Verify

Verify and validate customers globally using their phone number.

Velocity

Discover the network provider for every mobile number globally.

Authenticate

Protect customers, accounts, and transactions within your app.

Live

Discover if a mobile number is assigned to a subscriber.

Score

A real time phone number credibility score.

TeleShield™

Identify if a number has the propensity to be used for fraud.

Banks and Financial Services
E-Commerce
Insurance
Mobile Messaging
Gaming & Gambling
Communication and Service Providers
Identity & Verification Providers
eBooks
News
Developers
FAQ
About us
Events
Careers
Contact us

Authenticate
Frictionless Customer
Device Authentication

Protects customers, accounts and transactions without the need for an OTP

Chat to an Authentification expert >

A businesswoman using a smartphone, with graphic overlays suggesting mobile security and transaction services.

Frictionless Customer Authentication – Validate Your Customer in Seconds

Mobile customer verification by Authenticate securely links the mobile device that you are communicating with to the number’s live status, reducing fraud and friction during login

Find out more >

Person holding a smartphone and texting with someone named kayley about making plans for the weekend.

What Does The Authenticate User Experience Look Like?

Step 1

The user logs in online or selects your app and provides the mobile number linked to their account

Smartphone displaying a login screen for

Step 2

The device connects to the mobile network to verify it against the mobile customer account

Smartphone screen displaying a loading symbol with the text

Step 3

The device and the user are authenticated

Mobile authentication screen showing a user verified with a checkmark and the text

Step 4

The customer continues within your website or app

Mobile app welcome screen with user profile verification checkmark.

How does Authenticate work?

The process involves using live mobile data to corroborate the integrity of the customer’s mobile device, allowing almost instantaneous access to a website or app without compromising security

Firstly, we check which operator owns the number, then, in conjunction with you and the operator, we definitively confirm that the device attempting log in is the one you expect it to be. This check requires no direct involvement from the user and eliminates a major risk factor in conducting your online business

Chat to a Authenticate expert >

Five benefits of using Authenticate

Reduces One Time Password friction

Passwordless authentication requires zero input from customers and keeps them engaged on your website or app without delay or distraction

Reduce log in abandonment

Frictionless customer login increases the chance of retaining new customers – because signing in doesn’t require them to remember a password, wait for an SMS or download anything

Increase the speed of login or sign up

Authenticate works significantly faster than any One Time Password system. So your customer can engage with you without delay

Reduced fraud and phishing attempts

Despite being widely used, SMS-based OTPs can be phished and used by fraudsters to take control of an account – if a phone number has been compromised. Authenticate uses the mobile operator’s own data to ensure that it hasn’t been compromised

Easily integrated into your current app or service

Authenticate provides a single interface to multiple network operators around the world, meaning you only need to integrate the service into your workflow once

Case study

Authenticate Case Study

Providing a real-time customer liveness check that allows you to check which mobile numbers are no longer active

Rread case study >

Authenticate Coverage Map

Authenticate FAQ

Authenticate confirms the device connecting with your business has the same identity you expect (i.e.telephone number). It does this using data from the Mobile Network Operator that is encoded onto the SIM card contained within the phone. This cannot be copied or reproduced. Note that it is not authenticating the physical identity of the phone user, since it assumes that most modern smartphones will have other means (i.e. biometrics) to provide that function. Any fraudster attempting to copy attributes of the device to a new device that is under their control (i.e. cloning) will not be able to access the service.

On all Smartphones YES. Clearly the device needs to be internet enabled to make the authentication URL call.

No. There are multiple layers of protection built into the service and the data used by the operator to authenticate the device is not something that is publicly available or able to be cloned. Devices can still be potentially susceptible to SIM Swap fraud however because a SIM Swap is a social engineering type fraud and once executed the operator considers the new SIM to be correct. Therefore, where possible TMT still recommend performing regular SIM Swap checks.

The answer depends heavily on the operator and what country they are in, but typically a full authentication flow takes between 2 and 5 seconds. Don’t forget that silent authentications require no user input so the total time taken will normally be much lower than SMS OTP.

View all FAQs >
What Our Customers Are Saying

"BTS (Business Telecommunications Services) is successfully using TMT’s Velocity and Live services to check the status of mobile numbers. This way we make sure we optimize the performance of the service offered to our customers and ensure the quality of terminating traffic to all countries.”

Business Telecommunications Services

"TMT is a valued partner that enables us to manage our routing costs effectively. They proactively and continuously expand their operator and country coverage while delivering exceptional customer service. We can always count on them to achieve high-quality results and look forward to our continued collaboration."

Global Message Service

"TMT provides us with the most comprehensive numbering intelligence data through their fast and reliable Velocity and Live services. TMT is a trusted partner for us, their products ensure that we continue to optimise the best performance and service to our customers."

Global Voice

"TeleShield from TMT gives 42com the power to detect and target telephony fraud scams internationally, thereby protecting our company from the financial and customer experience impacts of telecommunications fraud."

Alberto Grunstein - CEO

"It has been a pleasure to work with the team at TMT. They have become an essential provider of accurate numbering data information and Number Portability services globally."

Luisa Sanchez - VP of SMS and Messaging Solutions, Identidad Technologies

"Deutsche Telekom Global Carrier uses TMT ID as one of their key suppliers for Mobile Number Portability Data services. Deutsche Telekom Global Carrier uses TMT ID’s Velocity MNP solution. This is an ultra-fast query service that optimises the routing of international voice calls and A2P messaging."

Deutsche Telekom Global Carrier

Ready to get started?

We provide comprehensive device, network and mobile numbering data available.

Contact us > Chat to an expert >