When it comes to flagging fraud, telecoms data is certainly effective, adding a valuable layer of identity verification. This is exactly how we use it at Callsign.
Telecoms (or mobile network) data is one of the third party sources used by Callsign.
All with a view to checking that someone really is who they say they are. While it could be said that telecoms data, in itself, is not a catch-all method of identity validation, when used in a wider identity solution – like Callsign’s – it’s a highly effective, cross-industry method of flagging and blocking potentially fraudulent activity.
What makes it so powerful? First up, the fact that it addresses two of the most common fraud types: SIM swaps and call diverts. But also the fact that by using telecoms data as one of many sources, it can actually help to reduce false positives and remove friction from the verification and authentication process.
How Callsign uses Telecoms data
We cross-reference information provided by the user during an interaction or transaction with live telecoms data. It’s a way of flagging potentially fraudulent activity and preventing fraudsters from committing account takeover. All without the need for any extra resource. We are looking for things like:
- Has a SIM swap taken place recently?
- Has a call divert been put in place?
- Has the device been reported lost or stolen?
- Is this phone number usually associated with this identity?
All of this is done in real time, not just at the point of registration but throughout the user lifecycle, which means Callsign technology is continually building and renewing trust around the user. This information is enriched with additional data collected in the intelligence engine to help give extra confidence that the user is who they say they are. This ongoing approach to verification and authentication means friction can be removed for the end user, without compromising security, while appropriate checks are being carried out in the background.
Telecoms data privacy
Naturally, the use of telecoms in an identity solution raises a data privacy question. The good news is that, on the Callsign platform, telecoms data simply uses yes/no validation. All we’re doing is comparing the information provided by the user with existing telecoms operator data. If the technology suspects fraud, additional layers of verification and authentication will be required.
Find out more about our other modules
Use statistical modeling, advanced machine learning and deep learning techniques to determine that your users are who they say they are.Find out More
Policy Engine & Manager
Build dynamic policies that adapt in real time with our Policy Manager & Engine.Find out More