Two Factor Authentication with SMS and Voice Calling
Back to Articles
News VoIP SMS Security OTP Two Factor Authentication

Two Factor Authentication with SMS and Voice Calling

April 17, 2018 2 min
Aivis Olsteins

Aivis Olsteins

Regular username and password based authentication relies on a single set of access credentials (username and password) which is something user "knows", i. e. he/she has a knowledge of the username and password. If the information is somehow compromised (stolen, intercepted, guessed etc), then the unauthorized access to the service can be gained relatively easy.

Multi factor authentication uses more than one factor to verify the identity of the user:

  1. Something user "knows" (like username, password or PIN, see above)
  2. Something user "has" ( a physical device, like code card, token generators, or a phone number)
  3. Something user "is" ( biometric factors, like fingerprints, eye retina patterns, or voice)

Two factor authentication uses two of the above factors, usually what the user "knows" and "has". It greatly reduces risks of unauthorized access, because compromising one the factor, does not compromise the access altogether.

The method of using users phone number is relatively easy to implement and secure way to achive two factor authentication. While it has its own security issues, it is still considered far more secure than the traditional one factor (username and password based) authentication. This method assumes that users phone number is the factor that user "has", i.e. this is something what traditionally has been considered as more or less stable and permanent property. Once you have got the access to your phone line number, it is supposed to stay with you for reasonable long time, and even if you decide to abandon it, it will not become in the possession of another user in the short time frame. Companies usually place those numbers on hold for some time before making them available to next user.

It is also considered safe to assume that the call delivered to the specific number will always reach to the number, same is true for short messages. Therefore information delivered via Voice call or SMS can be considered as good second factor of the two factor authentication mechanism.

{$image1}

In practical scenario, the application developers choose whether to use text messaging, voice calling or both methods for delivering two factor authentication codes.

Advantages of using SMS:

  1. Seamless integration with end users app - the code can be delivered directly to the app without users intervention;
  2. Faster delivery times in compared to establishing voice calls;
  3. Lower costs in most of the markets;

Advantages of the Voice call:

  1. In many markets is more reliable or sometimes the only method available;
  2. In many markets cheaper than text messaging.

Developers should therefore decide which methods in which case they should use, should one method be backed up by another, and what are the execution schedule. 

Check out also my post about use case of one time passwords with script based telehony engine.

 

Share this article

Aivis Olsteins

Aivis Olsteins

An experienced telecommunications professional with expertise in network architecture, cloud communications, and emerging technologies. Passionate about helping businesses leverage modern telecom solutions to drive growth and innovation.

Related Articles

Case Study: Global Communications Company

Case Study: Global Communications Company

A leading communications company used our cloud Voice platform to send 30 million OTP calls per month to their customers, resulting in cost reduction and incrased conversion

Read Article
Bridging The Delay Gap in Conversational AI: The Backpressure Analogy

Bridging The Delay Gap in Conversational AI: The Backpressure Analogy

Conversational AI struggles with the time gap between text generation and speech synthesis. A “backpressure” mechanism, akin to network data flow control, could slow text generation to match speech synthesis speed, improving user interaction.

Read Article
How Voice AI Agents Can Automate Outbound Calls and Unlock New Opportunities for Businesses: A Deeper Dive

How Voice AI Agents Can Automate Outbound Calls and Unlock New Opportunities for Businesses: A Deeper Dive

AI voice agents transform healthcare scheduling by reducing costs, administrative tasks, and no-shows. They offer 24/7 service, multilingual support, proactive reminders, and valuable insights, improving efficiency and patient experiences.

Read Article
How to Fix Your Context: Mitigating and Avoiding Context Failures in LLMs

How to Fix Your Context: Mitigating and Avoiding Context Failures in LLMs

Larger context windows in LLMs cause poisoning, distraction, confusion, and clash. Effective context management (RAG, pruning, quarantine, summarization, tool loadouts, offloading) remains essential for high-quality outputs.

Read Article

SUBSCRIBE TO OUR NEWSLETTER

Stay up to date with the latest news and updates from our telecom experts