50 likes | 70 Views
Combating fraudulent and unwanted robocalls has become a critical concern in the rapidly changing telecoms industry. The telecoms sector has responded to this problem by introducing STIR/SHAKEN, a system that seeks to authenticate and verify the origin of phone calls
E N D
Demystifying Stir/Shaken: How Does It Actually Work?
➢Combating fraudulent and unwanted robocalls has become a critical concern in the rapidly changing telecoms industry. The telecoms sector has responded to this problem by introducing STIR/SHAKEN, a system that seeks to authenticate and verify the origin of phone calls. In- depth explanations of STIR/SHAKEN’s intricate workings are provided in this page, along with tips on how to prevent fraud and call spoofing. ➢Recognising the Issue Fraud and call spoofing: - Call spoofing is the practise of changing a call’s phone number to make it look as though it is coming from another number. Scammers and fraudsters frequently utilise this method to dupe victims and carry out different sorts of fraud, such as identity theft, money scams, and impersonation. Traditional caller ID systems lack reliable methods to confirm the legitimacy of call origins, leaving them vulnerable to abuse by criminals.
➢STIR/SHAKEN Foundations: - The STIR/SHAKEN architecture provides an additional layer of authentication to phone conversations. It stands for Secure Telephone Identity Revisited/Signature-based Handling of Asserted information using toKENs. In order to ensure that the caller’s identification has not been tampered with during transit, it functions by digitally signing and confirming caller identify information. The technique known as STIR, or Secure Telephone Identity Revisited, outlines how to sign and validate caller identity data. To authenticate the calling party, it uses public key cryptography and digital certificates. The framework that makes it easier to implement STIR is called SHAKEN: Signature-based Handling of Asserted Information Using Tokens. It describes the rules and practises for call verification and authentication. ➢The Functions of STIR/SHAKEN : - The origination service providers (OSP) and terminating service providers (TSP) work together to manage the STIR/SHAKEN system. Here is a brief description of the procedure: Call Origination: The OSP issues a digital certificate containing the caller’s identifying information, together with a cryptographic signature, when a call is first begun. The call signalling information is then coupled with this data.
Call Validation: The TSP checks the signed identification information as soon as the call arrives there. The integrity and validity of the call are guaranteed by the TSP, which validates the digital signature using the OSP’s public key. Based on the degree of trust in the caller’s identity, STIR/SHAKEN offers three attestation levels:Full Attestation a Full Attestation ( A) : The OSP has completely verified the identity of the caller. b. Partial Attestation (B): The OSP has partially verified the identity of the caller. c. Gateway Attestation ©: The call was placed through a gateway, and the OSP lacks the tools necessary to confirm the identity of the caller. Caller ID Display: The TSP can choose how to show the caller ID to the receiver based on the attestation level. While calls with lower levels may be warned or presented in a different way to signify a possible concern, calls with higher levels are more likely to be real and are displayed as such. ➢STIR/SHAKEN Advantages and Difficulties : - The following are some advantages STIR/SHAKEN delivers to the communications ecosystem: Enhanced Caller Trust: By confirming the validity of caller ID data, STIR/SHAKEN improves caller trust and lowers the risk of becoming the victim of scam calls.
Improved Call Blocking: TSPs can use the attestation levels to determine which calls to block or flag as potential spam or fraud, allowing . Find Us On: - Facbook Instagram LinkedIn TwitterPinterest YouTube