Matches in DBpedia 2014 for { <http://dbpedia.org/resource/Risk-based_authentication> ?p ?o. }
Showing items 1 to 34 of
34
with 100 items per page.
- Risk-based_authentication abstract "In cryptography, Risk-based authentication is a non-static authentication system which takes into account the profile of the agent requesting access to the system to determine the risk profile associated with that transaction. The risk profile is then used to determine the complexity of the challenge. Higher risk profiles leads to stronger challenges, whereas a static username/password may suffice for lower-risk profiles. Risk-based implementation allows the application to challenge the user for additional credentials only when the risk level is appropriate. "Machine authentication is often used in a risk based authentication set up. The machine authentication will run in the background and only ask the customer for additional authentication if the computer is not recognized. In a risk based authentication system, the institution decides if additional authentication is necessary. If the risk is deemed appropriate, enhanced authentication will be triggered, such as a one time password delivered via an out of band communication. Risk based authentication can also be used during the session to prompt for additional authentication when the customer performs a certain high risk transaction, such as a money transfer or an address change. Risk based authentication is very beneficial to the customer because additional steps are only required if something is out of the ordinary, such as the login attempt is from a new machine."".
- Risk-based_authentication wikiPageExternalLink US20050097320.
- Risk-based_authentication wikiPageID "31219784".
- Risk-based_authentication wikiPageRevisionID "560665646".
- Risk-based_authentication hasPhotoCollection Risk-based_authentication.
- Risk-based_authentication subject Category:Access_control.
- Risk-based_authentication subject Category:Applications_of_cryptography.
- Risk-based_authentication subject Category:Authentication_methods.
- Risk-based_authentication subject Category:Computer_access_control.
- Risk-based_authentication subject Category:Password_authentication.
- Risk-based_authentication type Ability105616246.
- Risk-based_authentication type Abstraction100002137.
- Risk-based_authentication type Application106570110.
- Risk-based_authentication type ApplicationsOfCryptography.
- Risk-based_authentication type AuthenticationMethods.
- Risk-based_authentication type Code106355894.
- Risk-based_authentication type CodingSystem106353757.
- Risk-based_authentication type Cognition100023271.
- Risk-based_authentication type Communication100033020.
- Risk-based_authentication type Know-how105616786.
- Risk-based_authentication type Method105660268.
- Risk-based_authentication type Program106568978.
- Risk-based_authentication type PsychologicalFeature100023100.
- Risk-based_authentication type Software106566077.
- Risk-based_authentication type Writing106359877.
- Risk-based_authentication type WrittenCommunication106349220.
- Risk-based_authentication comment "In cryptography, Risk-based authentication is a non-static authentication system which takes into account the profile of the agent requesting access to the system to determine the risk profile associated with that transaction. The risk profile is then used to determine the complexity of the challenge. Higher risk profiles leads to stronger challenges, whereas a static username/password may suffice for lower-risk profiles.".
- Risk-based_authentication label "Risk-based authentication".
- Risk-based_authentication sameAs m.0gjd3q5.
- Risk-based_authentication sameAs Q7336206.
- Risk-based_authentication sameAs Q7336206.
- Risk-based_authentication sameAs Risk-based_authentication.
- Risk-based_authentication wasDerivedFrom Risk-based_authentication?oldid=560665646.
- Risk-based_authentication isPrimaryTopicOf Risk-based_authentication.