beautypg.com

Philips D721 User Manual

Page 31

background image

Note: for details of targeted clearing of a connection during "brokering",
see 3.3.12.

3.3.4

Malicious caller identification

If you are being molested by a caller, you can have his/her number stored =
"Malicious caller identification". Malicious caller identification is possible up
to 20 seconds after the connection. It is also possible in the case of analog
callers or if the caller has activated calling line identification suppression.
You must have previously requested this ISDN function from your network
provider.

Initial state:

call

Steps:

No.

Description

Input

Display

Initial state:

your telephone has rung

Steps:

No.

Description

Input

Display

Your network provider informs you in writing of the caller's telephone num-
ber or of the location of the telephone booth from where the call came.

TEL.NO. UNKNOWN

8888888888888888

Е‹ З ¤‰ ÏÌÓÛı

s f

positive ac-

knowledgement tone

Activate malicious
caller identification

2

TEL.NO. UNKNOWN

8888888888888888

Е‹ З ¤‰ ÏÌÓÛı

A

Lift the handset,
possibly busy tone

1

TEL.NO. UNKNOWN

s f

positive ac-

knowledgement tone

Activate malicious
caller identification

1

04.05.99

888

10:09

8888888888888888

Е‹ З ¤‰ ÏÌÓÛı

B

Clear both
connections

5

30

This manual is related to the following products: