Phone intelligence or mobile intelligence refers to a robust set of phone and mobile signals that can be analyzed and synthesized to provide insight for the purposes of identity verification, identity authentication, and fraud prevention. Examples of telecom signals that feed phone intelligence include:
How does phone intelligence support a more sophisticated, private, and secure model of identity verification? What does it offer that traditional identity verification and identity authentication models cannot?
First off, let’s identify some other identity verification and identity authentication methods that mobile intelligence can either replace or strengthen:
Why is using mobile intelligence a better identity verification and authentication approach than using the methods above?
If you think about how many people have mobile phones, how long they have had them, and how often they use them, it’s clear why signals from mobile phones provide the most detailed, longitudinal (repeated observation or examination over time) view of a consumer’s digital footprint. Because this digital footprint is composed of so many different signals over such a long period of time and with such frequency, it is highly correlated with the identity and trustworthiness of the associated consumer.
One important thing to note is that in order to have the maximum effect and accuracy, mobile signals should be paired with signals from other authoritative data sources, such as signals from banks and credit bureaus. Combined with signals from a diverse array of authoritative sources, phone intelligence can give powerful insight into whether your customer is who they say they are.
Phones have built-in, passive authentication, encryption and privacy. With phone intelligence, a consumer does not need to download a separate app or purchase a physical hardware token to authenticate themselves. The process can take place invisibly and seamlessly through their existing mobile device, improving the customer experience. If you think about the experience a customer goes through using some of the more traditional methods of identity verification – having to remember the answers to security questions, fumbling with passcodes – it’s obvious why a user flow that either eliminates or minimizes those points of friction is better.
Further, unlike with KBA, there is no need to share personally identifiable information (such as social security number, address, or answers to secret questions) to verify your identity because mobile intelligence is built upon a privacy-first, zero-knowledge architecture.
Phone intelligence has many different applications but some popular use cases include:
Phone intelligence signals can be used not only for mobile interactions but also across web and call center channels.
Interested in learning how mobile intelligence can improve your identity verification strategies to make your customer experiences safer, faster, and easier?
Prove provides the most comprehensive mobile intelligence on the market with over 10 years of tenure, behavior, and other telecom signals. We analyze 6 million new events every day, such as phone number changes, disconnects, account ports, and SIM swaps; and we uniquely have 90% coverage of the 700 million US phone numbers – the highest in the industry. Through our patented Trust Score™, we synthesize these telecom events with additional signals from our network of authoritative data sources to provide the most complete view of your customers’ identities in a private, tokenized manner.