AUTHENTICATING USERS DURING AND AFTER SUSPICIOUS VOICE CALLS AND BROWSING
摘要:
In some implementations, a remote server may receive a request for authentication including a set of credentials associated with a user. The remote server may transmit, to a user device associated with the user, a request for a status associated with a browsing history of the user device or associated with recent emails viewed on the user device. The remote server may receive, from the user device, an indication of the status. The remote server may transmit a message based on the indication of the status and may determine whether to authenticate the user, using the set of credentials, based on the indication of the status.
信息查询
0/0