International Business Machines Corporation
AUTHENTICATION SECURITY
Last updated:
Abstract:
A method can include obtaining access code data corresponding to an access code transmitted to a user device. The method can further include monitoring the user device. The method can further include determining, based on the monitoring, that the access code is shared. The method can further include initiating, in response to the determining that the access code is shared, an invalidation of the access code.
Status:
Application
Type:
Utility
Filling date:
2 Mar 2020
Issue date:
2 Sep 2021