As you tap your smartphone to make a call, send a text, or access the internet, have you ever wondered how the network verifies if you are who you claim to be?

OK we get it, unless you’re a cyber security geek, you probably haven’t wondered too much about it.

But since it’s now possible to leverage the same system mobile networks use to authenticate users, a passwordless world just got a lot more feasible. And because Honey Badger is at the forefront, allow us to uncover the fascinating world of mobile network authentication.

The Importance of the SIM Card

The heart of mobile authentication starts with the humble SIM card. But this tiny chip is more powerful than most realize:

International Mobile Subscriber Identity (IMSI): Think of the IMSI as the unique ID card for your phone. It’s primarily used to identify you as a subscriber but isn’t directly employed for security to avoid potential misuse.

The Secret Keeper, Authentication Key (Ki): Embedded within the SIM is a secret key, aptly named Ki. It’s a cryptographic secret that’s shared with your mobile operator’s Authentication Center (AuC). Crucially, the Ki never openly travels through the airwaves, ensuring its confidentiality.

Engaging in a Secure Dance: Challenge and Response

When you power up your phone and it seeks to connect to the network, a digital “handshake” unfolds:

The network, like a guard at the gates, issues a challenge by sending a random number to your device.

Your device processes this number with its Ki to produce a response, which it sends back.

In parallel, the AuC, using its copy of the Ki, computes an expected response.

If the two responses match, the gates open! Your device is authenticated.

OK OK, we know it sounds technical. But think of it this way, the mobile network has proven it’s you by using your SIM and device to generate a token. If you weren’t in possession of your SIM, then the token generated wouldn’t match with what the mobile network expects, and you wouldn’t be authenticated. It’s similar to when an SMS OTP is used to prove you’re in possession of a device, except  it’s more secure and there’s no need to enter an OTP code. 

The Best Part: You can Leverage this Process!

For the most part mobile network authentication is a closed ecosystem, reserved only for carriers to secure calls, texts and data sessions. Until now that is. Mobile Network Operators across the globe have begun allowing other apps and services to piggyback off their uniquely secure authentication mechanism.

The result? A way to prove a user is in possession of a device without clunky SMS OTP’s or magic links. It’s so seamless in fact that we’ve named this new approach Silent Authentication+. But maybe best of all, it dramatically reduces the risk of fraud through man in the middle and social engineering attacks. For more benefits be sure to read our blog post on why we’ve fallen in love with Silent Authentication+.

How does Honey Badger fit in?

You might be forgiven for wondering where Honey Badger fits into the brave new world of Mobile Network Authentication. The answer is that we’ve removed the barriers to getting started by building Silent Authentication+ libraries and software development kits (SDKs) native to web, iOS and Android.

Get started with our Silent Authentication+ libraries, which make authentication via the mobile network a breeze!

We’ve removed the technicalities of underlying protocols and taken care of the commercial relationships with mobile network operators. Ultimately, giving you the ability to authenticate users via the mobile network in just a couple of seconds using a single API call. Nice!

Hungry to learn more? Schedule a call with one of our experts or request a demo using the form below 👇.

Get a demo of Silent Authentication+

Enter your email address and we’ll send over some times for a demo.

Honey Badger HQ

Subscribe to receive updates on new content

Related Posts

Partner with us

Complete the form below and we’ll be in touch to kick off a discussion. 

Account Servicing

Stop fraud and improve customer experience during account servicing by eliminating SMS One Time Passwords (OTP). Instead, leverage phone based SIM authentication which involves comparing data generated by the Mobile Network Operator (MNO) with mobile device session data. This provides a foolproof way of proving that an individual is in possession of their two-factor device.

Benefits

This new approach to authentication isn’t susceptible to SIM swap attacks and doesn’t require the user to enter a password. Ultimately, account takeover attacks are blocked, while customer experience is improved and the time taken to service a request us reduced.

Made for

 LENDERS   ONBOARDING   AUTHENTICATION 

Get started via

 EMBEDDABLE WIDGET   API 

Pricing

 PAY PER AUTHENTICATION 

Request a demo

Contact Data Cleaning

Contact Data Cleansing verifies that the contact and personal information you hold isn’t out of date or inaccurate. Data is compared against the information held on file by Mobile Network Operators (MNOs). Whether processing a single record or sanitising thousands of records in batch, you’ll quickly identify bad data.

Benefits

The case for maintaining up-to-date records goes way beyond good practice for compliance and regulatory reasons. It’s critical to ensuring customers are contactable. Furthermore, it reduces security threats by ensuring communications aren’t sent to the incorrect individuals.

Made for

 LENDERS   FINTECH  KYC 

Get started via

 WEB INTERFACE   API 

Pricing

 PAY PER RECORD CHECK 

Request a demo

SIM Swap Detection

SIM Swap Detection is a critical step in stopping account takeover. Why? Because account takeover attacks commonly exploit the ease of which a phone number can be stolen by simply assigning it to a new SIM. This allows bad actors to intercept communications, such as SMS one-time-passwords (OTP), which are used by 93% of enterprises worldwide to verify customers.

Benefits

SIM Swap Detection instantly and silently checks the history of a SIM card to see when it was last swapped. Recent swaps indicate high risk of fraud, allowing you to take appropriate action, such as failing verification or requesting additional security procedures are followed.

Made for

 FRAUD PREVENTION

Get started via

 WEB INTERFACE   API 

Pricing

 PAY PER SIM SWAP CHECK 

Request a demo

Social Trace

Social Trace significantly reduces the risk of losing contact with your customers by diversifying communication channels. Simply drop the Social Trace widget into your onboarding workflow and allow customers to connect one or more social channels with just a click.

Benefits

Lenders who capture social channels are significantly less likely to lose contact with their customers. Why? Because different demographics prefer to engage over different channels. This is particularly important when it comes to collections. Initiating contact over different channels increases your chances of getting a response, which in turn increases the likelihood of resolving late or non payment. 

Made for

 LENDERS   ONBOARDING   COLLECTIONS

Get started via

 EMBEDDABLE WIDGET 

Pricing

 MONTHLY FEE 

Request a demo

Mobile Fraud Check

Mobile Fraud Check allow you detect fraud indicators using data provided by Mobile Network Operators (MNOs). Key checks include device overseas, call forwarding, SIM swap, a high risk number database lookup and much more.

Furthermore, Mobile Fraud KYC allows you to verify a person’s firstname, lastname, date of birth and postcode against the data held on file by MNOs. Since MNOs conduct their own KYC checks on new customers, it gives you the ability to match personal information you collect against a trusted and verified source.

Benefits

Mobile Fraud Checks happen instantly and with zero customer friction. The data held by MNOs is often more recent and reliable than other data sources and a level of granularity is provided,  allowing you to see how many and which KYC fields matched.

Made for

 LENDERS   ONBOARDING   FINTECH  RISK ANALYSIS

Get started via

 WEB INTERFACE   API 

Pricing

 PAY PER LOOKUP 

Request a demo

Mobile Data for Credit Risk

Mobile Data for Credit Risk delivers the data required to predict credit risk based on a persons mobile phone information. Key data attributes include the network provider, line type, and KYC match information. Working in partnership with lenders we’ve been able to clearly identify correlations between this data and the likelihood of a loan going into arrears.

Benefits

Open Banking Vs Mobile Data. Which is the most effective in predicting bad borrowers? A recent project with a UK lender compared a risk model built with Open Banking against a model built with Honey Badger’s Mobile Data. The results showed that both models outputted almost identical risk scores. The difference? Mobile Data could be deployed immediately with no customer friction required to calculate a risk score.

Made for

 LENDERS   ONBOARDING  RISK

Get started via

 EMBEDDABLE WIDGET   WEB INTERFACE   API 

Pricing

 PAY PER LOOKUP 

Request a demo

Geo Authentication

Geo Authentication™ provides frictionless identity verification that reduces abandonment rates. Users simply select images that they recognise from nearby to their address. In built anti-fraud controls ensure that valid users can complete the challenge whilst bad actors are blocked.

Benefits

Leading lenders such as Amplifi Capital use Geo Authentication during applications as an alternative to more intrusive identity verification checks, such as document uploads, that cause high friction and lead to increased dropouts. Completion rates with Geo Authentication are 28% higher and have subsequently helped drive an increase in revenue for the business.

Made for

 LENDERS   ONBOARDING   ACCOUNT RECOVERY 

Get started via

 EMBEDDABLE WIDGET   WEB INTERFACE   API 

Pricing

 PAY PER AUTHENTICATION CHECK 

Request a demo