Telephone Number Presentation or Spoofing


×DISCLAIMER

VoiceHost Ltd is committed to industry best practice and regulatory compliance is imperative. VoiceHost accepts no liability for the misuse of number presentation and reserves the right to terminate user service should any aspect of this policy be breached.

The policy details the guidelines for the provision of Calling Line Identification Facilities and other related services over Electronic Communications Networks define presentation numbers and the requirements that apply to them.

If permission is revoked or expires, it is the responsibility of either the account holder or the number owner to inform VoiceHost Ltd in writing to remove the presentation number and will be actioned within 10 working days of confirmation of receipt. The VoiceHost account must not continue to make calls using the presentation number after the permission has been revoked or expired. VoiceHost Ltd does not accept any liability if the number is used after the permission has been revoked or expires. It is not possible to request a specific start or removal date, due to the process requiring manual intervention.

WHAT IS NUMBER PRESENTATION | SPOOFING?

A presentation number is a number nominated or provided by the caller that can identify that caller or be used to make a return or subsequent call. In the UK the industry has recognised a number of scenarios where presentation numbers may be provided, as a commercial service, to meet differing customer calling requirements. The purpose of this guide is to describe the various types of presentation number service that have been developed to meet these end-user requirements and the conditions that are to be observed for their use.

Unlike a network number, a presentation number will not necessarily identify a call's point of ingress to a public network. However, it may well carry more useful information. The requirements of a presentation number are that:

(i) It must either be
                (a) a dial-able number, or
                (b) a number that has been received from the public network and passed on unchanged

(ii) It will have been allocated either to the caller or if allocated to a third party, only used with the third party's explicit permission

(iii) it must not be a number that connects to a Premium Rate Service prefixed 09, or to a revenue sharing number that generates an excessive or unexpected call charge (NB the exploitation of a Presentation Number to generate revenue sharing calls may constitute persistent misuse of an Electronic Communications Network or Electronic Communications Service).

(iv) It is supported by an underlying network number.

BENEFITS OF CLI MANIPULATION

Number presentation manipulation of the Calling Line Identifier (CLI) can be beneficial in order to:

  1. Centralised and controlled call backs to improve telephony capability and efficiency
  2. Protect the privacy of private extensions or mobiles (Pertinent for DISA / Dial-Through)
  3. Give a valid return route should the caller not have a DDI
  4. Allow for updated inward routing whilst telephone number porting is in progress.
  5. Improved perception by giving a local or national geographic image of presence.
TYPES OF NUMBER PRESENTATION
  • Type 1 - A presentation number generated by the subscriber's network provider. The number is stored in the network and applied to an outgoing call at the local exchange by the provider. Because the number is applied by network equipment there is no need for it to be verified each time a call is made – instead, the level of authenticity will depend on the checks made by a network provider that a subscriber is entitled to use a particular presentation number.
  • Type 2 - A presentation number which identifies a caller's extension number behind a DDI switchboard. Although the number or partial number is generated by the user's own equipment, the network provider is able to check that it falls within the range and length allocated to a particular subscriber. In this way, the authenticity of the number may be ensured. It should be noted that some network providers classify type 2 presentation numbers as network numbers (especially where the full number is constituted at the local exchange). This type of number is considered to carry sufficient authenticity to be classified as a network number and is carried as such by some networks.
  • Type 3 - A presentation number limited to the far-end breakout scenario where a call's ingress to the public network may be geographically remote from where it was originated. The number is generated by the user's equipment and is not capable of being subjected to network verification procedures. Verification is based on a contract between the subscriber and the network provider in which the subscriber gives an undertaking that only authentic calling party numbers will be generated.
  • Type 4 - A presentation number available for the onward transmission of the originating number where a call breaks into a private network and breaks out again before termination, as in a DISA scenario. On the break out leg, the number is generated by the user's equipment although it will have already been verified in consequence of having been delivered to the private network. To maintain the verification it is necessary to ensure that the number submitted by the private network is the number that was received. Network providers wishing to offer a type 4 service will require a contractual commitment from customers that they will only submit CLIs that have been received from the public network. Unlike other types of presentation numbers, type 4 numbers may not always be dial-able; this will depend on the nature of the number received from the public network.​
  • Type 5 - Presentation numbers that identify separate groups of callers behind a private network switch wishing to send different outgoing CLIs. A typical scenario is a call centre making calls on behalf of more than one client. Type 5 presentation numbers are generated by the user's equipment. Subscribers will need to enter into a similar contractual commitment with their network providers as for type 1 presentation numbers - which they are entitled to use the numbers they have selected.
SPOOFING APPLICATION PROCESS

A signed declaration by a person with subscription authority for the CLI to be presented must be received by VoiceHost prior to presenting the number over the VoiceHost network.

Help Tags: 

Videos

Call Encryption - TLS/SRTP walkthrough
Embedded thumbnail for Call Encryption - TLS/SRTP walkthrough
Hosted Directory LDAP - Lightweight Directory Access Protocol
Embedded thumbnail for Hosted Directory LDAP - Lightweight Directory Access Protocol
Cloud PBX Explainer
Embedded thumbnail for Cloud PBX Explainer
Zoiper Softphone Configuration
Embedded thumbnail for Zoiper Softphone Configuration
Call Conferencing
Embedded thumbnail for Call Conferencing
Receptionist Console
Embedded thumbnail for Receptionist Console

Search Help Portal

Get in touch

VoiceHost Limited
Norfolk Tower
Surrey Street
Norwich
NR1 3PA

UK Freephone 0800 2 545454

International +44 1603904090

support [at] voicehost.co.uk

Connect With Us

Download the iOS App from the Apple App Store

Get the Android app from the Google Play store