STIR/SHAKEN is used to perform caller ID authentication at origination and verification at call termination.
These James-Bond-inspired acronyms stand for Secure Telephony Identity Revisited (STIR), developed by the Internet Engineering Task Force (IETF), and Secure Handling of Asserted information using Tokens (SHAKEN), developed by ATIS and the SIP Forum.
But don’t worry about these arcane names. The important thing to know is that STIR/SHAKEN is used to prevent caller ID spoofing. Here’s how.
As a service provider is originating an outbound call for its customer, it will use the technology in conjunction with its subscriber information to attest to its confidence about two things:
1. That it knows the customer making the call.The attestation and related call information is then put into a digitally signed Identity token that is sent with the call. This is now a signed call.
When a terminating service provider receives a signed call, it uses the technology to verify that:
Figure 2: STIR/SHAKEN Network Flow
The service provider then puts verification status into the call data, which the handset displays to the called party (see figure 2).
To prevent clever robocall perpetrators from spoofing authentication, the technology uses Public Key Infrastructure. The originating provider digitally signs outbound calls with its private key, and the terminating provider verifies these signatures with the originating providers’ public key. These keys are associated with digital certificates, which are assigned to legitimate service providers by a trusted governance authority. Robocall perpetrators can’t get in on it.
STIR/SHAKEN throws new obstacles in the path of robocall perpetrators:
In the early days of STIR/SHAKEN, before widespread adoption of this technology, most calls will be unsigned and will not raise suspicion. As the technology becomes ubiquitous, subscribers will become more likely to answer verified calls and let unsigned calls go to voicemail.