SlideShare a Scribd company logo
1 of 10
CALLING LINE
IDENTIFICATION
PRESENTATION
(CLIP)
The Way ahead…
• Calling-line identification
• Operation
• Uses it
• Blocking
• Trapping
• Spoofing
• Disabling
• Enabling
Calling-line identification
• The calling number and the billing (or subscriber) name where available.
• When an originating phone switch sends out a phone number as caller ID,
the telephone company receiving the call is responsible for looking up the
name of the subscriber in a database.
• Cell phone companies must support interconnecting trunks to a significant
number of Wireline and PSTN access carriers.
– PSTN :- The combination of the interconnected networks and the single numbering plan make it
possible for any phone in the world to dial any other phone.
Operation
• Caller ID information is sent to the called party by the telephone switch as
an analog data stream using modulation.
• Database are used to Identify the caller information.
• E.g. For 800 numbers, they may report a string such as TOLLFREE
NUMBER if the name is not available in a database.
Uses it
• Telemarketing
– Some telemarketers have used caller ID itself for marketing
– E.g. an 800 number and the text string "FREE MONEY" or "FREE PLANE
TICKETS" as the name to be displayed on the caller ID.
• ISPs
– Some ISPs providing dial-up access require the customer to use CNID to
prevent abuse of the account by unauthorized callers.
• Mobile providers
Blocking
• Blocking is the common term for preventing the display of a calling
number.
• By dialing a special code before making a call to block the calling
number.
• E.g. code is *67, "PRIVATE" or "WITHHELD
Trapping
• if you block your number, it can still be trapped as it is still sent
through the telephone company network.
• When the local number is called by a customer who is blocking their
caller ID, the local number is forwarded to a toll-free number, where
the number of the calling party is passed on to and the owner of the
local number can receive the information.
• When a customer rejects an incoming blocked call it is routed to
TrapCall, who in turn traps the number and reroutes the call back to
the cellphone user with the Caller ID displayed giving the customer
the option to answer the call or reject it once more to send it back to
TrapCall where the second call will be sent to voicemail.
Spoofing
• Caller ID is a simple string of data that can be read and generated very
simply by small computer programs and even some inexpensive
devices.
• VoIP providers use Caller ID replacement to save local plan minutes.
• E.g. Skype service provider.
Disabling
• On GSM mobile networks, callers may dial #31# before the number
they wish to call to disable it.
Enabling
• On GSM mobile networks, callers may dial *31# before the number 
they wish to call to enable caller ID.

More Related Content

Viewers also liked

Foreclosure Response quarterly update oct 2010
Foreclosure Response quarterly update oct 2010Foreclosure Response quarterly update oct 2010
Foreclosure Response quarterly update oct 2010foreclosureresponse
 
สุขศึกษา
สุขศึกษาสุขศึกษา
สุขศึกษาalonelypim
 
ฉันเหมือนใคร2003
ฉันเหมือนใคร2003ฉันเหมือนใคร2003
ฉันเหมือนใคร2003018311144
 
Benchmarks bamboe picknicken
Benchmarks bamboe picknickenBenchmarks bamboe picknicken
Benchmarks bamboe picknickenlaurenztack
 
James marshall math blog
James marshall math blogJames marshall math blog
James marshall math blog40475044
 
James marshall math blog
James marshall math blogJames marshall math blog
James marshall math blog40475044
 
Tx2014 Feature and Highlights
Tx2014 Feature and Highlights Tx2014 Feature and Highlights
Tx2014 Feature and Highlights Heath Turner
 
就労コンテスト発表用資料 20101026
就労コンテスト発表用資料 20101026就労コンテスト発表用資料 20101026
就労コンテスト発表用資料 20101026heartbeat1209
 
ฉันเหมือนใคร2003
ฉันเหมือนใคร2003ฉันเหมือนใคร2003
ฉันเหมือนใคร2003018311144
 
Deployment serviceswd sinwindowsserver2008
Deployment serviceswd sinwindowsserver2008Deployment serviceswd sinwindowsserver2008
Deployment serviceswd sinwindowsserver2008o12
 

Viewers also liked (20)

Foreclosure Response quarterly update oct 2010
Foreclosure Response quarterly update oct 2010Foreclosure Response quarterly update oct 2010
Foreclosure Response quarterly update oct 2010
 
สุขศึกษา
สุขศึกษาสุขศึกษา
สุขศึกษา
 
ฉันเหมือนใคร2003
ฉันเหมือนใคร2003ฉันเหมือนใคร2003
ฉันเหมือนใคร2003
 
Aglamak
AglamakAglamak
Aglamak
 
Benchmarks bamboe picknicken
Benchmarks bamboe picknickenBenchmarks bamboe picknicken
Benchmarks bamboe picknicken
 
Year book 2006
Year   book    2006Year   book    2006
Year book 2006
 
Green computing
Green computingGreen computing
Green computing
 
Topp presteraren 2012
Topp presteraren 2012Topp presteraren 2012
Topp presteraren 2012
 
James marshall math blog
James marshall math blogJames marshall math blog
James marshall math blog
 
10roses11 1
10roses11 110roses11 1
10roses11 1
 
James marshall math blog
James marshall math blogJames marshall math blog
James marshall math blog
 
Tx2014 Feature and Highlights
Tx2014 Feature and Highlights Tx2014 Feature and Highlights
Tx2014 Feature and Highlights
 
就労コンテスト発表用資料 20101026
就労コンテスト発表用資料 20101026就労コンテスト発表用資料 20101026
就労コンテスト発表用資料 20101026
 
Pigen og træet
Pigen og træetPigen og træet
Pigen og træet
 
Work by natalia
Work by nataliaWork by natalia
Work by natalia
 
Catalogue
CatalogueCatalogue
Catalogue
 
Mz ranc tahunan-1-lama
Mz ranc tahunan-1-lamaMz ranc tahunan-1-lama
Mz ranc tahunan-1-lama
 
ฉันเหมือนใคร2003
ฉันเหมือนใคร2003ฉันเหมือนใคร2003
ฉันเหมือนใคร2003
 
Deployment serviceswd sinwindowsserver2008
Deployment serviceswd sinwindowsserver2008Deployment serviceswd sinwindowsserver2008
Deployment serviceswd sinwindowsserver2008
 
проекти
проектипроекти
проекти
 

Similar to Clip presentation 97 2003

Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocolJames Watt
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocolJames Watt
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocolJames Watt
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2Jihad Dib
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13Olya Saiko
 
presentation to an operator
presentation to an operatorpresentation to an operator
presentation to an operatorDavid Sugarman
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISMXINTEC
 
Skivoip llc portability ppt
Skivoip llc portability pptSkivoip llc portability ppt
Skivoip llc portability pptJames Watt
 
3CX and Dinstart Configuration
3CX and Dinstart Configuration3CX and Dinstart Configuration
3CX and Dinstart ConfigurationĐạt Ngô
 
Ccnp collaboration plus module 1 chapter 8 dial plan and call routing
Ccnp collaboration plus module 1   chapter 8 dial plan and call routingCcnp collaboration plus module 1   chapter 8 dial plan and call routing
Ccnp collaboration plus module 1 chapter 8 dial plan and call routingFaisal Khan
 
1ST Cellular Forensics.pptx
1ST Cellular Forensics.pptx1ST Cellular Forensics.pptx
1ST Cellular Forensics.pptxAMIRHAMZA18953
 

Similar to Clip presentation 97 2003 (20)

Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Number Portability.pptx
Mobile Number Portability.pptxMobile Number Portability.pptx
Mobile Number Portability.pptx
 
Presentation
PresentationPresentation
Presentation
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
 
presentation to an operator
presentation to an operatorpresentation to an operator
presentation to an operator
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
 
Skivoip llc portability ppt
Skivoip llc portability pptSkivoip llc portability ppt
Skivoip llc portability ppt
 
3CX and Dinstart Configuration
3CX and Dinstart Configuration3CX and Dinstart Configuration
3CX and Dinstart Configuration
 
Ccnp collaboration plus module 1 chapter 8 dial plan and call routing
Ccnp collaboration plus module 1   chapter 8 dial plan and call routingCcnp collaboration plus module 1   chapter 8 dial plan and call routing
Ccnp collaboration plus module 1 chapter 8 dial plan and call routing
 
1ST Cellular Forensics.pptx
1ST Cellular Forensics.pptx1ST Cellular Forensics.pptx
1ST Cellular Forensics.pptx
 
Long code service by cloudshope technologies
Long code service by cloudshope technologiesLong code service by cloudshope technologies
Long code service by cloudshope technologies
 
Fdp
FdpFdp
Fdp
 

Recently uploaded

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 

Recently uploaded (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Clip presentation 97 2003

  • 2. The Way ahead… • Calling-line identification • Operation • Uses it • Blocking • Trapping • Spoofing • Disabling • Enabling
  • 3. Calling-line identification • The calling number and the billing (or subscriber) name where available. • When an originating phone switch sends out a phone number as caller ID, the telephone company receiving the call is responsible for looking up the name of the subscriber in a database. • Cell phone companies must support interconnecting trunks to a significant number of Wireline and PSTN access carriers. – PSTN :- The combination of the interconnected networks and the single numbering plan make it possible for any phone in the world to dial any other phone.
  • 4. Operation • Caller ID information is sent to the called party by the telephone switch as an analog data stream using modulation. • Database are used to Identify the caller information. • E.g. For 800 numbers, they may report a string such as TOLLFREE NUMBER if the name is not available in a database.
  • 5. Uses it • Telemarketing – Some telemarketers have used caller ID itself for marketing – E.g. an 800 number and the text string "FREE MONEY" or "FREE PLANE TICKETS" as the name to be displayed on the caller ID. • ISPs – Some ISPs providing dial-up access require the customer to use CNID to prevent abuse of the account by unauthorized callers. • Mobile providers
  • 6. Blocking • Blocking is the common term for preventing the display of a calling number. • By dialing a special code before making a call to block the calling number. • E.g. code is *67, "PRIVATE" or "WITHHELD
  • 7. Trapping • if you block your number, it can still be trapped as it is still sent through the telephone company network. • When the local number is called by a customer who is blocking their caller ID, the local number is forwarded to a toll-free number, where the number of the calling party is passed on to and the owner of the local number can receive the information. • When a customer rejects an incoming blocked call it is routed to TrapCall, who in turn traps the number and reroutes the call back to the cellphone user with the Caller ID displayed giving the customer the option to answer the call or reject it once more to send it back to TrapCall where the second call will be sent to voicemail.
  • 8. Spoofing • Caller ID is a simple string of data that can be read and generated very simply by small computer programs and even some inexpensive devices. • VoIP providers use Caller ID replacement to save local plan minutes. • E.g. Skype service provider.
  • 9. Disabling • On GSM mobile networks, callers may dial #31# before the number they wish to call to disable it.