As part of Ribbon Call Trust®  portfolio, Ribbon provides a complete STIR/SHAKEN-compliant Secure Telephone Identity (STI) solution. Ribbon STI delivers all the functions needed for caller identity authentication, signing, verification, and certificate management.

Ribbon STI addresses these specific functions:

  • Secure Telephone Identity - Authentication Service (STI-AS) and the associated functions of Service Provider Key Management Service (SP-KMS) and Secure Key Store (SKS) to process originating network requests for signed assertion of caller’s identity
  • Secure Telephone Identity - Verification Service (STI-VS) and the associated function of Secure Telephone Identity Certificate Repository (STI-CR) to process terminating network requests for certificate verification of a caller’s identity.  Note: Ribbon provides the STI-CR function as a cloud-hosted service on Ribbon Identity Hub
  • Secure Telephone Identity – Certificate Authority (STI-CA) providing the following capabilities:
    • Accept SHAKEN Certificate Signing Requests (CSRs) for new certificates
    • Automatically validate Service Provider Code (SPC) Tokens and issue standards-compliant SHAKEN signing certificates that include the required Telephone Number Authorization List extension.
    • Revoke certificates if needed and notify the Secure Telephone Identity – Policy Administrator (STI-PA).
    • Note:  Ribbon provides the STI-CA function as a cloud-hosted service on Ribbon Identity Hub

 

Identity Hub Solution Brief

 

Ribbon's STI Compliance

Ribbon STI is compliant with ATIS-1000082 and RFC8224/8225/8226. Ribbon STI implements the ATIS-82 server side specifications and can be deployed within a service provider’s network or as part of a Ribbon-hosted STIR/SHAKEN as a Service offer. In a service provider’s network, which may have many SBCs and gateways, messaging to/from Ribbon STI is centralized via the Ribbon PSX, but Ribbon STI can be invoked through any ATIS-82 API compliant client. When deployed in an originating voice service provider’s network, Ribbon’s STI solution will receive call authentication requests, provide all the steps necessary to process these requests and respond with signed assertion of caller’s identity. Following STI authentication and signing, the signature information will be passed back to the authentication request originator to be forward to the next network hop. When deployed in a terminating voice service provider’s network, Ribbon’s STI solution will receive call verification requests, provide all the steps necessary to process these requests and respond with the appropriate verification of caller’s identity. Following STI certificate verification, the verification information will be passed back to the verification request originator.

 

 

STI Diagram

Controlled Networks chooses Ribbon STIR/SHAKEN

Request a Call Trust Quote