Risk-Based Authentication is not standardized at the moment. For this reason, several types of RBA algorithms and implementations exist.
Based on our observations we were able to derive three types of conceptual RBA models.
Used by: GOG.com
Advantages | Disadvantages |
---|---|
|
Used by: Google, Amazon, LinkedIn
Advantages | Disadvantages |
---|---|
|
Used by: Facebook
Advantages | Disadvantages |
---|---|
|
|