<p>Because TIM Enterprise (in conjunction with one or more 
<span class="reference">Magic Boxes</span>) records the call audio at strategic boundaries in your 
telecom infrastructure - usually your organisation's <b>telephone 
lines</b>, rather than each user's telephone 
<b>handset</b> - some reconciliation is normally required 
between those boundaries and the actual agent that handled the 
call.</p>

<p>By default, this reconcilliation occurs automatically by TIM Enterprise, which is how the
 agent-centric calls that you see in call reports are able to be 
associated (matched) with each call as seen from the point of view of a 
telephone line, which delivers calls to many agents.</p>

<p>During obfuscation, it is necessary that a user or device sends at least two 
signals to TIM Enterprise. Together, these two signals allow 
TIM Enterprise to mask out the audio between the two points in time that
 each signal was received.</p>

<img class="screenshot" src="http://www.tri-line.com/common/img/documentation/tim_enterprise/obfuscation.png" alt="Obfuscation" />

<p>At the point in time during an agent's call when obfuscation is necessary -
 e.g. <i>"Can I have your CVV number please?"</i> is spoken 
by the agent, a signal is sent by the agent to TIM Enterprise, which 
records the event along with the exact time it was sent.</p>

<p>Similarly, when the sensitive part of the call has completed, a further signal is 
sent by the agent to TIM Enterprise, which records that event 
too.</p>

<p>A single telephone call can contain more than one obfuscation; the number of signals required is 
always exactly twice the amount of obfuscations in a call.</p>

<h2>Assumptions</h2>

<p>This guide assumes the following statements are true:-</p>

<ul>
	<li>You have a licensed copy of TIM Enterprise that includes voice recording</li>
	<li>Your installation is at least version 3.0.0.55</li>
	<li>You have one or more <span class="reference">Magic Boxes</span> installed, each with their governing <span class="reference">RTA Service</span></li>
</ul>

<h2>Common solutions</h2>

<p>Taking the example of masking out some digits of a phone call when a credit 
card number is being quoted, most solution providers modify the data 
entry system that an agent uses.</p>