摘要:
A system and method for generating user authentication challenges based at least in part on an account owner's social network activity information. A login request including an account owner's correct username and password as well as additional login information is received from a user. The login attempt is detected as a potentially fraudulent based on the additional login information from the user. The account owner's social network activity information is analyzed. An authentication challenge based at least in part on the account owner's social network activity information is generated and sent for display. The login request is allowed or denied based on the completion on the authentication challenge.
摘要:
A system and method for generating user authentication challenges based at least in part on an account owner's social network activity information. A login request including an account owner's correct username and password as well as additional login information is received from a user. The login attempt is detected as a potentially fraudulent based on the additional login information from the user. The account owner's social network activity information is analyzed. An authentication challenge based at least in part on the account owner's social network activity information is generated and sent for display. The login request is allowed or denied based on the completion on the authentication challenge.
摘要:
A system and method for generating user authentication challenges based on risk level is provided. A login request from a user is received. The login request includes identifying information associated with the user sending the login request. A risk analysis based on the identifying information associated with the user sending the login request is performed. A level of risk is identified. The level of risk is part of a risk index that includes multiple levels of risk. An authentication challenge based on the identified level of risk is generated. The login request is allowed or denied based on the completion on the authentication challenge.