Skip to main content
How Does STIR/SHAKEN Work?
January 8, 2024 at 6:00 AM
Many organizational leaders wonder: How does STIR/SHAKEN work?

In a world where communication is increasingly digital, the battle against fraudulent and malicious activities has become a top priority. One significant stride in the ongoing fight against spam calls and robocalls is the implementation of STIR/SHAKEN technology. This innovative framework aims to restore trust in phone calls by verifying the authenticity of caller IDs.

At Prescott Martini, we specialize in AI-powered fraud detection, utilizing STIR/SHAKEN protocols to ensure a high level of security. In this blog, we'll answer the question: how does STIR/SHAKEN work? Continue reading to uncover how this technology is revolutionizing the telecommunications landscape.

Understanding the Problem

Before delving into the solution, it's essential to comprehend the magnitude of the problem STIR/SHAKEN addresses. Unwanted calls, including robocalls and scams, have reached epidemic proportions, causing frustration and distrust among phone users. Fraudsters exploit the lack of authentication mechanisms, easily manipulating caller IDs and deceiving recipients into answering their calls.

How Does STIR/SHAKEN Work?

STIR/SHAKEN, an acronym for Secure Telephone Identity Revisited (STIR) and Signature-based Handling of Asserted Information Using Tokens (SHAKEN), is a set of protocols designed to combat caller ID spoofing. This framework operates within the Session Initiation Protocol (SIP) used for voice over internet protocol (VoIP) calls, providing a secure foundation for verifying the legitimacy of a caller's identity.

The STIR Protocol

The STIR protocol is the first component of this dynamic duo, focusing on ensuring that the calling party's identity is accurately asserted. When a call is initiated, the originating service provider uses STIR to create a digital signature, commonly known as an "assertion." This signature is then attached to the call information, containing details like the caller's identity, timestamp, and other relevant data.

The SHAKEN Protocol

SHAKEN, the second component, comes into play after the STIR protocol. This protocol verifies the authenticity of the digital signature created by STIR. To do this, the call is transmitted through the network, and at each hop, the signature is validated by the service providers involved. If the signature remains intact and valid throughout the journey, it ensures that the caller's identity hasn't been tampered with, assuring the recipient that the displayed caller ID is legitimate.

Certificate Authorities and Attestations

A key element in the STIR/SHAKEN framework is the role of certificate authorities and attestations. Certificate authorities act as trusted entities that issue digital certificates to service providers. These certificates are used to sign the assertions made by the originating service provider. Attestations, on the other hand, categorize the level of confidence the service provider has in the authenticity of the caller's identity. There are three attestation levels: A, B, and C, with A being the highest level of confidence.

Real-time Call Validation

One of the strengths of STIR/SHAKEN is its ability to perform real-time call validation. As the call traverses through different service providers, each provider validates the signature, enabling a continuous verification process. If at any point the signature fails to pass validation, the service provider can take appropriate action, such as flagging the call as potentially fraudulent or blocking it altogether.

Impact on Robocalls and Fraud

The implementation of STIR/SHAKEN has already shown promising results in reducing the prevalence of robocalls and fraudulent activities. By establishing a secure and standardized framework for verifying caller IDs, this technology instills confidence in phone users, encouraging them to answer calls without the fear of falling victim to scams.

STIR/SHAKEN offers a powerful solution to the pervasive issue of caller ID spoofing, making it an asset to organizations worldwide. Get in touch with our experts today to learn more about our comprehensive robocall mitigation solutions.

Subscribe to our newsletter
Let's keep in touch!

Stay updated on our news and events! Sign up to receive our newsletter.