Tech Mahindra and Microsoft to curb pesky calls
Tech Mahindra and Microsoft have partnered to develop blockchainbased technology to curb pesky calls and SMS as recommended by telecom regulator Trai.
Based on blockchain technology and built on Microsoft Azure, the solution aims at mitigating the issue of unsolicited commercial communication ( UCC) in the country, it said. According to Trai’s new rules to quell pesky calls, telecom operators are required to deploy blockchainbased technology to prevent unauthorised access of subscribers data, make system nonrepudiative and enhance confidentiality.
This is apparently firstofits- kind technology in the world to be deployed to prevent leakages of consumer information from unauthorised telemarketers.
“Blockchain as a technology is a powerful tool to combat the issue of spam calls and fraud risks, to protect user information, as well as the integrity of the telecom sector. Trai’s new rules aim to ensure that subscribers’ data is not visible to a person operating the system in clear text or any application “other than the application performing the delegated functions.” The regulator has stated that UCC or spam calls are a major nuisance to telecom subscribers and has been working with stakeholders to curb this menace.
Trai had established a “Do Not Disturb” ( DND) registry in 2010. However, while the registry has more than 23 crore subscribers, unregistered telemarketers continue to spam customers, obtaining their consent through fraudulent tactics.
Any changes made in a blockchain- based system gets reflected across all the system or computers linked to it and it can be easily tracked when and where the changes were made. The blockchainbased solution will enable telcos and registered telemarketers to take care of preference registration, consent acquisition, dynamic preference setting, stakeholder onboarding, header registration, template registration, scrubbing service, and complaint handling and tracking, the statement said.
The solution will be a shared, secured ledger of UCCs distributed across a network of computers, to ensure a transparent system to help companies mitigate UCC on their networks.