&noscript=1 />

Receive SMS Verification Online - for when you want to keep your personal identity Private

Use alternate Mobile Phone Numbers on your Personal Phone to receive SMS Authentication codes or use our SMS2Email service to get them in your email inbox - simple!

Buy your
Verification Number HERE:

Verify yourself on any online site
Use as many numbers as you need?

Use numbers for Commerce: Survey Sites, Review Pages, Flexi-work...

ConXhub allows you to make & receive SMS from any Mobile number - so you can run all your businesses on the one mobile phone.

Join the 21st Century Evolution

We’re Reshaping the World of Business & Communication

Total Mobile Freedom...

Utilise multiple numbers by condensing them into one mobile whilst protecting your privacy

Be Local Wherever You Are!

Create local numbers to call customers & increase pick up rates by up to 68%

Become a Global Player

Make international calls without worrying about the cost

Receive SMS Verification Online

What is Online Verification

Online Verification is when an individual presents personal information to identify who they are. The verification of an individual’s name, identity and existence has long been a requirement of complex human societies, especially when concerning the transaction of goods and services.

Today, various forms of identity verification methods are used to authenticate and prove identity, seamlessly blurring the lines between identity as an instrument to verify and as a way to prove “liveness”, ensuring the person who is authenticating their identity is actually a real person and not a fraudulent actor.

Online identity for digital transactions

Whether it takes place within an e-commerce framework or for the purposes of furthering social equality through governmental redistribution, the accurate verification and authentication of an individual’s identity in the digital world is crucial to the functioning of society and the successful application of several different industries ranging from the sharing economy to gaming and banking businesses.

Prior to the advent of our modern communication channels (esp. the internet), transactions were often face-to-face, involved eye contact and usually concluded with a handshake. In this way, the parties involved could ascertain whether or not the other party was acting honestly and whether or not they were who they said they were. Though not totally free from fraud, meeting in-person offered a level of authentication that was and still is hard to beat.

However, a great deal of transacting now takes place online – a tendency which has been greatly amplified by the ongoing Corona pandemic. Thus, the verification of one’s identity (built around the standards of liveness) is of growing importance as more industries take their services online.

Verification Solutions

To verify if a user is actually who they say they are, real life identity verification for online applications employ a great deal of automation as well as data analytics to implement identity theft protection methods.

Here’s a list of some of the most successful and commonly used verification methods:

Biometric authentication through face verification and liveness detection

The use of biometric features for authentication involves the use of unique biological characteristics to verify end-users. Presenting face, fingerprint, iris, voice or other behavioural metrics to ensure their live presence is a highly convenient and secure way to authorise login. As use cases spread to a large number of consumer services including healthcare, travel, and retail, customers are looking for identity solutions that can easily be integrated into smartphones. Cost effective solutions such as taking a simple selfie or presenting a card to a camera are being accepted by large digital audiences. 

Through cross device authentication services, customers can use a hand-held device to capture a video or a selfie and confirm their presence. An automated procedure fast-tracks the process and authenticates account holders with high accuracy. Advanced Identity verification applications powered by machine learning are also recording verification processes in real-time and storing the data in the form of timestamps, videos, IP location and device information. 

Document Verification

Digital verification methods can replace manual checking of customer documents to prevent online theft and ID fraud. The more customer attributes that can be verified through a given ID source, the more robust the authentication. The end goal is to achieve a high level of verification assurance across multiple systems and countries. 

Customers can scan ID documents in front of a webcam and allow verification APIs to extract and screen key customer credentials. In most cases, the use of optical character recognition technology (OCR) assists in providing verifications for several documents in different languages. 

Document validation includes checking: 

  • Full name of end-user
  • Photoshopped/tampered documents
  • Document expiry
  • Document format type
  • Address format
  • Address Verification

The authenticity of individuals and businesses can be verified in real-time using automated software that cross-checks addresses with official databases. Users are asked to upload photos while holding identity documents in order to match their face. Secondary documents containing official address are uploaded to verify the information entered by the user. Analysis is done via an API and the verification is also recorded. 

For e-commerce and other retail business, this translates into better management of chargeback fraud and improved reputation. Mailing costs associated with returned mail can be mitigated and high-quality address data maintained for faster delivery time. Identity documents such as national IDs, utility bills, bank statements, and driver’s license, are verified for authenticity, to improve customer risk profiling and online identity fraud management. 

AML Screening

Businesses must ensure a high level of safety by vetting both individual customers as well as businesses before beginning transactions. International regulations now require that sources that may be involved in money laundering and terrorist financing be actively avoided and screened before onboarding.

Detailed background checks and sanction list monitoring for high-risk clients is a given for AML compliance programs. Simply entering the name and date of birth can reveal useful information about authenticity. Data on customers and businesses must be screened against international regulatory watchlists, sanction lists and PEP lists to ensure compliance with laws and regulations. Risk reporting and global compliance is made easier with AML solutions for fraud prevention. 

Ongoing AML monitoring is an essential part of process, as regular monitoring of clients assures that no illegal activity is recorded in recurring transactions. This is to ensure that client credibility is maintained over time and high-risk clients are marked with an ‘on-alert’ status.

Companies can be validated using a registration number in order to identify blacklisted entities. Background checks of the Ultimate Beneficial Owners (UBOs) can help in identifying individuals with a suspicious profile. As a long-term business goal, financial risk assessment is improved by limiting compliance fines and penalties leading to unanticipated financial loss. 

Knowledge based authentication

This method of online identification requires customers to protect sensitive information with security questions that can be answered using personally identifiable information.

It is an easy process to employ since it doesn’t contain complex passwords or codes to remember. However, it is also easier to breach since such information can be guessed, discovered or sold. There’s no verification with official customer IDs either. 

2FA Authentication

As an added layer of security, 2FA solidifies account protection by double checking the possession of sensitive information by clients. A physical token or a numerical SMS code must be immediately available to the customer through personally held devices to gain access to online accounts. 

Passwords are losing their authority as a security measure for fraud prevention. Hackers can breach accounts using weak or easy-to-guess passwords and gain malicious access through single layer security methods. Customers are advised to create long passwords with complex characters to lower the probability of a breach. This hurts customer experience and often makes the login process tedious. 

Authorised customer account access through two-step authentication method includes the following steps: 

  • End-user is sent a personalised, auto-generated code at each log-in attempt
  • Authentication code is required to enter the code at login
  • API matches code and completes user verification 

Two-step online identity verification services provide a way for companies to manage financial loss for end-user accounts without compromising customer experience. Malware activity and phishing attacks can be prevented by strengthening security layers.

Identity fraud: Calculating the global impact

News stories of online identity fraud are common across the world. A 2018 report by the London-based Fraud Advisory Panel listed fraud as one of human society’s greatest threats, a risk that dates back to the dawn of human civilization. In fact, fraud has infiltrated all stages of our technological progress in communication over the ages, from the early days of the telegraph and the telephone – right through to the advent of television – and certainly now with the internet.

Perhaps we should not be surprised to learn that our personal identity data is among the most valuable commodities on earth.

Every time there is another large-scale hack of personal identity data, thousands of gigabytes of highly-compromising data are eventually sold across underground darkweb markets. The data often comprises various identity components such as name, address, date of birth and encrypted passwords – but it can also be much more revealing when it comes to our identity and financial documents, including government ID / social security numbers, drivers licence numbers, etc.

In the last 10 years, some of the largest data breaches have also included some very famous brand names:

  • LinkedIn, 2012 & 2016: 172 Million user accounts
  • Ebay, 2014: 145 Million user accounts
  • Equifax, 2017: 147 Million user accounts
  • Marriott International, 2014 – 2018: 500 Million user accounts
  • Canva, 2019: 137 million user accounts
  • Yahoo, 2013-14: 3 billion user accounts

These data hacks represent some of the most popular websites in the world and yet, regardless of the company’s balance sheet or the presumption of online security – no company is truly immune from fraud.

Digital Identity Verification Methods Explained

To accurately verify and authenticate identity, three main ID verification processes have emerged and are often used in tandem during digital onboarding:

  • Document verification
  • Biometric facial verification
  • Liveness detection

Digital Identity Verification Methods Explained

  1. Document Verification

This solution allows users to get verified with a scan of a government-issued identity document. ID documents (such as a passport or national ID card) are very useful when it comes to verifying identity, particularly as these documents perform a critical regulatory or compliance step during digital onboarding.

The setup is simple: A user only needs a smartphone or desktop camera to scan their ID and process the results almost instantly. But that simplicity can have a downside too. Government-issued documents can be faked, and as you’d expect, there are different levels of quality when it comes to document tampering.

Determined fraudsters will try to find any opportunity to test a system’s weak points and a falsified document is among the most basic of attacks used.  Companies need to take this into account when they select a digital identity verification vendor to ensure the safety of their customers and the integrity of their onboarding process.

  1. Biometric Facial verification

Facial biometric solutions now provide an almost fully-automated identity verification experience without the downsides of a human operator or the costs associated with higher dropout rates.

In the broader identity verification market, facial verification software vendors tend to offer overly-homogenized and standardised products  (e.g. Amazon, Microsoft, etc) and most of these generic solutions are primarily designed to work under ideal lighting and within ‘perfect’ onboarding settings or even controlled hardware environments, where the initial facial scan is unlikely to run into any challenging characteristics that might interrupt or interfere with the digital onboarding process.

  1. Biometrics: Liveness Solutions

Identity verification vendors offer different liveness solutions to their customers, but most approaches generally use ‘active’ liveness detection, which requires a user to perform liveness instructions from facial movements to eye blinks and head twitches in order to ‘prove’ they are a real person (sometimes referred to as a ‘challenge response’).

As one might predict, the active form of liveness detection has a few obvious downsides:

End-users are more likely to experience uncomfortable dropouts due to software limitations.

A higher number of ID verification attempts ends up costing businesses more money across the onboarding process.

Results in more unhappy customers and higher customer abandonment rates.

A complex Issue = A dichotomy

This is a two-way street with companies needing to ensure they are dealing with the correct individual to avoid fraud, whilst individuals don’t really want to give out real information for fear of that information being stolen and then their being impersonated.

To this end many individuals, are resorting to using alternate email addresses, credit cards and phone numbers to create an online personality. It is still them, but using different credentials.

Online Verification will fall into 3 main categories:

Domestic – Banks, Govt departments, Legal, Insurance

Personal – Dating, Selling online, Social, gaming

Commerce – Survey Sites, Review Sites, Flexi-Work

Unlike the others, ‘Domestic Sites’ will require you to disclose Real private information like Passport, Address, Drivers Licence details and so on, however in all cases you will be able to use a secondary phone number or email, keeping your personal Mobile Number & email address, Private.

Keeping YOUR Data SAFE

Email – getting a new email address is pretty simple & all the top players, like Gmail, Yahoo, Microsoft, will let you have one with a few basic pieces of information normally including a mobile number which they can send an authentication PIN to.

If you would prefer to really track which site is using your email address, then getting a whole domain may be more up your street.

Domains with email cost very little each month, but will give you a huge layer of protection.

Here is how it works:

Buy a Domain.. example: mydomain.com and set up email forwarding for all emails received (post master) to your actual email address. Then any time you are asked to enter an email address add one suffixed by your domain. For example if you are registering at facebook use [email protected], for Twitter use; [email protected] or Yell use; [email protected]

So, every site you register at will have a unique email address, centred on your domain.

In this way you can very easily see which sites have been hacked or sold your data, as any spam email will show up for your respective and unique email address. You can then that one address easily and simply, without worrying about all the others.

Great… but what about phone numbers?

As with Emails, you can actually have as many phone numbers as you require and inexpensively.

We wouldn’t suggest a number for every site, but certainly a number for different parts of your life, but having one additional number ensuring you can keep your actual phone number is essential.

Getting a new number is incredibly easy, simply sign up for the Verification Service at  www.ConXhub.com.

Once you have been allocated a new number, it will be attached to your existing number and email address.

When you are sent an SMS message to your new number, it will be automatically forwarded to your existing number as an SMS and also sent as an email to your email address via a new service known as SMS2Email.

ConXhub offer phone numbers from over 10,000+ cities around the world and mobile numbers from over 26 countries and you can have as many numbers as you require on one account.

Phone Numbers for Commerce

There are huge benefits to using alternative phone numbers for your commercial aspects.

Knowing why you are being called or from which number gives you a ‘heads up’ on how to answer or even whether you should answer.

If a number is Private, and you get a call on it, chances are it is a spam call.

Alternative numbers make you appear more professional and can be routed to a host of different destinations, including colleagues, announcements, voicemail or other phone numbers.

Online Verification

So, when you need to verify who you are online using a SIM number, simply use a number from ConXhub and receive the verification code as an SMS right in to your email inbox.

App Verification

Firebase Authentication is one of the SDK provided by Google for authenticating a user’s identity. Firebase provides a list of authentication methods, such as Google Sign-In, Sign in with Apple, Email and password authentication, Phone Number authentication, and more.

Phone number authentication is a common way for logging in to a mobile app. When signing in using Phone Number authentication, Firebase sends an SMS message with a 6-digit one-time code to the user’s phone. The user then has to type this code into an input field in the app they want to sign in to. The app then has to send this code with a generated verification ID back to Firebase for verification.

Moreover, Firebase uses silent push notifications and reCAPTCHA to prevent bots spamming the system.

Look BIG! Sound Professional
Use numbers to be more LOCAL to your customers

Adrian Brown
Managing Director

“Now I don’t need to pay for two mobiles and just the one mobile is much easier to carry around!”

Jeff Badeev
Entrepreneur

“I love that I can make a call & display any number
I choose too”

Riffi Khan
ITV – CEO

“I can now phone customers direct from my mobile without exposing my personal number."

Dr. Ruth
Famous Coach

“One phone, One phone contract yet I’ve got 3 separate numbers linked to it!”

One phone, One SIM – Unlimited Telephone Numbers

Make & Receive Calls

Using one handset you can accept
calls to your work number & then make a call
from your personal number if you choose.

Unlimited Numbers

Use an infinite amount of telephone
numbers, whether existing or new, national or international, mobile or landline! Set up in minutes!

No tech skills required

We’ll set up your phone numbers and any required call routing or features
– Just download and begin using.

Instant Virtual Offices

Increase “Pick up” rates by 68%
by calling with Local numbers and
increase your sales

Protect your Privacy

Keep your personal number safe.
Use additional numbers and
link them to your mobile.

Bin the Desk Phone

You don’t need it.
Link numbers directly to your mobile handset. for both making & receiving calls

VoIP calls have always been a pain in the butt, especially when calling internationally. Drop outs, poor quality and lag, are really detrimental to my business.

I couldn't believe my luck when I came across ConXhub - every call, even those half way round the world, are now like I'm calling my next door neighbour!

Todd Binns

Buy YOUR Verification Number HERE:

100% RISK FREE

Minutes Away from your NEW

VERIFICATION NUMBER

Minutes Away from

SOLVING YOUR ISSUE

Choose Your Plan

Flick the Toggle to Select Just Verification Plan to get a number for OTP or web authentication!

For All Plans
Just Verification Plan

ALL YOU NEED TO KNOW ABOUT

ONLINE VERIFICATION

DOWNLOAD OUR FREE GUIDE HERE

Privacy Policy: We hate SPAM & promise to keep your email address safe.

Minutes Away from

SOLVING YOUR ISSUE

Choose Your Plan *

Flick the Toggle to Select Just Verification Plan to get a number for OTP or web authentication!

For All Plans
Just Verification Plan

Minutes Away from

MULTI NUMBERS

Monthly
Annual
  • GBP
  • EUR
  • USD

Verification SMS

USA/UK Mobile Numbers
£ 3
00
month-to-month
  • Real Phone Number
  • SMS2email Service
  • SMS to Your Mobile

Silver

Call Forwarding Plan
£ 9
95
month-to-month
  • Real Phone Number
  • Unltd Inbound Calls
  • Basic PBX Features

Gold

Business Plan
£18
£ 14
95
month-to-month
  • Real Phone Number
  • Unltd Inclusive Calls
  • Basic PBX Features
Popular

Platinum

Call Centre / Corporate Plan
£ 7
50
p/m Exc. PayPerCall
  • Unltd Users/Numbers
  • Wholesale Call Price
  • Fully Stacked PBX

Verification SMS

Online Identity Service
3
50
USA/UK Mobile Numbers
  • Real Phone Number
  • SMS2email Service
  • SMS to Your Mobile

Silver

Call Forwarding Plan
11
50
month-to-month
  • Real Phone Number
  • Unltd Inbound Calls
  • Basic PBX Features

Gold

Business Plan
22
17
50
month-to-month
  • Real Phone Number
  • Unltd Inclusive Calls
  • Basic PBX Features
Popular

Platinum

Call Centre / Corporate Plan
8
50
p/m Exc. PayPerCall
  • Unltd Users/Numbers
  • Wholesale Call Price
  • Fully Stacked PBX

Verification SMS

Online Identity Service
$ 3
50
USA/UK Mobile Numbers
  • Real Phone Number
  • SMS2email Service
  • SMS to Your Mobile

Silver

Call Forwarding Plan
$ 13
50
month-to-month
  • Real Phone Number
  • Unltd Inbound Calls
  • Basic PBX Features

Gold

Business Plan
$23
$ 18 month-to-month
  • Real Phone Number
  • Unltd Inclusive Calls
  • Basic PBX Features
Popular

Platinum

Call Centre / Corporate Plan
$ 8
50
p/m Exc. PayPerCall
  • Unltd Users/Numbers
  • Wholesale Call Prices
  • Fully Stacked PBX
  • GBP
  • EUR
  • USD

Verification SMS

Online Identity Service
£ 2
50
£30.00 Paid Annually
  • Real Phone Number
  • SMS to Your Mobile
  • SMS2email Service

Silver

Call Forwarding Plan
£ 7
99
£95.00 Paid Annually
  • Real Phone Number
  • Unltd Inbound Calls
  • Basic PBX Features

Gold

Business Plan
£18
£ 13
50
£162.00 Paid Annually
  • Real Phone Number
  • Unltd Inclusive Calls
  • Basic PBX Features
Popular

Platinum

Call Centre / Corporate Plan
£ 7
50
p/m Exc. PayPerCall
  • Unltd Users/Numbers
  • Wholesale Call Price
  • Fully Stacked PBX

Verification SMS

Online Identity Service
3
00
£36.00 Paid Annually
  • Real Phone Number
  • SMS to Your Mobile
  • SMS2email Service

Silver

Call Forwarding Plan
9
20
£110.00 Paid Annually
  • Real Phone Number
  • Unltd Inbound Calls
  • Basic PBX Features

Gold

Business Plan
22
15
00
£180.00 Paid Annually
  • Real Phone Number
  • Unltd Inclusive Calls
  • Basic PBX Features
Popular

Platinum

Call Centre / Corporate Plan
8
50
p/m Exc. PayPerCall
  • Unltd Users/Numbers
  • Wholesale Call Price
  • Fully Stacked PBX

Verification SMS

Online Identity Service
$ 3
00
£36.00 Paid Annually
  • Real Phone Number
  • SMS to Your Mobile
  • SMS2email Service

Silver

Call Forwarding Plan
$ 9
99
£120.00 Paid Annually
  • Real Phone Number
  • Unltd Inbound Calls
  • Basic PBX Features

Gold

Business Plan
$23
$ 15
80
£190.00 Paid Annually
  • Real Phone Number
  • Unltd Inclusive Calls
  • Basic PBX Features
Popular

Platinum

Call Centre / Corporate Plan
$ 8
50
p/m Exc. PayPerCall
  • Unltd Users/Numbers
  • Wholesale Call Prices
  • Fully Stacked PBX
You are just One Click away from having ConXhub on your Phone

Minutes Away from

MULTI NUMBERS

Minutes Away from

SOLVING YOUR ISSUE

Get Your FREE NUMBER

Select the
Silver Plan
& apply
Discount Code:
'CXSilver100'

Minutes Away from

MULTI NUMBERS

Minutes Away from

SUPERPOWERS

In Your Palm

Minutes Away from

SUPER POWERS

Monthly
Annual
  • GBP
  • EUR
  • USD

Verification SMS

Online Identity Service
£ 3
00
month-to-month
  • Real Phone Number
  • SMS to Your Mobile
  • SMS2email Service

Silver

Call Forwarding Plan
£ 9
95
month-to-month
  • Real Phone Number
  • Unltd Inbound Calls
  • Basic PBX Features

Gold

Business Plan
£18
£ 14
95
month-to-month
  • Real Phone Number
  • Unltd Inclusive Calls
  • Basic PBX Features
Popular

Platinum

Call Centre / Corporate Plan
£ 7
50
p/m Exc. PayPerCall
  • Unltd Users/Numbers
  • Wholesale Call Price
  • Fully Stacked PBX

Verification SMS

Online Identity Service
3
50
month-to-month
  • Real Phone Number
  • SMS to Your Mobile
  • SMS2email Service

Silver

Call Forwarding Plan
11
50
month-to-month
  • Real Phone Number
  • Unltd Inbound Calls
  • Basic PBX Features

Gold

Business Plan
22
17
50
month-to-month
  • Real Phone Number
  • Unltd Inclusive Calls
  • Basic PBX Features
Popular

Platinum

Call Centre / Corporate Plan
8
50
p/m Exc. PayPerCall
  • Unltd Users/Numbers
  • Wholesale Call Price
  • Fully Stacked PBX

Verification SMS

Online Identity Service
$ 3
50
month-to-month
  • Real Phone Number
  • SMS to Your Mobile
  • SMS2email Service

Silver

Call Forwarding Plan
$ 13
50
month-to-month
  • Real Phone Number
  • Unltd Inbound Calls
  • Basic PBX Features

Gold

Business Plan
$23
$ 18 month-to-month
  • Real Phone Number
  • Unltd Inclusive Calls
  • Basic PBX Features
Popular

Platinum

Call Centre / Corporate Plan
$ 8
50
p/m Exc. PayPerCall
  • Unltd Users/Numbers
  • Wholesale Call Prices
  • Fully Stacked PBX
  • GBP
  • EUR
  • USD