GB2406241A - Controlling communication between a network and subscriber equipment - Google Patents

Controlling communication between a network and subscriber equipment Download PDF

Info

Publication number
GB2406241A
GB2406241A GB0420959A GB0420959A GB2406241A GB 2406241 A GB2406241 A GB 2406241A GB 0420959 A GB0420959 A GB 0420959A GB 0420959 A GB0420959 A GB 0420959A GB 2406241 A GB2406241 A GB 2406241A
Authority
GB
United Kingdom
Prior art keywords
security device
subscriber equipment
blocking
signals
telecommunications
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0420959A
Other versions
GB0420959D0 (en
Inventor
Rory Joseph Donnelly
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB0322180A external-priority patent/GB0322180D0/en
Application filed by Individual filed Critical Individual
Publication of GB0420959D0 publication Critical patent/GB0420959D0/en
Publication of GB2406241A publication Critical patent/GB2406241A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B3/00Line transmission systems
    • H04B3/02Details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2207/00Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
    • H04M2207/20Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place hybrid systems
    • H04M2207/203Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place hybrid systems composed of PSTN and data network, e.g. the Internet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2218Call detail recording
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42221Conversation recording systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The blocking security device includes a filter (104) and means for connecting the filter (104) between the telecommunications network (100) and the subscriber equipment (102) . The filter (104) is capable of blocking the passage of signals within a predetermined frequency range. Selectable by-pass means (106), when selected, allow the passage of signals within the frequency range. The blocking security device can be used to control broadband connection to the Internet and/or other services. The blocking security device can be used within a larger telecoms security monitoring system, whereby a remote monitoring means monitors communications over a communications line and generates a 'de-activation' signal to be sent to blocking security device should internet connections be made to certain disallowed websites.

Description

16794GB 2406241 - 1 -
DEVICE FOR CONTROLLING COMMUNICATION BETWEEN A
TELECOMMUNICATIONS NETWORK AND SUBSCRIBER EQUIPMENT
Field of the invention
The present invention relates to a blocking security device for controlling communication between a telecommunications network and subscriber equipment.
Background of the invention
Telecommunication systems have been developed whereby, on the same line, voice signals can be passed at one frequency while non-voice signals, such as communications to the Internet and other services, are passed at a different frequency. Such a system is referred to as "broadband''.
The owner of subscriber equipment, or the person responsible for paying charges for its use, may wish to control the extent of use. My International patent application PCT/GB03/02351 is directed to a telecommunications security device, in particular to such a security device which enables an authorised person to control the use of telecommunication equipment by others, such as to barr the use of a telephone from making outgoing calls to unauthorized numbers and as an Internet connection limiting device.
There is however a need to provide a blocking security device which enables users to make voice calls from telecommunication equipment but to prevent the use of such equipment for connection to the Internet and other non-voice services. Furthermore, the device needs to be secure and be enabled to be permanently in place with end-user control.
I am aware of Brazilian patent application BR9802614-3A (Bonetti) describes an anti-modem communication filter to be introduced in telephone lines, public and private exchanges, 16794GB - 2 - to ensure the security of digital information against undue access or unexpected attacks to corporate or private computers. It is alleged that the device does not interfere with the voice band and emits a slight signal, indicating that the telephone line is blocked to the traffic of data, ensuring the security of the system.
I am also aware of the following disclosures which concern test equipment for determining the line quality of a telecommunications system.
Firstly, United States patent No. US 6594343 (Duffie) describes a splitter bypass system and method for monitoring, testing and maintaining copper loops and lines.
Switching devices are implemented to bypass a low pass filter and/or a high pass filter in the splitter, thereby actuating bypass functions to bypass a splitter or portions thereof for enabling pure metallic access to the loop, digital equipment, voice equipment, and/or test equipment.
The splitter bypass function can be used with a conventional splitter in the current voice and digital system. The splitter bypass operation includes selecting a copper loop or portions thereof for monitoring, testing and maintenance.
Secondly, United States patent No. US6301337 (Scholtz) describes a telephone handset for testing the transmission quality of a local loop. The telephone handset includes a connector configured to connect to the local loop at, for example, a junction box. A low-pass filter circuit is electrically interposed between the connector and operational circuitry of the telephone handset. In operation, the low-pass filter is designed to pass (substantially undisturbed) electrical signals within the POTS frequency band from the connector to the operational circuitry. In the same way, the low-pass filter is designed to substantially block the passage of electrical signals 16794GB - 3 - above the POTS frequency range. In this way, the low-pass filter blocks the introduction of high frequency signals, which may otherwise generate intermodulation products within the audible range, from reaching the operational circuitry of the testing handset. Also described is a device for detecting the presence of xDSL signals on a local loop. At least one band-pass or high-pass filter is added in parallel with the low-pass filter. The output of the at least one band-pass or high-pass filter is then analysed to determine whether an xDSL signal is present within that frequency band (defined by the at least one band-pass or high-pass filter).
SUMMARY OF THE INVENTION
According to the invention there is provided a blocking security device for controlling communication between a telecommunications network and subscriber equipment, the blocking security device including a filter, means for connecting the filter between the telecommunications network and the subscriber equipment, the filter being capable of blocking the passage of signals within a predetermined frequency range, and selectable by-pass means which, when selected, allows the passage of signals within the predetermined frequency range.
By stating that the filter is capable of blocking the passage of signals within a predetermined frequency range, it is to be understood that the filter does not block the passage of signals outside the predetermined frequency range.
Preferably, the predetermined frequency range is a non-voice band frequency range, such as ADSL and CLI.
The predetermined frequency range may be an open range or a closed range. The predetermined frequency range preferably lies above 3.4 kHz, most preferably above 32 kHz.
16794GB - 4 The filter may be capable of blocking the passage of signals within a predetermined frequency range by attenuating such signals by at least 60 dB. Signals having a frequency outside the predetermined frequency range are attenuated to a significantly lesser extent.
The selectable by-pass means may comprise a switch connected in parallel with the filter. The switch may be manually operable. Alternatively, or additionally, control means are provided for operating the switch in response to disconnect signals received from the telecommunications network. These disconnect signals may be in the form of dUmf or pulse dialling signals, sms signals, signals from a web server or signals from a voice recognition device.
In another embodiment, the control device acts to operate the switch only for pre-set time periods or at certain times of the day.
The means for connecting the filter between the telecommunications network and the subscriber equipment may comprise a first connector for connection to a telecommunications line and a second connector for connection to subscriber equipment, the filter being connected between the first and second connectors.
In a preferred embodiment the subscriber equipment includes the modem of a computer.
The blocking security device may be located within a lockable housing.
The blocking security device may be a stand-alone device or it may be part of a telecommunications security unit capable of blocking connection between subscriber equipment and a telecommunications network, except upon the receipt of 16794GB allowed signal sequences.
In an embodiment of the invention, the blocking security device can be used as part of a system for monitoring the passage of information signals between subscriber equipment and a telecommunications network connected thereto through the blocking security device according to the invention.
The system may usefully include monitoring means receiving lo the information signals, means enabling connection of a remote telecommunications device to the monitoring means to enable the remote telecommunications device to receive the information signals, the remote telecommunications device being located remote from the subscriber equipment and from the monitoring means.
The arrangement may be such that the remote telecommunications device receives the information signals in real time. Additionally or alternatively the monitoring means may include a store, whereby the remote telecommunications device is able to selectively receive a copy of information signals which have historically passed between the subscriber equipment and the telecommunications network.
The information signals will usually be Internet web page names, and/or Internet web pages or fragments thereof.
The remote telecommunications device may be selected from a mobile telephone, a land-line telephone or the modem of computer equipment.
Where the subscriber equipment is a personal computer and the telecommunications network comprises the Internet, the system may further include a store for retaining identification details of Internet web sites identified by 16794GB - 6 - the user as disallowed, a comparator for comparing details of a web site requested by the subscriber equipment, signal generating means for generating a de-activation signal in the event that the requested web site details match details retained in the store. The de-activation signal may be a disconnect signal with means being provided for passing the disconnect signal to the blocking security device to cause Reselection of the by-pass means. Alternatively, the de activation signal is a disconnect signal with means being lo provided for passing the disconnect signal through the blocking security device to the personal computer to disable the ability of the personal computer to be connected to the Internet, e.g. by the use of Windows_ Task Manager or the like. Further alternatively, the de-activation signal is a disablement signal with means being provided for passing the disablement signal through the blocking security device to the personal computer to disable the ability of the personal computer to be connected to the Internet, e.g. by de installing the appropriate software, such as by using Windows_ Add/Remove programs, by modifying a Windows' Start Up list, by restoring a backup or by re-loading an operating system.
The de-activation signal should be generated and have the intended deactivation effect within 1 second from detection of a request for a nonallowed web site.
Such a system could be particularly valuable for a parent to monitor a child's use of the Internet or an employer to monitor an employee's use of the Internet. Herein, the term Manager' is used to indicate such a parent or employer or other person charged with the monitoring process and the term "User" to indicate the child, employee or other person using the subscriber equipment. Such a system has the advantages that (i) the Manager can call in from a remote location to check if the User is on the Internet and be able 16794GB - 7 - to see in real time the images that are being viewed; (ii) the Manager can also view a recording of past received images and (iii) the Manager can trigger the device to cut the Internet connection.
The system may also comprise the following features.
Corruption or manual editing of the personal computer softwares registry entries, and/or disk held data files lo should be detected and the establishment of an Internet connection prevented. If the Internet connection is already established, then it should be dropped as soon as the original valid data ceases to be available.
Restoration of old registry entries or old copies of the disk file (such as by using Windows 4 System Restore, by restoring files from backup, or by down-loading from somebody else's computer via the Internet), should not take the level of protection back to an earlier period. Instead, any new Internet connection should be prevented or any established connection dropped.
It should ideally be possible for the Manager of the system to reinitiate his software and get his system going even in the worst circumstances described above.
The software used for the monitoring system may include features to prevent or reduce the risk of counterfeiting.
The invention will now be further described, purely by way of example, with reference to the accompanying drawings, in which: Figure 1 is a diagrammatic illustration of a blocking security device according to a first embodiment of the invention; 16794GB Figure 2 is a circuit diagram of one embodiment of a filter circuit for use in the blocking security device illustrated in Figure 1; and Figure 3 is a diagrammatic illustration of a blocking security device according to a second embodiment of the invention incorporated with a telecommunications security device.
Referring to Figure 1, there is shown a blocking security device for controlling communication between the line 118 of a telecommunications network 100 and the modem 102 of a computer. A first multi-polar connector 112 connects the blocking security device to modem 102 and a second multi polar connector 116 connects the blocking security device to the telecommunications line 118 via a wall socket 144.
The blocking security device includes a filter circuit 104 connected between the first and second connector 116, 112.
The filter circuit 104 is controlled by a control device 125 which includes a by-pass circuit and, as illustrated, is adapted to receive control signals from the telecommunications line 118. The control device 125 may also be constituted by a mechanical device.
As shown in Figure 2, the filter circuit 104 comprises inductances 120, typically having a value of 3.3 mH each, a condenser 122 having a typical value of lo nF.
The filter circuit 104 is capable of attenuating the passage of signals within a frequency range of above 10 kHz. This predetermined frequency range is a non-voice band frequency range, voice-band frequencies being typically 300 Hz to 3.4 KHz. The filter circuit 104 blocks the passage of signals within the predetermined frequency range by attenuating such signals. Thus, for example, a signal of 100 kHz is 16794GB attenuated by the illustrated circuit by about 60 dB.
Signals having a frequency outside the predetermined frequency range are not significantly attenuated. Thus, for example, a voice-band signal of 3. 2 kHz is attenuated by the illustrated circuit by less than about 6 dB.
A manually operable bi-polar switch 106 is connected in parallel with the filter circuit 104 and constitutes a by pass for the filter circuit 104. Thus, when closed, the lo switch 106 allows the passage of signals through the - blocking security device, whatever their frequency.
The blocking security device is a stand-alone device located within a lockable housing 146.
In the embodiment shown in Figure 3, the blocking security device is part of a telecommunications security unit 10 capable of blocking connection between the modem 15 of a computer and the line 18 of a telecommunications network, except upon the receipt of allowed signal sequences.
Figure 3 shows a unit 10 having a first connector 12 connected to the modem 15 of a computer. A second connector 16, in the form of a plug, co-operates with a wall socket 44 to connect the unit to a telecommunications line 18.
A switch 21 within the unit 10 has closed and open positions. In the closed position a signal pathway 23 within the unit lo between the first connector 12 and the second connector 16 is completed. In the open position the signal pathway 23 is interrupted. The switch 21 is controlled by a control device 25, which is adapted to open the switch 21 when a dialling code applied to the pathway 23 does not match one of the dialling codes stored in a programmable memory 27. The memory 27 may store, for example, ten or twenty authorised dialling codes. The 16794GB - 10 memory 27 also stores at least one authorised pass number.
A comparator 30 is in operative connection with the control device 25 and compares dialling codes applied to pathway 23 from the modem 15 with the allowed stored dialling codes in the memory 27. The control device 25 opens the switch 21 when a dialling code on the pathway 23 does not match one of the stored dialling codes.
lo A programmer 32, adapted to receive pass numbers and programming signals, is connected within the unit 10 to the signal pathway 23. The programmer 32 includes an authorised pass number recognition device 34 for comparing a received; pass number with the authorised pass numbers stored in the memory 27, and allows programming of the memory 27 only when an authorized pass number is received. In this manner, the memory 27 can be programmed by programming signals applied to the signal pathway 23.
A green indicator light 36 operates when the modem 15 connected to the first connector 12 is taken "off-hook''.
A red indicator light 38 is lit when the switch 21 is opened, to indicate that the connection has been broken.
An audible warning device 40 also operates when the switch 21 is opened.
A battery 42 is provided for powering the unit 10 and the control device 25 is adapted to open the switch 21 when the modem 15 is "on-hook", thereby to save battery power.
A clock 28 is provided in operative connection with the control device 25, for determining the date, the time of day and elapsed time.
16794GB The unit 10 is stored in a lockable housing 46, the lock 48 of the housing 46 being key operated. The control device 25 opens the switch 21 when the lockable housing 46 is unlocked. When the key switch 48 on the unit is opened, this defeats all the unit's features, allowing only the clock 28 to continue running.
The unit operates as follows. When operation of the modem is triggered by the computer, the green light 36 is illuminated showing an ''off-hook'' condition. The modem then dials the desired number in the usual way. If the number which is dialled does not match a number stored in the memory 27, the unit opens the switch 21 to disconnect the line. Disconnection is also signalled by a tone from the audible warning device 40 and by illumination of the red light 38 on the unit.
The control device 25 is thus adapted to open the switch 21 when the modem is connected to an Internet service provider and signal sequences on the pathway 23 do not match one of the stored signal sequences. Thus the unit acts as a signal detector for valid modem signals.
The memory 27 stores allowed time data and the control device 25 opens the switch 21 in response thereto at certain times of day or after certain cumulative time periods.
A third connector 49 is provided for connecting the unit 10 to a telephone apparatus 50, the third connector 49 being connected within the unit 10 via a decoder 51 to the programmer 32, so that the memory 27 can be programmed by dUmf tones generated from the apparatus 50. The telephone apparatus 50 thus acts as a configuration input device for the unit. All configuration data is entered as dtmf tones from the telephone apparatus 50. Access to the configurations will be via a pass number, as described 16794GB - 12 below. In this way, the internal clock, the elapsed time, the allowable time-of-day, and the time per week may be set / reset.
A blocking security device 52 is located along the pathway 23, on the line-side of the switch 21. The blocking security device 52 includes a filter circuit and by-pass switch much as illustrated in Figure 2.
The unit can be reprogrammed as follows. Firstly, a non number code such as **** is dialled on the apparatus 50 to trigger the programming mode. To indicate this to the user, the control device 25 applies 2 beeps to the pathway 23 which will be heard by the user on the apparatus 50. The user now enters a pass number e.g. 1234. The recognition device 34 compares this applied pass number with the one or more pass numbers stored in the memory 27. If the pass number matches, programming may continue. To indicate this to the user, the control device 25 again applies 2 beeps to the pathway 23 which will be heard by the user on the apparatus 50. If the pass number is not recognised the unit is shut down. The user may now enter a new authorized number into the memory 27, indicating its position in that memory, and thereby overriding any number previously stored in that position. For example the user may enter 01322 664601#3 and the unit will store the number 01322 664601 in location 3. The unit then shuts down. This programming process can be repeated until all locations of the memory 27 are used.
The switch of the blocking security device 52 can be a manually operated switch or may be controlled by the control device 25, programmed either by signals from the telephone apparatus 50, or from signals applied to the pathway 23 from a remote location via the line 18.
16794GB - 13 The unit may be adapted in such a manner as to allow the user to change the pass number. Also, the unit may be adapted to over- ride the need for a pass number, if for example, the pass number should be forgotten. Thus, for example, if pass number forgotten the user presses an internal reset button, lifts the receiver on the apparatus and keeps holding button for 1 second. When the user next goes into programming mode, any pass number may be entered and this will become a new stored pass number.
The unit 10 can also be programmed remotely by calling up the modem 15 from a remote location, and once the modem answers, then sending programming signals from the remote location to be picked up from the pathway 23.

Claims (13)

16794GB - 14 CLAIMS
1. A blocking security device for controlling communication between a telecommunications network (100) and - subscriber equipment (15, 102), the blocking security device including a filter (104), means for connecting the filter (104) between the telecommunications network (100) and the subscriber equipment (15, 102), the filter (104) being.
capable of blocking the passage of signals within a - predetermined frequency range, and selectable by-pass means (106) which, when selected, allows the passage of signals within said frequency range. 5'
2. A blocking security device according to claim 1, wherein said predetermined frequency range is a non-voice band frequency range.
3. A blocking security device according to claim 1 or 2, wherein said predetermined frequency range lies above 3.4 kHz, preferably above 32 kHz.
4. A blocking security device according to any preceding claim, wherein said selectable by-pass means comprises a switch (106) connected in parallel with said filter (104).
5. A blocking security device according to any preceding claim, located within a lockable housing (146).
6. A blocking security device according to any preceding claim, which is part of a telecommunications security unit (10) capable of blocking connection between subscriber equipment (15, 102) and a telecommunications network (100), except upon the receipt of allowed signal sequences.
16794GB - 15
7. A system for monitoring the passage of information signals between subscriber equipment and a telecommunications network connected thereto through a blocking security device according to any preceding claim, the system further comprising monitoring means receiving the information signals, means enabling connection of a remote telecommunications device to the monitoring means to enable the remote telecommunications device to receive the information signals, the remote telecommunications device being located remote from the subscriber equipment and from the monitoring means.
8. The system according to claim 7, the arrangement being such that the remote telecommunications device receives the information signals in real time.
9. The system according to claim 7 or 8, wherein the monitoring means includes a store, whereby the remote telecommunications device is able to selectively receive a copy of information signals which have historically passed between the subscriber equipment and the telecommunications network.
10. The system according to any one of claims 7 to 9, wherein the information signals are Internet web page names, and/or Internet web pages or fragments thereof.
11. The system according to any one of claims 7 to 10, wherein the subscriber equipment is a personal computer and the telecommunications network comprises the Internet, wherein the system further includes a store for retaining identification details of Internet web sites identified by the user as disallowed, a comparator for comparing details of a web site requested by the subscriber equipment, signal generating means for generating a de-activation signal in the event that the requested web site details match details 16794GB - 16 retained in the store.
12. A blocking security device for controlling communication between a telecommunications network and subscriber equipment substantially as hereinbefore described, with reference to the accompanying drawings.
13. A system for monitoring the passage of information signals between subscriber equipment and a telecommunications network connected thereto through a blocking security device, substantially as hereinbefore described with reference to the accompanying drawings.
GB0420959A 2003-09-22 2004-09-21 Controlling communication between a network and subscriber equipment Withdrawn GB2406241A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0322180A GB0322180D0 (en) 2003-09-22 2003-09-22 Device for controlling communication between a telecommunications network and subscriber equipment
GB0404966A GB0404966D0 (en) 2003-09-22 2004-03-05 Device for controlling communication between a telecommunications network and subscriber equipment

Publications (2)

Publication Number Publication Date
GB0420959D0 GB0420959D0 (en) 2004-10-20
GB2406241A true GB2406241A (en) 2005-03-23

Family

ID=33312373

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0420959A Withdrawn GB2406241A (en) 2003-09-22 2004-09-21 Controlling communication between a network and subscriber equipment

Country Status (2)

Country Link
GB (1) GB2406241A (en)
WO (1) WO2005029724A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007132162A1 (en) * 2006-05-03 2007-11-22 Tyco Electronics Raychem Nv Improvements in xdsl service provision

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BR9802614A (en) * 1998-06-30 2000-03-28 Ricardo Bonetti Anti-modem communication filter.
US6301337B1 (en) * 1997-09-18 2001-10-09 Globespan, Inc. Combined handset and POTS filter
US20030072437A1 (en) * 2001-10-16 2003-04-17 Kiko Frederick J. T1E1.4 compliant filter circuit
US6594343B1 (en) * 2000-10-24 2003-07-15 Turnstone Systems, Inc. Splitter bypass architecture for testing multiple ports
GB2393354A (en) * 2002-09-03 2004-03-24 Paul Alexander Grafton Broadband test voice telephony service maintainer

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6297729B1 (en) * 1999-03-29 2001-10-02 International Business Machines Corporation Method and apparatus for securing communications along ac power lines
GB2376854A (en) * 2001-06-19 2002-12-24 Hewlett Packard Co Centralised security service for ISP environment
KR100424457B1 (en) * 2001-08-29 2004-03-26 삼성전자주식회사 Method for filtering internet protocol packet in customer premise equipment of digital subscriber line

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6301337B1 (en) * 1997-09-18 2001-10-09 Globespan, Inc. Combined handset and POTS filter
BR9802614A (en) * 1998-06-30 2000-03-28 Ricardo Bonetti Anti-modem communication filter.
US6594343B1 (en) * 2000-10-24 2003-07-15 Turnstone Systems, Inc. Splitter bypass architecture for testing multiple ports
US20030072437A1 (en) * 2001-10-16 2003-04-17 Kiko Frederick J. T1E1.4 compliant filter circuit
GB2393354A (en) * 2002-09-03 2004-03-24 Paul Alexander Grafton Broadband test voice telephony service maintainer

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007132162A1 (en) * 2006-05-03 2007-11-22 Tyco Electronics Raychem Nv Improvements in xdsl service provision

Also Published As

Publication number Publication date
WO2005029724A1 (en) 2005-03-31
GB0420959D0 (en) 2004-10-20

Similar Documents

Publication Publication Date Title
US6611583B1 (en) Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access
US5022067A (en) Telephone call security system
US4679226A (en) Computer security guard circuit
US5809125A (en) Method and apparatus for intercepting potentially fraudulent telephone calls
US5799062A (en) Systems and methods for integrating telephone and security devices
US5655004A (en) Method and apparatus for detection of cellular phone fraud
US20030112940A1 (en) Telephony security system
US7248680B1 (en) Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access
EP1415459A4 (en) Telephony security system
US5311582A (en) Integrated cocot and regulated paystation telephone system
CA1288152C (en) Fraud prevention in a public telephone station
WO1994019896A1 (en) Telelphone dialling code processor
US5852653A (en) Communications line security device
US5812650A (en) Method and apparatus for intercepting potentially fraudulent
US5150403A (en) Coin fraud prevention system for coin telephones
CA2309642C (en) Method, apparatus and system for filtering incoming telephone calls
GB2406241A (en) Controlling communication between a network and subscriber equipment
GB2357934A (en) Preventing unauthorised use of a telephone line
US4924512A (en) Method and apparatus for preventing recognition of a telephone dialing signal
JPH0795284A (en) Communications terminal provided with function for detecting and preventing lie branching
WO1999005842A1 (en) A security apparatus for a telephone line and a method for securing a telephone line
GB2227906A (en) Telephone call barring system
FR2577085A1 (en) APPARATUS FOR CONTROLLING THE OPERATION OF A TELEPHONE LINE
CA2270039C (en) Low power dialer
US7409049B2 (en) Network-based securing of added-value services against automated connections

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)