JPS61198856A - System for tracing malicious call - Google Patents

System for tracing malicious call

Info

Publication number
JPS61198856A
JPS61198856A JP3795285A JP3795285A JPS61198856A JP S61198856 A JPS61198856 A JP S61198856A JP 3795285 A JP3795285 A JP 3795285A JP 3795285 A JP3795285 A JP 3795285A JP S61198856 A JPS61198856 A JP S61198856A
Authority
JP
Japan
Prior art keywords
malicious call
call
subscriber
malicious
tracing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP3795285A
Other languages
Japanese (ja)
Inventor
Takamasa Kimura
木村 隆昌
Yasuo Satake
佐竹 康男
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Priority to JP3795285A priority Critical patent/JPS61198856A/en
Publication of JPS61198856A publication Critical patent/JPS61198856A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/72Finding out and indicating number of calling subscriber

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)

Abstract

PURPOSE:To trace a malicious call without hooking operation by collating a call with a malicious call tracing registering table at a call from an outgoing station and executing the trace of malicious call at the state of calling when the caller is a malicious call registration subscriber. CONSTITUTION:When a malicious caller 6 dials a telephone number of an incoming subscriber 7, the dial number is collated with a subscriber number registered in the malicious call tracing registration table 3 provided in an exchange and when they are coincident, just after the incoming subscriber 7 replies, only the channel of incoming subscriber 7 malicious call sender 6 is interrupted. This is conducted by cutting off the path of the secondary time switch 14 during a prescribed timing period only. When the incoming subscriber 7 hooks off during the said timing period, since the channel is set to a path of incoming subscriber 7 malicious call sender 6 only, a click sent to the path of incomingsubscriber 7 malicious call sender 6 i not sensed by the malicious call sender 6.

Description

【発明の詳細な説明】 〔産業上の利用分野〕 本発明は交換網に於ける悪意呼追跡方式に係り、特に被
呼者側が悪意呼追跡中であることを発信者側に認知され
ない様にする為フッキング操作により行う悪意呼追跡方
式に関するものである。
[Detailed Description of the Invention] [Field of Industrial Application] The present invention relates to a malicious call tracking system in a switched network, and in particular, to a system for tracking malicious calls in a switched network, and in particular, to prevent the calling party from recognizing that the called party is tracking a malicious call. This paper relates to a malicious call tracing method that uses hooking operations to prevent malicious calls.

交換網に於ける悪意呼追跡は発信者側に判らない様に而
も迅速に行うことが必要であり、従来は着信者側がフッ
キング操作を行って交換網の悪意呼追跡を起動させてい
たが、此の方法では発信者に判る恐れがあり、発信者に
判らない悪意呼追跡方式の開発が強く要望されていた。
Malicious call tracking in a switched network must be carried out quickly and without the caller's knowledge; conventionally, the called party performed a hooking operation to activate malicious call tracking in the switched network. However, with this method, there is a risk that the caller will be able to detect the call, and there has been a strong demand for the development of a method for tracking malicious calls that will not be obvious to the caller.

〔従来の技術〕[Conventional technology]

最近脅迫等の事件に於いて犯人追跡のため、悪意呼の発
信元を迅速に検出することが強く要求されていることは
周知の通りである。
It is well known that there is a strong demand for quickly detecting the source of a malicious call in order to track down the culprit in cases of blackmail and the like.

第3図は従来の悪意呼追跡方式の一例を示す図である。FIG. 3 is a diagram showing an example of a conventional malicious call tracing method.

図中、1は発信局、2は発信局1の出トランク、3は悪
意呼追跡登録表、4は着信局、5は着信局4の人トラン
ク、6は発信加入者、7は着信加入者である。以下全図
を通じ同一記号は同一対象物を表す。尚以下の説明に於
いて、出トランクはOCT、入トランクはICTと称す
る。
In the figure, 1 is the originating station, 2 is the outgoing trunk of the originating station 1, 3 is the malicious call tracking registration table, 4 is the terminating station, 5 is the trunk of the terminating station 4, 6 is the originating subscriber, and 7 is the terminating subscriber. It is. The same symbols represent the same objects throughout the figures below. In the following description, the outgoing trunk will be referred to as OCT, and the incoming trunk will be referred to as ICT.

従来の悪意呼追跡方式は発信局1、又は着信局4に悪意
呼追跡登録表3を予め用意して置く。
In the conventional malicious call tracing method, a malicious call tracing registration table 3 is prepared in advance at the originating station 1 or the terminating station 4.

加入者から予め出された悪意呼追跡の要求に基づき、局
側か其の加入者を悪意呼追跡登録表3に登録する。
Based on a request for malicious call tracing issued in advance by a subscriber, either the station side or the subscriber is registered in the malicious call tracing registration table 3.

今着信加入者7が此の悪意呼追跡登録表3に登録されて
いる加入者であるとする。此の時任意の加入者6(悪意
呼の発信者)が加入者7に電話をかけて来たとする。
Assume that the subscriber 7 who is currently receiving the call is a subscriber registered in the malicious call tracking registration table 3. At this time, it is assumed that an arbitrary subscriber 6 (the originator of the malicious call) calls subscriber 7.

此の呼び出しに対し着信加入者7がフックオフして通話
に入り、着信加入者7が悪意呼を確認してフンキング操
作を行う。
In response to this call, the called subscriber 7 hooks off and enters the conversation, and the called subscriber 7 confirms the malicious call and performs a hooking operation.

此のフッキング操作に基づき、発信局1又は着信局4は
着信加入者7の電話番号と自局の悪意呼追跡登録表3を
照合しく第3図では発信局1に悪意呼追跡登録表3が設
けられている)、若しフッキング操作を行った加入者7
が悪意呼追跡登録表3に登録されている加入者である場
合は悪意呼の追跡対象であると認識し、直ちに発信加入
者6の電話番号の追跡を開始し、悪意呼のメツセージ出
力(発信加入者6の電話番号等)、及びモニタ電話機の
接続を行う。
Based on this hooking operation, the originating station 1 or the terminating station 4 checks the telephone number of the terminating subscriber 7 and its own malicious call tracing registration table 3. In FIG. 3, the originating station 1 has the malicious call tracing registration table 3. ), if the subscriber 7 who performed the hooking operation
If the subscriber is registered in the malicious call tracing registration table 3, it is recognized that the subscriber is being tracked as a malicious call, and immediately starts tracking the telephone number of the calling subscriber 6, and outputs the message of the malicious call (calling (subscriber 6's telephone number, etc.) and a monitor telephone.

然し上記従来の悪意呼追跡方式は着信加入者7が行うフ
ッキング操作により発生するクリック音が発信加入者6
に聞こえる為、発信加入者6に悪意呼追跡中である倦と
が露顕し、犯人を逃がす結果となると云う欠点があった
However, in the conventional malicious call tracking method described above, the click sound generated by the hooking operation performed by the calling subscriber 7 is transmitted to the calling subscriber 6.
This has the disadvantage that it becomes obvious to the originating subscriber 6 that the malicious call is being tracked, and the culprit gets away with it.

〔発明が解決しようとする問題点〕[Problem that the invention seeks to solve]

本発明の目的は上記従来方式の欠点を除去し、着信加入
者が悪意呼追跡を要求する為にフッキング操作をした時
、発生するクリック音を発信者側に送らない様にする機
能を有する悪意呼追跡方式を提供することである。
The purpose of the present invention is to eliminate the drawbacks of the conventional system described above, and to provide a malicious system having a function of preventing the click sound generated when a called subscriber performs a hooking operation to request tracking of a malicious call from being sent to the calling party. The purpose of the present invention is to provide a call tracking method.

〔問題点を解決するための手段〕[Means for solving problems]

問題点を解決するための手段は、発信局と着信局からな
る電話交換網で該着信局の悪意呼登録加入者のフッキン
グ操作により悪意呼追跡を開始する機能を備えたものに
於いて、該発信局に於ける発呼時に該悪意呼追跡登録表
と照合し、該悪意呼登録加入者であれば呼出し中の状態
で悪意呼追跡を実施し、応答後一時的に該着信局から該
発信局へのパスを切断してフンキング操作により生ずる
クリック音を該発信者へ送出しないことにより達成され
る。
A means to solve the problem is to use a telephone switching network consisting of a calling station and a receiving station, which is equipped with a function to start tracking malicious calls by hooking a subscriber who has registered a malicious call at the receiving station. When a call is made at the originating station, it is checked against the malicious call tracking registration table, and if the malicious call is a registered subscriber, the malicious call is traced while the call is in progress, and after the call is answered, the terminating station temporarily cancels the call. This is accomplished by cutting the path to the station so that the click sound produced by the hunking operation is not transmitted to the caller.

又上記悪意呼追跡登録表に緊急度表示と悪意呼追跡時間
帯表を付加し、緊急度及び時間帯により呼出し音を着信
加入者に対し送出すると共に発信者電話番号、モニタ電
話番号、該着信加入者のメツセージを出力することによ
り達成される。
In addition, an emergency level display and a malicious call tracking time zone table are added to the above malicious call tracking registration table, and a ring tone is sent to the called subscriber depending on the level of urgency and time zone, as well as the caller's phone number, monitor phone number, and the incoming call. This is achieved by outputting the subscriber's messages.

〔作用〕[Effect]

本発明に依ると着信加入者が行うフッキング操作により
発生するクリック音の送出を阻止する為、一時的に一方
路(着信側から発信側への方路)の通話路を切断する機
能を交換機に付加し、又緊急追跡用の時間畳表を備える
ことにより其の時間帯内では着信加入者がフッキング操
作を行わなくても悪意呼追跡が実施出来る機能を具備さ
せることにより、究極的にはフッキング操作により発生
するクリック音を悪意呼の発信加入者が聞いて逃亡する
のを未然に阻止し、効果的な犯人追跡を可能にすると云
う効果が生まれる。
According to the present invention, in order to prevent the sending of a click sound caused by a hooking operation performed by a called subscriber, the exchange is equipped with a function that temporarily disconnects the communication path on one side (from the called side to the calling side). In addition, by providing a time table for emergency tracking, it is possible to perform malicious call tracking without the need for the receiving subscriber to perform a hooking operation within that time period, which will ultimately prevent the hooking operation. This has the effect of preventing the subscriber who made the malicious call from hearing the click sound generated by the system and escaping, thereby making it possible to effectively track down the culprit.

〔実施例〕〔Example〕

第1図は交換システムに於けるクリック音送出防止の一
実施例を示す図である。
FIG. 1 is a diagram showing an embodiment of preventing the transmission of click sounds in an exchange system.

第2図はフンキング操作なしに悪意呼追跡を行う一実施
例を示す図である。
FIG. 2 is a diagram illustrating an embodiment in which malicious call tracing is performed without a hunking operation.

図中、10は加入者ライントラック、11はラインコン
セントレータ、12は一次タイムスイッチ、13は一次
タイムスイッチ12の制御メモリ、14は二次タイムス
イッチ、15は二次タイムスイッチ14の制御メモリ、
16はSSW、、17は5SW16の制御メモリ、18
は一次タイムスイッチ、19は一次タイムスインチ18
の制御メモリ、20は二次タイムスイッチ、21は二次
タイムスイッチ20の制御メモリ、22はラインコンセ
ントレータ、23は加入者ライントラッ胆 り、24は悪意呼追跡時間帯χである。
In the figure, 10 is a subscriber line track, 11 is a line concentrator, 12 is a primary time switch, 13 is a control memory of the primary time switch 12, 14 is a secondary time switch, 15 is a control memory of the secondary time switch 14,
16 is SSW, 17 is control memory of 5SW16, 18
is the primary time switch, 19 is the primary time switch inch 18
20 is a secondary time switch, 21 is a control memory of the secondary time switch 20, 22 is a line concentrator, 23 is a subscriber line tracker, and 24 is a malicious call tracing time period χ.

以下図に従って本発明の詳細な説明する。The present invention will be described in detail below with reference to the drawings.

第1図に於いては6は悪意呼発信者、7は着信加入者と
し、−は悪意呼発信者6から着信加入者7への通話路、
−は着信加入者7から悪意呼発信者6への通話路を表す
In FIG. 1, 6 is the malicious call originator, 7 is the terminating subscriber, and - is the communication path from the malicious call originator 6 to the terminating subscriber 7.
- represents the communication path from the receiving subscriber 7 to the malicious call originator 6.

悪意呼発信者6が着信加入者7のダイヤル番号を廻すと
、此のダイヤル番号を交換機内に設けられた悪意呼追跡
登録表3内に登録されている加入者番号と照合し、一致
すれば着信加入者7が応答直後、着信加入者7−悪意呼
発信者6の通話路のみ切断する。此れは二次タイムスイ
ッチ14のパスを切断することにより行われ、此の切断
は成る一定のタイミング期間内だけ切断する。
When the malicious call originator 6 dials the dialed number of the called subscriber 7, this dialed number is compared with the subscriber number registered in the malicious call tracking registration table 3 provided in the exchange, and if they match, the dialed number is checked. Immediately after the terminating subscriber 7 responds, only the communication path between the terminating subscriber 7 and the malicious call originator 6 is disconnected. This is done by cutting the path of the secondary time switch 14, which cuts only within a certain timing period.

此のタイミング期間内に着信加入者7がフッキングを行
うと通話路は着信加入者7−悪意呼発信者6の方路のみ
設定されている為、着信加入者7−悪意呼発信者6の方
路に送出されるクリック音は悪意呼発信者6に感知され
ることはない。
If the terminating subscriber 7 hooks within this timing period, only the route from the terminating subscriber 7 to the malicious call originator 6 is set, so the route from the terminating subscriber 7 to the malicious call originator 6 is set. The click sound sent to the public is not detected by the malicious call originator 6.

フッキング信号受信後、又は前記タイミング期間終了後
、切断された着信加入者7→悪意呼発信者6の方路を再
設定し、通話可能状態とする。
After receiving the hooking signal or after the end of the timing period, the route from the disconnected subscriber 7 to the malicious call originator 6 is reset, and the call is enabled.

第2図に示す実施例の場合は、第1図の実施例と悪意呼
追跡登録表3内に登録されている加入者番号の照合迄は
同一である。
The embodiment shown in FIG. 2 is the same as the embodiment shown in FIG. 1 until the subscriber number registered in the malicious call tracing registration table 3 is verified.

然し其の後、着信加入者7が緊急追跡対象であるか否か
を、悪意呼追跡登録表3内のプライオリティ表示により
判別する。
However, after that, it is determined whether the called subscriber 7 is an object of emergency tracing or not based on the priority display in the malicious call tracing registration table 3.

第2図に於いて悪意呼追跡登録表3に示されている記号
■は登録中の表示で、悪意呼のサービスを受けたい加入
者がある場合、交換局の保守者は其の申請を加入者から
受けた後、悪意呼サービス実施加入者(DN−電話番号
)を交換機に登録する。
In Figure 2, the symbol ■ shown in Malicious Call Tracking Registration Table 3 indicates that registration is in progress, and if there is a subscriber who wishes to receive malicious call service, the maintenance staff of the switching center must submit the application. After receiving the malicious call service from the user, the subscriber (DN-telephone number) implementing the malicious call service is registered in the exchange.

其の手段としてはタイプライタから悪意呼追跡を受ける
加入者を打ち込む。交換機内のソフトウェア・プログラ
ムにより此の加入者情報を悪意呼追跡登録表3に書込む
One way to do this is to type in the name of the subscriber who will receive malicious call tracking from a typewriter. A software program within the exchange writes this subscriber information into the malicious call tracing registration table 3.

又悪意呼追跡を中止したい場合も同様にタイプライタに
よりキャンセルする旨を打込むと交換機内のソフトウェ
ア・プログラムにより其の加入者情報を悪意呼追跡登録
表3から削除する。
If the subscriber wishes to cancel the malicious call tracing, he or she may similarly type in the intention to cancel using a typewriter, and the software program within the exchange will delete the subscriber information from the malicious call tracing registration table 3.

従って登録エリアが使用中であるか、否かを判別する方
法として記号Iを使用する。
Therefore, symbol I is used as a method for determining whether a registration area is in use or not.

又第2図に於いて悪意呼追跡登録表3に示されている記
号Pはプライオリティ表示で、緊急追跡加入者であるか
、否かを判別する為の表示であり、若し此の表示があれ
ば、悪意呼追跡時間帯表24を参照し、現在時間が其の
時間帯内であれば呼出し音を着信加入者7に対し送出す
ると共に発信者電話番号、モニタ電話番号、着信加入者
7のメツセージを出力する。従って着信加入者7のフッ
キングは不要である。
In addition, the symbol P shown in the malicious call tracking registration table 3 in Figure 2 is a priority display, which is used to determine whether the subscriber is an emergency tracking subscriber or not. If there is, refer to the malicious call tracking time zone table 24, and if the current time is within that time zone, a ring tone is sent to the called subscriber 7, and the caller's telephone number, monitor telephone number, and called subscriber 7 are sent. Outputs the message. Hooking of the called subscriber 7 is therefore unnecessary.

又前記説明に於ける悪意呼追跡登録表3内の悪意呼追跡
時間帯表、プライオリティ表示は随時変更することが出
来のでシステムに融通性を持たせることが可能である。
Furthermore, the malicious call tracing time zone table and priority display in the malicious call tracing registration table 3 in the above description can be changed at any time, making it possible to provide flexibility to the system.

更に呼出し中にフッキング操作なしでも悪意呼追跡メツ
セージを出力する機構は、他の状態例えば着信加入者7
の応答時にも適用可能である。
Furthermore, a mechanism for outputting a malicious call tracing message without a hooking operation during a call can be implemented in other conditions, such as when the called subscriber 7
It is also applicable when responding to

〔発明の効果〕〔Effect of the invention〕

以上詳細に説明した様に本発明によれば、フッキング操
作により発生するクリック音が発信者に聞こえることは
なく、又フッキング操作を行うことなく悪意呼追跡を行
うことが出来ると云う大きい効果がある。
As explained in detail above, the present invention has the great effect that the click sound generated by the hooking operation cannot be heard by the caller, and malicious call tracing can be performed without performing the hooking operation. .

防止の一実施例を示す図である。It is a figure which shows one example of prevention.

第2図はフッキング操作なしに悪意呼追跡を行う一実施
例を示す図である。
FIG. 2 is a diagram showing an embodiment in which malicious call tracking is performed without hooking operations.

第3図は従来の悪意呼追跡方式の一例を示す図である。FIG. 3 is a diagram showing an example of a conventional malicious call tracing method.

図中、1は発信局、2は発信局1の出トランク、3は悪
意呼追跡登録表、4は着信局、5は着信局4の入トラン
ク、6は発信加入者、7は着信加入者、lOは加入者ラ
イントラック、11はラインコンセントレータ、12は
一次タイムスイッチ、13は一次タイムスイッチ12の
制御メモリ、14は二次タイムスイッチ、15は二次タ
イムスイッチ14の制御メモリ、16はSSW、17は
5SW16(7)制御/ −T−17,18は一次タイ
ムスイッチ、19は−次タイムスイッチ18の制御メモ
リ、20は二次タイムスイッチ、21は二次タイムスイ
ッチ20の制御メモリ、22はライ賽 3 図
In the figure, 1 is the originating station, 2 is the outgoing trunk of the originating station 1, 3 is the malicious call tracking registration table, 4 is the terminating station, 5 is the incoming trunk of the terminating station 4, 6 is the originating subscriber, and 7 is the terminating subscriber. , IO is a subscriber line track, 11 is a line concentrator, 12 is a primary time switch, 13 is a control memory of the primary time switch 12, 14 is a secondary time switch, 15 is a control memory of the secondary time switch 14, 16 is SSW , 17 is 5SW16 (7) control/-T-17, 18 is the primary time switch, 19 is the control memory for the -next time switch 18, 20 is the secondary time switch, 21 is the control memory for the secondary time switch 20, 22 3 dice

Claims (1)

【特許請求の範囲】 1、発信局と着信局からなる電話交換網で該着信局の悪
意呼登録加入者のフッキング操作により悪意呼追跡を開
始する機能を備えたものに於いて、該発信局に於ける発
呼時に該悪意呼追跡登録表と照合し、該悪意呼登録加入
者であれば呼出し中の状態で悪意呼追跡を実施し、応答
後一時的に該着信局から該発信局へのパスを切断してフ
ッキング操作により生ずるクリック音を該発信者へ送出
しないことを特徴とする悪意呼追跡方式。 2、上記悪意呼追跡登録表に緊急度表示と悪意呼追跡時
間帯表を付加し、緊急度及び時間帯により呼出し音を着
信加入者に対し送出すると共に発信者電話番号、モニタ
電話番号、該着信加入者のメッセージを出力することを
特徴とする特許請求の範囲第1項記載の悪意呼追跡方式
[Scope of Claims] 1. In a telephone switching network consisting of a calling station and a terminating station, which is equipped with a function of starting malicious call tracking by a hooking operation of a malicious call registered subscriber of the terminating station, the calling station When a call is made, it is checked against the malicious call tracing registration table, and if the malicious call is a registered subscriber, the malicious call is traced while the call is in progress, and after the call is answered, the call is temporarily transferred from the receiving station to the calling station. A malicious call tracing method characterized in that a click sound generated by a hooking operation is not transmitted to the caller by cutting the path of the caller. 2. Add an emergency level display and a malicious call tracking time zone table to the above malicious call tracking registration table, and send a ring tone to the called subscriber depending on the level of urgency and time zone, as well as the caller's phone number, monitor phone number, and the corresponding phone number. A malicious call tracing system according to claim 1, characterized in that a message of a called subscriber is output.
JP3795285A 1985-02-27 1985-02-27 System for tracing malicious call Pending JPS61198856A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP3795285A JPS61198856A (en) 1985-02-27 1985-02-27 System for tracing malicious call

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP3795285A JPS61198856A (en) 1985-02-27 1985-02-27 System for tracing malicious call

Publications (1)

Publication Number Publication Date
JPS61198856A true JPS61198856A (en) 1986-09-03

Family

ID=12511883

Family Applications (1)

Application Number Title Priority Date Filing Date
JP3795285A Pending JPS61198856A (en) 1985-02-27 1985-02-27 System for tracing malicious call

Country Status (1)

Country Link
JP (1) JPS61198856A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2712131A1 (en) * 1993-11-02 1995-05-12 Frc Pro Sarl Long-term digital backup of compressed data, automated simultaneously at input and output, particularly allowing digital security protection of the recording of telephone taps

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2712131A1 (en) * 1993-11-02 1995-05-12 Frc Pro Sarl Long-term digital backup of compressed data, automated simultaneously at input and output, particularly allowing digital security protection of the recording of telephone taps

Similar Documents

Publication Publication Date Title
JPH05160886A (en) Digital terminal equipment
JP3080262B2 (en) Exchange control unit
JPS61198856A (en) System for tracing malicious call
JPS60200666A (en) Call waiting connecting system
JPS62281648A (en) Automatic telephone answering equipment
JPH04215355A (en) Interruptive call response system
JP2651694B2 (en) Automatic telephone line switching device
JPH04355552A (en) Call tone transmission system
JPH03101355A (en) Ring-back tone transmission control system
JPS59144228A (en) Automatic exchange
JPH04363947A (en) Telephone set for packet line
JPH04208750A (en) Audio mail switching system
JPH0483458A (en) Method for sending ring-back tone including guidance
JP2000069150A (en) Automated answering telephone system
JPH08163250A (en) Incoming telephone call exchanging method
JPH0213163A (en) Private telephone system, its caller the same equipment and called party the same equipment
JPS63151162A (en) Voice mail equipment
KR19980034173A (en) Automatic distribution of call and fax calls from key phone system
JPH05268326A (en) Data terminal calling system for common line signal system
JPS63151161A (en) Voice mail equipment
JPH0946501A (en) Device for notifying erroneous termination of facsimile document
JPH05219230A (en) Pocket beeper system for digital extension telephone set
JPH0295063A (en) Call signal sending system
JPS62183650A (en) Telephone equipment
JPS6281160A (en) Electronic computer