STIR/SHAKEN as a Service
STIR/SHAKEN as a Service - is a standards-compliant solution providing real-time caller authentication (signing), verification, and certificate repository services. It is comprised of the following:
- Authentication Service – provides signed assertion for a caller’s identity, used in the originating service provider’s network
- Verification Service - Used by the terminating service provider to verify the originating callers identity based on a STIR/SHAKEN signature
- Certificate Repository Service – used to host STIR/SHAKEN public-key certificates owned by originating service providers. These certificates are used by terminating service providers during call verification.
Reputation Scoring Service
Reputation Scoring is used for to prevent telephony fraud and to mitigate originating or terminating robocalls.
To prevent robocalls from originating on a voice service provider's network, Reputation Scoring is used to determine the likelihood that a call is illegitimate and should be blocked. A call will be considered illegitimate for two reasons:
- If the originating number is being spoofed using a Telephone Number that shows up on a Do-Not-Originate list or is an unallocated, unused, or invalid number.
- If reasonable analytics indicate the call is highly likely likely to be illegitimate and malicious in intent.
To prevent robocalls from terminating on a voice service provider's network, Reputation Scoring is used to determine the likelihood that a call is illegitimate and should be blocked or is likely legitimate and should be allowed to proceed normally. Many calls may have reputation scores that fall somewhere between these two outcomes and should be given special call validation treatment options. Some examples of call validation treatment options are:
- Route to an announcement indicating the call cannot be complete at this time
- Divert to a voice mail system
- Route to a "CAPTCHA" system that will play an announcement asking the calling party to respond to instructructions, such as entering a specific set of digits, if they want the call to proceed.
- Alter the Calling NAMe (CNAM) display to "Potential SPAM" to let the terminating party know so they can make a decision to answer or not answer a call
Reputation Scoring provides the following:
- Fraud Scoring - provides a reputation score indicating the likelihood of a call being fraudulent based on Ribbon-supplied databases, STIR/SHAKEN verification outcome, in-network fraud insights from Ribbon Analytics, and customer-provided data sources such as allow lists, deny lists, fraud lists, and do-not-originate lists.
- Nuisance Scoring - provides a reputation score indicating the likelihood of a call being a telemarketing or nuisance call based on Ribbon-supplied databases and STIR/SHAKEN verification outcome.
- Call Validation Treatment - provides guidance on how a call should be handled, based on the reputation scores associated with an given call.
Ribbon Identity Hub
Ribbon's cloud native Identity Hub is designed as an open ecosystem with open APIs to feed data into Machine Learning models, using both real-time and non-real time data. Open APIs enable data integration as follows:
- Real-time queries of 3rd party transactional policy information, such as real-time attestation of caller identity from Ribbon STI.
- Collection of non-real time, 3rd party policy data that can be crowdsourced, carrier-based, or subscriber provided
- Integration of robocall and fraud information from Ribbon Analytics, based on analysis of network and call traffic (CDRs, KPIs)
- Real-time policy requests from Ribbon PSX or third-party policy servers for reputation scoring and call validation treatment.Invalid calling numbers – based on national/international telephone numbering plans, these are numbers that can be screened out in call processing
Ribbon Identity Hub
Earn Trust in Phone Calls Again
Ribbon Identity Hub Solution
Features and Benefits
- Dynamic, machine learning (ML) models with iterative learning to adapt to new network conditions, traffic patterns, and data sources
- Cloud native design as an open ecosystem, with open APIs, increasing flexibility to adapt to new data sources
- Integration of both real-time and non-real time data sources to increase the accuracy of the identity assertion modeling
- Leverage public cloud infrastructure to handle massive real-time processing with very low latency, because identity Hub is in the call path
- Robust, high availability architecture