Verified Caller Identity
enterprise call authentication

Vetting, Verifying, and Delivering STIR/SHAKEN Calls

Now that the June 30, 2021 STIR/SHAKEN implementation deadline has come and gone, the industry is now in the execution phases of STIR/SHAKEN deployment and Robocall Mitigation Plan fulfillment.

Service providers have the responsibility to vet and validate the authenticity of the callers originating traffic on their networks, an also attest to the authorized usage of the phone numbers to be displayed.

If you are a service provider who is currently signing enterprise calls at B or C-Level, looking for a solution to elevate these calls to A-Level, a KYC process has to be implemented to authenticate each intermediary along the call chain down to the calling party brand in order to fulfill the due diligence requirements as set forth by the FCC.

Implementation of a KYC-based local policy solution, such as the Aegis Mobile + Numeracle solution, supports service and platform provider’s ability to assess the level of attestation achievable based on the availability of information to vet and verify down to the enterprise or calling party brand, with confidence. Here we follow the basic steps needed to deliver a STIR/SHAKEN Verified Call.

Verified Identity logo
step 1

Verified Identity™

The process begins with Numeracle's Verified Identity entity vetting and verification process. This is a compliance-based due diligence solution to validate call intent, and consent-based competence in compliant calling. This is the first step in voluntarily disclosing to the network that you are not a bad actor.

learn more
step 2

Entity Identity Management™

Next, Numeracle validates the relationship between your Verified Identity and your authorized phone numbers via our Entity Identity Management platform. We then confirm your relationship to any vendor partners (BPOs, technology platform providers, etc.) and add rich call data (RCD) for branded call identification.

learn more
Identity Management Logo
SHAKEN Certificate Management Logo
step 3

SHAKEN Certificate Management

With your Verified Identity successfully associated with your phone numbers and RCD (rich call data), Numeracle then passes this information to your originating service provider or other authority for call signing, such as NetNumber’s Guaranteed Caller Enterprise STIR/SHAKEN solution.

learn more
step 4

Enterprise Call Signing

To complete the process, the call is assigned a level of attestation relational to the level of validation completed. The call is passed to the terminating service provider. The result is a call delivered as STIR/SHAKEN authenticated, displayed with a verified caller display and optional RCD information available.

learn more
Call Signing Logo
delivering an authenticated presence

Benefits of Verified Caller Identity

Acquire Verified Caller Display

Stand Apart From Bad Actors

'Easy Button'
Calls meet the STIR/SHAKEN criteria to be delivered as verified calls with optional RCD (rich call data) info to show branded information such as calling party name and company logo.
Legitimate enterprises will stand out from the bad actors traversing the network by meeting the KYC 'know your customer' requirements outlined within the TRACED Act.
Utilizing Numeracle and Aegis Mobile's local policy vetting and validation solution provides a streamlined, compliance-based pathway for enterprise callers to participate in the STIR/SHAKEN trust network.
more about us

STIR/SHAKEN Joint Solution Partnerships

POC Comcast

Industry Collaboration Proof of Concept

Comcast, Everbridge, NetNumber, Numeracle, and Twilio completed the first-ever telephone call with authenticated caller ID and rich call data, powered by the STIR/SHAKEN framework and protocols. This marks a milestone in protecting consumers from fraudulent robocalls and building greater trust and transparency for phone users.

Enhancing authenticated caller ID as an extension of STIR/SHAKEN Rich Call Data is an evolutionary leap forward for trust in the phone ecosystem.
Read the Press release
Aegis has been a trusted channel "verification" partner for wireless carriers, aggregators, and enterprise businesses, providing vetting and compliance services that ensure the safe and beneficial growth of the digital content market for mobile consumers.

To fulfill the rigorous requirements of the service provider to verify the source of traffic delivered across the public switched telephone network, Aegis’s extensive identity verification and authentication services have been integrated into Numeracle’s Verified Identity solution to create a dually authenticated risk assessment tool.  
Read more about aegis mobile
Numeracle’s Entity Identity Management™ platform enables service and technology platform providers, business process outsourcing (“BPO”) organizations, and contact centers to manage brand identity and phone number usage on behalf of enterprise clients for the purpose of business communications. This KYC-based platform supports service providers’ ability to implement local policies to attest to the legitimacy of phone number usage per the SHAKEN Standard. In alignment with the FCC’s continued focus on combatting illegally spoofed calls, this solution enables communications providers to verify a business’s identity and legal operational status.
read the numeracle + Aegis Mobile press release
STIR/SHAKEN, here we come!
Ready to start the process of ensuring your legitimate business calls meet the requirements to achieve the 'Verified' call display via STIR/SHAKEN?
get in touch
caller id authentication

STIR (Secure Telephone Identity Revisited) / SHAKEN (Signature-based Handling of Asserted information using toKENs) is a framework designed to assign a certificate of authenticity to each phone call for use across the telecom network. These certificates act as a digital signature of trust passed from carrier to carrier to improve traceable call delivery.

STIR/SHAKEN is a requirement of the TRACED Act, and the FCC has also mandated that both originating and terminating voice service providers were to implement the STIR/SHAKEN caller ID authentication framework by June 30, 2021.

The execution of STIR/SHAKEN deployment requires that the relationship between the identity of the caller and the authorized use of its phone numbers be verified in order to pass STIR/SHAKEN authentication and achieve the "Verified Caller" display. If a service provider hasn't filed its certified Robocall Mitigation Plan with the FCC, its call may be blocked based on the upcoming September deadline.

for more on stir/shaken,
visit our knowledge center
videos, articles, and more

More STIR/SHAKEN Resources

Key Advice on the Robocall Mitigation Database
Key Advice on the Robocall Mitigation Database

Make sure you have expert advice on how to file in the Robocall Mitigation Database and what service providers should be keeping in mind when drafting their Robocall Mitigation Plans.

Watch the Video
Blog posts
Q&A Interview Presented by Somos: Delivering Trust and Added Value to Consumers Part Three
Q&A Interview Presented by Somos: Delivering Trust and Added Value to Consumers Part Three

Q&A Interview Presented by Somos: Delivering Trust and Added Value to Consumers Part Three

Read Full Blog Post
Top Startups helping Industries Reopen Post-COVID
Top Startups helping Industries Reopen Post-COVID

Staying ahead of the technology curve means strengthening your competitive advantage. That is why StartUs Insights compiles data-driven innovation insights based on their analysis of 3.500 startups & technologies developing COVID-induced solutions. This time, you get to discover 12 industries that are impacted by COVID-19 and hand-picked startups helping businesses in these industries adapt to and resume operations post-COVID. Representing the Telecom industry, is Numeracle.

Read Full Article