Skip to content

Why Network Authentication?

Smartphone with finance and market icons and symbols concept

Seamless Experience

What if banks and other companies could reduce mobile fraud by confirming that a login attempt is being made by the owner of the device?
 
Today many mobile authentication experiences require SMS or  email one-time passwords (OTPs). These  are not  “customer-first” experiences. Additionally, SMS was not architected  as a authentication method, and the National Institute of Standards and Technology (NIST) states that “due to the risk that SMS may be intercepted or redirected,” businesses should consider alternative authentication methods.

Simply put, authentication using SMS creates friction and gives a false sense of security. Email and authenticator apps require switching apps and add to the complexity of a simple transaction.

Silent is Simple

Shush is partnering with mobile network operators around the globe to offer brands and users a better way to authenticate.  The Shush solution uses mobile network-based technology to offer strong authentication. 

When you turn on your phone, it automatically connects to your mobile network operator and authenticates your device and SIM card. As a user, you didn’t have to do anything. Shush Sherlock uses this same SIM-based authentication to confirm mobile phone number possession. 

Shush Network Authentication leverages SIM data and authoritative signals across our global carrier network to instantly verify user authenticity. This blocks SIM swap attacks without any action needed by authorized users, ensuring a secure, passwordless sign-in experience.

 

Businessman working with a Cloud Computing diagram on the new computer interface
Screenshot 2024-06-03 at 2.28.35 PM

Who are Shush Customers?

Shush works directly with the largest mobile network operators across the globe to solve the supply-side of the network authentication business. Our solution resides within the trusted and highly secure mobile operator network to allow demand side partners the ability to offer network authentication to banks and other companies. 

By creating a more secure alternative to  OTPs codes at the network level we provide both brands and mobile app developers a solution that requires zero updates to mobile apps. Shush works without any integration at the mobile app level.

While there many demand-side partners in the mobile  ecosystem, mobile network operators need a supply-side partner to enter the network authentication market -- enter Shush Sherlock. Shush is dedicated to enabling mobile network operator with a cloud-based supply-side solution. 

What Data Powers Network Authentication?

How Shush silently authenticates devices with SIM and mobile network operator data

  • Silent Authentication

    The most compelling workflow which replaces SMS OTP using device IP address and the unique mobile identifier. This workflow provides device authentication without any user involvement.

  • SIM Swap Status

    The status of how long a SIM card has been associated with a registered mobile device and the mobile network provide a very strong assurance that an authorized users is initiating a transaction.

  • Location Verification

    This request verifies the location of a device based on mobile network operator data and can be used to determine if user have multiple sessions which indicate a mobile device has been compromised. 

  • Number Verify

    Verification of the phone number associated with the SIM used in the device connected to the mobile network operator.

  • Device Status

    This request checks if a device has lost connection to the network or has rejoined the same or different mobile network operator.

Hand using phone with cloud computing and online storage concept