主权项 |
1. A computer based method for establishing communications between a negotiator and a subject, the method comprising:
storing, in association with a virtual number in a mapping table, an authorized transmitting number and party information for each telephonic device in a plurality of telephonic devices, the party information indicating whether the authorized transmitting number of a given telephonic device in the plurality of telephonic devices corresponds to the negotiator, a monitor in a first monitoring party having a first selected configuration, or a monitor in a second monitoring party having a second selected configuration, the first selected configuration of the first monitoring party differing from the second selected configuration of the second monitoring party; receiving number information in response to a request from a target telephonic device in the plurality of telephonic devices to connect to the virtual number, the number information identifying the virtual number and a transmitting number of the target telephonic device; authenticating the target telephonic device as a negotiator device based on a match between the transmitting number of the target telephonic device and the authorized transmitting number corresponding to the negotiator stored in association with the virtual number in the mapping table; and in response to authenticating the target telephonic device as the negotiator device, transmitting instructions for:
establishing, with the virtual number, bi-directional communications between the negotiator device and a subject device;establishing, with the virtual number, a first monitoring connection to a monitoring device of the monitor in the first monitoring party based on the first selected configuration of the first monitoring party and the authorized transmitting number corresponding to the monitor in the first monitoring party; andestablishing, with the virtual number, a second monitoring connection to a monitoring device of the monitor in the second monitoring party based on the second selected configuration of the second monitoring party and the authorized transmitting number corresponding to the monitor in the second monitoring party, the second monitoring connection differing from the first monitoring connection. |