Event-Based Security Challenges

Concepts and technologies are disclosed herein for event-based security challenges. A computer can execute a security application. The computer can receive a request for authentication information associated with a user device. The computer can access event data corresponding to the user device. The...

Full description

Saved in:
Bibliographic Details
Main Authors BRIDGER, II ROBERT, LEE, JR. JAMES T, KOCH ROBERT ALAN
Format Patent
LanguageEnglish
Published 21.07.2016
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Concepts and technologies are disclosed herein for event-based security challenges. A computer can execute a security application. The computer can receive a request for authentication information associated with a user device. The computer can access event data corresponding to the user device. The computer can generate, based upon the event data, a challenge question and a response to the challenge question. The computer can provide data indicating the challenge question and the response to a requestor associated with the request.
Bibliography:Application Number: US201615082079