System and methods for weak authentication data reinforcement
Abstract:
Systems and methods for weak authentication data reinforcement are described. In some embodiments, authentication data is received in a request to authenticate a user. In response to detecting weak authentication data, the systems and methods determine whether the identifier of the device was previously associated with a human user and whether the authentication data is weak. An example embodiment may include initiating a verification process in response to determining that the authentication data is weak and that the identifier of the device was not previously associated with a human user.
Public/Granted literature
Information query
Patent Agency Ranking
0/0