FRAUD DETERRENCE FOR SECURE TRANSACTIONS
摘要:
One or more processors receive a request for a secure digital asset and execute a validation protocol defined for validating the request. The validation protocol may define conditions for fulfilling the request that include one or more conditions related to information about an identified user requesting the request or information indicative of a routing-aspect of the request. The one or more processors attempt to validate the request based on assessment of the conditions specified in the validation protocol. If validation is unsuccessful, the one or more processors instruct the user to undertake one or more multi-factor authentication actions, which may include choices from a plurality of possible multi-factor authentication options and/or certain required multi-factor authentication options, defined by the protocol. The one or more processors validate and fulfil the request responsive to confirming successful undertaking of the one or more multi-factor authentication actions by the user.
公开/授权文献
信息查询
0/0