摘要 |
A strategy-driven methodology for reducing identity theft comprises the steps of attempting to gain system access, and presenting at least one list of user choices instead of granting system access, as practiced conventionally. The presented list contains at least one choice that is preset by a registered user. Other steps include selecting at least one choice from the presented list, and granting system access if the selected choice matches the preset choice.
|