Two Factor Authentication with SMS and Voice Calling
Back to Articles
News VoIP SMS Security OTP Two Factor Authentication

Two Factor Authentication with SMS and Voice Calling

April 17, 2018 2 min
Aivis Olsteins

Aivis Olsteins

Regular username and password based authentication relies on a single set of access credentials (username and password) which is something user "knows", i. e. he/she has a knowledge of the username and password. If the information is somehow compromised (stolen, intercepted, guessed etc), then the unauthorized access to the service can be gained relatively easy.

Multi factor authentication uses more than one factor to verify the identity of the user:

  1. Something user "knows" (like username, password or PIN, see above)
  2. Something user "has" ( a physical device, like code card, token generators, or a phone number)
  3. Something user "is" ( biometric factors, like fingerprints, eye retina patterns, or voice)

Two factor authentication uses two of the above factors, usually what the user "knows" and "has". It greatly reduces risks of unauthorized access, because compromising one the factor, does not compromise the access altogether.

The method of using users phone number is relatively easy to implement and secure way to achive two factor authentication. While it has its own security issues, it is still considered far more secure than the traditional one factor (username and password based) authentication. This method assumes that users phone number is the factor that user "has", i.e. this is something what traditionally has been considered as more or less stable and permanent property. Once you have got the access to your phone line number, it is supposed to stay with you for reasonable long time, and even if you decide to abandon it, it will not become in the possession of another user in the short time frame. Companies usually place those numbers on hold for some time before making them available to next user.

It is also considered safe to assume that the call delivered to the specific number will always reach to the number, same is true for short messages. Therefore information delivered via Voice call or SMS can be considered as good second factor of the two factor authentication mechanism.

{$image1}

In practical scenario, the application developers choose whether to use text messaging, voice calling or both methods for delivering two factor authentication codes.

Advantages of using SMS:

  1. Seamless integration with end users app - the code can be delivered directly to the app without users intervention;
  2. Faster delivery times in compared to establishing voice calls;
  3. Lower costs in most of the markets;

Advantages of the Voice call:

  1. In many markets is more reliable or sometimes the only method available;
  2. In many markets cheaper than text messaging.

Developers should therefore decide which methods in which case they should use, should one method be backed up by another, and what are the execution schedule. 

Check out also my post about use case of one time passwords with script based telehony engine.

 

Share this article

Aivis Olsteins

Aivis Olsteins

An experienced telecommunications professional with expertise in network architecture, cloud communications, and emerging technologies. Passionate about helping businesses leverage modern telecom solutions to drive growth and innovation.

Related Articles

How Voice AI Reduces Agent Burnout and Boosts Satisfaction

How Voice AI Reduces Agent Burnout and Boosts Satisfaction

Reduce Burnout with Voice AI: Offload Repetitive Calls, Real‑Time Agent Assist, 40–80% Less ACW, Calmer Escalations, Healthier Occupancy, Proactive Deflection & PCI‑Safe Flows—Happier Agents, Faster Resolutions, Better Coaching, Faster Ramp

Read Article
Seamless Voice AI Integrations: Salesforce, HubSpot, and ERP Systems

Seamless Voice AI Integrations: Salesforce, HubSpot, and ERP Systems

Seamless Voice AI Integrations with Your Stack: Salesforce & HubSpot CRM + SAP/Oracle/NetSuite/Dynamics ERP; OAuth2 & mTLS Security; Real‑Time Read/Write (Cases, Orders, Payments, Scheduling); Warm Transfers, Context; Audit Logs, SLAs, iPaaS Support

Read Article
Measuring Voice AI Success: The KPIs That Matter—CSAT, Containment, Speed, Accuracy, Reliability, and ROI

Measuring Voice AI Success: The KPIs That Matter—CSAT, Containment, Speed, Accuracy, Reliability, and ROI

Voice AI KPI Scorecard: CSAT/NPS, FCR & Containment, Time‑to‑First‑Word & p95 Latency, Intent/Slot Accuracy & ASR WER, Groundedness, Tool Success (Payments/IDV/Scheduling), Warm Xfers, Uptime/Reliability, Consent/Redact, Cost per Resolution & ROI

Read Article
Sensitive Data in Voice AI: PCI‑Safe Payments, HIPAA‑Compliant PHI, Redaction & Tokenization

Sensitive Data in Voice AI: PCI‑Safe Payments, HIPAA‑Compliant PHI, Redaction & Tokenization

Managing Sensitive Data in Voice AI: PCI‑Safe Payments (DTMF Masking, Tokenization), HIPAA‑Compliant PHI Segregation, Redaction/De‑Identification, End‑to‑End Encryption, Zero‑Trust Access, Residency/Retention, DSAR Deletion, SIEM‑Audited Trails

Read Article

SUBSCRIBE TO OUR NEWSLETTER

Stay up to date with the latest news and updates from our telecom experts