Abstract: Over the past few years, robocalls are rapidly overwhelming the telephone world. According to a study analyzing over 50 million calls, the number of robocalls is dramatically increasing, from 3.7% of total calls in 2017 to 29.2% in 2018. And it’s projected to reach 44.6% by 2019. This article discusses the current solutions available to the consumers that are provided by telephone service providers to prevent robocalls. It also includes the newly adopted SHAKEN/STIR standard for caller ID identification by service providers. SHAKEN/STIR standard refers to the criteria of using public key infrastructure to authenticate the calls between the originating and terminating service providers.
On July 24, the House of Representatives approved an anti-robocalling bill, dialing up the heat that Congress has been pressing on telecoms and the Federal Communications Commission due to the onslaught of harmful calls. As a result, the US Federal Telecommunications Committee which has been pushing for SHAKEN/STIR's adoption and has imposed the end of 2019 as a hard deadline for networks implementing the protocol. Though research and development teams at AT&T and Comcast have claimed to complete the first SHAKEN/STIR call made between two different networks, U.S. has already been hit with 33 billion robocalls this year.
Robocalls are irrelevant or inappropriate messages sent over the phone to a large number of recipients – typically to those who have not expressed interest in receiving the message. Caller force the users to pick the calls using Caller ID spoofing. Spoofing is when a caller deliberately falsifies the information transmitted to user’s caller ID display to disguise their identity. Scammers often use neighbour spoofing so it appears that an incoming call is coming from a local number, or spoof a number from a company or a government agency that users may already know and trust. Not only are spam calls annoying, they are very dangerous. Without a solution to effectively stop the flood of unwanted spam calls received on their smartphone, users are vulnerable to phone scams and the crooks responsible for them.
The major wireless companies all provide free and paid services that can alert customers to suspected robocalls or block them. AT&T’s Call Protect app provides fraud warnings, and spam call screening and blocking. Call Protect is free for iOS and android. AT&T also offers Call Protect Plus for $3.99 a month which offers enhanced caller ID services and reverse number lookups.
Sprint also let customers block or restrict calls through its Premium Caller ID service. It costs $2.99 per month and can be added to Sprint account. On the other hand, T-Mobile already let customers know when an incoming call is fishy by displaying “scam likely” as the caller ID. Users can also ask T-Mobile to block those calls before phone even rings using Scam Block. Customers can get it for free by dialing #662# from their device.
Verizon‘s Call Filter is an app that works on both iOS and Android. The free version detect and filter spam calls, while its $2.99 a month version give users a few additional features like its proprietary “risk meter” to help them know more about the caller.
Third-party apps are also widely available and often free. They’re the best tools available right now. These apps include Hiya, YouMail, Robokiller, TrueCaller and Nomorobo. There isn’t a lot one can do for traditional landline phones, except block individual phone numbers.
Caller ID authentication is a new system aimed at combating illegal caller ID spoofing and spam calls. Industry stakeholders are working to implement caller ID authentication, which is called SHAKEN/STIR. SHAKEN/STIR, Signature-based Handling of Asserted Information Using toKENs (SHAKEN) and the Secure Telephone Identity Revisited (STIR) standards, is a framework of interconnected standards. An originating service provider puts the call on the network and authenticates the caller ID information using STIR/SHAKEN. Service providers know their customers, so they’re well-positioned to do that. They secure their authentication by signing the call using public key infrastructure, which is also widely used with the internet. A terminating service provider delivers the call to their customer and also verifies the caller ID information in the call using the public key infrastructure to confirm the information and signature still match. Following call flow diagram illustrates how STIR/SHAKEN works:
A SIP (Session Initiation Protocol) INVITE is received by the originating telephone service provider.
The originating telephone service provider checks the call source and calling number to determine how to attest for the validity of the calling number.
Full Attestation (A) — the service provider has authenticated the calling party and they are authorized to use the calling number. An example of this case is a subscriber registered with the originating telephone service provider’s softswitch.
Partial Attestation (B) — the service provider has authenticated the call origination, but cannot verify the call source is authorized to use the calling number. An example of this use case is a telephone number behind an enterprise PBX.
Gateway Attestation (C) — the service provider has authenticated from where it received the call, but cannot authenticate the call source. An example of this case would be a call received from an international gateway.
The originating telephone service provider uses the authentication service to create a SIP Identity header. The authentication service could be a third-party service hosted in the cloud a software application integrated with the telephone service provider’s softswitch or Session Border Controller (SBC). The SIP Identity header contains the following data:
The SIP INVITE with the SIP Identity header is sent to the terminating telephone service provider. In addition, the Identity token may be sent across the internet, out-of-band, to the terminating provider’s Call Placement Service.
The SIP INVITE with Identity header is passed to the verification service.
The verification service obtains the digital certificate of the originating telephone service provider from the public certificate repository and begins a multi-step verification process. If all verification steps are successful, then the calling number has not been spoofed.
The SIP Identity header is base64 URL decoded and the details are compared to the SIP INVITE message.
The public key of the certificate is used to verify the SIP Identity header signature.
The certificate chain of trust is verified.
The verification service returns the results to the terminating service provider’s softswitch or SBC.'
Determining and denying call completion based on detection of robocall or telemarketing call
Original Assignee: TelTech Systems Inc.
Current Assignee: TelTech Systems Inc.
It relates to a method for handling an incoming call, comprising the steps of determining that the incoming call is an unwanted call. The process included locating at least one prior call where the characteristics of a calling party match that of the unwanted call, determining an audio response which kept the calling party in the prior call longest and playing the audio response which kept the calling party in the prior call longest in the unwanted call.
Before forwarding the call to intended recipient, the call is routed within a switch. First, phone number of calling party is checked the call is answered by the switch at this point. A continued ringing sound is played to the calling party, a greeting or a request for a name to be stated. Meanwhile, when answering the call, the audio received from the calling party is compared to prior stored audio in a database. Then signatures stored such as the audio signatures transcribing the voice recording of the call are compared to further determine if the call is an unwanted robocall or telemarketing cal
Method for blocking illegal prerecorded messages
Original Assignee: John Almeida
Current Assignee: Unoweb Inc.
This patent proposes a method for blocking illegal prerecord messages (robocalls). The method uses telephone number lists and a telephone exchange server to enable the blocking of illegal robocalls and to enable the legal ones to proceed free of impediment. The method includes following steps:
1. Server computer receiving a request to permit a telephone call to the first telephone when the telephone call originates from a second telephone number;
2. Storing the first telephone number and the second telephone number;
3. Intercepting a call to the first telephone number and determining an originating telephone number for a device making the intercepted call;
4. Comparing the originating telephone number to the telephone number list and if the originating telephone number is in the telephone number list, then the server computer enables the call to ring at the first telephone.
Determining and denying call completion based on detection of robocall or unsolicited advertisement
Original Assignee: TelTech Systems Inc.
Current Assignee: TelTech Systems Inc.
The method proposed prevents the receipt of unwanted calls by determining an intermediate switch between calling party and called party. If the calling party is in the database of previously verified callers, the call is passed on to the called party. If not, then the calling party is prompted to provide data, such as "press 5 to be connected' or “say proceed’ before being allowed to connect. Once connected, the called party may indicate that the call was/is unwanted and should be disconnected. Then, the call is disconnected from the called party while being maintained with the switch. The call is also recorded to detect future unwanted calls. The detection of future unwanted calls may be modified based on association of called parties to each other which further may be used to change the threshold of closeness of audio signatures between calls.