In some embodiments, instead of using the security score for an authentication decision, the security score is used to detect fraud. In these embodiments, the security score is fed to a fraud/risk engine, which makes a determination about whether an interaction may be fraudulent, and if so performs some action, such as: blocking the transaction; flagging the transaction as potentially fraudulent; or logging the transaction to be investigated at a later time.
Otherwise, if the security score is not greater than the threshold (NO at step 606), the client causes a challenge to be issued to the user (step 608) either on the same device or on a different device. The challenge can be an “active challenge” that requires the user to perform some action, or a “passive challenge” that happens unbeknownst to the user and requires the system to obtain more-detailed sensor data or perform more-sophisticated processing of the sensor data.