Event-Based Security Challenges
Concepts and technologies are disclosed herein for event-based security challenges. A computer can execute a security application. The computer can receive a request for authentication information associated with a user device. The computer can access event data corresponding to the user device. The...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
21.07.2016
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Concepts and technologies are disclosed herein for event-based security challenges. A computer can execute a security application. The computer can receive a request for authentication information associated with a user device. The computer can access event data corresponding to the user device. The computer can generate, based upon the event data, a challenge question and a response to the challenge question. The computer can provide data indicating the challenge question and the response to a requestor associated with the request. |
---|---|
Bibliography: | Application Number: US201615082079 |