5Clear both connections

B

04.05.9988810:09 8888888888888888

ŋǤ‰ÏÌÓÛı

Note: for details of targeted clearing of a connection during "brokering", see 3.3.12.

3.3.4Malicious caller identification

If you are being molested by a caller, you can have his/her number stored = "Malicious caller identification". Malicious caller identification is possible up to 20 seconds after the connection. It is also possible in the case of analog callers or if the caller has activated calling line identification suppression. You must have previously requested this ISDN function from your network provider.

Initial state: call

Steps:

No.

Description

Input

Display

1

Activate malicious

sfpositive ac-

 

TEL.NO. UNKNOWN

 

 

caller identification

knowledgement tone

 

 

 

 

 

 

 

 

 

 

 

 

Initial state: your telephone has rung

Steps:

 

No.

Description

 

Input

Display

1

 

Lift the handset,

 

 

 

A

TEL.NO. UNKNOWN

 

 

 

 

possibly busy tone

 

 

 

8888888888888888

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

ŋǤ‰ÏÌÓÛı

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

2

 

Activate malicious

 

sfpositive ac-

 

TEL.NO. UNKNOWN

 

 

 

 

caller identification

 

knowledgement tone

 

8888888888888888

 

 

 

 

 

 

 

 

ŋǤ‰ÏÌÓÛı

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Your network provider informs you in writing of the caller's telephone num- ber or of the location of the telephone booth from where the call came.

30

Page 31
Image 31
Philips D711 Caller identification, Steps Description Input Display Lift the handset, Activate malicious Sfpositive ac