one
REAL-TIME SELECTION OF AUTHENTICATION PROCEDURES BASED ON RISK ASSESSMENT
Last updated:
Abstract:
A device may receive, from a server device, a real-time notification indicating that a field of a user account is being modified. The field may include personal information of a user associated with the user account and/or information identifying authorized users of the user account. The device may receive, from a user device, a request associated with a high-risk transaction involving the user account. The device may determine a risk score indicating a likelihood of the high-risk transaction being performed by an unauthorized user. The device may selectively identify an authentication procedure, of a group of authentication procedures, based on the risk score. The device may provide authentication instructions for the authentication procedure to the user device to allow the user device to perform the authentication procedure.
Utility
5 Oct 2021
27 Jan 2022