$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Apparatus and method for detecting fraudulent telecommunication activity 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04Q-007/00
출원번호 US-0975512 (1992-11-12)
발명자 / 주소
  • Johnson Eric A. (Longmont CO) Liss Michael D. (Nederland CO) Jensen Flemming B. (Sandy UT)
출원인 / 주소
  • Coral Systems, Inc. (Longmont CO 02)
인용정보 피인용 횟수 : 255  인용 특허 : 0

초록

An apparatus for detecting potentially fraudulent telecommunication activity, comprising a digital computer; interface, operatively connected to the digital computer, for receiving a call information record for each call involving a particular subscriber; comparator operating within the digital comp

대표청구항

An apparatus for detecting potentially fraudulent telecommunication activity, comprising: a digital computer; interface means, operating within said digital computer, for receiving a call information record for each call involving a particular subscriber; pattern means, operating within said digital

이 특허를 인용한 특허 (255)

  1. Martin,Thomas, 3-Way call detection system.
  2. Martin, Thomas J., 3-Way call detection system and method.
  3. Martin, Thomas J., 3-way call detection system and method.
  4. Asfar Hooshmand ; Potnis Shailesh, Administrative monitoring system for calling card fraud prevention.
  5. Blink, Russell, Advanced three way call detection system and method using spread spectrum techniques.
  6. Hodge, Stephen L.; Darring-Collins, Catherine Rose; Marino, Dominick, Alarm control for inmate call monitoring.
  7. van der Made, Peter A. J., Analytical virtual machine.
  8. van der Made,Peter A. J., Analytical virtual machine.
  9. Johnson,Eric A.; Handzel,Mark J., Apparatus and method for credit based management of telecommunication activity.
  10. Johnson,Eric A.; Handzel,Mark J., Apparatus and method for credit based management of telecommunication activity.
  11. Johnson, Eric A.; Handzel, Mark J., Apparatus and method for detecting potentially fradulent telecommunication.
  12. Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint a.
  13. Joao Raymond Anthony ; Bock Robert Richard, Apparatus and method for providing account security.
  14. Paxson Dana W., Authentication and tracking system for a cellular telephone.
  15. Lee David Y., Authentication system and method for preventing wireless communication fraud.
  16. Baulier Gerald Donald ; Cahill Michael H. ; Ferrara Virginia Kay ; Lambert Diane, Automated and selective intervention in transaction-based networks.
  17. Hoogerwerf David N. ; Stanhope David M. ; Barrere William Gerrit ; Green Evan R. ; McKernan Randolph W., Automated forced call disruption for use with wireless telephone systems.
  18. Baulier Gerald Donald ; Cahill Michael H. ; Ferrara Virginia Kay ; Lambert Diane, Automated fraud management in transaction-based networks.
  19. Fawcett Tom Elliott ; Provost Foster John, Automatic design of fraud detection systems.
  20. Petite, Thomas David; Huff, Richard M, Automotive diagnostic data monitoring systems and methods.
  21. Ritter,Rudolf; Heutschi,Walter, Billing process and system in a telecommunication network.
  22. Ritter,Rudolf; Heutschi,Walter, Billing process and system in a telecommunication network.
  23. Senn,Paul; Erskine,Thomas; Cooper,John R., Call delivery systems for roaming prepaid subscribers.
  24. Rae, Robert L.; Spadaro, Thomas R., Call processing with voice over internet protocol transmission.
  25. Boatwright, John T., Call security system.
  26. Boatwright, John T., Call security system.
  27. Boatwright, John T., Call security system which detects fraud by examination of call history.
  28. Wedeking, John K., Cellular device authorized user tracking systems and methods.
  29. Daniels David Leighton, Cellular fraud prevention using selective roaming.
  30. Daniels David Leighton, Cellular fraud prevention using selective roaming.
  31. Frederick Max B., Cellular telephone anti-fraud system.
  32. Hawkes Kelly Davidson ; McKinley Michael Shaw ; Talbot Kenneth Irwin, Cellular telephone fraud prevention system using RF signature analysis.
  33. Hidem Stephen E. ; Tretter ; III Joseph P. ; Schuholz John ; Engfer Robert P. ; Smoot ; III Charles H. ; Anderson Hans, Cellular telephone management system.
  34. Sansone Ronald P ; Violante Anthony F, Cellular telephone manifest system.
  35. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  36. van der Made, Peter A. J., Computer immune system and method for detecting unwanted code in a computer system.
  37. van der Made,Peter A. J, Computer immune system and method for detecting unwanted code in a computer system.
  38. Gainsboro, Jay L., Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access.
  39. Gainsboro, Jay L., Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access.
  40. Gainsboro, Jay L., Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access.
  41. Gainsboro, Jay L., Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access.
  42. Gainsboro,Jay L., Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access.
  43. Gainsboro,Jay L.; Margosian,Charles, Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access.
  44. Arthur L. Springer ; Dean Marchand, Country to country call intercept process.
  45. Arthur L. Springer ; Dean Marchand, Country to domestic call intercept process (CIP).
  46. Johnson, Eric A.; Handzel, Mark J., Credit based management of telecommunication activity.
  47. Meredith, Sheldon Kent; Cottrill, William; Hilliard, Brandon B., Detection and blocking of cloned mobile devices.
  48. Meredith, Sheldon Kent; Cottrill, William; Hilliard, Brandon B., Detection and blocking of cloned mobile devices.
  49. Meredith, Sheldon Kent; Cottrill, William; Hilliard, Brandon B., Detection and blocking of cloned mobile devices.
  50. Hoogerwerf David N. ; Stanhope David M. ; McKernan Randy, Detection and prevention of channel grabbing in a wireless communications system.
  51. Lampell,Maurice; Key,Patricia; Scott,Alistair K C, Detection of carrier mis-routing in telephone systems.
  52. Amin Umesh J. ; Rowe Lorin B. ; Waughman Russell John, Detection of fraudulently registered mobile phones.
  53. Brichta Harriet B. ; Lewis Gerald R. ; Knesek Mark D. ; Hoyt Ronald A. ; Owens Geoffrey M., Distributed data integration method and system.
  54. Arthur L. Springer ; Dean Marchand, Domestic to country call intercept process (CIP).
  55. Petite, Thomas David; Huff, Richard M; Aldoretta, David P, Dual-mode communication devices, methods and systems.
  56. Dempsey, Derek M., Dynamic deviation.
  57. Geoffrey B. Rhoads, Emulsion film media employing steganography.
  58. Rhoads, Geoffrey B., Emulsion products and imagery employing steganography.
  59. Schmid, Greg; Pickens, Keith S.; Heilmann, Craig; Smith, Kirk, Encapsulation, compression and encryption of PCM data.
  60. Schmid,Greg; Smith,Kirk; Pickens,Keith S.; Heilmann,Craig, Encapsulation, compression, and encryption of PCM data.
  61. Perfit, Michael Adam; Buchanan, Darin L.; Samek, Scott J.; Butler, Timothy W.; Mancini, Elizabeth; Arena, Michael J.; Wise, Karen G.; Farrar, Michael B.; Uftring, Michael D.; Wilson, Theodore J.; Ant, Event manager for use in fraud detection.
  62. Jaana Hurme FI, Finding copied sim cards.
  63. Barson, Paul Colin, Forming a signature of parameters extracted from information.
  64. Ronen,David; Adler,Daniel, Fraud detection in a distributed telecommunications networks.
  65. Zimmermann, Ron, Fraud library.
  66. Edwards, Alexander F M, Fraud monitoring system.
  67. Rae, Robert L.; Rosenfield, Stuart, Inmate management and call processing systems and methods.
  68. Rae, Robert L.; Rosenfield, Stuart, Inmate management and call processing systems and methods.
  69. Cree, Richard E.; McFarlen, John D., Inmate messaging system and method.
  70. Malaure,Jason Robert; Kydd,Richard Andrew, Interactive applications.
  71. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  72. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  73. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  74. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  75. Mow, John Beck, Message screening, delivery and billing system.
  76. Engel, Tobias; Freyther, Holger, Method and a device for securing a Signalling System No. 7 interface.
  77. Hammond, Nicolas J., Method and apparatus for auditing network security.
  78. Kaminsky William J. ; Medina Robert C. ; Daniels David Leighton ; Parzych Matthew John, Method and apparatus for fraud control in a cellular telephone switch.
  79. Kaminsky William J. ; Sanpore Jeffrey G. ; Daniels David L. ; Kennedy Mary H., Method and apparatus for fraud control in cellular telephone systems.
  80. Kaminsky William J. ; Sanpore Jeffrey G. ; Daniels David L. ; Kennedy Mary H., Method and apparatus for fraud control in cellular telephone systems.
  81. Rudokas Ronald S. (Alamo CA) Storch John A. (Laguna Niguel CA) Daniels David L. (Placentia CA), Method and apparatus for fraud control in cellular telephone systems.
  82. Rudokas Ronald Steven ; Storch John Adam ; Daniels David Leighton, Method and apparatus for fraud control in cellular telephone systems.
  83. Thompson Horace C., Method and apparatus for maintaining security in a packetized data communications network.
  84. Croak, Marian; Eslambolchi, Hossein, Method and apparatus for monitoring service usage in a communications network.
  85. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  86. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  87. Mahone, Saralyn M.; Gilbert, Matthew J.; Stepp, Thomas E.; Springer, Arthur L.; Van Arkel, John Hans, Method and apparatus for providing fraud detection using connection frequency and cumulative duration thresholds.
  88. Mahone, Saralyn M.; Gilbert, Matthew J.; Stepp, Thomas E.; Springer, Arthur L.; Van Arkel, John Hans, Method and apparatus for providing fraud detection using hot or cold originating attributes.
  89. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  90. Lum,Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  91. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  92. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  93. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  94. Dodd, Timothy D.; Mewett, Scott; Ide, Curtis E.; Overcash, Kevin A.; Dennerline, David A.; Williams, Bobby J.; Sells, Martin D., Method and system for identifying, fixing, and updating security vulnerabilities.
  95. Hackenberger, William Frank; Hendry, Randy Jay; Wood, Christopher James, Method and system for implementing security devices in a network.
  96. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  97. Graf Lars Oliver, Method and system for managing a group of computers.
  98. Farley,Timothy P.; Hammer,John M.; Williams,Bryan Douglas; Brass,Philip Charles; Young,George C.; Mezack,Derek John, Method and system for managing computer security information.
  99. Rhoads, Geoffrey B., Method and system for preventing reproduction of professional photographs.
  100. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  101. Jordan David P., Method and system therefor of establishing an acceptance threshold for controlling fraudulent telephone calls.
  102. Ryan, Jr.,Frederick W.; Wilson,Michael W.; Sansone,Ronald P.; Biasi,Theresa; Stelman,Vadim, Method for collecting sales and/or use taxes on sales that are made via the internet and/or catalog.
  103. Petite, Thomas D.; Huff, Richard; Aldoretta, David P., Method for communicating in dual-modes.
  104. Lambert, Diane; Pinheiro, Jose′ C; Sun, Don X, Method for constructing an updateable database of subject behavior patterns.
  105. Pennypacker Frank ; Corrigan Richard J. ; Burke Timothy M., Method for detecting fraudulent use of a communication system.
  106. Peterson David Cartwright, Method for detecting fraudulent use of a communications system.
  107. Vialen, Jukka; Niemi, Valtteri, Method of checking amount of transmitted data.
  108. Vial��n,Jukka; Niemi,Valtteri, Method of checking amount of transmitted data.
  109. Sanmugam K. Raj,GBX, Method of detecting fraud in a radio communications network by analyzing activity, identification of RF channel data for.
  110. Haverinen, Henry; Haukka, Tao; Niemi, Valtteri, Method of preventing or limiting the number of simultaneous sessions in wireless local area network (WLAN).
  111. Petite, Thomas David; Huff, Richard M, Mobile inventory unit monitoring systems and methods.
  112. Kawakami, Takaaki, Mobile object search system and mobile object search method for mobile service.
  113. Kocsis, Tamas, Mobile telecommunications network roaming.
  114. Bjorn Erik Rutger Jonsson SE, Mobile terminal having conditional blocking of outgoing call requests.
  115. Groenendaal, Johan van de; Chakraborty, Amitava, Mobility management in wireless networks.
  116. Kling, John Howard; Brubaker, Mark Earl; Quon, Cora Yan; Bierner, Rachel Yun Kim; Moloian, Armen; Kuhlmeier, Ronald James, Model framework and system for cyber security services.
  117. Alexander F M Edwards GB, Monitoring a communication network.
  118. Petite,Thomas D., Multi-function general purpose transceiver.
  119. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  120. Enmei, Toshiharu, Portable communicator.
  121. Spadaro,Thomas R.; Knodle,Martin L.; Miller,Fredrick W.; Salibrici,William J.; Abdelwahab,Amr E., Public telephone control with voice over internet protocol transmission.
  122. Jankowitz Charles M. ; Mandelbaum Richard, Risk management technique for network access.
  123. Hayashi Hironao,JPX, Road/vehicle communication method and device.
  124. Anderson ; Jr. Victor C., Security arrangement and method for controlling access to a protected system.
  125. Brown, Barry D., Selectively activated integrated real-time recording of telephone conversations with automated documentation of consent to call recording.
  126. Morgan, Anne, Sequence number calculation and authentication in a communications system.
  127. Rhoads Geoffrey B., Steganographic methods and media for photography.
  128. Marsh, William; Merritt, John; Gonzales, Juan, System and method for analyzing wireless communication data.
  129. Marsh,William; Merritt,John; Gonzales,Juan, System and method for analyzing wireless communication data.
  130. Vacon, Gary; Backes, Floyd, System and method for authenticating devices in a wireless network.
  131. Kubo, Takayuki; Albrecht, Norbert, System and method for authorizing electronic payment transactions.
  132. Brysch, Michael; Heilmann, Craig; Pickens, Keith S.; Applonie, Robert R., System and method for bringing an in-line device on-line and assuming control of calls.
  133. Hoogerwerf David N. ; Stanhope David M., System and method for collection of transmission characteristics.
  134. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  135. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  136. Davis, James; Petite, Thomas D., System and method for controlling communication between a host computer and communication devices associated with remote devices in an automated monitoring system.
  137. Gavan, John; Paul, Kevin; Richards, Jim; Dallas, Charles A.; Van Arkel, Hans; Herrington, Cheryl; Mahone, Saralyn; Curtis, Terril J.; Wagner, James J., System and method for detecting and managing fraud.
  138. Gavan, John; Paul, Kevin; Richards, Jim; Dallas, Charles A; Arkel, Hans Van; Herrington, Cheryl; Mahone, Saralyn; Curtis, Terrill J; Wagner, James J, System and method for detecting and managing fraud.
  139. Gavan,John; Paul,Kevin; Richards,Jim; Dallas,Charles A; Van Arkel,Hans; Herrington,Cheryl; Mahone,Saralyn; Curtis,Terrell J; Wagner,James J, System and method for detecting and managing fraud.
  140. Donald M. Gerth ; Yogeesh H. Kamath ; Timothy J. Rooney, System and method for detecting cloning fraud in cellular/PCS communications.
  141. Bowman William B. (Herndon VA), System and method for detecting fraudulent network usage patterns using real-time network monitoring.
  142. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  143. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  144. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  145. Kaplan Dmitry ; Sharma Chetan, System and method for detection of fraud in a wireless telephone system.
  146. Otterson Scott D. ; Kaplan Dmitry, System and method for detection of fraud in a wireless telephone system.
  147. Kaplan Dmitry ; Sharma Chetan ; McKernan Randy, System and method for detection of redial fraud in a cellular telephone system.
  148. Chmaytelli, Mazen; Khazaka, Samir K., System and method for minimizing fraudulent usage of a mobile telephone.
  149. Petite, Thomas D.; Huff, Richard; Aldoretta, David P.; Stevens, Candida, System and method for monitoring remote devices with a dual-mode wireless communication protocol.
  150. Petite, Thomas David; Huff, Richard M; Aldoretta, David P; Stevens, Candida, System and method for monitoring remote devices with a dual-mode wireless communication protocol.
  151. Olligschlaeger, Andreas M.; Rokosky, James P., System and method for multi-modal audio mining of telephone conversations.
  152. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  153. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  154. Layman, Randy; Alexander, Jonathan, System and method for non-disruptive mitigation of VOIP fraud.
  155. Alexander, Jonathan, System and method for non-disruptive mitigation of messaging fraud.
  156. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  157. Martinez, Veronica; Hite, Marc; Keiser, Luke, System and method for proactively establishing a third-party payment account for services rendered to a resident of a controlled-environment facility.
  158. Betts, Judy Lynn; Hatlak, Michael Joseph; McGuire, Michael Joseph, System and method for real-time fraud detection within a telecommunication network.
  159. Betts,Judy Lynn; Hatlak,Michael Joseph; McGuire,Michael Joseph, System and method for real-time fraud detection within a telecommunication network.
  160. Betts,Judy Lynn; Hatlak,Michael Joseph; McGuire,Michael Joseph, System and method for real-time fraud detection within a telecommunication network.
  161. Betts Judy Lynn ; Hatlak Michael Joseph ; McGuire Michael Joseph, System and method for real-time fraud detection within a telecommunications system.
  162. Betts, Judy Lynn; Hatlak, Michael Joseph; McGuire, Michael Joseph, System and method for real-time fraud detection within a telecommunications system.
  163. Betts,Judy Lynn; Hatlak,Michael Joseph; McGuire,Michael Joseph, System and method for real-time fraud detection within a telecommunications system.
  164. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  165. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  166. Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., System and method for the verification of authentic telephone numbers in a wireless telephone system.
  167. Hodge, Stephen Lee, System and method for third party monitoring of voice and video calls.
  168. Olligschlaeger, Andreas M., System and method for three-way call detection.
  169. Olligschlaeger, Andreas M., System and method for three-way call detection.
  170. Olligschlaeger, Andreas M., System and method for three-way call detection.
  171. Olligschlaeger, Andreas M., System and method for three-way call detection.
  172. Petite, Thomas David, System and method for transmitting an emergency message over an integrated wireless network.
  173. Petite, Thomas David, System and method for transmitting an emergency message over an integrated wireless network.
  174. Petite, Thomas David, System and method for transmitting an emergency message over an integrated wireless network.
  175. Petite,Thomas D., System and method for transmitting an emergency message over an integrated wireless network.
  176. Petite, Thomas D., System and method for transmitting pollution information over an integrated wireless network.
  177. Petite, Thomas D., System and method for transmitting pollution information over an integrated wireless network.
  178. Petite, Thomas David, System and method for transmitting pollution information over an integrated wireless network.
  179. Petite,Thomas D., System and method for transmitting pollution information over an integrated wireless network.
  180. Bellamy ; Jr. Gary Wayne ; Tobey Mathew John ; Lavender Roger Brian, System and method of retrieving and formatting data from cellular telephone switches.
  181. Doliov, Stephan, System and method to determine the validity of an interaction on a network.
  182. Doliov, Stephan, System and method to determine the validity of an interaction on a network.
  183. Doliov, Stephan, System and method to determine the validity of an interaction on a network.
  184. Doliov,Stephan, System and method to determine the validity of an interaction on a network.
  185. Doliov,Stephan, System and method to determine the validity of an interaction on a network.
  186. Steven, Doliov, System and method to determine the validity of an interaction on a network.
  187. Fotta Keith Alan, System and process for automatic storage, enforcement and override of consumer do-not-call requests.
  188. Fotta, Keith Alan, System and process for automatic storage, enforcement and override of consumer do-not-call requests.
  189. Fotta,Keith Alan, System and process for automatic storage, enforcement and override of consumer do-not-call requests.
  190. Graf, Lars Oliver, System for assigning new alerts in response to a plurality of escaltion schemes or assigning an ignore scheme to the new alert.
  191. Haertel, Scott, System for authorizing credit use.
  192. Yu, Sounil; Sloane, Brandon Matthew, System for generation and reuse of resource-centric threat modeling templates and identifying controls for securing technology resources.
  193. Lars Oliver Graf, System for managing a group of computers by performing automatic actions based on the identified computer conditions.
  194. Yu, Sounil; Sloane, Brandon Matthew, System for resource-centric threat modeling and identifying controls for securing technology resources.
  195. Gavan, John; Paul, Kevin; Richards, Jim; Dallas, Charles A.; Van Arkel, Hans; Herrington, Cheryl; Mahone, Saralyn M.; Curtis, Terrill J.; Wagner, James J., System, method and computer program product for processing event records.
  196. Gavan,John; Paul,Kevin; Richards,Jim; Dallas,Charles A.; Arkel,Hans Van; Herrington,Cheryl; Mahone,Saralyn M.; Curtis,Terrill J.; Wagner,James J., System, method and computer program product for processing event records.
  197. Sidler, James S.; Viola, John J.; Polozola, Michelle L., Systems and methods for acquiring, accessing, and analyzing investigative information.
  198. Petite, Thomas D., Systems and methods for controlling communication between a host computer and communication devices.
  199. Petite, Thomas David, Systems and methods for controlling communication between a host computer and communication devices.
  200. Petite, Thomas David, Systems and methods for controlling communication between a host computer and communication devices.
  201. Hogg, Jr., John S., Systems and methods for detecting a call anomaly using biometric identification.
  202. Hogg, Jr., John S., Systems and methods for detecting a call anomaly using biometric identification.
  203. Klose, Steve W.; Fowler, Leonard R., Systems and methods for extracting switch data.
  204. Klose, Steve W.; Fowler, Leonard R., Systems and methods for extracting switch data.
  205. Brownrigg, Edwin B., Systems and methods for facilitating wireless network communication, satellite-based wireless network systems, and aircraft-based wireless network systems, and related methods.
  206. Brownrigg, Edwin B., Systems and methods for facilitating wireless network communication, satellite-based wireless network systems, and aircraft-based wireless network systems, and related methods.
  207. Petite, Thomas D., Systems and methods for monitoring and controlling remote devices.
  208. Petite, Thomas D., Systems and methods for monitoring and controlling remote devices.
  209. Petite, Thomas David, Systems and methods for monitoring and controlling remote devices.
  210. Petite, Thomas David; Huff, Richard M, Systems and methods for monitoring and controlling remote devices.
  211. Petite, Thomas David; Huff, Richard M., Systems and methods for monitoring and controlling remote devices.
  212. Petite, Thomas D., Systems and methods for monitoring conditions.
  213. Petite, Thomas D., Systems and methods for monitoring conditions.
  214. Petite, Thomas David, Systems and methods for monitoring conditions.
  215. Petite, Thomas David; Huff, Richard M, Systems and methods for monitoring vehicle parking.
  216. Senn, Paul; Erskine, Thomas; Cooper, John; Sonberg, Kenneth W., Systems and methods for prerating costs for a communication event.
  217. Senn,Paul; Erskine,Thomas; Cooper,John; Sonberg,Kenneth W., Systems and methods for prerating costs for a communication event.
  218. Petite, Thomas David, Systems and methods for providing emergency messages to a mobile device.
  219. Petite, Thomas David, Systems and methods for providing emergency messages to a mobile device.
  220. Miller,John S.; Timmins,Timothy A., Technique for controlling fraudulent use of a telecommunication service including information assistance.
  221. O'Rourke, Christopher C.; Bordonaro, Frank Gerard; Menditto, Louis; Batz, Robert, Techniques for network protection based on subscriber-aware application proxies.
  222. Buntin, David L.; Pickens, Keith S.; Collier, Mark D.; Smith, Kirk E., Telephony security system.
  223. Buntin,David L.; Pickens,Keith S., Telephony security system.
  224. Heilmann Craig ; Beebe Todd, Telephony security system.
  225. Heilmann Craig ; Beebe Todd, Telephony security system.
  226. Heilmann, Craig; Beebe, Todd, Telephony security system.
  227. Heilmann, Craig; Collier, Mark D.; Conyers, Doug; Pickens, Keith S.; Buntin, David; Schmid, Greg; Faustino, Stephen; Beebe, Todd; Brysch, Michael; Applonie, Robert R., Telephony security system.
  228. Heilmann,Craig; Collier,Mark D.; Conyers,Doug; Pickens,Keith S.; Buntin,David; Schmid,Greg; Faustino,Stephen; Beebe,Todd; Brysch,Michael; Applonie,Robert R., Telephony security system.
  229. Arthur L. Springer ; Dean Marchand, Termination number screening.
  230. Hodge, Stephen Lee, Third party monitoring of a activity within a monitoring platform.
  231. Martin, Thomas J., Three-way call detection using steganography.
  232. Martin,Thomas J., Three-way call detection using steganography.
  233. Beebe Todd ; Collier Mark D. ; Conyers Doug ; Hamlett Chris ; Faustino Stephen, Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities.
  234. Joao,Raymond Anthony; Bock,Robert Richard, Transaction security apparatus.
  235. Joao Raymond Anthony ; Bock Robert Richard, Transaction security apparatus and method.
  236. Joao Raymond Anthony ; Bock Robert Richard, Transaction security apparatus and method.
  237. Joao, Raymond Anthony, Transaction security apparatus and method.
  238. Joao, Raymond Anthony, Transaction security apparatus and method.
  239. Joao, Raymond Anthony, Transaction security apparatus and method.
  240. Joao, Raymond Anthony; Bock, Robert Richard, Transaction security apparatus and method.
  241. Fink, Ian M.; Keeler, James D., User fraud detection and prevention of access to a distributed network communication system.
  242. Hodge, Stephen, Utilizing VoIP codec negotiation during a controlled environment call.
  243. Stoddard Robert Eugene ; McKinley Michael Shaw, Validation method and apparatus for preventing unauthorized use of cellular phones.
  244. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
  245. Kaplan Dmitry ; Stanhope David M., Waveform collection for use in wireless telephone identification.
  246. Rhoads, Geoffrey B., Wireless methods and devices employing plural-bit data derived from audio information.
  247. Rhoads, Geoffrey B., Wireless methods and devices employing plural-bit data derived from audio information.
  248. Rhoads, Geoffrey B., Wireless methods and devices employing steganography.
  249. Rhoads,Geoffrey B., Wireless methods and devices employing steganography.
  250. Petite, David, Wireless network protocol system and methods.
  251. Petite, David, Wireless network protocol systems and methods.
  252. Brownrigg, Edwin B.; Wilson, Thomas W., Wireless network system and method for providing same.
  253. Brownrigg, Edwin B.; Wilson, Thomas W., Wireless network system and method for providing same.
  254. Brownrigg, Edwin B.; Wilson, Thomas W., Wireless network system and method for providing same.
  255. Hooshmand Afsar ; Mark Ross Erickson ; Larry Eugene Barber ; Roger Lynn Lippert, Workstation for calling card fraud analysis.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로