Skip to main content
The ins and outs of token-based authentication
February 7, 2022 at 7:00 AM
The ins and outs of token-based authentication

It’s not unusual to feel like we’re getting more robocalls throughout the day than real calls. Not only are robocalls inconvenient and annoying, but they can also be dangerous for many individuals who fall victim to their scams. Token-based authentication can help mitigate some of these scam calls to protect individuals from the risks that come with them. If you’re not familiar with how this process works, our team at Prescott-Martini can provide you with the ins and outs of token-based authentication.

Why is it necessary?

Generally speaking, token-based authentication is not a new concept. Web browsers have been using this process to verify security processes and protocols for nearly three decades. It’s a method that gives users peace of mind when sharing personal information or buying products.

The same concept has been applied to help individuals screen their phone calls before they reach the phone, to begin with. While token-based authentication isn’t necessary to block calls from a friend or scorned lover, it’s effective in blocking calls from scammers and robocallers. Many vulnerable individuals can be protected from scams with the help of token-based authentication.

How does it work?

Token-based authentication is a process that requires database look-ups and checks to be performed in a matter of seconds. While there’s a lot that goes on, it can be described with a simple approach, which we’ll outline below.

When a phone call is made, the entity making the call will send a destination number using the MySQL data link. When we receive a MySQL data query from your phone, we’ll add a “verified caller ID” tag from our ANI inventory. The verified tag lets the person receiving the call know that your number is legitimate.

We’ll then produce a Service Provider signature certificate that verifies the number is accepted by a major telephone provider. The MySQL data is returned and inserted into the caller’s SIP header.

After the call has been cross-checked against our API, the call receiver will see a message letting them know it’s been verified as legitimate, which is similar to traditional caller ID with someone in the contacts list.

What are the benefits of tokens?

We can add, edit, or delete any ANI in the customer account. Where we provide the ANI, we generally provide A level tokens as well. These tokens are what is used to verify the legitimacy of a phone call. Callers who don't have these tokens will either be dropped before the call can be completed or sent through with a B- or C-level authentication. As a business, you can increase pickup rates with customers with token-based authentication. Your customers and prospective customers will be at ease knowing they're receiving a call from a business that's not trying to scam them or steal personal information. These tokens are what is used to verify the legitimacy of a phone call. Callers who don’t have these tokens will either be dropped before the call can be completed or sent through with a B- or C-level authentication. As a business, you can increase pickup rates with customers with token-based authentication. Your customers and prospective customers will be at ease knowing they’re receiving a call from a business that’s not trying to scam them or steal personal information.

Reach out to learn more

You can learn more about the ins and outs of token-based authentication by getting in touch with Prescott-Martini. We provide STIR/SHAKEN treatment so businesses can be compliant with the Traced Act. We offer more than 150 years of combined experience in telecommunications and can provide you with the right solution for your business. We want to help eliminate illegal robocalls to restore the confidence we all have in answering our phones. Get in touch by sending a message using our online contact form.