Discover how our products can revolutionize the way you communicate and collaborate.


Explore our advanced voice solutions designed to optimize your communication workflows.

Diverse range of DID number solutions designed to enhance your communication capabilities.

Experience unparalleled communication efficiency with our advanced SIP Trunking Solutions.

Cutting-edge technology to proactively detect and neutralize spam flags on your DID Numbers.


Wherever your audience is, our platform ensures seamless messaging across diverse channels.

Build customer journeys by fostering interactive conversations, all within the framework of your app. 

Connect with your audience in a simple and effective way through our cutting-edge SMS platform. 


Harness the power of IDT as your chosen carrier while leveraging your platform’s advanced features and services.

Integrate Twilio with our robust carrier routing platform to achieve unparalleled Voice termination system.

Experience reliable and high-quality communication services while leveraging the advanced capabilities of Genesys. 

Integrate IDT with the collaborative strength of MS Teams, unlocking efficient and feature-rich communication. 

Experience the power of our carrier network seamlessly connected to Plivo through our cutting-edge BYOC solution. 


Experience the power of our online voice tools, designed to simplify communication management. 

Ensure the authenticity and integrity of outbound calls with our STIR/SHAKEN Verification Check tool. 

User-friendly tool to verify the reputation of your business number, ensuring that it remains trusted. 

Compare and gain insights into outbound call expenses, optimize budget, and make informed decisions. 

Easily estimate and compare the costs associated with different DID numbers providers. 

Compare inbound VoIP rates among top CPaaS providers and optimize your inbound call costs. 

Generate custom SMS templates. 


Empower yourself with the resources you need to thrive in the dynamic landscape of communication.

Articles covering a wide range of topics.

Get answers to common queries.

Find instructions to make the most of our products.

Discover telecom insights and trends.

Find definitions of popular telecom terms.

Explore how our solutions have helped businesses.

Latest telecom trends, innovations, and market insights.


A global telecom partner built to meet your needs. 

Discover the story behind our commitment to delivering innovative solutions to connect people and businesses worldwide. 

Learn about our robust network infrastructure that spans across the globe, ensuring reliable and secure connectivity. 

Got a question, feedback, or need assistance? Our dedicated team is here to help!

Find partners or sign up for partnership programs.

Learn / Blog

End Spoof Calls with Certification

|  4 min
On Page IDT
In this article

Business VoIP providers – certification could end spoof calls

The introduction of VoIP has many advantages for business. It offers lower call costs and improved scalability, plus the ability for staff to use the same company phone system wherever they are located. 

However, for business and personal phone users alike, some of the strengths of VoIP have, in some situations, exacerbated the curse of spoofed calls. Unscrupulous telemarketers have been able to evade call blocking by changing their numbers and cutting labour costs by calling from overseas. More serious fraudsters have spoofed the numbers of banks, utility companies and other businesses in an effort to extort funds or steal identities. 

Numbers can be spoofed to have a specified local area code – a technique known as ‘neighbour spoofing’ – so that the call recipient is less likely to be suspicious and therefore more inclined to pick up the call. Combine all of this with robot calling systems that can be set up cheaply with basic hardware and wrongdoers are able to dial hundreds of numbers in a short space of time. It’s easy to see why people are getting fed up with the tide of unwanted calls. 

In the US alone, calls of this nature triggered over seven million complaints to the telecommunications regulator in 2017. It is estimated that the average US consumer receives more than 20 unwanted or spam phone calls each month and on many days will get more spam calls than they do genuine ones. 

All of this is bad news for legitimate businesses because it’s increasingly the case that if people don’t recognise the number that is calling, they simply don’t pick up the phone. If you are trying to get in touch with your customers, this can lead to an irritating round of ‘voicemail tennis’ and a good deal of wasted time for both business and customer. 

Technology to the rescue

There have been various attempts to curb the menace of spoofed and spam calls. Until now these have mostly involved the blacklisting of numbers. The problem with this is that the spoofers are able to react quickly by setting up new numbers as soon as an old one is blocked. 

Help is at hand, however, in the form of a new technology developed by a consortium of technical experts from the telecoms industry. It’s currently being tested in the United States and may be precisely what’s needed to bring an end to the curse of spoofed phone numbers. Known as the STIR/SHAKEN system, it works by adding a certificate to each number in order to provide an additional layer of verification. 

STIR stands for Secure Telephone Identity Revisited, and SHAKEN for Signature-based Handling of Asserted information using toKENs – you can see why they needed a catchy acronym. The system is currently being tested by a number of companies in the US. 

So, how does it work? When someone makes a call, a certificate is attached to it which verifies that it comes from a particular number. When the call gets to the recipient’s service provider, the certificate is checked against an encrypted private key to ensure that it’s genuine. The call can then be marked as verified or flagged as suspicious. This is similar to the secure socket layer (SSL) certificate system used to verify that websites are genuine and secure and which results in a green padlock symbol showing in your browser software. 

Issuing of certificates is overseen by an industry regulator – the Federal Communications Commission (FCC) in United States – so that only genuine companies will be able to get hold of them. 

What this means for business VoIP providers

In order for the STIR/SHAKEN system to be effective, carriers, whether on traditional PSTN networks or on VoIP, need to be onboard with the technology. This will allow caller display systems to show when a call has not been verified and should be treated with a degree of suspicion. This could, perhaps, be achieved by means of a suitable security symbol to show that the number of your bank – for example – is genuinely what it appears to be. 

The system may confer additional costs on providers as they will need to invest in the technology needed to make the verification system work effectively. They may, however, be able to pass these costs on to their customers as individuals and businesses have already proved more than willing to invest in call blocking technologies to reduce the annoyance of unwanted calls. 

Will it make automated calling go away? It seems unlikely that this will happen. However, if verification systems such as STIR/SHAKEN take off, it is probable that robot calling will become a less lucrative activity for scammers and fraudsters and we may see a reduction in this type of call. 

Share this article

Leave a Reply

Your email address will not be published. Required fields are marked *


Meet our wholesale voice routing

Fulfill all your voice calling needs with our category leading wholesale A-Z Voice Termination.
Try IDT Express for a $25 Credit

Get $25 Free Trial Credit

Get IDT Express articles in your inbox

The best source of information in the telecom industry. Join us.

    Most Popular

    |  7 min
    Introduction to Toll-Free Forwarding In today’s fast-paced business landscape where...
    |  7 min
    Introduction to Caller ID Reputation Caller ID reputation is a...
    |  6 min
    The European Union’s General Data Protection Regulation (GDPR) has permanently...