摘要 |
This document discusses, among other things, a system and methods for weak authentication data reinforcement. In an example embodiment, authentication data is received in a request to authenticate a user. In response to authentication being detected to be weak authentication data, it may be determined whether the request to authenticate is associated with a human user. An example embodiment may include initiating an authentication process based on determining that the request to authenticate is associated with the human use.
|