ATIS 0300114-2016 Next Generation Network (NGN) Reference Document Caller ID and Caller ID Spoofing.pdf
《ATIS 0300114-2016 Next Generation Network (NGN) Reference Document Caller ID and Caller ID Spoofing.pdf》由会员分享,可在线阅读,更多相关《ATIS 0300114-2016 Next Generation Network (NGN) Reference Document Caller ID and Caller ID Spoofing.pdf(18页珍藏版)》请在麦多课文档分享上搜索。
1、 ATIS-0300114 ATIS Standard on - Next Generation Interconnection Interoperability Forum (NGIIF) Next Generation Network (NGN) Reference Document Caller ID and Caller ID Spoofing As a leading technology and solutions development organization, the Alliance for Telecommunications Industry Solutions (AT
2、IS) brings together the top global ICT companies to advance the industrys most pressing business priorities. ATIS nearly 200 member companies are currently working to address the All-IP transition, network functions virtualization, big data analytics, cloud services, device solutions, emergency serv
3、ices, M2M, cyber security, network evolution, quality of service, billing support, operations, and much more. These priorities follow a fast-track development lifecycle from design and innovation through standards, specifications, requirements, business use cases, software toolkits, open source solu
4、tions, and interoperability testing. ATIS is accredited by the American National Standards Institute (ANSI). The organization is the North American Organizational Partner for the 3rd Generation Partnership Project (3GPP), a founding Partner of the oneM2M global initiative, a member of and major U.S.
5、 contributor to the International Telecommunication Union (ITU), as well as a member of the Inter-American Telecommunication Commission (CITEL). For more information, visit www.atis.org. Notice of Disclaimer however, 14GR-31-CORE, CLASS Feature: Calling Number Delivery. 15ATIS-1000067, IP NGN Callin
6、g Name (eCNAM). 16GR-1188-CORE, CLASS Feature: Calling Name Delivery Generic Requirements. 17A SIP INVITE is a request code that indicates a client is being invited to participate in a call session. 18The Truth in Caller ID Act 2009 amends Section 227 of the Communications Act of 1934 (47 U.S.C. 227
7、). ATIS-0300114 5 this clause points out techniques that are being developed within the industry, and discussed in various industry groups: certification and verified tokens. 5.1 Certification Work is underway in the Internet Engineering Task Force (IETF) Secure Telephone Identity Revisited (STIR) w
8、orking group to develop RFC4474bis for IP-based Caller ID certification. Figure 5.1 is an example of a basic use case for a SP implementation for Caller ID certification.19Figure 5.1 Basic Use Case for Service Provider Implementation for Caller ID Certification 5.2 Verified Token Proposal In additio
9、n to the IEFT STIR work underway addressing certification in RFC4474bis, that work has recently been augmented to include consideration of a Verified Token as a certification method. 19IETF RFC 4474bis, Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP). DRAF
10、T version only. ATIS-0300114 6 Figure 5.2 Authenticate/Verify Service - Basic Call Flow Originate call on user equipment (UE) and authentication constructs one or more signatures using one of the following options: 4474bis signature and adds identity header to SIP INVITE. 4474bis signature with full
11、 Verified Token added to identity header of SIP INVITE. Verified Token is applied to Message Body as a multi-part MIME.20 Terminating network receives INVITE, fetches (likely highly cached) public key certificate from x5u claim, and uses validation service to validate signature. In addition, other m
12、itigation techniques can be used to perform SPspecific call validation treatment (CVT). Figure 5.3 Originating Service Provider Certificate Management Each SP will create a public key/private key X.509 certificate pair. It will generate a certificate signing request (CSR) to the chosen Trust Anchor
13、or authority that can validate with absolute certainty that the requestor is an authorized PSTN SP. The SP will receive back a signed public key and certificate chain with the public key of the Trust Anchor. 20Multipurpose Internet Mail Extensions ATIS-0300114 7 The SP will use the certificate chain
14、 as the public key certificate and distribute this public key via HTTP Secure (HTTPS) and/or Domain Name System Security Extensions (DNSSEC) as indicated in the “x5u” claim used in the verified token. The validation of the signature and the certificate chain back to the Trust Anchor will be the trus
15、t mechanism for authenticating the originating SPs certificate. As a precursor to the token proposal, trusted SPs need the ability to authenticate the end users authority to use the TN resource. 6 Relationship between Caller ID Spoofing Increase in consumer complaints; Increase in call center contac
16、ts; Potential billing issues. 8.1.1 Network Congestion SPs networks are engineered to minimize network congestion conditions which could impact the ability of the consumer to make and receive telephone calls. The engineering of these networks is based on the theory that the future behavior of the ne
17、twork will be similar to past behavior and include a small margin for network growth. SP network congestion will occur whenever actual conditions exceed these assumptions and an alternate route is not available. The magnitude and scope of the network congestion depends on the magnitude and scope of
18、the associated event. Table 7.1 illustrates the potential for illegitimate Caller ID spoofing to negatively impact SPs networks and cause network congestion. 8.1.2 Blocking E911 Calls Illegitimate Caller ID spoofing of a PSAPs legitimate TN could result in undesirable impacts, including a total tele
19、phony denial of service (TDoS) for the PSAP. Such events could occur if a number of the called parties return the call to the PSAP. This could be prevalent when a PSAPs 911 trunks are limited in size. The operational problem is exacerbated in the event of a true emergency situation wherein legitimat
20、e 911 calls fail to reach a PSAP due to a TDoS attack or loss of service event. This hinders SPs ability to fulfill the legal requirement of restoring all emergency services impacting national security in a timely fashion. 23M3AAWG. Best Practices to Address Online, Mobile, and Telephony Threats, Ju
21、ne 1, 2015, p. 48 . 24U.S. Senate Committee on Commerce, Science, Financial loss; Loss of confidence in SP; Loss of confidence in telecommunication industry; Safety concerns. Since Caller ID spoofing is not always illegitimate, consumer education is important to minimize confusion and understand pot
22、ential impacts. 8.2.1 Consumer Education from SPs Call Spoofing Best Practices for Consumer Interactions: Provide education to personnel on the feature of Caller ID, the legitimate use of call spoofing as allowed in the Telephone Consumer Protection Act of 1991 (TCPA), as well as the issues associat
23、ed with the illegitimate use of call spoofing. Ensure processes, as well as training, are well documented and in place for front-line personnel to be equipped to easily address concerns regarding call spoofing raised to them by customers. Areas to be considered for this coverage on call spoofing are
24、: the front line business office or other in bound call centers, online access for customers, and repair and technical support in in bound centers. Call center personnel are best prepared to address Caller ID spoofing concerns with the appropriate processes, training, and documentation, allowing per
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATIS03001142016NEXTGENERATIONNETWORKNGNREFERENCEDOCUMENTCALLERIDANDCALLERIDSPOOFINGPDF

链接地址:http://www.mydoc123.com/p-541028.html