Two-Factor Authentication or 2FA is the security term for providing two different form factors of identification for verifying an identity or authorizing an action.
The generally accepted form factors themselves are typically from three categories:
- Something a user knows (a password or the answer to a challenge question)
- Something a user has (an ATM card or security token)
- Something a user is (a biometric such as a voiceprint or fingerprint)
Authentify offers out-of-band authentication services in more than 120 countries and in any spoken language. We've learned one approach seldom suits all needs. Whether you have a global presence or a more local focus, we can tailor a solution for you and your users.
Two-Factor Authentication Using the Telephone
Authentify enables online financial services firms to employ their online user's telephone, something they have, as the second authentication factor. A phone call synchronized to an online session can be used as part of an online account activation, a regular part of a secure logon, a transaction verification, or any account activity associated with higher risk.
How does it work?
Authentify's two-factor authentication phone services are invoked by an online property as a Web service. When using an account protected by Authentify, a user will log on to their account as they normally would. If they are logging on from an unfamiliar location, initiating a larger than normal transaction, or attempting something viewed as higher risk by the bank, the bank's server will send a request for a call via a secure Internet connection to Authentify.
The request contains just enough information for Authentify's service center to place a phone call. No Personally Identifiable Information (PII) or account specific information need change hands between your institution and Authentify. Authentify will place the call and communicate the outcome of the call back to the institution.
- 1. User activity triggers need for 2FA
- 2. Financial services firm requests phone call
- 3. Authentify places call
- 4. User follows instruction rec'd during call
What are the benefits of using an end user's telephone as part of an authentication and security process?
Employing an end user's telephone as part of a logon or other security process means there is no software involved for you or your users, nothing to deploy, no training required, and the process will work anywhere there is phone service.
Interested in trying it out yourself? CLICK HERE to visit our demo page.