Patent attributes
Internet-of-Things (IoT) devices can be used to perform authentication related operations because IoT devices are prevalent in our society and because a server performing an authentication operation can communicate with IoT devices via the Internet. In a first example authentication technique, a server determines whether a person can perform an operation requested by the person based on whether the person performed an action on an IoT device, where the action is selected by the server and send to the person's user device. In a second example authentication technique, a server determines whether a person can perform an operation based on whether a person accurately identified an action performed by an IoT device, where the IoT device performs the action based on a command sent by the server.