SlideShare a Scribd company logo
1 of 27
Download to read offline
Effective STIR/SHAKEN
and Robocall Solutions
that Work Today
• Software to help organizations manage and protect
their telecom networks
• Applications include:
• Telecom fraud prevention
• Unwanted robocall prevention
• STIR/SHAKEN
• Least cost routing
• Telephony Denial of Service (TDoS) prevention
• We’ve been providing such solutions for over 20 years
About
1. A brief history of robocalls,
legislation and regulations
2. STIR/SHAKEN overview
3. Robocall prevention
4. Integration
5. Questions and answers
Agenda
A brief history of
robocalls,
legislation and
regulations
A brief history of robocalls, legislation and regulations
2000 2005 2010 2015 2020
Do-Not-Call
Act
Truth In
Caller ID
Act
FCC
authorizes
limited
blocking
FCC chairman
Pai calls for
SHAKEN/STIR
without delay
FCC
allows
blocking
by default
Robocall
Strike
Force
Canadian
CRTC
2018-32
PA
selected
in U.S.
“I’ve been clear that I expect major voice
service providers to implement
SHAKEN/STIR by the end of 2019…
“I’ve also made clear that if this deadline
is not met, the FCC will act to ensure that
SHAKEN/STIR is implemented. “
– Ajit Pai, FCC Chairman
address to USTelecom robocall forum
June 11, 2019
STIR/SHAKEN
overview
Triangle of trust
Governance
Authority Policies
Policy Administrator
iconectiv
Telephone Service
Providers
Certificate
Authorities
Originating
telephone service
provider
Key
management
service
Certificate
repository
Certificate infrastructure
Certificate
Authority
Originating
telephone service
provider
Terminating
telephone service
provider
Authentication
service
Verification
service
Certificate
repository
Calling party Called party
STIR/SHAKEN: the big picture
SIP network
STIR/SHAKEN doesn’t prevent
robocalls. It prevents caller ID
spoofing so you can answer
more calls you want while
avoiding spam robocalls.
INVITE sip:18001234567@example.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" <sip:14045266060@5.6.7.8:5060>;tag=123456789
To: "Bob" <sip:18001234567@1.2.3.4:5060>
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
Identity:
eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc3Nwb3J0IiwieDV1IjogImh0dHBzOi8
vY2VydGlmaWNhdGVzLmNsZWFyaXAuY29tL2IxNWQ3Y2M5LTBmMjYtNDZjMi04M2VhLWEzZTYzYTgy
ZWMzYS83Y2M0ZGI2OTVkMTNlZGFkYTRkMWY5ODYxYjliODBmZS5jcnQifQ.eyJhdHRlc3QiOiAiQSIsIm
Rlc3QiOiB7InRuIjogWyIxNDA0NTI2NjA2MCJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOi
AiMTgwMDEyMzQ1NjcifSwib3JpZ2lkIjogIjNhNDdjYTIzLWQ3YWItNDQ2Yi04MjFkLTMzZDVkZWVkYmVk
NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-dMF7eCjDYARLR7EZSZwiu0fd4H_QD_
9Z5U2bg;info=<https://certificates.clearip.com/b15d7cc9-0f26-46c2-83ea-a3e63a82ec3a/7cc4db69
5d13edada4d1f9861b9b80fe.crt>alg=ES256;ppt=shaken
SIP INVITE with Identity header
Authentication Identity token decoded
"header":
"alg": "ES256"
"typ": "passport"
"ppt": "shaken"
"x5u": https://certificates.clearip.com/4a8eb5-461b.crt
"payload":
"attest": "A"
"dest": { "tn": [ "14695858065" ] }
"iat": 1529071382
"orig": { "tn": "12013776051" }
"origid": "4aec94e2-508c-4c1c-907b-3737bac0a80e"
Attestation level
Called number
Timestamp
Calling number
Origination identifier
• Authentication for non-carriers (e.g., enterprises)
• Critical for outbound call centers
• Enables Least Cost Routing and Load Balancing among carriers
• Carriers for SHAKEN Authentication and call delivery may be different
• Rich Call Data
• Out-of-Band STIR
STIR/SHAKEN future developments
Authentication for non-carriers (enterprises)
STI-CA STI-CA STI-CA
TN Provider TN Provider TN Provider
Enterprise Enterprise Enterprise
Proof of Possession
TN Provider proxies
certificate signing request
Delegated
TN Provider issues certificate
LEMON-TWIST
TN Provider issues token to
Enterprise for CA authentication
• Additional information about the caller that
can be displayed to the called party, such as:
• Display name
• Hyperlinks to related info, e.g., image of the caller
or company logo
• Flexible set of caller information, e.g., address,
email, birthday, etc.
• Similar to enhanced CNAM
• Except done at origination instead of termination
• Cryptographically secure
• Gives source party greater control over info
presented
Rich Call Data
Example of Rich Call Data in SHAKEN Token
"attest": "A",
"dest": { "tn": [ "12155551213“ ] },
"iat": 1443208345,
"orig": { "tn": "12155551212“ },
"origid": "123e4567-e89b-12d3-a456-426655440000",
"rcd": {
"nam": "James Bond",
"jcd": [
"vcard",
[
[ "version", {}, "text", "4.0" ],
[ "fn", {}, "text", "James Bond" ],
[
"adr", { "type": "work" }, "text",
[ "3100 Apple Ave", "Washington", "DC", "20008", "USA" ]
],
[ "email", {}, "text", "bond@example.com" ],
[ "tel", { "type": [ "voice", "text" ] }, "uri", "tel:+1-202-555-1000" ],
[ "logo", {}, "uri", "https://example.com/logo.jpg" ]
]
]
}
Out-of-Band STIR
Originating
telephone service
provider
Terminating
telephone service
provider
Authentication
service
Verification
service
Calling party Called party
Call Placement Service
Identity
token
Identity
token
SIP network
Normal call flow
Certificate
repository
Robocall
prevention
Robocall prevention methods work well with SHAKEN
• On-net calls from external networks
• By OCN
• By DID
• Invalid calling numbers
• High risk calling numbers
• Calling numbers with poor reputation
• Real time traffic analysis
• STIR/SHAKEN verification
Nuisance call detection methods
• Report only
• Block
• Send to voicemail
• Send to CAPTCHA
• Send to a honeypot
• Modify caller display name (CNAM)
Nuisance call treatment options per subscriber
Can be configured for each subscriber
SHAKEN outcome Reputation Privacy header Digital display Character
display
Verified Good No Caller ID [V]Caller ID
Verified Good Yes Anonymous [V]Anonymous
Verified Poor Yes or No <SPAM> [V]<SPAM>
Failed or no token Good No Caller ID Caller ID
Failed or no token Good Yes Anonymous Anonymous
Failed or no token Poor Yes or No <SPAM> <SPAM>
Caller display name
Integration
Inbound integration
Ingress SBC Switch
302 – Divert, modify CNAM
503 – Report only
603 – Block
SIP INVITE
Called
party
External
network
• Blacklists
• Traffic Analysis
• Reputation
• SHAKEN verification
• CNAM lookup
Outbound integration – option 1
Switch Egress SBC
• Blacklists
• Toll fraud prevention
• SHAKEN authentication
• Least cost routing
302 – Divert, modify destination
503 – Report only
603 – Block
SIP INVITE
Called
party
External
network
Outbound integration – option 2
Switch Egress SBC
• Blacklists
• Toll fraud prevention
• SHAKEN authentication
• Least cost routing
302 – Divert, modify destination
503 – Report only
603 – Block
SIP INVITE
Called
party
External
network
• Get started now!
• Free trial offer
• Month-to-month billing
• No contract – no commitment
• Up to 2 million calls – no charge
• transnexus.com
• info@transnexus.com
• 1-404-526-6060
Questions, answers and discussion

More Related Content

What's hot

IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISMXINTEC
 
International Revenue Share Fraud webinar
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinarXINTEC
 
The Legality of Call Recording
The Legality of Call RecordingThe Legality of Call Recording
The Legality of Call RecordingShoreTel
 
Top 10 Inbound And Outbound Calling Compliance Issues
Top 10 Inbound And Outbound Calling Compliance IssuesTop 10 Inbound And Outbound Calling Compliance Issues
Top 10 Inbound And Outbound Calling Compliance IssuesRyan Thurman
 
Neustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigationNeustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigationThomas McNally
 
Reveneu frauds and telcos
Reveneu frauds and telcosReveneu frauds and telcos
Reveneu frauds and telcosmrkhanlodhi
 
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Ryan Thurman
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom FraudJeraSoft
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sectorsksahu099
 
How to Increase Mobile Registration Conversions
How to Increase Mobile Registration Conversions How to Increase Mobile Registration Conversions
How to Increase Mobile Registration Conversions TeleSign Corporation
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeAlan Percy
 
Cutting Edge TCPA Solutions
Cutting Edge TCPA SolutionsCutting Edge TCPA Solutions
Cutting Edge TCPA SolutionsRyan Thurman
 
2014 march falcon business fraud classification model (3attendees)
2014 march falcon business fraud classification model (3attendees)2014 march falcon business fraud classification model (3attendees)
2014 march falcon business fraud classification model (3attendees)jcsobreira
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksAlan Percy
 
V way call
V way callV way call
V way callajbayne
 

What's hot (20)

IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
 
International Revenue Share Fraud webinar
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinar
 
The Legality of Call Recording
The Legality of Call RecordingThe Legality of Call Recording
The Legality of Call Recording
 
Top 10 Inbound And Outbound Calling Compliance Issues
Top 10 Inbound And Outbound Calling Compliance IssuesTop 10 Inbound And Outbound Calling Compliance Issues
Top 10 Inbound And Outbound Calling Compliance Issues
 
Inroamer frauds
Inroamer fraudsInroamer frauds
Inroamer frauds
 
Subex cv akhil_singh_rawat
Subex cv akhil_singh_rawatSubex cv akhil_singh_rawat
Subex cv akhil_singh_rawat
 
Neustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigationNeustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigation
 
Reveneu frauds and telcos
Reveneu frauds and telcosReveneu frauds and telcos
Reveneu frauds and telcos
 
Sim box
Sim boxSim box
Sim box
 
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom Fraud
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
 
How to Increase Mobile Registration Conversions
How to Increase Mobile Registration Conversions How to Increase Mobile Registration Conversions
How to Increase Mobile Registration Conversions
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
Cutting Edge TCPA Solutions
Cutting Edge TCPA SolutionsCutting Edge TCPA Solutions
Cutting Edge TCPA Solutions
 
Pabx fraud
Pabx fraudPabx fraud
Pabx fraud
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
2014 march falcon business fraud classification model (3attendees)
2014 march falcon business fraud classification model (3attendees)2014 march falcon business fraud classification model (3attendees)
2014 march falcon business fraud classification model (3attendees)
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
V way call
V way callV way call
V way call
 

Similar to Effective STIR/SHAKEN and Robocall Solutions that Work Today

Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENTelcoBridges Inc.
 
ITA SHAKEN Presentation Draft.pptx
ITA SHAKEN Presentation Draft.pptxITA SHAKEN Presentation Draft.pptx
ITA SHAKEN Presentation Draft.pptximranCCIE
 
The Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionThe Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionAlan Percy
 
The Role of SBCs in Fraud Protection
The Role of SBCs in Fraud ProtectionThe Role of SBCs in Fraud Protection
The Role of SBCs in Fraud ProtectionTelcoBridges Inc.
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeTelcoBridges Inc.
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Alan Percy
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?TelcoBridges Inc.
 
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023lindsey601888
 
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdfLilminow
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENTelcoBridges Inc.
 
Enhanced Voice Transit + Global Insights- Customer Facing Slides-Voxbone.pdf
Enhanced Voice Transit + Global Insights- Customer Facing Slides-Voxbone.pdfEnhanced Voice Transit + Global Insights- Customer Facing Slides-Voxbone.pdf
Enhanced Voice Transit + Global Insights- Customer Facing Slides-Voxbone.pdfMamtaMittal21
 
StarTelecom Product Catalogue
StarTelecom Product CatalogueStarTelecom Product Catalogue
StarTelecom Product CatalogueBrad Swift
 
TalkTalk Data Breach Case Study
TalkTalk Data Breach Case StudyTalkTalk Data Breach Case Study
TalkTalk Data Breach Case StudyCharlie Pownall
 
Top 6 Telecom Industry Trends
Top 6 Telecom Industry TrendsTop 6 Telecom Industry Trends
Top 6 Telecom Industry TrendsSam Sansome
 
How to Verify if Phone Numbers are Active or Disconnected - Self-Service Batc...
How to Verify if Phone Numbers are Active or Disconnected - Self-Service Batc...How to Verify if Phone Numbers are Active or Disconnected - Self-Service Batc...
How to Verify if Phone Numbers are Active or Disconnected - Self-Service Batc...ATMDepot.com & Searchbug.com
 
Interconnection Revolution for GSM operators and MVNOs
Interconnection Revolution for GSM operators and MVNOsInterconnection Revolution for GSM operators and MVNOs
Interconnection Revolution for GSM operators and MVNOsTelecomsXChange
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksTelcoBridges Inc.
 
Why Cogent (2)
Why Cogent (2)Why Cogent (2)
Why Cogent (2)browe
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCAlan Percy
 

Similar to Effective STIR/SHAKEN and Robocall Solutions that Work Today (20)

Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKEN
 
ITA SHAKEN Presentation Draft.pptx
ITA SHAKEN Presentation Draft.pptxITA SHAKEN Presentation Draft.pptx
ITA SHAKEN Presentation Draft.pptx
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 
The Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionThe Role of SBC in Fraud Protection
The Role of SBC in Fraud Protection
 
The Role of SBCs in Fraud Protection
The Role of SBCs in Fraud ProtectionThe Role of SBCs in Fraud Protection
The Role of SBCs in Fraud Protection
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
 
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
Enhanced Voice Transit + Global Insights- Customer Facing Slides-Voxbone.pdf
Enhanced Voice Transit + Global Insights- Customer Facing Slides-Voxbone.pdfEnhanced Voice Transit + Global Insights- Customer Facing Slides-Voxbone.pdf
Enhanced Voice Transit + Global Insights- Customer Facing Slides-Voxbone.pdf
 
StarTelecom Product Catalogue
StarTelecom Product CatalogueStarTelecom Product Catalogue
StarTelecom Product Catalogue
 
TalkTalk Data Breach Case Study
TalkTalk Data Breach Case StudyTalkTalk Data Breach Case Study
TalkTalk Data Breach Case Study
 
Top 6 Telecom Industry Trends
Top 6 Telecom Industry TrendsTop 6 Telecom Industry Trends
Top 6 Telecom Industry Trends
 
How to Verify if Phone Numbers are Active or Disconnected - Self-Service Batc...
How to Verify if Phone Numbers are Active or Disconnected - Self-Service Batc...How to Verify if Phone Numbers are Active or Disconnected - Self-Service Batc...
How to Verify if Phone Numbers are Active or Disconnected - Self-Service Batc...
 
Interconnection Revolution for GSM operators and MVNOs
Interconnection Revolution for GSM operators and MVNOsInterconnection Revolution for GSM operators and MVNOs
Interconnection Revolution for GSM operators and MVNOs
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
Why Cogent (2)
Why Cogent (2)Why Cogent (2)
Why Cogent (2)
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Effective STIR/SHAKEN and Robocall Solutions that Work Today

  • 1. Effective STIR/SHAKEN and Robocall Solutions that Work Today
  • 2. • Software to help organizations manage and protect their telecom networks • Applications include: • Telecom fraud prevention • Unwanted robocall prevention • STIR/SHAKEN • Least cost routing • Telephony Denial of Service (TDoS) prevention • We’ve been providing such solutions for over 20 years About
  • 3. 1. A brief history of robocalls, legislation and regulations 2. STIR/SHAKEN overview 3. Robocall prevention 4. Integration 5. Questions and answers Agenda
  • 4. A brief history of robocalls, legislation and regulations
  • 5. A brief history of robocalls, legislation and regulations 2000 2005 2010 2015 2020 Do-Not-Call Act Truth In Caller ID Act FCC authorizes limited blocking FCC chairman Pai calls for SHAKEN/STIR without delay FCC allows blocking by default Robocall Strike Force Canadian CRTC 2018-32 PA selected in U.S.
  • 6. “I’ve been clear that I expect major voice service providers to implement SHAKEN/STIR by the end of 2019… “I’ve also made clear that if this deadline is not met, the FCC will act to ensure that SHAKEN/STIR is implemented. “ – Ajit Pai, FCC Chairman address to USTelecom robocall forum June 11, 2019
  • 8. Triangle of trust Governance Authority Policies Policy Administrator iconectiv Telephone Service Providers Certificate Authorities
  • 10. Originating telephone service provider Terminating telephone service provider Authentication service Verification service Certificate repository Calling party Called party STIR/SHAKEN: the big picture SIP network STIR/SHAKEN doesn’t prevent robocalls. It prevents caller ID spoofing so you can answer more calls you want while avoiding spam robocalls.
  • 11. INVITE sip:18001234567@example.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" <sip:14045266060@5.6.7.8:5060>;tag=123456789 To: "Bob" <sip:18001234567@1.2.3.4:5060> Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc3Nwb3J0IiwieDV1IjogImh0dHBzOi8 vY2VydGlmaWNhdGVzLmNsZWFyaXAuY29tL2IxNWQ3Y2M5LTBmMjYtNDZjMi04M2VhLWEzZTYzYTgy ZWMzYS83Y2M0ZGI2OTVkMTNlZGFkYTRkMWY5ODYxYjliODBmZS5jcnQifQ.eyJhdHRlc3QiOiAiQSIsIm Rlc3QiOiB7InRuIjogWyIxNDA0NTI2NjA2MCJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOi AiMTgwMDEyMzQ1NjcifSwib3JpZ2lkIjogIjNhNDdjYTIzLWQ3YWItNDQ2Yi04MjFkLTMzZDVkZWVkYmVk NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-dMF7eCjDYARLR7EZSZwiu0fd4H_QD_ 9Z5U2bg;info=<https://certificates.clearip.com/b15d7cc9-0f26-46c2-83ea-a3e63a82ec3a/7cc4db69 5d13edada4d1f9861b9b80fe.crt>alg=ES256;ppt=shaken SIP INVITE with Identity header
  • 12. Authentication Identity token decoded "header": "alg": "ES256" "typ": "passport" "ppt": "shaken" "x5u": https://certificates.clearip.com/4a8eb5-461b.crt "payload": "attest": "A" "dest": { "tn": [ "14695858065" ] } "iat": 1529071382 "orig": { "tn": "12013776051" } "origid": "4aec94e2-508c-4c1c-907b-3737bac0a80e" Attestation level Called number Timestamp Calling number Origination identifier
  • 13. • Authentication for non-carriers (e.g., enterprises) • Critical for outbound call centers • Enables Least Cost Routing and Load Balancing among carriers • Carriers for SHAKEN Authentication and call delivery may be different • Rich Call Data • Out-of-Band STIR STIR/SHAKEN future developments
  • 14. Authentication for non-carriers (enterprises) STI-CA STI-CA STI-CA TN Provider TN Provider TN Provider Enterprise Enterprise Enterprise Proof of Possession TN Provider proxies certificate signing request Delegated TN Provider issues certificate LEMON-TWIST TN Provider issues token to Enterprise for CA authentication
  • 15. • Additional information about the caller that can be displayed to the called party, such as: • Display name • Hyperlinks to related info, e.g., image of the caller or company logo • Flexible set of caller information, e.g., address, email, birthday, etc. • Similar to enhanced CNAM • Except done at origination instead of termination • Cryptographically secure • Gives source party greater control over info presented Rich Call Data
  • 16. Example of Rich Call Data in SHAKEN Token "attest": "A", "dest": { "tn": [ "12155551213“ ] }, "iat": 1443208345, "orig": { "tn": "12155551212“ }, "origid": "123e4567-e89b-12d3-a456-426655440000", "rcd": { "nam": "James Bond", "jcd": [ "vcard", [ [ "version", {}, "text", "4.0" ], [ "fn", {}, "text", "James Bond" ], [ "adr", { "type": "work" }, "text", [ "3100 Apple Ave", "Washington", "DC", "20008", "USA" ] ], [ "email", {}, "text", "bond@example.com" ], [ "tel", { "type": [ "voice", "text" ] }, "uri", "tel:+1-202-555-1000" ], [ "logo", {}, "uri", "https://example.com/logo.jpg" ] ] ] }
  • 17. Out-of-Band STIR Originating telephone service provider Terminating telephone service provider Authentication service Verification service Calling party Called party Call Placement Service Identity token Identity token SIP network Normal call flow Certificate repository
  • 19. Robocall prevention methods work well with SHAKEN
  • 20. • On-net calls from external networks • By OCN • By DID • Invalid calling numbers • High risk calling numbers • Calling numbers with poor reputation • Real time traffic analysis • STIR/SHAKEN verification Nuisance call detection methods
  • 21. • Report only • Block • Send to voicemail • Send to CAPTCHA • Send to a honeypot • Modify caller display name (CNAM) Nuisance call treatment options per subscriber Can be configured for each subscriber
  • 22. SHAKEN outcome Reputation Privacy header Digital display Character display Verified Good No Caller ID [V]Caller ID Verified Good Yes Anonymous [V]Anonymous Verified Poor Yes or No <SPAM> [V]<SPAM> Failed or no token Good No Caller ID Caller ID Failed or no token Good Yes Anonymous Anonymous Failed or no token Poor Yes or No <SPAM> <SPAM> Caller display name
  • 24. Inbound integration Ingress SBC Switch 302 – Divert, modify CNAM 503 – Report only 603 – Block SIP INVITE Called party External network • Blacklists • Traffic Analysis • Reputation • SHAKEN verification • CNAM lookup
  • 25. Outbound integration – option 1 Switch Egress SBC • Blacklists • Toll fraud prevention • SHAKEN authentication • Least cost routing 302 – Divert, modify destination 503 – Report only 603 – Block SIP INVITE Called party External network
  • 26. Outbound integration – option 2 Switch Egress SBC • Blacklists • Toll fraud prevention • SHAKEN authentication • Least cost routing 302 – Divert, modify destination 503 – Report only 603 – Block SIP INVITE Called party External network
  • 27. • Get started now! • Free trial offer • Month-to-month billing • No contract – no commitment • Up to 2 million calls – no charge • transnexus.com • info@transnexus.com • 1-404-526-6060 Questions, answers and discussion