The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jul. 04, 2023

Filed:

Dec. 10, 2021
Applicant:

Level 3 Communications, Llc, Broomfield, CO (US);

Inventors:

Adam Uzelac, Rochester, NY (US);

Andrew J. Broadworth, Thornton, CO (US);

Robert P. Slaughter, West Monroe, LA (US);

Assignee:

Level 3 Communications, LLC, Broomfield, CO (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/40 (2022.01); H04M 3/56 (2006.01); H04M 3/42 (2006.01); H04W 12/02 (2009.01); H04L 67/306 (2022.01); H04L 61/5007 (2022.01);
U.S. Cl.
CPC ...
H04L 63/304 (2013.01); H04L 63/10 (2013.01); H04L 63/308 (2013.01); H04L 67/306 (2013.01); H04M 3/42059 (2013.01); H04M 3/56 (2013.01); H04W 12/02 (2013.01); H04L 61/5007 (2022.05); H04L 2463/121 (2013.01);
Abstract

Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.


Find Patent Forward Citations

Loading…