Telefonni Seznam

Main Menu

  • Home
  • Phonebook
  • Telephone directory
  • Telephone book
  • Phone contact
  • Telecommunications network

Telefonni Seznam

Header Banner

Telefonni Seznam

  • Home
  • Phonebook
  • Telephone directory
  • Telephone book
  • Phone contact
  • Telecommunications network
Phone contact
Home›Phone contact›Alternatives to knowledge-based authentication in the contact center –

Alternatives to knowledge-based authentication in the contact center –

By Catherine H. Perez
October 11, 2021
0
0


It is difficult for your customers to remember their PIN, password, or the measurements on the inside of their dog’s paws. Your agents are spending too much time asking these questions and waiting for customers to find slips of paper. The whole process is just a theater of security, offering very little meaningful, yet expected security.

Ten years ago, Opus Research coined the term “smart authentication” to encompass an approach, technologies, and techniques that businesses could use to create better customer and agent experiences that effectively deliver real security. While some companies have had great success taking this approach, it is not without challenges. The most feasible authentication technology at the time was voice biometrics, which proved to be technically complex to integrate while being very secure and efficient in the right use cases. Also, it depended (and remains) on client sign-up, with the associated privacy implications, and then on frequent enough reminders to justify the investment. In short, authentication based on voice biometrics is not the right answer for everyone.

Phone numbers in the foreground

In search of practical and affordable alternatives, organizations have often turned to Automatic Number Identification (ANI) or Caller Line Identifier (CLI) as a source of authentication. Like the caller’s voice, their phone number is inherent in their way of reaching the call center. Still, there was a major problem. Before mobile phones and number portability were commonplace, however, the challenge was that less than half of all calls to a contact center had a valid ANI and less than half of those matched a known customer record.

Most customers now contact businesses from their mobile, often keeping the same number for decades or even life. Many organizations now use ANI or CLI to identify their customers, either openly or in the background. As a result, it is not uncommon to see over 75% of calls recognized as customers, more than 3 times the rate of 10 years ago, and we expect this will only increase in the future. . Opus Research strongly recommends using ANI as an identifier, especially when paired with strong authentication such as voice biometrics.

ANI for authentication

As an authenticator, you can argue that ANI / CLI represents a factor of ownership because its use signals ownership by the known customer. In most cases, this is complicated because the customer does not own the number himself as it is assigned to the phone users by their telecom provider, who may as well assign it to another handset. With readily available Caller ID spoofing services, a business cannot be sure that the number it receives represents the originating device of the call. There are benign uses of caller ID spoofing, such as providing the appropriate callback number while working remotely. Yet it has become common for fraudsters to exploit weaknesses in a company’s security processes.

To further complicate authentication processes, the world of communications is divided into fixed, mobile, international and toll-free networks, among others. Calls often have to go between many providers, and in many cases businesses are not on the same telecommunications network as their customers. Unfortunately, the standards used by telecommunications service providers date back decades and are not designed with security in mind. Every carrier relies on the implicit trust that their peers are telling the truth. People working with less scrupulous vendors can exploit this weakness so that you really shouldn’t trust the ANI presented to you. This is why we say, “Don’t trust just any ANI”.

Adding AI to ANI is the solution

Fortunately, thanks to partnerships with telecommunications providers and the judicious application of artificial intelligence (in particular, machine learning), the technology now exists that can help you trust ANI.

Opus Research will feature this new category of network authentication and fraud detection in our upcoming Intelliview and Smart Authentication eBook.

Pre-register for both here

Related

‹Consolidation Chronicles: Genesys to acquire Pointillist and Exceed.ai

Categories: Smart authentication, Articles

Related Articles


Related posts:

  1. “In search of a form of contact”: a notorious pedophile sends a disturbing letter to the family of the victims
  2. Contact tracers write to HSE about salary and conditions
  3. How contact centers can leverage the benefits of Microsoft Teams
  4. Boyfriend arrested in death of Arkansas woman had received prior no-contact order, documents say
Tagsphone numbers

Categories

  • Phone contact
  • Phonebook
  • Telecommunications network
  • Telephone book
  • Telephone directory

Recent Posts

  • Udupi: MAHE researchers report the development of a 3D-printed self-hydrating contact lens
  • Book Review: Robert Buderi’s ‘Where Futures Converge’ chronicles the transformation of Kendall Square
  • Lucid Group Inc. Investors: Contact Portnoy Law Firm to Recover Losses
  • Biography of Phil Mickelson by Alan Shipnuck book review
  • Results of conversation between Austin and Shoigu: there is contact, no progress

Archives

  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • July 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • December 2019
  • November 2019
  • October 2019
  • July 2019
  • April 2019
  • March 2019
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • May 2018
  • April 2018
  • January 2018
  • December 2017
  • September 2017
  • August 2017
  • June 2017
  • April 2017
  • March 2017
  • February 2017
  • December 2016
  • October 2016
  • August 2016
  • July 2016
  • May 2016
  • January 2016
  • December 2015
  • October 2015
  • December 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • March 2014
  • September 2013
  • June 2013
  • September 2012
  • July 2012
  • January 2012
  • August 2011
  • January 2011
  • November 2010
  • April 2010
  • February 2009
  • March 2007
  • Privacy Policy
  • Terms and Conditions