摘要 |
In an approach for authenticating a request for an electronic transaction, a computer receives a request for an electronic transaction on a user account. The computer determines whether the request for the electronic transaction is suspicious, and responsive to determining the request is suspicious, the computer retrieves profile information for the user. The computer determines based on at least the profile information, one or more contacts of the user, wherein the one or more contacts are identified by the user. The computer then determines, based on at least a response from the one or more contacts, whether the request for the electronic transaction is suspicious, wherein determining the request is not suspicious validates authentication of the electronic transaction. |
主权项 |
1. A method for authenticating a request for an electronic transaction, the method comprising:
receiving, by one or more computer processors, a request for an electronic transaction on an account associated with a user; determining, by one or more computer processors, whether the request for the electronic transaction is suspicious; responsive to determining the request is suspicious, retrieving, by one or more computer processors, profile information for the user; determining, by one or more computer processors, based on at least the profile information, one or more contacts of the user, wherein the one or more contacts are identified by the user; and determining, by one or more computer processors, based on at least a response from the one or more contacts, whether the request for the electronic transaction is suspicious, wherein determining the request is not suspicious validates authentication of the electronic transaction. |