Methods for secure authentication
Abstract:
Embodiments include method for authentication including interacting with a user by a server in real time to collect verification data for authentication by requiring the user to take an action in real time; comparing a detected reaction by the user in response to the requirement to take the action to a predetermined metric; and determining based on the comparison to the predetermined metric, whether to authenticate the user.
Public/Granted literature
Information query
Patent Agency Ranking
0/0