摘要 |
<p>There are methods and apparatus, including computer program products, for user authentication. For example, there is a method that includes generating a dynamic mapping between assigned authentication symbols and temporary authentication symbols, presenting the dynamic on an electronic device, and receiving a selection signal that identifies one or more of the temporary authentication symbols.</p> |