Verify

Verify and validate customers globally using their phone number.

Velocity

Discover the network provider for every mobile number globally.

Authenticate

Protect customers, accounts, and transactions within your app.

Live

Discover if a mobile number is assigned to a subscriber.

Score

A real time phone number credibility score.

TeleShield™

Identify if a number has the propensity to be used for fraud.

Banks and Financial Services
E-Commerce
Insurance
Mobile Messaging
Gaming & Gambling
Communication and Service Providers
Identity & Verification Providers
eBooks
News
Developers
FAQ
About us
Events
Careers
Contact us
Articles

Silent Authentication – why it’s the future and why the fraudsters hate it

A man in a hoodie looking at a laptop screen with a concerned expression, alongside a promotional graphic for an article about silent authentication.

They were once expected to be a kind of smart bomb that would be a terminal blow to crooks.

But lately the fraudsters have found one or two cracks that can allow them to bypass the hitherto completely impenetrable security OTPs provided.

There’s certainly no need to panic – OTPs are still largely a robust means of protecting users from fraud during transactions. But there are now some known ways fraudsters can bypass them.

One of the biggest problems in the war on fraud is that the enemy is always looking to turn the weaponry that is intended to eradicate it to its own advantage and use it as a weapon itself. And just that has recently begun to happen in some circumstances with One Time Passwords (OTPs).

One of the newest scams, for example, allows fraudsters to get hold of OTPs without even having the victim’s phone or a replica of it. Instead, they’ll send an SMS that appears to come from their target’s bank asking if they just made a high value transaction – a £10,000 holiday booking, say. The horrified account holder will reply ‘no’. A new SMS will then ask them to verify this reply by sharing the OTP they are about to receive. At the same moment the hacker will attempt to log in to an account belonging to their victim. This will initiate a genuine OTP being sent by SMS to their phone – but worried about that holiday booking, the victim will enter it as instructed. In so doing, of course, they are actually sending that access code to a hacker.

OTPs Vulnerabilities

At the other end of the scale, on a cruder but more frightening level, is this version. A friend of mine was mugged recently. They took his phone and threatened him with violence unless he revealed his PIN to unlock it. Once they had that they could get into all his apps and begin causing mayhem with his money. Long after the phone was reported stolen they were still getting sent OTPs to facilitate their theft – because there was no correlation between the phone’s status as stolen and its ability to perform transactions.

There are multiple variations on these scams but you get the broader point – OTPs do have some vulnerabilities that can allow them to be bypassed by criminals.

Authenticate explanation design one app blog post

Which is why we are so excited about the coming of silent authentication.

This is a fast, frictionless and, crucially, entirely secure way of verifying users that is soon to be a very big deal in online security. For use at the point of onboarding and/or subsequent purchases, silent authentication gets rid of the vulnerabilities that OTPs have developed.

And the reason is that it’s based solely on the real time data around the user’s mobile phone.

We’ve been evangelical for years about how the key to online security is to use telecom data as it can tell us more about the user than any other insight. And that’s exactly what silent authentication does. So, it’s really gratifying to see it finally being adopted as the cutting-edge security weapon we always knew it could be.

And I hope it goes without saying, but we’ll of course be at the forefront of introducing silent authentication to mainstream use.

Our own version of silent authentication is called TMT Authenticate and brings data from over 50 telecom network operators globally into play. This means it offers genuine worldwide security protection to a standard never attained before.

It takes away that longstanding antagonism of having to choose between cutting edge fraud controls and a frictionless user experience: suddenly you can have both.

The ultimate winner here is the customer: because they never wanted to have to make the invidious choice between a fast, seamless online experience and feeling safe and protected either.

Now they won’t have to.

Last updated on March 21, 2024

Contents

Related Articles

A person browsing on a smartphone with an accompanying caption suggesting a review of online security strategy for businesses.

When even billion dollar brands struggle with online security, it’s time to look at your own

Promotional graphic featuring a smiling woman holding a credit card, highlighting mobile verification to keep customers secure online.

Keeping Customers Secure Using Mobile Verification

A hand holding a SIM card with text overlay discussing SIM-Swap understanding by Edward Glasscote.

Understanding SIM-Swap


What Our Customers Are Saying

"BTS (Business Telecommunications Services) is successfully using TMT’s Velocity and Live services to check the status of mobile numbers. This way we make sure we optimize the performance of the service offered to our customers and ensure the quality of terminating traffic to all countries.”

Business Telecommunications Services

"TMT is a valued partner that enables us to manage our routing costs effectively. They proactively and continuously expand their operator and country coverage while delivering exceptional customer service. We can always count on them to achieve high-quality results and look forward to our continued collaboration."

Global Message Service

"TMT provides us with the most comprehensive numbering intelligence data through their fast and reliable Velocity and Live services. TMT is a trusted partner for us, their products ensure that we continue to optimise the best performance and service to our customers."

Global Voice

"TeleShield from TMT gives 42com the power to detect and target telephony fraud scams internationally, thereby protecting our company from the financial and customer experience impacts of telecommunications fraud."

Alberto Grunstein - CEO

"It has been a pleasure to work with the team at TMT. They have become an essential provider of accurate numbering data information and Number Portability services globally."

Luisa Sanchez - VP of SMS and Messaging Solutions, Identidad Technologies

"Deutsche Telekom Global Carrier uses TMT ID as one of their key suppliers for Mobile Number Portability Data services. Deutsche Telekom Global Carrier uses TMT ID’s Velocity MNP solution. This is an ultra-fast query service that optimises the routing of international voice calls and A2P messaging."

Deutsche Telekom Global Carrier

Ready to get started?

We provide comprehensive device, network and mobile numbering data available.

Contact us > Chat to an expert >