Verification Protocols

Secure verification methods for high-stakes calls

Why Verification Protocols Matter

Voice cloning can make a scam call sound exactly like a family member. Verification protocols provide a second layer of authentication that criminals cannot fake. Pre-arranged codewords and multi-channel verification stop scams before money is sent.

Active Verification Protocols

Family Emergency Codeword

CodewordActive
Margaret Chen, David Chen, Lisa Chen-Thompson, Emily Chen
Last used: 11/25/2025

Financial Transaction Verification

Multi-ChannelActive
David Chen, Lisa Chen-Thompson
Last used: 11/20/2025

Video Call Verification

VideoActive
All Family Members

Bank Wire Authorization

FinancialActive
David Chen
Last used: 11/15/2025
Available Protocol Types
Different verification methods for different situations

Family Codeword

Secret phrase only family knows

Pre-arrange a secret word or phrase. If anyone calls claiming to be family and can't provide the codeword, hang up immediately.

Multi-Channel Verification

Call + text confirmation

Require confirmation through a second channel (text, email, or app) before acting on any urgent phone request.

Video Verification

Visual confirmation required

For high-stakes requests, require a video call to visually verify the caller's identity before proceeding.

Financial Authorization

Multi-step financial verification

Special protocol for financial requests including call-back verification, waiting periods, and manager approval.

Emergency Quick Reference
What to do when you receive a suspicious call
1

Don't panic - scammers create urgency

Take a breath. Legitimate emergencies can wait 5 minutes for verification.

2

Ask for the family codeword

If they can't provide it, hang up immediately.

3

Verify through another channel

Call them back on their known number, or text to confirm.

4

Never send money without video verification

For any financial request, insist on a video call first.