[ { "title": "Transaction verification through enhanced authentication", "publication_date": "2014/25/09", "number": "09363267", "url": "/2014/09/25/transaction-verification-through-enhanced-authentication/", "abstract": "In some examples, the additional authentication challenge may be encrypted using a key associated with the second computer system before issuance the additional authentication challenge. For example, the key may be a public key corresponding to a private key stored in a highly secure area on the second computer system.", "owner": "eBay, Inc.", "owner_city": "San Jose", "owner_country": "US" }, { "title": "Managing access to an on-demand service", "publication_date": "2014/19/07", "number": "09565182", "url": "/2014/07/19/managing-access-to-an-ondemand-service2/", "abstract": "Provided are mechanisms and methods for managing a risk of access to an on-demand service as a condition of permitting access to the on-demand service. These mechanisms and methods for providing such management can enable embodiments to help prohibit an unauthorized user from accessing an account of an authorized user when the authorized user inadvertently loses login information. The ability of embodiments to provide such management may lead to an improved security feature for accessing on-demand services.", "owner": "salesforce.com, inc.", "owner_city": "San Francisco", "owner_country": "US" } ]