SHAKEN & Know Your Customer

Slides:



Advertisements
Similar presentations
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Advertisements

Authentication & Kerberos
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Advanced CAMP: BoF Summaries. 2 Role-based Access Control (RBAC)
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Key Management and Distribution Anand Seetharam CST 312.
TAG Presentation 18th May 2004 Paul Butler
Jim McEachern Senior Technology Consultant ATIS July 8, 2015.
SHAKEN and STIRed: Thoughts on the Current State of:
Timeline – Standards & Requirements
Presented by: Rebekah Johnson CEO/President Gloria-Mac
Status Update -- ATIS Robocalling and Caller ID Initiatives
THIS IS THE WAY ENUM Variants Jim McEachern
TITLE: Contribution on Display Guidelines
Regression Testing with its types
TN Proof-of-Possession and Number Portability
TITLE: Contribution on Display Guidelines
SHAKEN Governance Authority Next Steps
Timeline - ATIS Involvement
Status Update -- ATIS Robocalling and Caller ID Initiatives
TAG Presentation 18th May 2004 Paul Butler
Global Standards Collaboration (GSC) 14
SHAKEN Governance Authority Criteria
ATIS/SIP Forum IP NNI Task Force Tyson's Corner, VA November 7-8, 2017
ATIS Cybersecurity DOCUMENT #: GSC13-GTSC6-12 FOR: Presentation
Chris Wendt, David Hancock (Comcast)
Timeline - ATIS Involvement
VCE Dumps
Verstat Related Best Practices
Reference Architecture and Call Flow Example for SIP RPH Signing
Presented by: Rebekah Johnson CEO/President Gloria-Mac
DLR EO-Data Management - User Metrics K. Molch, J. Senft, C
NANC Call Authentication Trust Anchor (CATA) Working Group
21st Century Debt Collection in a 20th Century Regulatory Framework
SHAKEN Jim McEachern Senior Technology Consultant ATIS December 2017.
TITLE: Contribution on Vertical Service Codes (VSC) Action Item
Doug Bellows – Inteliquent 10/4/2018
STI Display Implementation and Evolution
Enterprise Scenarios August 2018.
STIR/SHAKEN Display Implementation and Evolution
i3forum contractual fraud clauses
TITLE: Baseline Display Guidelines SOURCE*: Hala Mowafy (Ericsson)
Communications Relationships
TN-PoP Scenarios Jim McEachern Principal Technologist ATIS August 2018.
IoTSec Taxonomy Proposal
SHAKEN Jim McEachern Senior Technology Consultant ATIS December 2017.
Issuing delegate certs to Customer AF using Cross-Certification
IPNNI SHAKEN Enterprise Models: LEMON TWIST
PKI (Public Key Infrastructure)
STIR/SHAKEN Display Initial Implementation
The OTENTIK trust network
Enhanced 911 for VoIP Standards and Regulatory
Doug Bellows – Inteliquent 3/18/2019
Video Relay Service & SHAKEN/STIR
Robocalling Blocking Cause and Effect
Enterprise Structure For Use Case Application of Various Token/Cert Proposals Presented by: Rebekah Johnson.
STIR/Shaken: Mitigating Illegal Robocalling and Caller ID Scams
STIR Certificate delegation
Calling Party Identity
Enterprise Use Cases and A-Level Attestation
Enterprise Certificates DRAFT
Enterprise Use Cases and A-Level Attestation
STIR / SHAKEN for 911 use of SHAKEN 8/7/2019
Calling Party Identity
Enterprise Certificates
Toll-Free Number Assignment and Administration – SHAKEN/STIR Delegate Certificates Enterprise Origination Julio Armenta
REALTORS® Political Action Committee
Presentation transcript:

SHAKEN & Know Your Customer Jim McEachern Principal Technologist ATIS October 2018

STI-GA/PA - Governance SHAKEN & Analytics SHAKEN Analytics STI-GA/PA - Governance “Root of Trust” Call Blocking STI-CA “Certificate Management” Display to user AS VS “Call Processing” Analytics / CVT Sign “good TNs” Provide traceability Ensure correct use of STI certificates Enabling technology Analyze robocall/spoofing data Detect fraudulent calls Block unwanted calls (at user’s request) Provide a consumer service WC Docket No.17-97 Call Authentication Trust Anchor CG Docket No. 17-59 Advanced Methods to Target and Eliminate Unlawful Robocalls

SHAKEN SHAKEN verifies that the entity originating a call is entitled to use the phone number displayed – nothing more! SHAKEN builds on the information the originating carrier has about the calling party. The originating service provider can only attest to “what it knows”. Enterprise Carrier 0 Carrier 2 SHAKEN

Call Origination Scenario Platform 1.555.555.0123 1.555.555.0124 1.555.555.0125 1.555.555.0126 1.555.555.0127 … 1.555.555.0123 1.555.555.0124 1.555.555.0125 1.555.555.0126 1.555.555.0127 … Call Center Multiple Originating Carriers Enterprise Typical real-world call origination scenarios are far more complex.

Know Your Customer Platform 1.555.555.0123 1.555.555.0124 1.555.555.0125 1.555.555.0126 1.555.555.0127 … 1.555.555.0123 1.555.555.0124 1.555.555.0125 1.555.555.0126 1.555.555.0127 … Call Center Ledger ? Enterprise Efforts are underway to verify all elements in call origination. No way to effectively link this information to the termination.

SHAKEN Plays Complementary Role Platform SHAKEN could extend the reach of “Know Your Customer” to include terminating network. 1.555.555.0123 1.555.555.0124 1.555.555.0125 1.555.555.0126 1.555.555.0127 … 1.555.555.0123 1.555.555.0124 1.555.555.0125 1.555.555.0126 1.555.555.0127 … Call Center Ledger Enterprise Carrier 0 Carrier 2 SHAKEN

SHAKEN: Standards and Governance SHAKEN Governance Authority is an industry led initiative under the auspices of ATIS, with FCC oversight. Enterprise Standards: SHAKEN Standards developed by ATIS/SIP Forum IP-NNI TF Carrier 0 Carrier 2 SHAKEN

Know Your Customer: Standards and Governance Platform Governance must include: Enterprise Call centers Consumer advocates Carriers Others? 1.555.555.0123 1.555.555.0124 1.555.555.0125 1.555.555.0126 1.555.555.0127 … 1.555.555.0123 1.555.555.0124 1.555.555.0125 1.555.555.0126 1.555.555.0127 … Call Center Ledger Enterprise Standards Analysis underway in various forums, but no consolidated industry effort yet: PACE Consumer Protection Consortium USTelecom ATIS

SHAKEN No Trust Between Carriers and Enterprise TRUST CNAM may or may not have current data Legal Entity Not Verified No baseline of truth Analytics determine based on algorithm - Carrier 0 TRUST Carrier 2 Number not attested Cannot traceback to originating carrier\customer

SHAKEN ? Partial Trust Established Through SHAKEN ONLY TRUST Enterprise TRUST ? CNAM may or may not have current data Legal Entity Not Verified No baseline of truth Analytics determine based on algorithm - Carrier 0 TRUST Carrier 2 Number partially attested Traceback to originating carrier\customer

SHAKEN ? Trust Established Through SHAKEN ONLY TRUST Enterprise TRUST ? CNAM may or may not have current data Legal Entity Not Verified No baseline of truth Analytics determine based on algorithm - Carrier 0 TRUST Carrier 2 Know the number used by the owner Traceback to originating carrier\customer

SHAKEN Trust Established Through Know Your Customer & SHAKEN TRUST Enterprise TRUST Consumer informed of entity who is calling Legal Entity Verified Baseline of truth - Carrier 0 TRUST Carrier 2 Know the number used by the owner Traceback to originating carrier\customer

Summary Focus is different, but complementary: Know Your Customer: focused on the intent of the call SHAKEN: focused on verifying the source of the call The “Know Your Customer” initiative should remain distinct from SHAKEN. Trying to merge the two could compromise both. Coordination between the two initiatives would be valuable: Ensure necessary functionality is supported Understand limitations Coordinated messaging Watch this space…