US English (US)
GB English (UK)

By Appointment to
His Majesty The King
Contact Centre Service Software
Cirrus Response Ltd
Epsom

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Cirrus eLearning
  • Contact Us
English (UK)
US English (US)
GB English (UK)
  • Home
  • Cirrus Connect
  • Administrator
  • Phone & Text

Identifications

Written by Keith Winhall

Updated at May 30th, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Cirrus Connect
    Agent Supervisor Administrator
  • Cirrus Digital
    Agents Supervisors Administrators API Documentation
  • Release Notes
    Release FAQs Latest Release 2025 2024 2023
  • Customer Billing
+ More

Table of Contents

Identifications Module Overview Advantages of Caller Identification Example Scenario Caller Identification Methods Benefits of Caller Identification Step 1: Create an identification list 1. Access Identification Lists 2. Create a New Identification List 3. Configure Identification Members 4. Identification Member Fields 5. Importing Members into an Identification List Export Existing Data First Edit & Import Data Step 2: Create an identification 1. Access Identification Settings 2. Create a New Identification Module 3. Identification Code Settings 4. Exception Handling 5. Save the Identification Module

Identifications Module Overview

The Identifications Module allows callers to be recognised using stored database information. Identified callers can be routed through a specific call flow or excluded from certain services based on predefined criteria.

Advantages of Caller Identification

Identification enables organisations to:

  • Track call volumes per office or department.
  • Personalise service based on caller identity.
  • Restrict or prioritise access for certain callers.

Example Scenario

A multinational company’s technical helpdesk supports ICT-related queries worldwide. Using caller identification, the system:

  1. Tracks call volumes from different offices.
  2. Displays caller details in the agent’s application.
  3. Routes authorised callers to the international helpdesk.
  4. Groups callers by office for more efficient reporting.

Similar use cases include:

  • Offering premium service to paying customers.
  • Differentiating new vs. returning callers.

Caller Identification Methods

Method Description
CLI – Calling Line Identification Stores the caller’s phone number for recognition. Allows routing based on wildcards (*) or ranges (-), useful for sorting calls by country or area code.
DNIS – Dialed Number Identification Service Recognises callers based on the number they dialled. Used when organisations assign dedicated numbers for specific groups.
CHNL – Channel Number Identification Identifies calls using the Channel Number.
PID – Personal Identity (PIN-based identification) Requires callers to enter a unique PIN to verify their identity, often used for premium services or secure personal calling.
PID with Confirmation Same as PID, but requires the caller to confirm their PIN entry before proceeding.
Subject-Based Identification For Text Channels, calls can be identified based on their subject line, enabling more contextual routing.

Benefits of Caller Identification

  • Displays caller details in the agent’s Client application.
  • Enables customised call flows, such as:
    • Routing callers to dedicated services or departments.
    • Playing personalised prompts, e.g., "Safe and Sure welcomes you to Gold Service Assistance."
  • Allows call prioritisation:
    • Identified callers can be placed higher or lower in the queue based on priority settings.

Each Identification Module is linked to an Identification List, containing the stored caller data.

Step 1: Create an identification list

The Identification List enables multiple Identification Modules to reference a single member list, improving efficiency in caller identification. This allows for sequential identification, such as CLI first, followed by PID.

1. Access Identification Lists

  • In the Explorer Pane, navigate to Voice > Identification Lists.
  • A list of existing Identification Lists will be displayed.

2. Create a New Identification List

  • Click Add.
  • Assign a logical name to the Identification List.
  • Click Add to save.

3. Configure Identification Members

  • Select the newly created Identification List.
  • Click on the Identification Members tab.
  • Click Add to insert new members.

4. Identification Member Fields

Field Description
Name Enter the caller’s name, or if identifying a group of callers, enter the group or service name.
IdentificationNumber If PID identification is used, enter the PID number per member.
Description Displays caller details in the Agent application Client (e.g., user type, organisation, status).
Telephone Number If CLI identification is used, this number will serve as the reference. Wildcard (*) or range (-) entries are supported.
$USER Entry This entry checks whether the number belongs to a registered user, including guest and external users.
Email Address Displays the caller’s email in the Client application.
LinkInstance Specifies the next module assigned to this caller. 
Module Type If no next module is assigned, the default action is executed.

Note: The $USER entry is always checked last in an Identification List.

5. Importing Members into an Identification List

Export Existing Data First

  1. Select the Identification List you wish to update.
  2. In the Identification Members tab, enter details for one member.
  3. Click Export to save a CSV file.
  4. Choose a location to store the exported file.

Edit & Import Data

  1. Open the exported file in Microsoft Excel.
  2. Add new members and fill in their data.
  3. Click Import and select the updated CSV file.
  4. Click OK to complete the import.

Note: A duplicate check is performed based on:

  • Identification Number
  • Telephone Number
  • Email Address

Step 2: Create an identification

The Identification Module allows callers to be recognised based on pre-stored information and routed accordingly. You can configure various identification methods to enhance call handling.

1. Access Identification Settings

  • In the Explorer Pane, navigate to Phone & Text > Identifications.
  • A list of existing Identification Modules will be displayed.

2. Create a New Identification Module

Click Add to create a new Identification Module.

Configure the following settings:

Name – Assign a name to the module (displayed in reports).

Identification Method – Select how the caller should be recognised:

  • CLI – Calling Line Identity (matches stored phone numbers).
  • Called Phone Number – Recognises calls based on the dialled number (DNIS).
  • PID – Personal Identity (requires callers to enter a PIN).
  • PID with Confirmation – Same as PID, but requires PIN confirmation.
  • Channel Number – Identifies calls based on the Channel Number.

Identification List – Select the list of members used by this module.

Copy Fields (Default = Always) – Controls which caller details appear in the Client application:

  • Always – Caller details are always displayed in the Client.
  • When Empty – Displays UCS User details if the identified caller is a UCS User.
  • Never – Caller details are not displayed.

3. Identification Code Settings

If PID or PID with Confirmation is used, enter the following details:

Request Input Prompt – The prompt played when the caller enters the Identification Module (e.g., "Please enter your personal registration number and end with a Hash.").

Max Number of Digits – Specifies the maximum digits allowed for the PID.

  • The system processes input when the caller presses "#".
  • Processing delays follow the UMC Messagebox settings:
    • First Digit Timeout – Maximum wait time for the first digit.
    • Time Between Digits – Maximum wait time between entries.

Max Number of Retries – Defines how many times the caller can re-enter the PID.

  • If the caller exceeds the limit, they will be routed to the Error Action (see below).

4. Exception Handling

  • Error Prompt – The message played if the caller fails identification.
  • Error Action – The fallback destination for failed identification attempts.
  • Default Action – If an identified caller has no assigned next module, they will be routed to the Default Action.

5. Save the Identification Module

  • Click Add to save your changes.

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Call Flow
  • IVRs
  • Clocks
  • Menus
  • Routers

Cirrus
Office 126
63 St Mary Axe
London, EC3A 8AA
Tel: 0333 103 3333
Email: cm@cirrusconnects.com

Social: twitter linkedin

Privacy Policy

Postal address
Cirrus
PO Box 708
Epsom, KT17 9RA
Tel: 0333 103 3333
Email: support@cirrusconnects.com

© Copyright Cirrus


Knowledge Base Software powered by Helpjuice

Expand