: 5163086 (1992-11-01), Ahearn
patent: 5168517 (1992-12-01), Waldman
patent: 5220593 (1993-06-01), Zicker
patent: 5237612 (1993-08-01), Raith
patent: 5309501 (1994-05-01), Kozik
patent: 5335265 (1994-08-01), Cooper et al.
patent: 5335278 (1994-08-01), Matchett
patent: 5345595 (1994-09-01), Johnson et al.
patent: 5351290 (1994-09-01), Abdolreza
patent: 5375244 (1994-12-01), McNair
patent: 5392335 (1995-02-01), Reeder
patent: 5392357 (1995-02-01), Bulfer
patent: 5504810 (1996-04-01), McNair
patent: 5514862 (1996-05-01), Salzano
patent: 5517555 (1996-05-01), Amadon
patent: 5517567 (1996-05-01), Epstein
patent: 5539816 (1996-07-01), Pinard
patent: 5544225 (1996-08-01), Kennedy
patent: 5566234 (1996-10-01), Reed
patent: 5596632 (1997-01-01), Curtis
patent: 5598459 (1997-01-01), Haartsen
patent: 5602906 (1997-02-01), Phelps
patent: 5615253 (1997-03-01), Kocan
patent: 5615408 (1997-03-01), Johnson
patent: 5617470 (1997-04-01), Depasquale
patent: 5623539 (1997-04-01), Bassenyemukasa
patent: 5627886 (1997-05-01), Bowman
patent: 5655004 (1997-08-01), Holbrook
patent: 5673309 (1997-09-01), Woynoski
patent: 5719926 (1998-02-01), Hill
patent: 5757896 (1998-05-01), Akhteruzzaman
patent: 5758277 (1998-05-01), Hawkes
patent: 5771455 (1998-06-01), Kennedy
patent: 5805686 (1998-09-01), Moller
patent: 5809125 (1998-09-01), Gammino
patent: 5812650 (1998-09-01), Gammino
patent: 5812955 (1998-09-01), Dent
patent: 5826195 (1998-10-01), Westerlage
patent: 5839063 (1998-11-01), Randolph
patent: 5852811 (1998-12-01), Atkins
patent: 5905949 (1999-05-01), Hawkes
patent: 5924025 (1999-07-01), Kaplan
patent: 5940751 (1999-08-01), Kaplan
patent: 5953398 (1999-09-01), Hill
patent: 5956634 (1999-09-01), Otterson
patent: 5956635 (1999-09-01), Hoogerwerf
patent: 5966650 (1999-10-01), Hobson
patent: 5970129 (1999-10-01), Asfar
patent: 5991617 (1999-11-01), Powell
patent: 6026293 (2000-02-01), Osborn
patent: 6038555 (2000-03-01), Field
patent: 6058301 (2000-05-01), Daniels
patent: 6064972 (2000-05-01), Jankowitz
patent: 6067535 (2000-05-01), Hobson
patent: 6072863 (2000-06-01), Potter
patent: 6078807 (2000-06-01), Dunn
patent: 6094573 (2000-07-01), Heinonen
patent: 6104795 (2000-08-01), Akhteruzzaman
patent: 6104803 (2000-08-01), Weser
patent: 6141404 (2000-10-01), Westerlage
patent: 6185415 (2001-02-01), Boatwright
patent: 6185416 (2001-02-01), Rudokas
patent: 6188753 (2001-02-01), Afsar
patent: 6330546 (2001-12-01), Gopinathan
patent: 6505039 (2003-01-01), Boatwright
patent: 6526389 (2003-02-01), Murad
patent: 6947532 (2005-09-01), Marchand et al.
patent: 4-20055 (1992-01-01), None
Subscriber Computing, Inc. news release entitled “Subscriber Computing, Inc. Unveils Advanced Version of FraudWatch.TM.”, Mar. 1, 1993, Irvine, Calif., 3 pages, no author given.
Cellular Technical Services Company (CTS) product literature on the Clonerwatch.TM. product, no author, relevant pages, date or place of publication given.
EDS Personal Communications Corp. News Release, “EDS Personal Communications Corporation Announces Comprehensive Fraud Solutions and Capabilities”, Mar. 2, 1993, Waltham, Mass., 3 pages, no author given.
EDS Personal Communications Corp., News Release entitled, “EDS Personal Communications Corporation Tackles Fraud with New ‘Strategic Partnership’ Plan.” Waltham, Mass., 4 pages, no author or date of publication given.
“Telemate Fraud Software Ready”, Jul. 13, 1992. Communications Week p. 24.
“Hacon System Self-Activates Computer Fraud & Security Bulletin”, Nov. 1992, Elsevier Advanced Technology Publications.
Lewyn, Mark: “Phone Sleuths Are Cutting Off The Hackers . . . ”, Jul. 13, 1992, Business Week.
An article with the byline Jennifer Lieffers from Lexis-Nexis vol. 3; No. 21; sec 1; p. 26 Mar. 16, 1987.
“Telemate Fraud Software Reads” Jul. 13, 1992 from Lexis-Nexis.
“EMATE with Fraud Fighter” Telemate Product Literature four pages, undated. From IDS filed Jun. 28, 1995 in U.S. Appl. No. 08/367,972.
“Virtual Networks: Past, Present and Future” Brosemer et al. IEEE Communications Magazine, Mar. 1992 pp. 80-85.
Harter, Curt, “How to prevent Wily Hackers From Plundering Your Phones”, Communications News, Jan. 1992.
“A Recording and Processing System for Accounting and Traffic Analysis on a Large PBX”, IEEE Transaction on Communication Technology. 1971.
Analysis of Network Statistics, Conference in High Energy Physics. 1987.
Application Monitors Telecom Systems for Fraud, Computer World. 1992.
“Land Mobile Voice Privacy Communications”, 30th IEEE Vehicular Technology Conference. 1980.
“Maintenance Strategies for PCM Circuit Switching”, Proceedings of the IEEE. 1997.
“New for Telecom—Moscom fights PBX fraud—VoiceLock Prevents Hacker Access to PBX systems—Product Announcement”. NewsBytes News Network. 1991.
“New Game in Town—There's No Such Thing as a Fee Phone Call”. IEEE. 1990.
“New Product Helps Detect Toll-Fraud—Toll Fraud Monitoring Service form Account-A-Call Corp”. NewsBytes News Network. 1991.
“Guard Your PBX—Security of Telephone Systems,” Communications News. 1990.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Call security system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Call security system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Call security system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4177099

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.