malicious call tracing meaning in Chinese
恶意呼叫追踪
Examples
- Abstract : the paper introduces various identification methods for tracing the malicious call and calling identification services in spc telephone exchanges , especially describes the malicious call trace methods by using switch boards and " r " key tandem function and telephone set which can display calling subscriber ' s numbers
文摘:介绍了程控电话交换机追查恶意呼叫和主叫用户信息识别业务的各种识别方法,特别是详细介绍了利用话务台和话机上的" r "键转接的功能,以及利用能显示主叫信息的话机来显示主叫电话号码和追查恶意呼叫电话的方法。 - The paper introduces various identification methods for tracing the malicious call and calling identification services in spc telephone exchanges , especially describes the malicious call trace methods by using switch boards and " r " key tandem function and telephone set which can display calling subscriber ' s numbers
介绍了程控电话交换机追查恶意呼叫和主叫用户信息识别业务的各种识别方法,特别是详细介绍了利用话务台和话机上的" r "键转接的功能,以及利用能显示主叫信息的话机来显示主叫电话号码和追查恶意呼叫电话的方法。