SlideShare a Scribd company logo
1 of 10
CALLING LINE
IDENTIFICATION
PRESENTATION
(CLIP)
The Way ahead…
• Calling-line identification
• Operation
• Uses it
• Blocking
• Trapping
• Spoofing
• Disabling
• Enabling
Calling-line identification
• The calling number and the billing (or subscriber) name where available.
• When an originating phone switch sends out a phone number as caller ID,
the telephone company receiving the call is responsible for looking up the
name of the subscriber in a database.
• Cell phone companies must support interconnecting trunks to a significant
number of Wireline and PSTN access carriers.
– PSTN :- The combination of the interconnected networks and the single numbering plan make it
possible for any phone in the world to dial any other phone.
Operation
• Caller ID information is sent to the called party by the telephone switch as
an analog data stream using modulation.
• Database are used to Identify the caller information.
• E.g. For 800 numbers, they may report a string such as TOLLFREE
NUMBER if the name is not available in a database.
Uses it
• Telemarketing
– Some telemarketers have used caller ID itself for marketing
– E.g. an 800 number and the text string "FREE MONEY" or "FREE PLANE
TICKETS" as the name to be displayed on the caller ID.
• ISPs
– Some ISPs providing dial-up access require the customer to use CNID to
prevent abuse of the account by unauthorized callers.
• Mobile providers
Blocking
• Blocking is the common term for preventing the display of a calling
number.
• By dialing a special code before making a call to block the calling
number.
• E.g. code is *67, "PRIVATE" or "WITHHELD
Trapping
• if you block your number, it can still be trapped as it is still sent
through the telephone company network.
• When the local number is called by a customer who is blocking their
caller ID, the local number is forwarded to a toll-free number, where
the number of the calling party is passed on to and the owner of the
local number can receive the information.
• When a customer rejects an incoming blocked call it is routed to
TrapCall, who in turn traps the number and reroutes the call back to
the cellphone user with the Caller ID displayed giving the customer
the option to answer the call or reject it once more to send it back to
TrapCall where the second call will be sent to voicemail.
Spoofing
• Caller ID is a simple string of data that can be read and generated very
simply by small computer programs and even some inexpensive
devices.
• VoIP providers use Caller ID replacement to save local plan minutes.
• E.g. Skype service provider.
Disabling
• On GSM mobile networks, callers may dial #31# before the number
they wish to call to disable it.
Enabling
• On GSM mobile networks, callers may dial *31# before the number 
they wish to call to enable caller ID.

More Related Content

Viewers also liked

Foreclosure Response quarterly update oct 2010
Foreclosure Response quarterly update oct 2010Foreclosure Response quarterly update oct 2010
Foreclosure Response quarterly update oct 2010foreclosureresponse
 
สุขศึกษา
สุขศึกษาสุขศึกษา
สุขศึกษาalonelypim
 
ฉันเหมือนใคร2003
ฉันเหมือนใคร2003ฉันเหมือนใคร2003
ฉันเหมือนใคร2003018311144
 
Benchmarks bamboe picknicken
Benchmarks bamboe picknickenBenchmarks bamboe picknicken
Benchmarks bamboe picknickenlaurenztack
 
James marshall math blog
James marshall math blogJames marshall math blog
James marshall math blog40475044
 
James marshall math blog
James marshall math blogJames marshall math blog
James marshall math blog40475044
 
Tx2014 Feature and Highlights
Tx2014 Feature and Highlights Tx2014 Feature and Highlights
Tx2014 Feature and Highlights Heath Turner
 
就労コンテスト発表用資料 20101026
就労コンテスト発表用資料 20101026就労コンテスト発表用資料 20101026
就労コンテスト発表用資料 20101026heartbeat1209
 
ฉันเหมือนใคร2003
ฉันเหมือนใคร2003ฉันเหมือนใคร2003
ฉันเหมือนใคร2003018311144
 
Deployment serviceswd sinwindowsserver2008
Deployment serviceswd sinwindowsserver2008Deployment serviceswd sinwindowsserver2008
Deployment serviceswd sinwindowsserver2008o12
 

Viewers also liked (20)

Foreclosure Response quarterly update oct 2010
Foreclosure Response quarterly update oct 2010Foreclosure Response quarterly update oct 2010
Foreclosure Response quarterly update oct 2010
 
สุขศึกษา
สุขศึกษาสุขศึกษา
สุขศึกษา
 
ฉันเหมือนใคร2003
ฉันเหมือนใคร2003ฉันเหมือนใคร2003
ฉันเหมือนใคร2003
 
Aglamak
AglamakAglamak
Aglamak
 
Benchmarks bamboe picknicken
Benchmarks bamboe picknickenBenchmarks bamboe picknicken
Benchmarks bamboe picknicken
 
Year book 2006
Year   book    2006Year   book    2006
Year book 2006
 
Green computing
Green computingGreen computing
Green computing
 
Topp presteraren 2012
Topp presteraren 2012Topp presteraren 2012
Topp presteraren 2012
 
James marshall math blog
James marshall math blogJames marshall math blog
James marshall math blog
 
10roses11 1
10roses11 110roses11 1
10roses11 1
 
James marshall math blog
James marshall math blogJames marshall math blog
James marshall math blog
 
Tx2014 Feature and Highlights
Tx2014 Feature and Highlights Tx2014 Feature and Highlights
Tx2014 Feature and Highlights
 
就労コンテスト発表用資料 20101026
就労コンテスト発表用資料 20101026就労コンテスト発表用資料 20101026
就労コンテスト発表用資料 20101026
 
Pigen og træet
Pigen og træetPigen og træet
Pigen og træet
 
Work by natalia
Work by nataliaWork by natalia
Work by natalia
 
Catalogue
CatalogueCatalogue
Catalogue
 
Mz ranc tahunan-1-lama
Mz ranc tahunan-1-lamaMz ranc tahunan-1-lama
Mz ranc tahunan-1-lama
 
ฉันเหมือนใคร2003
ฉันเหมือนใคร2003ฉันเหมือนใคร2003
ฉันเหมือนใคร2003
 
Deployment serviceswd sinwindowsserver2008
Deployment serviceswd sinwindowsserver2008Deployment serviceswd sinwindowsserver2008
Deployment serviceswd sinwindowsserver2008
 
проекти
проектипроекти
проекти
 

Similar to Clip presentation 97 2003

Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocolJames Watt
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocolJames Watt
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocolJames Watt
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2Jihad Dib
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13Olya Saiko
 
presentation to an operator
presentation to an operatorpresentation to an operator
presentation to an operatorDavid Sugarman
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISMXINTEC
 
Skivoip llc portability ppt
Skivoip llc portability pptSkivoip llc portability ppt
Skivoip llc portability pptJames Watt
 
3CX and Dinstart Configuration
3CX and Dinstart Configuration3CX and Dinstart Configuration
3CX and Dinstart ConfigurationĐạt Ngô
 
Ccnp collaboration plus module 1 chapter 8 dial plan and call routing
Ccnp collaboration plus module 1   chapter 8 dial plan and call routingCcnp collaboration plus module 1   chapter 8 dial plan and call routing
Ccnp collaboration plus module 1 chapter 8 dial plan and call routingFaisal Khan
 
1ST Cellular Forensics.pptx
1ST Cellular Forensics.pptx1ST Cellular Forensics.pptx
1ST Cellular Forensics.pptxAMIRHAMZA18953
 

Similar to Clip presentation 97 2003 (20)

Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Number Portability.pptx
Mobile Number Portability.pptxMobile Number Portability.pptx
Mobile Number Portability.pptx
 
Presentation
PresentationPresentation
Presentation
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
 
presentation to an operator
presentation to an operatorpresentation to an operator
presentation to an operator
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
 
Skivoip llc portability ppt
Skivoip llc portability pptSkivoip llc portability ppt
Skivoip llc portability ppt
 
3CX and Dinstart Configuration
3CX and Dinstart Configuration3CX and Dinstart Configuration
3CX and Dinstart Configuration
 
Ccnp collaboration plus module 1 chapter 8 dial plan and call routing
Ccnp collaboration plus module 1   chapter 8 dial plan and call routingCcnp collaboration plus module 1   chapter 8 dial plan and call routing
Ccnp collaboration plus module 1 chapter 8 dial plan and call routing
 
1ST Cellular Forensics.pptx
1ST Cellular Forensics.pptx1ST Cellular Forensics.pptx
1ST Cellular Forensics.pptx
 
Long code service by cloudshope technologies
Long code service by cloudshope technologiesLong code service by cloudshope technologies
Long code service by cloudshope technologies
 
Fdp
FdpFdp
Fdp
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Clip presentation 97 2003

  • 2. The Way ahead… • Calling-line identification • Operation • Uses it • Blocking • Trapping • Spoofing • Disabling • Enabling
  • 3. Calling-line identification • The calling number and the billing (or subscriber) name where available. • When an originating phone switch sends out a phone number as caller ID, the telephone company receiving the call is responsible for looking up the name of the subscriber in a database. • Cell phone companies must support interconnecting trunks to a significant number of Wireline and PSTN access carriers. – PSTN :- The combination of the interconnected networks and the single numbering plan make it possible for any phone in the world to dial any other phone.
  • 4. Operation • Caller ID information is sent to the called party by the telephone switch as an analog data stream using modulation. • Database are used to Identify the caller information. • E.g. For 800 numbers, they may report a string such as TOLLFREE NUMBER if the name is not available in a database.
  • 5. Uses it • Telemarketing – Some telemarketers have used caller ID itself for marketing – E.g. an 800 number and the text string "FREE MONEY" or "FREE PLANE TICKETS" as the name to be displayed on the caller ID. • ISPs – Some ISPs providing dial-up access require the customer to use CNID to prevent abuse of the account by unauthorized callers. • Mobile providers
  • 6. Blocking • Blocking is the common term for preventing the display of a calling number. • By dialing a special code before making a call to block the calling number. • E.g. code is *67, "PRIVATE" or "WITHHELD
  • 7. Trapping • if you block your number, it can still be trapped as it is still sent through the telephone company network. • When the local number is called by a customer who is blocking their caller ID, the local number is forwarded to a toll-free number, where the number of the calling party is passed on to and the owner of the local number can receive the information. • When a customer rejects an incoming blocked call it is routed to TrapCall, who in turn traps the number and reroutes the call back to the cellphone user with the Caller ID displayed giving the customer the option to answer the call or reject it once more to send it back to TrapCall where the second call will be sent to voicemail.
  • 8. Spoofing • Caller ID is a simple string of data that can be read and generated very simply by small computer programs and even some inexpensive devices. • VoIP providers use Caller ID replacement to save local plan minutes. • E.g. Skype service provider.
  • 9. Disabling • On GSM mobile networks, callers may dial #31# before the number they wish to call to disable it.