최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | UP-0339256 (2006-01-25) |
등록번호 | US-7542555 (2009-07-01) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 2 인용 특허 : 368 |
An interface for personal communications systems is described which provides rapid identification of a caller and limited access based on a variety of parameters obtained from caller identification information encoded by the telephone company. The incoming telephone call information is compared to a
An interface for personal communications systems is described which provides rapid identification of a caller and limited access based on a variety of parameters obtained from caller identification information encoded by the telephone company. The incoming telephone call information is compared to a preprogrammed access matrix to determine if the caller is authorized to access the personal communications system connected to the interface. A telephone call screening method and apparatus which incorporates the encoded caller identification is also described.
We claim: 1. A communication method comprising: providing a graphical user interface program executable on a personal computer with a modem, the modem operable for connection to a telephone line; providing a telephone line caller identification interface for use in determining whether a caller is p
We claim: 1. A communication method comprising: providing a graphical user interface program executable on a personal computer with a modem, the modem operable for connection to a telephone line; providing a telephone line caller identification interface for use in determining whether a caller is permitted to have access to the modem, wherein providing the caller identification interface comprises: programming a memory device with access parameters; detecting a telephone call on the telephone line connected to the modem; receiving caller identification information without answering the telephone call; decoding the caller identification information; and comparing the caller identification information with the access parameters to determine whether the access is authorized or unauthorized; if access is authorized, allowing the modem to receive incoming packets using the modem communicated from at least one packet switched network, the incoming packets comprising at least compressed incoming digital voice information, wherein each of the incoming packets comprises at least one header, wherein the at least one header comprises information used to route the incoming packets within the communication apparatus, wherein allowing the modem to receive incoming packets further comprises: decompressing the compressed incoming digital voice information into incoming digital voice information; converting the incoming digital voice information to produce voice signals for conveyance to a local user; and conveying the voice signals to the local user; if access is unauthorized, placing the telephone line connected to the modem off hook and hanging up so as to prevent access to the modem. 2. The method of claim 1, wherein the step of programming further comprises the step of programming a list of names of authorized caller names. 3. The method of claim 1, wherein the step of programming further comprises the step of programming a list of authorized caller telephone numbers. 4. The method of claim 1, wherein the step of programming further comprises the step of programming a list of authorized times of day to call. 5. The method of claim 1, wherein the step of programming further comprises the step of programming a list of authorized days to call. 6. The method of claim 1, wherein the step of programming further comprise the step of programming a list of authorized caller names, days and times of day to call. 7. The method of claim 1, wherein the step of programming further comprises the step of programming a list of authorized caller telephone numbers, days and times of day to call. 8. The method of claim 1, wherein the step of programming further comprises the step of programming a list of unauthorized caller names. 9. The method of claim 1, wherein the step of programming further comprises the step of programming a list of unauthorized caller numbers. 10. The method of claim 1, wherein the incoming packets comprise incoming voice packets comprising compressed incoming digital voice information and incoming data packets comprising incoming digital data information, wherein each of the incoming voice packets comprises at least one header and wherein each of the incoming data packets comprises at least one header, and further wherein the headers of the incoming voice packets and the incoming data packets comprise information used to route the incoming packets.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.