Philips D711 Telephone User Manual


 
Note: for details of targeted clearing of a connection during "brokering",
see 3.3.12.
3.3.4 Malicious caller identification
If you are being molested by a caller, you can have his/her number stored =
"Malicious caller identification". Malicious caller identification is possible up
to 20 seconds after the connection. It is also possible in the case of analog
callers or if the caller has activated calling line identification suppression.
You must have previously requested this ISDN function from your network
provider.
Initial state:
call
Steps:
No. Description Input Display
Initial state: your telephone has rung
Steps:
No. Description Input Display
Your network provider informs you in writing of the caller's telephone num-
ber or of the location of the telephone booth from where the call came.
TEL.NO. UNKNOWN
8888888888888888
ŋǤ‰ ÏÌÓÛı
s f positive ac-
knowledgement tone
Activate malicious
caller identification
2
TEL.NO. UNKNOWN
8888888888888888
ŋǤ‰ ÏÌÓÛı
A
Lift the handset,
possibly busy tone
1
TEL.NO. UNKNOWN
s f positive ac-
knowledgement tone
Activate malicious
caller identification
1
04.05.9988810:09
8888888888888888
ŋǤ‰ ÏÌÓÛı
B
Clear both
connections
5
30