Patent attributes
According to one example, a system includes a first computing device that performs one or more tests that indicate whether the first computing device is compromised. In response to a determination that the first computing device passed the one or more tests, the first computing device manipulates an authentication code to generate a first seed value. In response to a determination that the first computing device failed the one or more tests, the first computing device manipulates the authentication code to generate a second seed value. The first computing device also determine data for transmittal to a second computing device, modifies the data using the first seed value or the second seed value, and transmits the modified data for receipt by the second computing device.