Skip to main content
How Does STIR/SHAKEN Maintain Phone Privacy?
October 11, 2022 at 6:00 PM
How Does STIR/SHAKEN Maintain Phone Privacy?

Combating robocalls and phone privacy have continued to become priorities with the FCC. With approximately 4 billion of these calls sent to consumers every month, the problem has become a serious issue for all of us.

As the FCC’s post describes, voice providers are now required to take some actions in cooperating with these tactics:

“The FCC requires voice service providers to file certifications in the FCC’s new Robocall Mitigation Database to inform the agency of their STIR/SHAKEN implementation status and, in some cases, their robocall mitigation efforts.”

As an authorized provider of STIR/SHAKEN digital certificates, Prescott-Martini is helping providers accomplish this vital FCC objective. Below, we’ve provided crucial information for you to know and understand the core tenets of Stir-Shaken and how it works in enhancing phone privacy and combating robocalls.

Basics of STIR/SHAKEN Explained

  1. Call originators first send a destination number through to Prescott-Martini to be analyzed using the STIR/SHAKEN
    method. This is sent as a MySQL data query.
  2. Prescott-Martini receives the MySQL query and adds a verified caller-ID from the automatic number identification system. If needed, you can also use a preestablished ANI to be ported to our competitive local exchange carrier (CLEC).
  3. Prescott-Martini creates a service provider signature certificate. This is produced using STIR/SHAKEN's national administration service. It is accepted by all the significant U.S. telephone carriers.
  4. MySQL data is then returned to you to be inserted into the session initiation protocol (SIP). Prescott-Martini's API allows you to simplify this process by adding, deleting, and editing any ANIs that may be present in your account.
  5. Finally, the destination for the recipient of the call can see the secured number transferred through the system in their caller ID system.

While Prescott-Martini’s phone privacy sequence provides complex STIR/SHAKEN security, the experience from caller to recipient is seamless. This allows normal communication to proceed as normal with this added component to keep everyone within a system protected.

Prescott-Martini: STIR/SHAKEN Services Made Easy

Here at Prescott-Martini, we offer solutions that fit whichever level of service you need. You can get STIR/SHAKEN
within your system through the various options we offer:

Calls Sent

Calls are sent through to Prescott-Martini. We then utilize our platform to add a STIR/SHAKEN token to your call, which is then forwarded to a Tier 1 carrier (or your own carrier) for termination. We can offer pricing relative to the volume of calls your system requires.

MySQL Request

You can send your STIR/SHAKEN request using MySQL to Prescott-Martini. We'll return that token for straightforward insertion to your SIP header.

Flat-Rate Pricing for High Volume

We also provide higher-volume clients with transparent service embedded into their system or platform's switching locations.

Harnessing the Power of AI for Phone Security

As a company focused on your safety and security, Prescott-Martini also utilizes the latest in AI and machine intelligence to enhance results in blocking spam and robocalls.

Our AI is implemented after a custom analysis of how your business operates. We'll develop solutions that help your daily operations improve while moving you forward toward long-term company goals.

Combating robocalls isn’t just a recommendation; it’s an absolute necessity today. Through our multi-tiered approach, we transform our technology into phone privacy and security results for you.

To learn more about Prescott-Martini and how we make it easy for you, get in touch with our team today for a consultation.

Subscribe to our newsletter
Let's keep in touch!

Stay updated on the latest news in the regulatory and compliance world! Sign up to receive our newsletter.