SlideShare a Scribd company logo
1 of 25
Download to read offline
The Phone Number
as a Digital Identity
22
Agenda: Phone Number as Digital Identity
02. Verification
Registration Use Case
Keyp User Experience
2FA w/o a Password
01. Phone Numbers
Digital Identity
Why use Phone Numbers
Security Benefits
03. Final Words
Conclusions
About tyntec
tyntec + Keyp
3
01.
Phone Number –
Key Attribute of Digital
Identity
4
From Physical to Digital Identities
5
A phone number is an easy-to-verify handle to connect an account
to a real person.
• Unique and valid phone no = No fake accounts
Phone number is a great identifier
• Phone numbers open up immediate
communication channels (SMS, voice)
• Phone numbers introduce additional security
benefits
6
Phone number is a great security asset
• Unique and universal
• Proof of possession and access of a communication end-point – hard to steal at scale (unlike
proof of knowledge, i.e. passwords)
• Missing/Stolen phones are noticed immediately
• Harder to hack than emails (require special equipment, knowhow)
• Can be used for running additional security diagnostics that prevent SIM swaps and fraudulent
account takeovers or transactions
• Easy adoption - additional hardware not necessary, verification is straightforward and
inexpensive
7
02.
Phone Number Verification
8
Phone number verification inside Keyp
Wallet with tyntec
9
Power of tyntec API
• Detect phone type and choose appropriate channel: SMS or Voice
• Detect country code and choose language template
Intelligence
Connectivity
• Global Coverage
• Reliable connectivity – direct connections to mobile operators
10
Registration Across Domains
11
Registration Across Domains
12
Registration Across Domains
13
Registration Across Domains
14
Verified phone number as a token inside
Keyp Wallet
15
Keyp Terminal & 2FA w/o a password
• Define acceptable validity period
• Combine phone number verification w/
biometrics
• Define risk levels and appropriate
authentication combinations
• 2FA without passwords: What you own +
what you are
16
Registration/login with Phone number &
biometric 2FA with Keyp
17
Registration/login with Phone number &
biometric 2FA with Keyp
18
Registration/login with Phone number &
biometric 2FA with Keyp
19
Registration/login with Phone number &
biometric 2FA with Keyp
20
Registration/login with Phone number &
biometric 2FA with Keyp
21
03.
Conclusions
22
Conclusions
• Digital Identities need to balance CX and security – easily possible with tyntec & Keyp
• Reduce friction in getting verified phone number information – a valuable asset
• Stronger identification and more secure than email
• Wrong phone numbers are not rare, and cause trouble
• Immediate communication channel - also for security matters (e.g. confirmation of
access, fraud prevention)
• To know who is calling before picking up the phone!
23
tyntec powers omnichannel
communications
tyntec enables enterprises to add
any communication and
authentication channel right into
your customer journey – delivered
via programmable APIs
And now authentication via user-
centric Keyp token.
www.tyntec.com
24
tyntec at a glance
Our Mission
Power human connection at scale
Our Space
A global cloud communications and authentication platform,
enabling businesses to interact with people across any
mobile channel
Our Footprint
German-based R&D, US-based messaging hub with operations in North
America, Europe and Asia, connecting 150 countries around the world.
tyntec + Keyp =

More Related Content

Similar to Keyp Partner: The Phone Number as a Digital Identity - Akcan Islamoglu, Senior Product Manager tyntec GmbH

tyntec Global Number Verification
tyntec Global Number Verificationtyntec Global Number Verification
tyntec Global Number Verificationtyntec
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENTelcoBridges Inc.
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENAlan Percy
 
tt.One
tt.Onett.One
tt.Onetyntec
 
Two way authentication
Two way authenticationTwo way authentication
Two way authenticationsree valli
 
Two way authentication
Two way authenticationTwo way authentication
Two way authenticationsree valli
 
Non-Financial Use Cases of Mobile Express
Non-Financial Use Cases of Mobile ExpressNon-Financial Use Cases of Mobile Express
Non-Financial Use Cases of Mobile Expressmobmewireless
 
CELL PHONE PAYMENT PROCESSING SYSTEM
CELL PHONE PAYMENT PROCESSING SYSTEMCELL PHONE PAYMENT PROCESSING SYSTEM
CELL PHONE PAYMENT PROCESSING SYSTEMTony TRAN
 
tyntec voice
tyntec voicetyntec voice
tyntec voicetyntec
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?Fortytwo
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays
 
CIS14: Zen and the Art of Cloud Adoption—a Practitioner’s Viewpoint on Findin...
CIS14: Zen and the Art of Cloud Adoption—a Practitioner’s Viewpoint on Findin...CIS14: Zen and the Art of Cloud Adoption—a Practitioner’s Viewpoint on Findin...
CIS14: Zen and the Art of Cloud Adoption—a Practitioner’s Viewpoint on Findin...CloudIDSummit
 
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...apidays
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToTelcoBridges Inc.
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Market Engel SAS
 

Similar to Keyp Partner: The Phone Number as a Digital Identity - Akcan Islamoglu, Senior Product Manager tyntec GmbH (20)

tyntec Global Number Verification
tyntec Global Number Verificationtyntec Global Number Verification
tyntec Global Number Verification
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKEN
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKEN
 
tt.One
tt.Onett.One
tt.One
 
Two way authentication
Two way authenticationTwo way authentication
Two way authentication
 
Two way authentication
Two way authenticationTwo way authentication
Two way authentication
 
Belgian mobile ID presents itsme
Belgian mobile ID presents itsmeBelgian mobile ID presents itsme
Belgian mobile ID presents itsme
 
Non-Financial Use Cases of Mobile Express
Non-Financial Use Cases of Mobile ExpressNon-Financial Use Cases of Mobile Express
Non-Financial Use Cases of Mobile Express
 
Mobile payments: A history of [in]security
Mobile payments: A history of [in]securityMobile payments: A history of [in]security
Mobile payments: A history of [in]security
 
CELL PHONE PAYMENT PROCESSING SYSTEM
CELL PHONE PAYMENT PROCESSING SYSTEMCELL PHONE PAYMENT PROCESSING SYSTEM
CELL PHONE PAYMENT PROCESSING SYSTEM
 
PHONEID
PHONEIDPHONEID
PHONEID
 
tyntec voice
tyntec voicetyntec voice
tyntec voice
 
120 i143
120 i143120 i143
120 i143
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 
Hsbc E business
Hsbc E businessHsbc E business
Hsbc E business
 
CIS14: Zen and the Art of Cloud Adoption—a Practitioner’s Viewpoint on Findin...
CIS14: Zen and the Art of Cloud Adoption—a Practitioner’s Viewpoint on Findin...CIS14: Zen and the Art of Cloud Adoption—a Practitioner’s Viewpoint on Findin...
CIS14: Zen and the Art of Cloud Adoption—a Practitioner’s Viewpoint on Findin...
 
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 

Recently uploaded

Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 

Recently uploaded (20)

Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 

Keyp Partner: The Phone Number as a Digital Identity - Akcan Islamoglu, Senior Product Manager tyntec GmbH

  • 1. The Phone Number as a Digital Identity
  • 2. 22 Agenda: Phone Number as Digital Identity 02. Verification Registration Use Case Keyp User Experience 2FA w/o a Password 01. Phone Numbers Digital Identity Why use Phone Numbers Security Benefits 03. Final Words Conclusions About tyntec tyntec + Keyp
  • 3. 3 01. Phone Number – Key Attribute of Digital Identity
  • 4. 4 From Physical to Digital Identities
  • 5. 5 A phone number is an easy-to-verify handle to connect an account to a real person. • Unique and valid phone no = No fake accounts Phone number is a great identifier • Phone numbers open up immediate communication channels (SMS, voice) • Phone numbers introduce additional security benefits
  • 6. 6 Phone number is a great security asset • Unique and universal • Proof of possession and access of a communication end-point – hard to steal at scale (unlike proof of knowledge, i.e. passwords) • Missing/Stolen phones are noticed immediately • Harder to hack than emails (require special equipment, knowhow) • Can be used for running additional security diagnostics that prevent SIM swaps and fraudulent account takeovers or transactions • Easy adoption - additional hardware not necessary, verification is straightforward and inexpensive
  • 8. 8 Phone number verification inside Keyp Wallet with tyntec
  • 9. 9 Power of tyntec API • Detect phone type and choose appropriate channel: SMS or Voice • Detect country code and choose language template Intelligence Connectivity • Global Coverage • Reliable connectivity – direct connections to mobile operators
  • 14. 14 Verified phone number as a token inside Keyp Wallet
  • 15. 15 Keyp Terminal & 2FA w/o a password • Define acceptable validity period • Combine phone number verification w/ biometrics • Define risk levels and appropriate authentication combinations • 2FA without passwords: What you own + what you are
  • 16. 16 Registration/login with Phone number & biometric 2FA with Keyp
  • 17. 17 Registration/login with Phone number & biometric 2FA with Keyp
  • 18. 18 Registration/login with Phone number & biometric 2FA with Keyp
  • 19. 19 Registration/login with Phone number & biometric 2FA with Keyp
  • 20. 20 Registration/login with Phone number & biometric 2FA with Keyp
  • 22. 22 Conclusions • Digital Identities need to balance CX and security – easily possible with tyntec & Keyp • Reduce friction in getting verified phone number information – a valuable asset • Stronger identification and more secure than email • Wrong phone numbers are not rare, and cause trouble • Immediate communication channel - also for security matters (e.g. confirmation of access, fraud prevention) • To know who is calling before picking up the phone!
  • 23. 23 tyntec powers omnichannel communications tyntec enables enterprises to add any communication and authentication channel right into your customer journey – delivered via programmable APIs And now authentication via user- centric Keyp token. www.tyntec.com
  • 24. 24 tyntec at a glance Our Mission Power human connection at scale Our Space A global cloud communications and authentication platform, enabling businesses to interact with people across any mobile channel Our Footprint German-based R&D, US-based messaging hub with operations in North America, Europe and Asia, connecting 150 countries around the world.