WO1999005842A1 - Appareil de securite pour ligne telephonique et procede visant a proteger une ligne telephonique - Google Patents

Appareil de securite pour ligne telephonique et procede visant a proteger une ligne telephonique Download PDF

Info

Publication number
WO1999005842A1
WO1999005842A1 PCT/AU1998/000595 AU9800595W WO9905842A1 WO 1999005842 A1 WO1999005842 A1 WO 1999005842A1 AU 9800595 W AU9800595 W AU 9800595W WO 9905842 A1 WO9905842 A1 WO 9905842A1
Authority
WO
WIPO (PCT)
Prior art keywords
telephone
call
security apparatus
telephone line
security
Prior art date
Application number
PCT/AU1998/000595
Other languages
English (en)
Inventor
John Rounsevell
Original Assignee
Jw & Ll Enterprises Pty. Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jw & Ll Enterprises Pty. Ltd. filed Critical Jw & Ll Enterprises Pty. Ltd.
Priority to GB0001599A priority Critical patent/GB2343087B/en
Priority to AU84271/98A priority patent/AU766464B2/en
Publication of WO1999005842A1 publication Critical patent/WO1999005842A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/88Provision for limiting connection, or expenditure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/673Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/677Preventing the dialling or sending of predetermined telephone numbers or selected types of telephone numbers, e.g. long distance numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/28Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP with meter at substation or with calculation of charges at terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/01Details of billing arrangements
    • H04M2215/0116Provision for limiting expenditure, e.g. limit on call expenses or account

Definitions

  • the present invention relates to a security apparatus for a telephone line and a method for securing a telephone line.
  • Some telecommunications carriers offer an electronic lock for telephones whereby a first PIN is entered to disable the telephone and a second PIN is entered to enable the telephone. Whilst this electronic lock provides some protection, it is inflexible in that the telephone is either disabled or fully enabled, whereas most parents want to provide their children with limited access to the telephone. Further, when the telephone is enabled there is no restriction on the type of call, such as international, long-distance or local calls, that can be placed using the telephone.
  • Australian patent specification AU-A 44438/96 describes a multi-user telephone arrangement which provides for multiple users to use a single telephone.
  • the specification describes the telephone exchange including an exchange processor which is used to identify each user via a user ID and PIN and to bill each telephone call to the corresponding user ID. Whilst this system is useful in situations such as university student houses, it requires the presence of special equipment at the telephone exchange and for each user to have an account with the telecommunications carrier.
  • Australian patent specification AU-B 38513/93 describes a telephone sub-set including a processor and a memory in which a credit limit is entered by the proprietor into the memory. The telephone may then be used until such time as the credit is used.
  • the telephone sub-set described in specification AU-B 38513/93 does not provide for any form of restriction to be placed on the type of call.
  • a security apparatus for a telephone line comprising:
  • switching means for connection in-line with said telephone line between a telephone exchange and at least one telephone, facsimile machine or the like;
  • processor means and associated memory said memory storing for each of a plurality of users a security code and access privileges for each of a plurality of outgoing call types;
  • said processor means including decoder means responsive to dial signals on the telephone line from the at least one telephone, said processor means determining therefrom the call type of an outgoing call;
  • said processor means arranged to control the switching means to reset the telephone line if an incorrect security code is entered or if a user has insufficient access privilege for the call type of the outgoing call.
  • said memory also stores at least one priority number, said processor means being arranged to allow outgoing calls to any of said priority numbers irrespective of said access privileges.
  • the processor means is arranged to allow outgoing calls to any of said priority numbers without requiring a security code to be entered.
  • said processor means determines the call type by analysing the dialled number.
  • said call types include at least two from the following list: local, long distance, international, mobile, premium.
  • the switching means is arranged such that in the event of a power failure to said security apparatus, said switching means is closed to permit outgoing and incoming calls.
  • said access privileges for each call type include at least one of: maximum number of calls per predetermined time interval; maximum length of each call; and time of day calls may be made.
  • said processor is arranged to provide a warning indication prior to the maximum length of call being reached.
  • said memory also stores at least one barred number, said processor means being arranged to prevent outgoing calls to any of said barred numbers irrespective of said access privileges.
  • the processing means is responsive to said telephone line to receive security codes therefrom via a telephone or other device connected to said telephone line.
  • the processor means controls the switching means to disconnect the telephone line when receiving a security code from said telephone, facsimile or the like.
  • the security apparatus further comprises a power supply to which the telephone, facsimile or the like are connected when the switching means disconnects the telephone line.
  • said access privileges can be edited by a master user upon entry of a master security code.
  • one of said priority numbers is fixed.
  • the security apparatus includes a key pad in communication with the processor means on which the security codes may be entered.
  • the security apparatus is provided integral with a telephone or facsimile machine, said key pad being the telephone or facsimile machine's key pad.
  • a method for securing a telephone line comprising the steps of:
  • FIG. 1 is a block diagram of the security apparatus according to the preferred embodiment of the invention.
  • Figure 2 is a block diagram of the processor and associated hardware of the security apparatus shown in figure 1 ;
  • Figure 3 shows the housing of the security apparatus in figure 1 ;
  • Figure 4 is a flowchart of the main routine controlling operation of the processor
  • Figure 5 is a flowchart of the parameter definition routine
  • Figure 6 is a flowchart of the print routine
  • Figure 7 is a flowchart of the look routine
  • Figure 8 is a flowchart of the incoming call routine.
  • the embodiment is directed toward a security apparatus which is provided as a unit separate from a telephone handset, facsimile machine or the like. It should be appreciated however that the invention is equally applicable to security apparatus which are incorporated into a telephone handset or facsimile machine.
  • the embodiment provides for a security apparatus 10 for a telephone line 12 extending between a telephone exchange 14 and a telephone handset 16.
  • the security apparatus 10 comprises a relay 18 provided in the telephone line 12 intermediate the telephone exchange 14 and the telephone handset 16, an LCD 20 (liquid crystal display), a battery backup and telephone line power supply 21 , a meter pulse detector circuit 22, a real time clock 23, a DTMF (dual tone multiple frequency) and CND (calling number display) decoder circuit 24, a key pad 26, a voice playback circuit 27, a flash memory 28 and a program memory 29, each of which is interfaced to a processor 30.
  • the processor 30 used in the embodiment is the MC68HC11K1 micro-controller manufactured by Motorola, although it should be appreciated that other processors may be utilised.
  • the processor 30 controls operation of the relay 18 via a relay interface circuit 19.
  • the relay 18 is arranged such that the telephone line 12 is connected to the normally-closed contacts of the relay 18. Consequently, in the event of a power failure to the security apparatus 10 the telephone handset 16 is still operable.
  • the telephone line power supply 21 is connected to the normally-open contacts of the relay 18.
  • the meter pulse detector circuit 22 is connected to the telephone line 12 and is arranged to indicate to the processor 30 when a telephone call placed using the telephone handset 16 is picked up by the recipient. This information is used by the processor 30 to log to the length of the telephone call and to monitor the length of the telephone call.
  • the meter pulse detection circuit 22 includes a circuit to detect each of these forms of indication. Which of these circuits is connected to the processor 30 is controlled via a jumper switch (not shown). It should be appreciated that if it is known the telephone line 12 utilises only one form of indication, the meter pulse detection circuit 22 may comprise only one of the three circuits. Additionally, other circuits may be provided if alternative methods are used by the carrier provider.
  • the real time clock 23 provides date and time information to the micro-processor 30 which is used to record the date and time that telephone calls are made. In the embodiment, the real time clock 23 used is a 68HC68T1 CMOS serial real time clock manufactured by Motorola.
  • the DTMF and CND decoder circuit 24 is connected to the telephone line 12 and provides the processor 30 with information corresponding to DTMF or CND signals appearing on the telephone line 12.
  • the dual tone multiple frequency receiver integrated circuit MC145436 manufactured by Motorola was utilised to provide DTMF signal decoding, such as those produced by a tone dial telephone handset.
  • Decoded DTMF information received from the DTMF and CND decoder circuit 24 is used by the processor 30 to allow security codes to be entered from the telephone handset 16 and to monitor telephone numbers dialled from the telephone handset 16.
  • the DTMF and CND decoder circuit 24 also utilises a CML FX602 calling number display integrated circuit which communicates the telephone number of incoming calls to the microprocessor 30 for display on the LCD 20.
  • the key pad 26 includes numeric keys 32 and function keys 34.
  • the key pad 26 is used to control operation of the security apparatus 10 and can also be used to enter security codes.
  • the security apparatus 10 further comprises a communications port 36, a serial printer 38, a battery level indicator 39, a tamper switch 40, a telephone line status circuit 42 and a touch key input 44, each of which is interfaced to the processor 30.
  • the serial printer 38 is connected to the processor 30 via the communications port 36 which provides an RS-232 interface.
  • the security apparatus 10 can be connected to a computer using the communications port 36.
  • the battery level indicator 39 comprises a voltage divider circuit which provides an indication of the current battery voltage to the micro-processor 30.
  • the output of the battery level indicator 39 is input to an analogue-to-digital input of the processor 30.
  • the processor 30 flashes a warning message on the LCD 20 that the battery level is low.
  • the telephone line status circuit 42 is arranged to provide information to the processor 30 regarding whether the telephone handset 16 is on-hook or off-hook, and also to provide an alarm indication if the security apparatus 10 is disconnected from the telephone line 12.
  • the touch key input 44 consists of a touch probe mounted on the exterior of the security apparatus 10.
  • the touch probe is designed to read touch buttons, which are similar to the DS2401 serial number integrated circuit by Dallas semi- conductor. Touch buttons are typically provided in a can package, which is similar in appearance to a button battery.
  • the touch key input 44 is provided for high security applications, where in addition to a security code the user will also be required to press a touch button to the touch key input in order to gain access to the telephone line.
  • the security apparatus 10 further comprises gate arrayed logic 47a and a selector circuit 47b to provide the necessary logic for addressing the flash memory 28, the EPROM memory 29 and the LCD 20.
  • the security apparatus 10 further includes a master key switch 48 which is connected to interrupt pin IRQ of the processor 30.
  • the master key switch 48 is used to activate the parameter definition routine, to be described hereinafter.
  • the security apparatus 10 is provided in a housing 50.
  • the tamper switch 40 is arranged such that opening the housing 50 will open the switch 40 and thereby provide indication to the processor 30 that the security apparatus 10 has been tampered with.
  • the processor 30 operates under control of computer software stored in the memory 29.
  • the flash memory 28 also includes, for each user, a security code and access privileges including the maximum number of each call type for local, long distance and premium calls, the maximum length of each type of call and the times of day each type of call can be made.
  • the local call type is reserved for calls which are within the same area as the security apparatus, and accordingly incur a relatively small tariff from the telecommunications provider.
  • the long distance call type is defined as being calls to promote areas within the same country and calls to mobile telephones, which incur a time-based higher charge compared with local calls.
  • the premium call type is reserved for international telephone calls and calls to high-tariff pay by the minute services. It should be appreciated that the number of call types and their definition may be varied in other embodiments.
  • user 1 has unlimited access privileges, whilst user 2 and user 3 have restrictions on their access privileges.
  • User 2 is limited to 60 local calls, 10 long distance calls, and three premium calls per pre-determined time period.
  • the pre-determined time period is definable by the master user and may be one week or one month, for example.
  • user 2 and user 3 have call length limitations on each type of telephone call. Finally, user 2 and user 3 have restrictions regarding during what time of the day local and long distance telephone calls may be made.
  • the flash memory 28 also includes up to three priority numbers and up to three barred numbers. Examples of priority numbers and barred numbers are set out in table 2 below.
  • FIG. 4 shows the main program routine executed by the processor 30.
  • program initialisation is performed.
  • the LCD 20 is updated with the current date and time from the real time clock 23.
  • a call has been initiated is determined according to information received from the DTMF decoder circuit 24. If a call has not been initiated, program control returns to 52. If a call has been initiated, the dialled number is compared with the priority numbers at 56. If the dialled number matches any one of the priority numbers, the call is permitted and the end of the call is awaited at 58. When the call has ended program control returns to 52.
  • the relay 18 is switched to the normally-open position at 59. This is done so that the security code is not interpreted by the telephone exchange 14 as being part of the telephone number. Since modern telephones rely on power from the telephone line 12 for their power source, the normally-open contacts of the relay 18 are connected to a telephone line power supply 21 , such that the telephone 16 can continue operation.
  • the dialled number is checked at 60 to determine if the dialled number commenced with ' * * ', which is used to indicate that a security code follows. If the dialled number does not commence with ' * * ', the telephone line is reset at 62 by opening and closing the relay 18, thereby terminating any call. Program control then returns to 52.
  • any further dialled numbers are then compared with the security codes. If the dialled number does not correspond with a security code, a pre-recorded voice message is played to the user via the voice IC 27. The voice IC 27 plays the message onto the telephone line 12 connected to the telephone. Three attempts are allowed at entering a security code. If a valid security code is not entered in the three attempts, the telephone line is re-set at 62 and program control then returns to 52. To prevent continual attempts to guess a security code, if three incorrect security codes are entered consecutively, the security apparatus 10 will not allow further attempts at entering security codes for a period of one minute. During this time, calls to priority numbers may still be made.
  • the relay 18 is switched to the normally-closed position at 64 so that the call can proceed.
  • the commencement of dialling the number is awaited at 66.
  • a check is performed to determine whether the call has dropped-out because of delays in dialling the number. If the call has dropped out, the telephone line is reset at 62 and control returns to 52, otherwise the call is again awaited at 66.
  • the dialled number is categorised into one of the call types, namely local, long distance or premium.
  • the categorisation can be performed in a number of ways, such as by comparison of the length of the dialled number and by comparison of the first several digits of the telephone number. For example, in Australia, if the number begins with 0055, 0011 or 0015, the call type is premium, and if the number begins with 08, 02, 03, etc the call type is long distance.
  • the dialled number is displayed on the LCD 20.
  • a check of whether the user has reached their maximum number of calls is made at 70. If the user has already made their maximum number of calls of this call type, the telephone line is reset at 62, thereby disconnecting the call. Program control then returns to 52. If the user has not reached their maximum number of calls, a check is then made at 71 as to whether the user is permitted to make the call type at the time of day. If the call is being made outside of the allowable times, the telephone line is reset at 62 thereby disconnecting the call and program control is then returned to 52.
  • the dialled number is compared with the barred numbers. If the dialled number matches with any one of the barred numbers, the telephone line is reset at 62, thereby disconnecting the call and program control is returned to 52.
  • the commencement of the call is logged.
  • a check is made of whether the length of the call has exceeded the length of call permitted for the user for the call type or the user has terminated the call.
  • the elapsed call time is displayed at 74.
  • a comparison is then made at 75 as to whether the elapsed length of call is less than 45 seconds from the maximum allowable call length for this type of call. If the call length is not within 45 seconds, program control returns to 73, otherwise a warning message is displayed on the LCD 20 and played to the user via the voice playback circuit 27 at 76 to provide an indication to the user of impending disconnection of the call. Program control then also returns to 73.
  • the logged call data for that call is completed and stored at 77.
  • the user's number of calls is updated to reflect the call.
  • a check is performed as to whether the user indicated they wish to make a follow-on call.
  • the user can provide such an indication by pressing the "#" key during a call. If the user indicated they wish to make a follow-on call, the telephone line is reset at 78a and program control returns to 64. The user can then dial a further call without having to re-enter their security code. If the user did not provide an indication that they wish to make a follow-on call, the telephone call is reset at 62 and program control returns to 52.
  • the user security codes, user access privileges, priority numbers and barred numbers are programmable by use of a master key.
  • the master key is a physical key which is required to activate the master key switch 48.
  • the processor 30 executes the parameter definition routine shown in figure 5.
  • the parameter definition routine consists of four sub-routines, an accounts sub-routine 80, a clock sub-routine 82, a priority number sub-routine 84 and a barred number sub-routine 86.
  • the parameter definition routine also includes an exit function 88. While the parameter definition routine is executing, the security apparatus 10 does not perform any line control on the telephone line 12. This allows the telecommunications carrier to perform diagnostic checks without interference from the apparatus 10.
  • the accounts sub-routine 80 requests a user number at 90 and a security code for that user at 92.
  • the maximum number of calls for that user for local, long distance and premium call types are requested at 94, 96 and 98 respectively.
  • the maximum length of local calls, long distance calls and premium calls are then requested for that user at 100, 102 and 104, respectively.
  • the allowable times during which local calls, long distance and premium calls can be made are requested at 106, 108 and 110 respectively.
  • the user is then queried at 112 whether they wish to proceed to the clock sub-routine 82 or to the exit function 88.
  • the clock sub-routine 82 is used to set the date and time of the real time clock 23.
  • the day number and month number are entered.
  • the year number is entered at 116.
  • the time in hours and minutes is entered at 118 and finally the day of the week from 1-7 is entered at 120.
  • the user is prompted whether to proceed to the priority numbers sub-routine 84 or to the exit function 88.
  • the priority numbers sub-routine 84 prompts the user to enter up to three priority numbers at 124, 126 and 128, respectively.
  • the user is prompted whether to proceed to the barred number sub-routine 86 or to the exit function 88.
  • the first priority number is not programmable.
  • the first priority number will be defined in such embodiments to be the emergency number for the particular country where the unit is sold, for example 000 for Australia and 911 for the USA.
  • the barred number sub-routine 86 prompts the user to enter up to three barred numbers at 132, 134 and 136 respectively.
  • the '*' key is pressed as one of the digits of the barred number, it is treated as any digit. That is, the '*' is treated as a wildcard.
  • the function keys 34 include a "next" key, a "back” key and a "back space” key.
  • the function keys 34 also include a "print" key which causes the processor 30 to execute the print routine shown in figure 6.
  • the print routine consists of initialisation at 138 whereupon the user is requested to enter the security code of the master user at 140, in order to prevent unauthorised access to the print routine. The user can then select between whether the data is to be formatted for printing or whether it is to be sent to a computer connected to the communications port 36.
  • the logged data for each user is sent to the communications port 36 at 144, following which the print routine is exited at 146 and program control returns to 52.
  • the user selected the data is to be formatted for transmission to a printer connected to the communications port 36 at 148, the user is prompted to enter a user number at 150 for which the data is to be printed, and the date range between which data is to be printed at 152.
  • the data is then transmitted to the communications port 36 at 154, following which the print routine exists at 146 and program control returns to 52.
  • the function keys 34 also include a "look" key by means of which a user is able to view their account details. Pressing the "look" function key 34 causes the processor 30 to execute the look routine 156 in shown in figure 7.
  • the look routine commences with a prompt to enter a security code at 157 or view a log of calling number display (CND) messages at 158.
  • CND calling number display
  • the security code is checked at 159. If an incorrect security code is entered, the look routine 156 terminates at 160 and control is returned to 52.
  • the user can view the remaining number of calls they may make for each of local, long distance and premium call types at 161 , 162 and 163, respectively; the maximum length of call for local calls, long distance calls and premium calls at 164, 165 and 166, respectively; and the times during which they made local calls, long distance calls and premium calls at 167,
  • the user elects to view the CND message log, their most recent CND message is displayed at 158. The user is then prompted at 170 whether they wish to delete or retain this message. If the user elects to retain the message, the next message is retrieved at 172. If the attempt to retrieve the next message indicates that the previous message was the final message, premium control forwards to 160. Otherwise, the next message is displayed at 158, and the user again prompted whether they wish to delete the message at 170. If the .use wishes to delete the message, the message is erased at 174, whereupon a comparison is made as to whether the deleted message was the last CND message. If not, program control is forwarded to 172 to obtain the next message, otherwise the look routine terminates at 160.
  • the processor 30 executes the calling number display routine 180 shown in figure 8. If available, the calling number is displayed on the LCD 20 at 182. The elapsed time of the incoming call is also displayed on the LCD 20 at 184. At 186, a check is made as to whether the incoming call has terminated. If the call has not terminated, the program returns to 184 and updates the duration of the call. Otherwise, the calling number display routine 180 terminates at 188 and program control returns to 52.
  • the security apparatus 10 further includes status LEDs 190,192 and 194.
  • the status LED 190 is used to indicate mains power to the security apparatus 10.
  • the status LED 192 is used to indicate that the security apparatus 10 is operating on battery power.
  • the status LED 194 is used to indicate if the security apparatus 10 has been disconnected from the telephone line 12.
  • the security apparatus 10 also monitors the telephone line 12 for calls that are made which by-pass the security apparatus 10. If information received from the DTMF decoder circuit 24 indicates that a telephone call is being made and the security apparatus 10 attempts to terminate the call by resetting the telephone line because of insufficient authorisation or an incorrect security code and the meter pulse detector circuit 22 continues to receive metered pulses, the security apparatus 10 logs the call as a call made by the user "by-pass". These calls will appear on the log printed using the print routine shown in figure 6. Call by- passing would occur if a telephone was connected between the telephone exchange 14 and the relay 18.
  • the relay 18 When resetting the telephone line 12, the relay 18 is caused to open for two seconds, which is sufficient for the exchange 14 to terminate the call.
  • the security apparatus 10 will terminate all outgoing calls for one minute, unless the calls are to one of the priority numbers.
  • the function keys 34 also include a "change PIN" function key by means of which a user is able to change their security code.
  • the apparatus 10 assigns the user a new security code randomly from the unused security codes. The new security code is spoken to the user via the voice IC.
  • the master key switch 48 has four settings, "run”, “program”, “reset” and “override”.
  • the "run” setting is the normal operating state of the security apparatus 10.
  • the "program” setting is used to access the parameter definition routine.
  • the "reset” setting is used to momentarily reset the security apparatus 10 in the event of a program halt.
  • the "override” position provides a manual override to the security apparatus 10, whereby the relay 18 will be switched to always closed in respective of the operation of the processor 30.
  • a message that the unit has been tampered with will appear in the LCD 20. The message will remain on the LCD 20 until the unit is reset using the master key.
  • the invention is not limited to the particular embodiment above.
  • the number of users the security apparatus can control, the number of call types and the call types may be varied.
  • the invention can equally be applied to several telephone lines.
  • a telephone number index can be incorporated into the apparatus.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)
  • Alarm Systems (AREA)

Abstract

L'invention porte sur un appareil (10) de sécurité de ligne téléphonique (12), cet appareil comprenant un commutateur destiné à établir une liaison téléphonique entre un central téléphonique (14) et au moins un téléphone (16), un télécopieur ou analogue; un processeur (30) et une mémoire associée (28), la mémoire stockant pour chaque pluralité d'utilisateurs un code de sécurité et des privilèges d'accès pour chaque pluralité de types d'appels sortants, et le processeur analysant les signaux de numérotation sur la ligne téléphonique de façon à déterminer le type d'appel sortant. Le processeur commande également le commutateur pour remettre à l'état initial la ligne téléphonique dans le cas où un code de sécurité incorrect a été introduit ou dans le cas où un utilisateur a un privilège d'accès insuffisant pour le type d'appel sortant.
PCT/AU1998/000595 1997-07-25 1998-07-27 Appareil de securite pour ligne telephonique et procede visant a proteger une ligne telephonique WO1999005842A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
GB0001599A GB2343087B (en) 1997-07-25 1998-07-27 A security apparatus for a telephone line and a method for securing a telephone line
AU84271/98A AU766464B2 (en) 1997-07-25 1998-07-27 A security apparatus for a telephone line and a method for securing a telephone line

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AUPO8244 1997-07-25
AUPO8244A AUPO824497A0 (en) 1997-07-25 1997-07-25 A security apparatus for a telephone line

Publications (1)

Publication Number Publication Date
WO1999005842A1 true WO1999005842A1 (fr) 1999-02-04

Family

ID=3802534

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU1998/000595 WO1999005842A1 (fr) 1997-07-25 1998-07-27 Appareil de securite pour ligne telephonique et procede visant a proteger une ligne telephonique

Country Status (3)

Country Link
AU (1) AUPO824497A0 (fr)
GB (1) GB2343087B (fr)
WO (1) WO1999005842A1 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000070850A1 (fr) * 1999-05-17 2000-11-23 Ipm International Sa Procede et dispositif de detection d'utilisation non autorisee de ligne telephonique
WO2002078300A2 (fr) * 2001-03-28 2002-10-03 Sandsave Marketing 4 (Pty) Limited Dispositif de commande de ligne de telecommunications
FR2824219A1 (fr) * 2001-04-26 2002-10-31 France Telecom Procede pour restreindre l'emission des appels, a travers un reseau telephonique, a partir d'un terminal, terminal, dispositif de filtrage et dispositif de programmation associes
CN1300728C (zh) * 2003-02-20 2007-02-14 华为技术有限公司 分段式计费方法
DE10253374B4 (de) * 2002-11-14 2008-09-11 Blöchl, Bernhard Einwahlsperre für Datenübertragungseinrichtungen

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004107720A1 (fr) * 2003-05-28 2004-12-09 Selvanathan Narainsamy Procede et moyen permettant d'administrer des communications sur une ligne

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5200995A (en) * 1990-12-24 1993-04-06 Gaukel John J Universal outgoing call restriction circuit
AU3851393A (en) * 1992-05-21 1993-11-25 Alcatel Australia Limited Method and apparatus for controlled credit facility in telephone subset
WO1995012266A1 (fr) * 1993-10-28 1995-05-04 Maldes Phoenix Limited Dispositif d'autorisation selective de l'acces aux services telephoniques
WO1996022647A1 (fr) * 1995-01-20 1996-07-25 Thomas Beth Procede et dispositif de saisie fiable de donnees concernant l'utilisation d'un systeme de communication
AU4443896A (en) * 1995-02-20 1996-08-29 Alcatel Australia Limited A multi-user telephone arrangement

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5200995A (en) * 1990-12-24 1993-04-06 Gaukel John J Universal outgoing call restriction circuit
AU3851393A (en) * 1992-05-21 1993-11-25 Alcatel Australia Limited Method and apparatus for controlled credit facility in telephone subset
WO1995012266A1 (fr) * 1993-10-28 1995-05-04 Maldes Phoenix Limited Dispositif d'autorisation selective de l'acces aux services telephoniques
WO1996022647A1 (fr) * 1995-01-20 1996-07-25 Thomas Beth Procede et dispositif de saisie fiable de donnees concernant l'utilisation d'un systeme de communication
AU4443896A (en) * 1995-02-20 1996-08-29 Alcatel Australia Limited A multi-user telephone arrangement

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000070850A1 (fr) * 1999-05-17 2000-11-23 Ipm International Sa Procede et dispositif de detection d'utilisation non autorisee de ligne telephonique
GB2366686A (en) * 1999-05-17 2002-03-13 Ipm Internat Sa Method and device for detecting the unauthorized use of a telephone line
WO2002078300A2 (fr) * 2001-03-28 2002-10-03 Sandsave Marketing 4 (Pty) Limited Dispositif de commande de ligne de telecommunications
WO2002078300A3 (fr) * 2001-03-28 2003-03-13 Edward John Thuynsma Dispositif de commande de ligne de telecommunications
FR2824219A1 (fr) * 2001-04-26 2002-10-31 France Telecom Procede pour restreindre l'emission des appels, a travers un reseau telephonique, a partir d'un terminal, terminal, dispositif de filtrage et dispositif de programmation associes
DE10253374B4 (de) * 2002-11-14 2008-09-11 Blöchl, Bernhard Einwahlsperre für Datenübertragungseinrichtungen
CN1300728C (zh) * 2003-02-20 2007-02-14 华为技术有限公司 分段式计费方法

Also Published As

Publication number Publication date
GB2343087B (en) 2002-09-18
GB2343087A (en) 2000-04-26
AUPO824497A0 (en) 1997-08-21
GB0001599D0 (en) 2000-03-15

Similar Documents

Publication Publication Date Title
US4731818A (en) Self-computing credit card telephone paystation method and system
US5022067A (en) Telephone call security system
US6611583B1 (en) Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access
EP0432866A2 (fr) Unité d'interface de ligne
US5809126A (en) Telephone bar device
CA1288152C (fr) Prevention de l'emploi frauduleux d'un telephone public
US7356135B2 (en) Telephone usage control
US7248680B1 (en) Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access
US5311582A (en) Integrated cocot and regulated paystation telephone system
KR0156175B1 (ko) 전화기의 통화요금 디스플레이장치 및 방법
WO1999005842A1 (fr) Appareil de securite pour ligne telephonique et procede visant a proteger une ligne telephonique
WO1992011725A1 (fr) Terminal de telecommunications
US4314108A (en) Key set toll restrictor
CA1312970C (fr) Methode et appareil de gestion d'intervalle de commutation ouvert dans un publiphone
AU766464B2 (en) A security apparatus for a telephone line and a method for securing a telephone line
US4833707A (en) Telephone lock unit
GB2227906A (en) Telephone call barring system
US4873721A (en) Device for starting charging in a pay phone
JP3453697B2 (ja) 携帯電話機
AU658595B2 (en) A telecommunications terminal
KR100707249B1 (ko) 자동 다이얼링 기능을 가지는 공중 전화기 및 그 방법
JP2528524B2 (ja) 不正ダイヤル防止機能付公衆電話機
WO2005029724A1 (fr) Dispositif de controle de la communication entre un reseau de telecommunications et un equipement d'abonne
WO1995004422A1 (fr) Procede et appareil de limitation de la duree d'un appel telephonique
JPH06276274A (ja) 電話装置

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref country code: GB

Ref document number: 200001599

Kind code of ref document: A

Format of ref document f/p: F

NENP Non-entry into the national phase

Ref country code: KR

WWE Wipo information: entry into national phase

Ref document number: 09485328

Country of ref document: US

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA

WWE Wipo information: entry into national phase

Ref document number: 84271/98

Country of ref document: AU

WWG Wipo information: grant in national office

Ref document number: 84271/98

Country of ref document: AU