Authenticating a request for an electronic transaction
Abstract:
In an approach for authenticating a request for an electronic transaction, a computer receives a request for an electronic transaction on a user account. The computer determines whether the request from the user for the electronic transaction is suspicious. The computer then determines, based on at least a response from at least one contact of the user, whether the request for the electronic transaction is suspicious to the at least one contact.
Public/Granted literature
Information query
Patent Agency Ranking
0/0