Telephone number verification

Last updated

Telephone number verification (or validation) services are online services used to establish whether a given telephone number is in service. They may include a form of Turing test to further determine if a human answers or answering equipment such as a modem, fax, voice mMail or answering machine.

Contents

Purpose

Verification services are often used to limit sockpuppetry, underage sign-ups, spamming and illegal activities like harassment, scams and fraud. Operators and their clients include:

Any verification operation which sells sets of contact numbers generated through its marketing operations will gain a premium for an efficient list of “clean” numbers. Call center outbound telephone campaigns save time and resources bypassing undefined or mechanized equipment numbers. [1]

Telephone numbers entered into an online sign-up form can be checked in real time, by implementing AJAX (background web page processing) type call to a telephone number verification service while the form is still being filled in.

To thwart fraud, it is possible to match an online customer to the telephone number owner, to certify it is in fact the same person who owns it. This service is of increasing value to online store managers, banks and credit card processors, who are faced with increasing quantities of attempts to make fraudulent purchases such as by those using stolen credit card details.

Methods employed

Line test

An aborted call is made to the subscriber line. This automated service “listens” to check for ringback tones, busy signals, answered call, voice mail automated answering, or network operator injected messages such as “the number called is not in service”. This method benefits from being international and covering mobile phones. However, the check can take up to 30 seconds to complete (average time 9 seconds). This delay can be handled well by the use of AJAX background processes for example by allowing the user to continue filling in other fields in a form while the line test is performed.

Turing test

It is possible to employ such methods further to verify that genuine people answer the telephone at that number by requesting a key press tone "Press one to 'unsubscribe'." Often this method is used to clean lists, and rather than unsubscribing, the number is categorized as a live one.

Line test + authentication

To verify that a telephone number exists and authorize its use, subscribers supply a telephone number on which to establish service, often via a web page. A unique code is first indicated or displayed to the customer via the web site, then an automated call is then placed to the supplied subscriber telephone number. To validate the transaction, the code entered via the telephone keypad must match. This method is used by Google Voice and online banking services such as Lloyds TSB.

Database check

Certain services offer to check telephone numbers alongside other personal details, gained from various public sources e.g. the Electoral roll and from the imprints left on by their activities, for examples from transactions made using credit cards. The advantage of a database check is that the lookup can be very quick (sub 1s), however no databases exist to cover all telephone subscriber lines internationally, with mobile telephones being particularly problematic to trace - especially Pay as you go (phone) (non contract) arrangements which often have no registered owner. Some databases are very detailed and can correlate telephone numbers with physical addresses, e-mail addresses, ownership and sometimes even personal details. Such detail can help with combating fraud as well as allowing greater understanding of a customer base.

At the other end of the scale, other database checking services might only check a telephone number against the allotted telephone number banks and therefore only indicate if a number is in a range that might be active and are therefore inconclusive.

Check for valid number format

A JavaScript function can check to see if a phone number is a valid format, i.e., is numeric, starts with a valid set of numbers ("0" for local, or an international dialing prefix followed by a valid country code and is not too short to be a phone number. At first a JavaScript function is used to clear out any spacer characters. Next, a function is employed to check if the phone number contain only numbers, last the length of the string is checked permitting only phone numbers with an allowable number of digits for the country.

It is prudent to carry out such checks even if a further method is employed in addition, so that telephone numbers to avoid wasting time and resource on numbers that are clearly not in a correct format to qualify as a telephone number, e.g. too short.

Other methods of verification

Some other methods that are being employed today are:

Related Research Articles

An automatic number announcement circuit (ANAC) is a component of a central office of a telephone company that provides a service to installation and service technicians to determine the telephone number of a line. The facility has a telephone number that may be called to listen to an automatic announcement that includes the caller's telephone number.

Telephone card

A telephone card, calling card or phonecard for short, is a credit card-size plastic or paper card, used to pay for telephone services. It is not necessary to have the physical card except with a stored-value system; knowledge of the access telephone number to dial and the PIN is sufficient. Standard cards which can be purchased and used without any sort of account facility give a fixed amount of credit and are discarded when used up; rechargeable cards can be topped up, or collect payment in arrears. The system for payment and the way in which the card is used to place a telephone call vary from card to card.

Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term phreak is a sensational spelling of the word freak with the ph- from phone, and may also refer to the use of various audio frequencies to manipulate a phone system. Phreak, phreaker, or phone phreak are names used for and by individuals who participate in phreaking.

Interactive voice response (IVR) is a technology that allows humans to interact with a computer-operated phone system through the use of voice and DTMF tones input via a keypad. In telecommunications, IVR allows customers to interact with a company's host system via a telephone keypad or by speech recognition, after which services can be inquired about through the IVR dialogue. IVR systems can respond with pre-recorded or dynamically generated audio to further direct users on how to proceed. IVR systems deployed in the network are sized to handle large call volumes and also used for outbound calling as IVR systems are more intelligent than many predictive dialer systems.

Personal identification number PIN code

A personal identification number (PIN), or sometimes redundantly a PIN number or PIN code, is a numeric passcode used in the process of authenticating a user accessing a system.

A dialer or dialler is an electronic device that is connected to a telephone line to monitor the dialed numbers and alter them to seamlessly provide services that otherwise require lengthy National or International access codes to be dialed. A dialer automatically inserts and modifies the numbers depending on the time of day, country or area code dialed, allowing the user to subscribe to the service providers who offer the best rates. For example, a dialer could be programmed to use one service provider for international calls and another for cellular calls. This process is known as prefix insertion or least cost routing. A line powered dialer does not need any external power but instead takes the power it needs from the telephone line.

A ringback number is a telephone number for a telephone line that automatically calls the line that the call was placed from, after the caller has hung up. The typical use of this facility is by telephone company technicians for testing a new installation or for trouble-shooting.

In telecommunications, a callback or call-back occurs when the originator of a call is immediately called back in a second call as a response.

Phone fraud, or more generally communications fraud, is the use of telecommunications products or services with the intention of illegally acquiring money from, or failing to pay, a telecommunication company or its customers.

Network switching subsystem (NSS) is the component of a GSM system that carries out call out and mobility management functions for mobile phones roaming on the network of base stations. It is owned and deployed by mobile phone operators and allows mobile devices to communicate with each other and telephones in the wider public switched telephone network (PSTN). The architecture contains specific features and functions which are needed because the phones are not fixed in one location.

Telephone numbers in the United Kingdom

Telephone numbers in the United Kingdom are administered by the Office of Communications (Ofcom). For this purpose, Ofcom established a telephone numbering plan, known as the National Telephone Numbering Plan, which is the system for assigning telephone numbers to subscriber stations.

A check verification service provides businesses or individuals with either the ability to check the validity of the actual check or draft being presented, or the ability to verify the history of the account holder, or both.

GSM services are a standard collection of applications and features available over the Global System for Mobile Communications (GSM) to mobile phone subscribers all over the world. The GSM standards are defined by the 3GPP collaboration and implemented in hardware and software by equipment manufacturers and mobile phone operators. The common standard makes it possible to use the same phones with different companies' services, or even roam into different countries. GSM is the world's most dominant mobile phone standard.

One-time password

A one-time password (OTP), also known as a one-time PIN, one-time authorization code (OTAC) or dynamic password, is a password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs avoid several shortcomings that are associated with traditional (static) password-based authentication; a number of implementations also incorporate two-factor authentication by ensuring that the one-time password requires access to something a person has as well as something a person knows.

Traitor tracing schemes help trace the source of leaks when secret or proprietary data is sold to many customers. In a traitor tracing scheme, each customer is given a different personal decryption key. (Traitor tracing schemes are often combined with conditional access systems so that, once the traitor tracing algorithm identifies a personal decryption key associated with the leak, the content distributor can revoke that personal decryption key, allowing honest customers to continue to watch pay television while the traitor and all the unauthorized users using the traitor's personal decryption key are cut off.)

The Mobile Telephone Service (MTS) was a pre-cellular VHF radio system that linked to the Public Switched Telephone Network (PSTN). MTS was the radiotelephone equivalent of land dial phone service.

Internet fraud prevention is the act of stopping various types of internet fraud. Due to the many different ways of committing fraud over the Internet, such as stolen credit cards, identity theft, phishing, and chargebacks, users of the Internet, including online merchants, financial institutions and consumers who make online purchases, must make sure to avoid or minimize the risk of falling prey to such scams.

Credit card fraud is an inclusive term for fraud committed using a payment card, such as a credit card or debit card. The purpose may be to obtain goods or services or to make payment to another account, which is controlled by a criminal. The Payment Card Industry Data Security Standard is the data security standard created to help financial institutions process card payments securely and reduce card fraud.

An expense and cost recovery system (ECRS) is a specialized subset of "extract, transform, load" (ETL) functioning as a powerful and flexible set of applications, including programs, scripts and databases designed to improve the cash flow of businesses and organizations by automating the movement of data between cost recovery systems, electronic billing from vendors, and accounting systems.

Digital identity in Australia is used by residents to validate who they are over digital media, such as over the Internet.

References

  1. Gupta, Jitendra (January 29, 2007). "Nobody Knows You're A Dog 2.0". ReadWriteWeb. Archived from the original on June 1, 2009. Retrieved 2009-07-10.