ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
CALLING LINE
IDENTIFICATION
PRESENTATION
(CLIP)
The Way ahead¡­
? Calling-line identification
? Operation
? Uses it
? Blocking
? Trapping
? Spoofing
? Disabling
? Enabling
Calling-line identification
? The calling number and the billing (or subscriber) name where available.
? When an originating phone switch sends out a phone number as caller ID,
the telephone company receiving the call is responsible for looking up the
name of the subscriber in a database.
? Cell phone companies must support interconnecting trunks to a significant
number of Wireline and PSTN access carriers.
¨C PSTN :- The combination of the interconnected networks and the single numbering plan make it
possible for any phone in the world to dial any other phone.
Operation
? Caller ID information is sent to the called party by the telephone switch as
an analog data stream using modulation.
? Database are used to Identify the caller information.
? E.g. For 800 numbers, they may report a string such as TOLLFREE
NUMBER if the name is not available in a database.
Uses it
? Telemarketing
¨C Some telemarketers have used caller ID itself for marketing
¨C E.g. an 800 number and the text string "FREE MONEY" or "FREE PLANE
TICKETS" as the name to be displayed on the caller ID.
? ISPs
¨C Some ISPs providing dial-up access require the customer to use CNID to
prevent abuse of the account by unauthorized callers.
? Mobile providers
Blocking
? Blocking is the common term for preventing the display of a calling
number.
? By dialing a special code before making a call to block the calling
number.
? E.g. code is *67, "PRIVATE" or "WITHHELD
Trapping
? if you block your number, it can still be trapped as it is still sent
through the telephone company network.
? When the local number is called by a customer who is blocking their
caller ID, the local number is forwarded to a toll-free number, where
the number of the calling party is passed on to and the owner of the
local number can receive the information.
? When a customer rejects an incoming blocked call it is routed to
TrapCall, who in turn traps the number and reroutes the call back to
the cellphone user with the Caller ID displayed giving the customer
the option to answer the call or reject it once more to send it back to
TrapCall where the second call will be sent to voicemail.
Spoofing
? Caller ID is a simple string of data that can be read and generated very
simply by small computer programs and even some inexpensive
devices.
? VoIP providers use Caller ID replacement to save local plan minutes.
? E.g. Skype service provider.
Disabling
? On GSM mobile networks, callers may dial #31# before the number
they wish to call to disable it.
Enabling
? On?GSM?mobile?networks,?callers?may?dial?*31#?before?the?number?
they?wish?to?call?to?enable?caller?ID.

More Related Content

Viewers also liked (20)

Foreclosure Response quarterly update oct 2010
Foreclosure Response quarterly update oct 2010Foreclosure Response quarterly update oct 2010
Foreclosure Response quarterly update oct 2010
foreclosureresponse
?
????????????2003
????????????2003????????????2003
????????????2003
018311144
?
Benchmarks bamboe picknicken
Benchmarks bamboe picknickenBenchmarks bamboe picknicken
Benchmarks bamboe picknicken
laurenztack
?
Year book 2006
Year   book    2006Year   book    2006
Year book 2006
Francisca Perez Liencura
?
Green computing
Green computingGreen computing
Green computing
Gentho Amik
?
James marshall math blog
James marshall math blogJames marshall math blog
James marshall math blog
40475044
?
10roses11 1
10roses11 110roses11 1
10roses11 1
Can Erg¨¹n
?
James marshall math blog
James marshall math blogJames marshall math blog
James marshall math blog
40475044
?
Tx2014 Feature and Highlights
Tx2014 Feature and Highlights Tx2014 Feature and Highlights
Tx2014 Feature and Highlights
Heath Turner
?
¾Í„º¥³¥ó¥Æ¥¹¥È°k±íÓÃÙYÁÏ 20101026
¾Í„º¥³¥ó¥Æ¥¹¥È°k±íÓÃÙYÁÏ 20101026¾Í„º¥³¥ó¥Æ¥¹¥È°k±íÓÃÙYÁÏ 20101026
¾Í„º¥³¥ó¥Æ¥¹¥È°k±íÓÃÙYÁÏ 20101026
heartbeat1209
?
Pigen og tr?et
Pigen og tr?etPigen og tr?et
Pigen og tr?et
Ove Christensen
?
Work by natalia
Work by nataliaWork by natalia
Work by natalia
firstbilingual1
?
Catalogue
CatalogueCatalogue
Catalogue
jiangtaisusan
?
Mz ranc tahunan-1-lama
Mz ranc tahunan-1-lamaMz ranc tahunan-1-lama
Mz ranc tahunan-1-lama
Tengku Hisamuddin Tengku Mohamed
?
????????????2003
????????????2003????????????2003
????????????2003
018311144
?
Deployment serviceswd sinwindowsserver2008
Deployment serviceswd sinwindowsserver2008Deployment serviceswd sinwindowsserver2008
Deployment serviceswd sinwindowsserver2008
o12
?
§á§â§à§Ö§Ü§ä§Ú
§á§â§à§Ö§Ü§ä§Ú§á§â§à§Ö§Ü§ä§Ú
§á§â§à§Ö§Ü§ä§Ú
Nadya Pacheva
?

Similar to Clip presentation 97 2003 (20)

Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
maham4569
?
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
James Watt
?
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
James Watt
?
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
James Watt
?
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Jashir Chakkayil
?
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
SreedevV
?
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2
Jihad Dib
?
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
Karteek Reddy
?
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Abhishek Abhi
?
Mobile Number Portability.pptx
Mobile Number Portability.pptxMobile Number Portability.pptx
Mobile Number Portability.pptx
KannanAlagumuthiah1
?
Presentation
PresentationPresentation
Presentation
Ram Dutt Shukla
?
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
Olya Saiko
?
presentation to an operator
presentation to an operatorpresentation to an operator
presentation to an operator
David Sugarman
?
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
XINTEC
?
Skivoip llc portability ppt
Skivoip llc portability pptSkivoip llc portability ppt
Skivoip llc portability ppt
James Watt
?
3CX and Dinstart Configuration
3CX and Dinstart Configuration3CX and Dinstart Configuration
3CX and Dinstart Configuration
??t Ng?
?
Ccnp collaboration plus module 1 chapter 8 dial plan and call routing
Ccnp collaboration plus module 1   chapter 8 dial plan and call routingCcnp collaboration plus module 1   chapter 8 dial plan and call routing
Ccnp collaboration plus module 1 chapter 8 dial plan and call routing
Faisal Khan
?
1ST Cellular Forensics.pptx
1ST Cellular Forensics.pptx1ST Cellular Forensics.pptx
1ST Cellular Forensics.pptx
AMIRHAMZA18953
?
Long code service by cloudshope technologies
Long code service by cloudshope technologiesLong code service by cloudshope technologies
Long code service by cloudshope technologies
cloudshope technologies Pvt LTD
?
Comprehensive Overview of GSM Technology: Architecture and Applications"
Comprehensive Overview of GSM Technology: Architecture and Applications"Comprehensive Overview of GSM Technology: Architecture and Applications"
Comprehensive Overview of GSM Technology: Architecture and Applications"
charudatta6
?
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
maham4569
?
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
James Watt
?
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
James Watt
?
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
James Watt
?
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
SreedevV
?
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
Olya Saiko
?
presentation to an operator
presentation to an operatorpresentation to an operator
presentation to an operator
David Sugarman
?
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
XINTEC
?
Skivoip llc portability ppt
Skivoip llc portability pptSkivoip llc portability ppt
Skivoip llc portability ppt
James Watt
?
3CX and Dinstart Configuration
3CX and Dinstart Configuration3CX and Dinstart Configuration
3CX and Dinstart Configuration
??t Ng?
?
Ccnp collaboration plus module 1 chapter 8 dial plan and call routing
Ccnp collaboration plus module 1   chapter 8 dial plan and call routingCcnp collaboration plus module 1   chapter 8 dial plan and call routing
Ccnp collaboration plus module 1 chapter 8 dial plan and call routing
Faisal Khan
?
1ST Cellular Forensics.pptx
1ST Cellular Forensics.pptx1ST Cellular Forensics.pptx
1ST Cellular Forensics.pptx
AMIRHAMZA18953
?
Comprehensive Overview of GSM Technology: Architecture and Applications"
Comprehensive Overview of GSM Technology: Architecture and Applications"Comprehensive Overview of GSM Technology: Architecture and Applications"
Comprehensive Overview of GSM Technology: Architecture and Applications"
charudatta6
?

Recently uploaded (20)

SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdfSECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
spub1985
?
Unlocking DevOps Secuirty :Vault & Keylock
Unlocking DevOps Secuirty :Vault & KeylockUnlocking DevOps Secuirty :Vault & Keylock
Unlocking DevOps Secuirty :Vault & Keylock
HusseinMalikMammadli
?
Temporary Compound microscope slide .pptx
Temporary Compound microscope slide .pptxTemporary Compound microscope slide .pptx
Temporary Compound microscope slide .pptx
Samir Sharma
?
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
Safe Software
?
EaseUS Partition Master Crack 2025 + Serial Key
EaseUS Partition Master Crack 2025 + Serial KeyEaseUS Partition Master Crack 2025 + Serial Key
EaseUS Partition Master Crack 2025 + Serial Key
kherorpacca127
?
ISOIEC 42001 AI Management System ºÝºÝߣs
ISOIEC 42001 AI Management System ºÝºÝߣsISOIEC 42001 AI Management System ºÝºÝߣs
ISOIEC 42001 AI Management System ºÝºÝߣs
GilangRamadhan884333
?
Mastering ChatGPT & LLMs for Practical Applications: Tips, Tricks, and Use Cases
Mastering ChatGPT & LLMs for Practical Applications: Tips, Tricks, and Use CasesMastering ChatGPT & LLMs for Practical Applications: Tips, Tricks, and Use Cases
Mastering ChatGPT & LLMs for Practical Applications: Tips, Tricks, and Use Cases
Sanjay Willie
?
UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1
DianaGray10
?
Computational Photography: How Technology is Changing Way We Capture the World
Computational Photography: How Technology is Changing Way We Capture the WorldComputational Photography: How Technology is Changing Way We Capture the World
Computational Photography: How Technology is Changing Way We Capture the World
HusseinMalikMammadli
?
Teaching Prompting and Prompt Sharing to End Users.pptx
Teaching Prompting and Prompt Sharing to End Users.pptxTeaching Prompting and Prompt Sharing to End Users.pptx
Teaching Prompting and Prompt Sharing to End Users.pptx
Michael Blumenthal (Microsoft MVP)
?
William Maclyn Murphy McRae - A Seasoned Professional Renowned
William Maclyn Murphy McRae - A Seasoned Professional RenownedWilliam Maclyn Murphy McRae - A Seasoned Professional Renowned
William Maclyn Murphy McRae - A Seasoned Professional Renowned
William Maclyn Murphy McRae
?
DealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures CapitalDealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures Capital
Yevgen Sysoyev
?
Webinar: LF Energy GEISA: Addressing edge interoperability at the meter
Webinar: LF Energy GEISA: Addressing edge interoperability at the meterWebinar: LF Energy GEISA: Addressing edge interoperability at the meter
Webinar: LF Energy GEISA: Addressing edge interoperability at the meter
DanBrown980551
?
Predictive vs. Preventive Maintenance ¡ª Which One is Right for Your Factory
Predictive vs. Preventive Maintenance ¡ª Which One is Right for Your FactoryPredictive vs. Preventive Maintenance ¡ª Which One is Right for Your Factory
Predictive vs. Preventive Maintenance ¡ª Which One is Right for Your Factory
Diagsense ltd
?
2025-02-27 Tech & Play_ Fun, UX, and Community.pdf
2025-02-27 Tech & Play_ Fun, UX, and Community.pdf2025-02-27 Tech & Play_ Fun, UX, and Community.pdf
2025-02-27 Tech & Play_ Fun, UX, and Community.pdf
katalinjordans1
?
DevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdfDevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdf
Justin Reock
?
UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2
DianaGray10
?
Cloud of everything Tech of the 21 century in Aviation
Cloud of everything Tech of the 21 century in AviationCloud of everything Tech of the 21 century in Aviation
Cloud of everything Tech of the 21 century in Aviation
Assem mousa
?
Build with AI on Google Cloud Session #3
Build with AI on Google Cloud Session #3Build with AI on Google Cloud Session #3
Build with AI on Google Cloud Session #3
Margaret Maynard-Reid
?
5 Must-Use AI Tools to Supercharge Your Productivity
5 Must-Use AI Tools to Supercharge Your Productivity5 Must-Use AI Tools to Supercharge Your Productivity
5 Must-Use AI Tools to Supercharge Your Productivity
cryptouniversityoffi
?
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdfSECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
spub1985
?
Unlocking DevOps Secuirty :Vault & Keylock
Unlocking DevOps Secuirty :Vault & KeylockUnlocking DevOps Secuirty :Vault & Keylock
Unlocking DevOps Secuirty :Vault & Keylock
HusseinMalikMammadli
?
Temporary Compound microscope slide .pptx
Temporary Compound microscope slide .pptxTemporary Compound microscope slide .pptx
Temporary Compound microscope slide .pptx
Samir Sharma
?
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
Safe Software
?
EaseUS Partition Master Crack 2025 + Serial Key
EaseUS Partition Master Crack 2025 + Serial KeyEaseUS Partition Master Crack 2025 + Serial Key
EaseUS Partition Master Crack 2025 + Serial Key
kherorpacca127
?
ISOIEC 42001 AI Management System ºÝºÝߣs
ISOIEC 42001 AI Management System ºÝºÝߣsISOIEC 42001 AI Management System ºÝºÝߣs
ISOIEC 42001 AI Management System ºÝºÝߣs
GilangRamadhan884333
?
Mastering ChatGPT & LLMs for Practical Applications: Tips, Tricks, and Use Cases
Mastering ChatGPT & LLMs for Practical Applications: Tips, Tricks, and Use CasesMastering ChatGPT & LLMs for Practical Applications: Tips, Tricks, and Use Cases
Mastering ChatGPT & LLMs for Practical Applications: Tips, Tricks, and Use Cases
Sanjay Willie
?
UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1
DianaGray10
?
Computational Photography: How Technology is Changing Way We Capture the World
Computational Photography: How Technology is Changing Way We Capture the WorldComputational Photography: How Technology is Changing Way We Capture the World
Computational Photography: How Technology is Changing Way We Capture the World
HusseinMalikMammadli
?
William Maclyn Murphy McRae - A Seasoned Professional Renowned
William Maclyn Murphy McRae - A Seasoned Professional RenownedWilliam Maclyn Murphy McRae - A Seasoned Professional Renowned
William Maclyn Murphy McRae - A Seasoned Professional Renowned
William Maclyn Murphy McRae
?
DealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures CapitalDealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures Capital
Yevgen Sysoyev
?
Webinar: LF Energy GEISA: Addressing edge interoperability at the meter
Webinar: LF Energy GEISA: Addressing edge interoperability at the meterWebinar: LF Energy GEISA: Addressing edge interoperability at the meter
Webinar: LF Energy GEISA: Addressing edge interoperability at the meter
DanBrown980551
?
Predictive vs. Preventive Maintenance ¡ª Which One is Right for Your Factory
Predictive vs. Preventive Maintenance ¡ª Which One is Right for Your FactoryPredictive vs. Preventive Maintenance ¡ª Which One is Right for Your Factory
Predictive vs. Preventive Maintenance ¡ª Which One is Right for Your Factory
Diagsense ltd
?
2025-02-27 Tech & Play_ Fun, UX, and Community.pdf
2025-02-27 Tech & Play_ Fun, UX, and Community.pdf2025-02-27 Tech & Play_ Fun, UX, and Community.pdf
2025-02-27 Tech & Play_ Fun, UX, and Community.pdf
katalinjordans1
?
DevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdfDevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdf
Justin Reock
?
UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2
DianaGray10
?
Cloud of everything Tech of the 21 century in Aviation
Cloud of everything Tech of the 21 century in AviationCloud of everything Tech of the 21 century in Aviation
Cloud of everything Tech of the 21 century in Aviation
Assem mousa
?
Build with AI on Google Cloud Session #3
Build with AI on Google Cloud Session #3Build with AI on Google Cloud Session #3
Build with AI on Google Cloud Session #3
Margaret Maynard-Reid
?
5 Must-Use AI Tools to Supercharge Your Productivity
5 Must-Use AI Tools to Supercharge Your Productivity5 Must-Use AI Tools to Supercharge Your Productivity
5 Must-Use AI Tools to Supercharge Your Productivity
cryptouniversityoffi
?

Clip presentation 97 2003

  • 2. The Way ahead¡­ ? Calling-line identification ? Operation ? Uses it ? Blocking ? Trapping ? Spoofing ? Disabling ? Enabling
  • 3. Calling-line identification ? The calling number and the billing (or subscriber) name where available. ? When an originating phone switch sends out a phone number as caller ID, the telephone company receiving the call is responsible for looking up the name of the subscriber in a database. ? Cell phone companies must support interconnecting trunks to a significant number of Wireline and PSTN access carriers. ¨C PSTN :- The combination of the interconnected networks and the single numbering plan make it possible for any phone in the world to dial any other phone.
  • 4. Operation ? Caller ID information is sent to the called party by the telephone switch as an analog data stream using modulation. ? Database are used to Identify the caller information. ? E.g. For 800 numbers, they may report a string such as TOLLFREE NUMBER if the name is not available in a database.
  • 5. Uses it ? Telemarketing ¨C Some telemarketers have used caller ID itself for marketing ¨C E.g. an 800 number and the text string "FREE MONEY" or "FREE PLANE TICKETS" as the name to be displayed on the caller ID. ? ISPs ¨C Some ISPs providing dial-up access require the customer to use CNID to prevent abuse of the account by unauthorized callers. ? Mobile providers
  • 6. Blocking ? Blocking is the common term for preventing the display of a calling number. ? By dialing a special code before making a call to block the calling number. ? E.g. code is *67, "PRIVATE" or "WITHHELD
  • 7. Trapping ? if you block your number, it can still be trapped as it is still sent through the telephone company network. ? When the local number is called by a customer who is blocking their caller ID, the local number is forwarded to a toll-free number, where the number of the calling party is passed on to and the owner of the local number can receive the information. ? When a customer rejects an incoming blocked call it is routed to TrapCall, who in turn traps the number and reroutes the call back to the cellphone user with the Caller ID displayed giving the customer the option to answer the call or reject it once more to send it back to TrapCall where the second call will be sent to voicemail.
  • 8. Spoofing ? Caller ID is a simple string of data that can be read and generated very simply by small computer programs and even some inexpensive devices. ? VoIP providers use Caller ID replacement to save local plan minutes. ? E.g. Skype service provider.
  • 9. Disabling ? On GSM mobile networks, callers may dial #31# before the number they wish to call to disable it.