摘要 |
<p>Disclosed is a system and method of verifying a request for access to data in a computer system. The system has a first module having access to a first trusted indicator of time, a second module having access to an un-trusted indicator of time and a computing device having access to a second trusted indicator of time. The first module generates a onetime password using the first trusted indicator of time. The second module receives the password associated with the access request and validates the received password using the un-trusted indicator of time. The second module then causes a message to be transmitted to the computing device, the message comprising data indicative of the un-trusted indicator of time used to validate the received password. The computing device then generates data indicative of a comparison between the un-trusted indicator of time and the second trusted indicator of time, and uses the generated data to provide access to data.</p> |