Skip to content

Restoring Trust in Global Communications with CLI Authentication

Consumer trust in Calling Line Identification (CLI) has been significantly diminished by the widespread misuse and spoofing of caller IDs by malicious actors. At NGN ICS, we believe that restoring trust in the displayed number is fundamental to the future of voice communications. We are an industry leader in implementing and championing robust, multi-layered authentication and verification strategies to ensure the integrity of every call that traverses our network.

Championing STIR/SHAKEN

For IP-based networks, the STIR/SHAKEN framework is the gold standard for call authentication. NGN ICS is at the forefront of implementing this framework, which allows us to cryptographically sign calls originating from trusted sources and validate the signatures of incoming calls. This process verifies that the calling number is accurate and has not been illegally manipulated, providing a critical layer of defense against spoofing.

Rigorous CLI Consistency Checks

Every call on our network is subjected to rigorous consistency checks based on the highest international carrier standards. Our platform validates that a CLI is a valid, active telephone number that uniquely identifies the caller.
This includes verifying:

Format Compliance

The CLI must comply with the international E.164 numbering plan format.

Validity and Allocation

The number must be a valid, allocated number within a national numbering plan and assigned to a licensed operator.

Active Status

The number must be in service and capable of making calls.

Right To Use (RTU)

The originating operator must confirm the caller has the right to use the number, which is critical for leased numbers and complex cloud use cases.

Trusted Network Interconnects

We utilize secure, logically separated “Trusted Trunks” for traffic exchange with our core partners7. Traffic arriving on these dedicated interconnects has already passed a series of mandated checks (such as CLI consistency and KYC/KYT) by the originating carrier, allowing it to be treated as trusted and secure from the moment it enters our network.

Intelligent Handling of Complex Use Cases

We recognize that legitimate use cases exist where a domestic CLI may originate from an international location, such as in cloud contact centers, corporate telephony, and number anonymization services9. Our intelligent platform is designed to differentiate these legitimate, compliant scenarios from fraudulent activity, ensuring that valid enterprise traffic is not blocked while malicious spoofing is stopped.

Ready to scale your telecom infrastructure?

Interconnect with the NGN ICS global network — the privately operated infrastructure trusted by Tier-1 carriers, platforms, and enterprises worldwide.