This process requires no One Time Password and keeps the customer on your website or app.
Mobile Authentication – TMT Authenticate is a frictionless ‘silent’ user authentication that uses a live mobile operator check to confirm that the device used by a customer is the same one that you expect it to be, with no requirement for an SMS One Time Password or user intervention – allowing customer verification using a mobile number.
Mobile customer verification by Authenticate securely links the mobile device that you are communicating with to the number that you expect it to be, without requiring any additional processing or credentials, reducing fraud and friction during a login or on-boarding process.
The process involves the customers mobile device, the website or app that wants to authenticate the customer, us at TMT Analysis and the Mobile Network Operator. The diagram below describes the 5 key stages in more detail and our experts are always on hand to discuss our frictionless authentication service.
Passwordless authentication requires zero customer input. It also keeps customers on your website or app.
Through providing frictionless customer login you can keep them on your website or app you increase the chance of gaining and retaining a customer. TMT Authenticate does not require a customer to remember a password, wait for an SMS OTP or download anything to verify themselves.
TMT Authenticate works faster than receiving an SMS OTP and having to input it. Your customer also does not have to visit another application like their SMS messages or retrieve a code from an email to proceed with the login.
Despite being ubiquitous and easy to use SMS OTP can be phished and used by fraudsters to take control of a account. TMT Authenticate uses the mobile operators own network. Device identity cannot be cloned or faked. Because the device must call the URL directly, it is also not susceptible to any kind of man-in-the-middle attack.
TMT Authenticate provides a single interface to multiple network operators around the world, meaning you only need to integrate the service into your workflow once.
When a user opens a website or an app on their device and it performs the login process, the Enterprise will provide us with the mobile number that they expect the device to have.
By checking which operator owns the number, then performing the silent authentication process, TMT Authenticate will in real-time be able to definitively confirm the identity of the device removing the need for any additional checks and allowing seamless and fast user log-in, every time with zero user involvement and still allowing you to a risk based approach in order to identify fraud.
What Our Customers Are Saying
Our team has many years’ experience working across telecommunications, media and technology.
The user obviously, but you don’t necessarily need to have them do that every time. When you detect a login request from a given account, you can always provide TMT Authenticate with the number that you are holding on file for that account to authenticate against.
No. There are multiple layers of protection built into the service and the data used by the operator to authenticate the device is not something that is publicly available or able to be cloned. Devices can still be potentially susceptible to SIM Swap fraud however because a SIM Swap is a social engineering type fraud and once executed the operator considers the new SIM to be correct. Therefore, where possible TMT still recommend performing regular SIM Swap checks.
You don’t need to. Through our core data platform, TMT Analysis know the correct network for any number in the World, even taking into account consumers moving (porting) between networks. The first thing we do with a number that requires authentication is check network ownership. This also allows you to instantly detect fake or incorrect numbers before incurring any further costs.
The answer depends heavily on the operator and what country they are in, but typically a full authentication flow takes between 2 and 5 seconds. Don’t forget that silent authentications require no user input so the total time taken will normally be much lower than SMS OTP.
Fill in the form below to access your eBook.
By leveraging mobile numbers, businesses and platforms can enhance the security of their authentication processes and provide users with a safer and more streamlined experience when using their business applications online.
Thanks for your details. Click the button below to our eBook automatically.