{"id":108348,"date":"2020-01-31T02:43:39","date_gmt":"2020-01-31T02:43:39","guid":{"rendered":"https:\/\/appleinsider.com\/articles\/20\/01\/30\/apple-proposes-standardized-format-for-sms-one-time-passcodes"},"modified":"2020-01-31T02:43:39","modified_gmt":"2020-01-31T02:43:39","slug":"apple-seeks-to-simplify-two-step-verifications-with-standard-sms-format","status":"publish","type":"post","link":"https:\/\/sickgaming.net\/blog\/2020\/01\/31\/apple-seeks-to-simplify-two-step-verifications-with-standard-sms-format\/","title":{"rendered":"Apple seeks to simplify two-step verifications with standard SMS format"},"content":{"rendered":"<p><!-- font size selector, BEGIN --> <span class=\"cfix\">&nbsp;<\/span> <\/p>\n<p class=\"gray small byline\"> By <a href=\"https:\/\/appleinsider.com\/cdn-cgi\/l\/email-protection#28464d5f5b68495858444d41465b414c4d5a064b4745\">AppleInsider Staff <\/a> <br \/><span class=\"gray\">Thursday, January 30, 2020, 06:43 pm PT (09:43 pm ET)<\/span> <\/p>\n<p> <span><span class=\"article-leader\">Apple&#8217;s WebKit engineers are working on a standardized format for SMS messages containing one-time passcodes, an initiative that could one day better protect users by streamlining two-step authentication logins.<br \/><\/span><\/p>\n<div align=\"center\">\n<div class=\"article-img\"><img decoding=\"async\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2020\/01\/apple-seeks-to-simplify-two-step-verifications-with-standard-sms-format.jpg\" alt=\"Two-step\" height=\"396\" class=\"lazy\" data-original=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2020\/01\/apple-seeks-to-simplify-two-step-verifications-with-standard-sms-format-1.jpg\"><img decoding=\"async\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2020\/01\/apple-seeks-to-simplify-two-step-verifications-with-standard-sms-format-1.jpg\"><\/div>\n<p><span class=\"minor2 small gray\">Apple previously relied on two-step verification for Apple ID.<\/span><\/div>\n<p>Posted to GitHub on Thursday, the proposal from Apple <a href=\"https:\/\/www.zdnet.com\/article\/apple-wants-to-standardize-the-format-of-sms-otps-one-time-passcodes\/\">seeks to simplify<\/a> the OTP SMS mechanism commonly used by websites, businesses and other entities to confirm login credentials as part of two-step authentication systems, reports <em>ZDNet<\/em>.<\/p>\n<p>Two-step solutions require a user&#8217;s password and another element, in this case a one-time code sent over SMS, to gain access to a target account. Currently, it is difficult to impossible for software to automatically extract the necessary information from an OTP SMS message, as they can arrive in a range of text formats. This means users must manually enter the provided code into an input box. <\/p>\n<p>Apple&#8217;s <a href=\"https:\/\/github.com\/WebKit\/explainers\/tree\/master\/sms-one-time-code-format\">proposal<\/a> seeks to eliminate user intervention in the OTP SMS process, namely copy-and-pasting one-time codes from messages into a browser. It also states that a more refined solution would ensure that one-time codes sent over SMS are used only on originating sites. <\/p>\n<p>Using a &#8220;lightweight text format,&#8221; the proposed format embeds an actionable one-time code in an SMS message and links that code to a particular originating URL. Doing so allows recipient systems to automatically extract the code and log in to an associated website. <\/p>\n<p>Apple provides an example SMS:<\/p>\n<blockquote><p>747723 is your [website] authentication code.<br \/> @website.com #747723<\/p><\/blockquote>\n<p> The first line in the message above is optional human-readable text to explain the incoming message, while the second line contains information for programmatic use. Special characters are employed to denote the one-time code and originating URL, which in this case is &#8220;747723&#8221; and &#8220;website.com,&#8221; respectively. <\/p>\n<p>Apple and Google have signed on to the proposal, while Mozilla has not made an official statement on the standard, the report said. <\/p>\n<p>For its part, Apple has moved its products from two-step verification to more secure two-factor authentication methods that rely on passcodes sent to pre-enrolled trusted devices. <\/p>\n<p><\/span> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; By AppleInsider Staff Thursday, January 30, 2020, 06:43 pm PT (09:43 pm ET) Apple&#8217;s WebKit engineers are working on a standardized format for SMS messages containing one-time passcodes, an initiative that could one day better protect users by streamlining two-step authentication logins. Apple previously relied on two-step verification for Apple ID. Posted to GitHub [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":108349,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[57],"tags":[],"class_list":["post-108348","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apple-insider"],"_links":{"self":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/108348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/comments?post=108348"}],"version-history":[{"count":0,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/108348\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media\/108349"}],"wp:attachment":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media?parent=108348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/categories?post=108348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/tags?post=108348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}