SlideShare a Scribd company logo
Toward Authenticated
Caller ID Transmission
Raymond Tu
Arizona State University
ITU SG11, Feb 7 2017
0
1,000,000
2,000,000
3,000,000
4,000,000
5,000,000
6,000,000
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
National Do-Not-Call Registry Complaints
Data Source: US National Do-Not-Call Registry
0%
10%
20%
30%
40%
50%
60%
70%
80%
0
100,000
200,000
300,000
400,000
500,000
600,000
2013 2014 2015
Phone Fraud Complaints % Fraud by Phone
Data Source: US FTC Consumer Sentinel Network
https://soundcloud.com/numbercop/phone-fraud-phishing-vishing-28-example-bank-of-america
https://www.facebook.com/fusionrealfuture/videos/1739477992956715/
PSTN
PSTNIP
PSTN
IP
+ VPN
+ TOR
PSTN
IP
+ VPN
+ TOR
Solution:
Security Indicators
Key Benefits
Immediate cue of a verified source
Provides a foundation for spam defenses
Promotes vigilance for identity verification
Provides assurance for doing business
over the phone
Caller ID Authentication
Scheme
• Authentication
• Integrity
• Deployability
Design Principles
1. Caller ID Verification
2. Authenticated Call Request
Scheme Overview
• Provide proof of E.164 ownership to a
CA
• Obtain a Caller ID Certificate
• Use Caller ID Certificate to generate
Authenticated Call Requests
Caller ID Verification
• Generate an extended IAM with a digital
signature using the Caller ID Certificate
• Validate the IAM signature
Authenticated Call Request
• UTC Timestamp (UNIX time)
• X.509 certificate format
• International E.164 format
• Parameter Compatibility Information
parameter (Q.764.2.9.5.3.2)
Other Details
Parameter Type Length (octets)
UTC Timestamp Optional Part 4-?
Signature Algorithm Optional Part 1-?
Signature Optional Part 16-?
Caller Identity Certificate Optional Part 32-?
• Certificate Revocation to guard against
stolen identity
– E.g. stolen certificate, cell phone theft, etc.
• Recommend: Certificate Revocation List
with short-term certificates
– No stalling, OCSP can cause stalling
– Reduce list size
– Risk containment
Security Considerations
Local Deployment
Considerations
• Presenting the security indicator to the
called party
• Use a flag indicator, only if
– Local exchange network connection is secured
– Identity of the local exchange carrier is
authenticated
– Call request header is integrity protected
• Recommend: Forwarding of the extended
IAM parameters
Future Work
1. Standardization
2. Implementation
3. Commercialization
Acknowledgement
Thank you
tu@asu.edu
+1 480 420 8250
huahongtu.me

More Related Content

Viewers also liked

Pa 60
Pa 60Pa 60
Ppt c gloria s
Ppt c gloria sPpt c gloria s
Ppt c gloria s
medinasanchez
 
Nasa controversy
Nasa controversyNasa controversy
Nasa controversy
Sagar Kumar
 
Avonian04 (2)
Avonian04 (2)Avonian04 (2)
Avonian04 (2)
Margaret B. Moss
 
Quant trading theory series: electronic markets
Quant trading theory series: electronic marketsQuant trading theory series: electronic markets
Quant trading theory series: electronic markets
Oliver Laslett
 
Soton quants welcome
Soton quants  welcomeSoton quants  welcome
Soton quants welcome
Oliver Laslett
 
Nagacv
NagacvNagacv
Resume- IRFAN. Feb-2016
Resume- IRFAN. Feb-2016Resume- IRFAN. Feb-2016
Resume- IRFAN. Feb-2016
Muhammad Irfan
 
Nagacv
NagacvNagacv
LEDit - LED light fitting
LEDit - LED light fitting LEDit - LED light fitting
LEDit - LED light fitting
Michal Bak
 
MENA regional campaign - summary report
MENA regional campaign - summary reportMENA regional campaign - summary report
MENA regional campaign - summary report
Joe Foltz
 
ifm_final_report_-_spring_2016
ifm_final_report_-_spring_2016ifm_final_report_-_spring_2016
ifm_final_report_-_spring_2016
Tianyuan Ren
 
Diapositivas de tics
Diapositivas de ticsDiapositivas de tics
Diapositivas de tics
Veronica Nathaly Yaguana Ojeda
 
Tercero de Educación Básica.
Tercero de  Educación Básica.Tercero de  Educación Básica.
Tercero de Educación Básica.
Veronica Nathaly Yaguana Ojeda
 
Diapositivas de entornos virtuales de aprendizaje
Diapositivas de entornos virtuales de aprendizajeDiapositivas de entornos virtuales de aprendizaje
Diapositivas de entornos virtuales de aprendizaje
Veronica Nathaly Yaguana Ojeda
 
Drone Academy Thailand Profile (May 2017)
Drone Academy Thailand Profile (May 2017)Drone Academy Thailand Profile (May 2017)
Drone Academy Thailand Profile (May 2017)
Drone Academy Thailand
 

Viewers also liked (16)

Pa 60
Pa 60Pa 60
Pa 60
 
Ppt c gloria s
Ppt c gloria sPpt c gloria s
Ppt c gloria s
 
Nasa controversy
Nasa controversyNasa controversy
Nasa controversy
 
Avonian04 (2)
Avonian04 (2)Avonian04 (2)
Avonian04 (2)
 
Quant trading theory series: electronic markets
Quant trading theory series: electronic marketsQuant trading theory series: electronic markets
Quant trading theory series: electronic markets
 
Soton quants welcome
Soton quants  welcomeSoton quants  welcome
Soton quants welcome
 
Nagacv
NagacvNagacv
Nagacv
 
Resume- IRFAN. Feb-2016
Resume- IRFAN. Feb-2016Resume- IRFAN. Feb-2016
Resume- IRFAN. Feb-2016
 
Nagacv
NagacvNagacv
Nagacv
 
LEDit - LED light fitting
LEDit - LED light fitting LEDit - LED light fitting
LEDit - LED light fitting
 
MENA regional campaign - summary report
MENA regional campaign - summary reportMENA regional campaign - summary report
MENA regional campaign - summary report
 
ifm_final_report_-_spring_2016
ifm_final_report_-_spring_2016ifm_final_report_-_spring_2016
ifm_final_report_-_spring_2016
 
Diapositivas de tics
Diapositivas de ticsDiapositivas de tics
Diapositivas de tics
 
Tercero de Educación Básica.
Tercero de  Educación Básica.Tercero de  Educación Básica.
Tercero de Educación Básica.
 
Diapositivas de entornos virtuales de aprendizaje
Diapositivas de entornos virtuales de aprendizajeDiapositivas de entornos virtuales de aprendizaje
Diapositivas de entornos virtuales de aprendizaje
 
Drone Academy Thailand Profile (May 2017)
Drone Academy Thailand Profile (May 2017)Drone Academy Thailand Profile (May 2017)
Drone Academy Thailand Profile (May 2017)
 

Similar to Toward Authenticated Caller ID Transmission

Identity, Authentication, and Programmable Telecoms
Identity, Authentication, and Programmable TelecomsIdentity, Authentication, and Programmable Telecoms
Identity, Authentication, and Programmable Telecoms
Alan Quayle
 
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CloudIDSummit
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
NEC Public Safety
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
Priyanka Aash
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
Bob Wall
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Mahender Boda
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions
Rasool Irfan
 
AWS re:Invent 2016: AWS Customers Saving Lives with Mobile and IoT Technology...
AWS re:Invent 2016: AWS Customers Saving Lives with Mobile and IoT Technology...AWS re:Invent 2016: AWS Customers Saving Lives with Mobile and IoT Technology...
AWS re:Invent 2016: AWS Customers Saving Lives with Mobile and IoT Technology...
Amazon Web Services
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
Norman W. Mayes, CISSP, MCSE, ITIL
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Why cyber security needs to be your top priority 2020
Why cyber security needs to be your top priority 2020Why cyber security needs to be your top priority 2020
Why cyber security needs to be your top priority 2020
Practical Vision Network
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Adrian Mikeliunas
 
Defense Innovation Summit
Defense Innovation SummitDefense Innovation Summit
Defense Innovation Summit
OPSWAT
 
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseSafer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and Response
Stephen Cobb
 
FEI Brisbane Lunch: Cybersecurity and the CFO
FEI Brisbane Lunch: Cybersecurity and the CFOFEI Brisbane Lunch: Cybersecurity and the CFO
FEI Brisbane Lunch: Cybersecurity and the CFO
Kate Mills
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
Verfied Response Is Your Business Protected 071712
Verfied Response Is Your Business Protected 071712Verfied Response Is Your Business Protected 071712
Verfied Response Is Your Business Protected 071712
angeloslideshare
 
The Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White ListThe Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White List
derektop
 
Rise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScanRise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScan
MicroWorld Software Services Pvt Ltd
 
ID Theft
ID TheftID Theft
ID Theft
Willhack
 

Similar to Toward Authenticated Caller ID Transmission (20)

Identity, Authentication, and Programmable Telecoms
Identity, Authentication, and Programmable TelecomsIdentity, Authentication, and Programmable Telecoms
Identity, Authentication, and Programmable Telecoms
 
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions
 
AWS re:Invent 2016: AWS Customers Saving Lives with Mobile and IoT Technology...
AWS re:Invent 2016: AWS Customers Saving Lives with Mobile and IoT Technology...AWS re:Invent 2016: AWS Customers Saving Lives with Mobile and IoT Technology...
AWS re:Invent 2016: AWS Customers Saving Lives with Mobile and IoT Technology...
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Why cyber security needs to be your top priority 2020
Why cyber security needs to be your top priority 2020Why cyber security needs to be your top priority 2020
Why cyber security needs to be your top priority 2020
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo local
 
Defense Innovation Summit
Defense Innovation SummitDefense Innovation Summit
Defense Innovation Summit
 
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseSafer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and Response
 
FEI Brisbane Lunch: Cybersecurity and the CFO
FEI Brisbane Lunch: Cybersecurity and the CFOFEI Brisbane Lunch: Cybersecurity and the CFO
FEI Brisbane Lunch: Cybersecurity and the CFO
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Verfied Response Is Your Business Protected 071712
Verfied Response Is Your Business Protected 071712Verfied Response Is Your Business Protected 071712
Verfied Response Is Your Business Protected 071712
 
The Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White ListThe Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White List
 
Rise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScanRise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScan
 
ID Theft
ID TheftID Theft
ID Theft
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 

Toward Authenticated Caller ID Transmission

Editor's Notes

  1. Today spam distribution technology has become more advanced and more accessible than ever. With the rise of cloud computing, there are now hundreds of autodialer services that are accessed over the internet, with advance features such as simultaneous calling, interactive voice response and customizable caller ID. In order to better understand telephone spam from the spammer’s perspective, we also asked, how does a spammer operate?
  2. This is what the PSTN used to look like.
  3. However, With introduction of IP access to the PSTN, the spammer is now further insulated from law enforcement.
  4. And with IP access, the spammer could now further evade law enforcement by hiding behind VPNs and Tors.
  5. To make matters worse, the spammer could reside anywhere in the world beyond the jurisdiction of the law enforcement.
  6. Another way is to defeat call blockers and make the call seem more legitimate is to use a fake caller ID number. With most autodialers, The caller ID number can be easily spoofed because current call protocols do not have a built-in authentication mechanism. The carriers also do not have a legal obligation to ensure that the caller ID number is verified. In fact, some VoIP carriers sell customizable caller ID as a service feature. So you might ask what about law enforcement?
  7. Right now, there is a sever lack of accountability in telephone identities, until that changes, we’re still going to have vast amounts of robocalls and scam calls hurting consumers and businesses.
  8. Talk about why TLS cannot be applied in deplorability, and STIR
  9. Give a bit more background of cert revocation and why it matters. Some stories.