CDEF Features for iOS
You can download CDEF App from Apple Store on your iPhone phone or tablet. We recommend that you get apps from APple Store rather than any third-party websites.
The various features of CDEF on iOS are as defined below.
The Call Logs feature provides a complete and organized view of call activities within a clean and user-friendly interface. A “Call History” header appears at the top, along with a search option and notification icon for easy navigation.
The call log displays:
- Contact name or phone number
- Date and time of the call
- Call duration
- Clear icons indicating incoming, outgoing, and missed calls
For unknown numbers, the app searches its database and displays the identified name along with a verification label such as “Identified by CDEF” when available.
On iOS, incoming calls do not display a real-time popup. Instead, caller identification is shown within the call interface, where users can view the number along with the identified name from the CDEF database.
Additionally, a call option is available within the app, allowing users to initiate calls quickly with a single tap.
iOS Note:
Due to iOS platform restrictions, call logs are available for calls involving Android devices (Android ↔ iOS). Calls made exclusively between iOS devices (iOS ↔ iOS) may not be fully recorded or displayed.
Summary
The Call Logs feature on iOS provides a structured view of call activity along with reliable caller identification powered by CDEF. While certain platform limitations apply, it ensures users can still access essential call insights and identify unknown numbers effectively.
Smart Contacts with Purpose - Based Calling
Our app displays all contacts in alphabetical order (after access is granted), making navigation simple and familiar. A smart search bar at the top allows users to quickly find any contact, and a Quick Call button beside each name enables instant calling.
Unique Feature: Purpose-Based Calling (CDEF to CDEF Users)
When both the caller and receiver are using the CDEF app, the Quick Call button is replaced with a red Purpose icon.
After tapping it, the caller can:
Select the type of call from a dropdown:
- Emergency Call
- Promotional Call
- Other: Enter the reason for calling (e.g., “HELP ME”).
- What the Receiver Sees:
When the receiver gets the call, a priority pop-up alert appears on their screen showing:
- Caller’s Name
- Phone Number
- Call Type (e.g., Emergency Call)
- Other (e.g., “HELP ME”)
- AI Threat Score (analyzed in real-time)
This ensures the receiver understands the urgency and context of the call before answering, enabling faster and more informed decisions.
Check Any Link Before You Click
URL Scan is a built-in security feature in our Caller ID app that allows users to instantly check whether a website link is safe or potentially harmful.
With online scams, phishing links, and fake websites increasing every day, clicking the wrong link can expose your personal data, banking details, or private information.
URL Scan helps you stay protected — before you tap.
🚀 How It Works
Using URL Scan is simple:
- Copy any suspicious link (from SMS, WhatsApp, email, social media, etc.)
- Open the Caller ID app.
- Tap on “URL Scan.”
Paste the link into the search field.
Click Search (or Clear to remove and enter a new link).
Within seconds, the app analyzes the URL and displays a detailed safety report.
🛡 What Information Does It Show?
After scanning, the user can see:
✅ Whether the URL is Safe or Risky
⚠️ If it is a phishing attempt
🔐 If the link is trying to steal personal or financial information.
🌍 Where the website is hosted.
📅 Basic domain details
🔎 Website background and security indicators
This helps users make an informed decision before clicking.
🎯 Why This Feature is Important
- Today, most cyber scams happen through links sent via:
- SMS (Bank fraud, KYC update scams)
- WhatsApp forwards
- Fake delivery messages
- Fake job offers
- OTP theft links
- Social media DMs
Instead of guessing, users can now verify instantly.
💡 Benefits for Users
✔ Prevents Phishing Attacks
Avoid fake banking, UPI, or payment links.
✔ Protects Personal Data
Stops scammers from accessing private photos, passwords, or OTPs.
✔ Saves Money
Prevents financial fraud and unauthorized transactions.
✔ Instant Results
No technical knowledge required.
✔ Easy to Use
Just copy → paste → search.
🔥 How We Are Different from the Market
Unlike regular caller ID apps that only identify phone numbers, our app goes one step further:
📞 Caller Identification + 🌐 Link Protection in one app
Real-time URL risk analysis
Clear “Safe / Unsafe” status for easy understanding
Detailed website insights, not just a basic warning
Designed for everyday users — no technical confusion
We don’t just tell you who is calling —
We also protect you from what they send.
👥 Who Should Use URL Scan?
- Online shoppers
- Digital payment users
- Working professionals
- Students
- Senior citizens
- Anyone who receives links daily
If you use a smartphone, you need URL Scan.
The Contextual Messaging feature enhances communication by adding purpose and clarity to every call, enabling smarter and less disruptive interactions.
It allows users to attach a subject or message to calls, helping both the caller and receiver understand the intent before and during the conversation.
Each message entry includes:
- Subject or message content
- Contact name or phone number
- Date and time
- Call duration
All messages—both incoming and outgoing—are securely stored for easy access and tracking.
Within the Messages section:
- Incoming messages are organized in a dedicated tab
- Outgoing messages are stored in a separate tab
- Users can tap on any entry to view detailed information
By providing context-aware communication and organized message history, this feature helps users stay informed, reduce interruptions, and manage calls more efficiently.
Short Summary
Contextual Messaging allows users to share call purpose through subject-based messages while storing all interactions with detailed insights for easy tracking and access.
The Search feature allows users to quickly look up any phone number within the app and access verified information from the CDEF database.
Unlike traditional caller ID apps that only display a name, this feature provides deeper insights along with AI-powered safety analysis to help users make informed decisions.
📱 Search Number
Users can enter any mobile number to instantly retrieve:
- Registered name (from our database)
- AI Threat Score (Safe / Suspicious / Spam)
Our AI system evaluates multiple factors, including:
- Spam reports
- Fraud indicators
- Suspicious behavior patterns
- Community feedback
This enables users to assess the credibility of a number before calling back or engaging.
With intelligent risk analysis, users don’t just see a name—they understand the level of trust and potential risk associated with it.
Dark web scanning for leaked credentials is a proactive cybersecurity measure that continuously monitors hidden areas of the internet for compromised data related to individuals or organizations. Early detection of exposed credentials allows for immediate remediation, such as password resets, to prevent account takeovers, financial fraud, and data breaches.
Dark web scanning services use a combination of automated tools to find mentions of your data on illicit platforms. Users can enter their sensitive credentials like Mobile number, email ID, credit card, etc., Credit Card etc and check if they are leaked in any Darkweb websites.
Alerts are generated, providing details about the compromised data (e.g., username, password, source of the leak) and recommended next steps. This helps in taking preventive steps against possible cyber attacks based on your credentials by using this intelligence to prioritize risks and respond effectively before the credentials can be weaponized by threat actors for credential stuffing or other attacks.
The Send Request feature allows users to connect with others directly through the app, without needing their phone number.
Instead of searching by number, users can send a connection request using name, making communication more structured, secure, and transparent.
How It Works
- Tap on Search
- Enter the name
- View the identified user from the database
- Tap on the Connect icon
Once you tap the connect option:
- A message box appears
- You can write a custom message
- Tap submit to send the request
Example:
“Hi, I am John, your friend from your previous organization. Let’s connect.”
What the Receiver Sees
When the receiver opens the request, they can view:
- Sender’s name
- Phone number
- Gender
- Email address
- Address
- Custom message
All details are fetched from the sender’s registered profile, ensuring complete transparency.
The receiver can then:
- ✅ Accept
- ❌ Reject
Why Send Request is Powerful
- Enables secure and verified communication
- Helps reconnect without needing saved contacts
- Supports professional and personal outreach
- Ensures clear intent before connecting
How CDEF Stands Out
Most caller ID apps:
- Only allow basic number identification
- Do not support structured connection requests
- Provide limited user information
CDEF offers:
- Secure request-based communication
- Full sender transparency
- User-controlled Accept/Reject system
Your mobile call analytics reporting involves collecting, tracking, and interpreting data from incoming and outgoing calls to improve efficiency of your call management. Analytics are applied to Identify the number of SPAM calls received on a period basis. Turn remainders into actions, empowering human call pattern analysis into actionable intelligence.
Call analytics tools collect, analyze, and interpret data from phone conversations, including inbound and outbound calls, to help you extract valuable insights. By examining patterns, keywords, call durations, and context to gain insights on how to prevent vishing frauds and improve user experiences.
The reports generated include –
- Number of SPAM calls identified
- Number of Calls Blocked
- Who viewed your profile
Settings option allow users to customize their experience through profile management, notification controls, security options, theme selection, data usage preferences etc. Key features often include privacy settings, account linking, cache clearing, and accessibility adjustments.
