Event-based security challenges

Concepts and technologies are disclosed herein for event-based security challenges. A computer can execute a security application. The computer can receive a request for authentication information associated with a user device. The computer can access event data corresponding to the user device. The...

Full description

Saved in:
Bibliographic Details
Main Authors Bridger, II, Robert, Koch, Robert Alan, Lee, Jr., James T
Format Patent
LanguageEnglish
Published 18.08.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Concepts and technologies are disclosed herein for event-based security challenges. A computer can execute a security application. The computer can receive a request for authentication information associated with a user device. The computer can access event data corresponding to the user device. The computer can generate, based upon the event data, a challenge question and a response to the challenge question. The computer can provide data indicating the challenge question and the response to a requestor associated with the request.
Bibliography:Application Number: US201816137619