If you have one, log in to your Netflix account , scroll to the bottom (keep scrolling, after a while there will be no more content loading) and click the “Service Code” button. Months after discovering this feature, I met Carlota , one of the brilliant people behind the implementation at Netflix, who explained how it works: clicking the button Service Codegenerates a token and syncs it with Netflix’s support system, so that desk agents can see the code.
The codes expire after about 24 hours. When you call and provide the code, the agents can tell that you are the person linked to the account. This approach requires customers to log in to generate the PIN, but has the advantage that they won't forget it. Carlota was careful to mention that Netflix's implementation has likely evolved since 2012 , but the general approach still makes sense. Other examples of PIN on demand can be borrowed from TV authentication which has this similar dilemma, namely that entering (or saying) a password is complicated.
Here is an example of how Youtube asks you singapore phone number list for authentication: 5. PIN OR VERBAL PASSWORD Many mobile services require a PIN to verify the user calling. This is a memory factor (different from the website password) that is easy to say over the phone (important!) but also more secure than a memory factor that can be searched, such as a birth date or your mother's birth name. Recommendation #2: Do not share personal information Running into agents who provide unnecessary amounts of my personal information happened more often than I thought during my research.
On one particularly egregious occasion, the agent greeted me with: “Can I have confirmation that I am speaking with Kelley Robinson? Ok. To verify your identity, please state your full name.” On another occasion, a utility company detected my phone number and gave my full address in an automated greeting. Providing personal information puts your users at risk from stalkers or other potential hackers, who can use the information to “authenticate” their victims’ identities in other contact centers.
Here is an example of how
-
- Posts: 4
- Joined: Mon Dec 23, 2024 3:30 am