Communications Relationships Telecommunications Service Providers have traditionally been in the business of helping people communicate in real-time. Illegal robo-calling has broken the traditional communications trust model of someone is calling and you answer. SHAKEN helps restore some trust in the calling number but service providers are challenged: with respect to how much useful trust information they can determine a priori about a call with respect to how best to alert called party People and businesses are vetted and recognized for their relative trustworthiness Dun & Bradstreet, KPMG, Barron’s, et cetera. Equifax, TransUnion, Experian, etc. People and business commonly establish communications relationships in which they exchange: Phone numbers E-mail addresses Social Network application identities People, Businesses, and Service Providers need standard methods of creating, storing, discovering, and transporting trust information.
Communications Relationships A simple model for establishing trust and exchanging digitized trust information using Passport Information Elements (PIEs).
Communications Relationships A simple model for storing Communications Relationship Information using Passport Information Elements (PIEs).
Communications Relationships Alice has relationships with Bob and Ted. They are similar but Bob has a Time Of Day restriction. Neither Bob nor Ted is entitled to complete knowledge of all of Alice’s managed communications.
Communications Relationships Bob has a smaller set of management communications relationships than Alice. And, Alice is not entitled to knowledge of all of Bob’s managed communications capabilities. Bob has not created any policy restrictions for Alice’s communications attempts.
Communications Relationships A simple model for discovering Communications Relationship Information using Passport Information Elements (PIEs).
Communications Relationships SHAKEN-capable Service Providers sign and verify calling number. Alice and Bob exchange Passport Information Elements and Alice (or her proxy) sends personal communications relationship PIE to Bob.
Communications Relationships The modern consumer of communications services uses many services which are reached via many transport and application protocols and these services are in some cases vulnerable to unwanted (and in some cases illegal) communications attempts. Service Providers should develop an infrastructure which enhances a customer’s ability to personally and securely manage communications relationships. By putting trust management in the hands of the user, telephony service providers can focus more on what they do best which is transport communications sessions between people. Creating a communications trust management infrastructure reinforces existing behavior: Same effect as Do Not Call Registry participation Established trust relationship permits direct but managed access. Service providers can offer opt-in communications. Helps unknown and untrusted parties who have reason to attempt communications and can verifiably offer a reason to be trusted. Agencies and entities can be granted access based on sovereignty or other legal authorization.