摘要 |
A method for enhancing the security of systems and resources involved in conducting network-based transactions on mobile communications devices includes comparing authentication data requested to be captured from a user as part of an authentication transaction against authentication data anticipated by the user to be captured during the authentication transaction. The method also includes authenticating the requested transaction when the user decides that the requested authentication data agrees with the anticipated authentication data, and conducting a network-based transaction from a mobile communications device, if the user is authorized, after successfully authenticating the identity of the user. |