A technique manages consumer authentication. The technique involves communicating with an institutional entity to perform an authentication operation regarding a consumer. The technique further involves conveying a query to the consumer in response to the authentication operation. The query prompts the consumer to indicate whether the consumer participated in the authentication operation. The technique further involves obtaining a response to the query indicating whether the consumer participated in the authentication operation. The authentication operation is legitimate when the response indicates that the consumer participated in the authentication operation. The authentication operation is fraudulent when the response indicates that the consumer did not participate in the authentication operation. In some arrangements, the authentication operation involves knowledge-based authentication (KBA) activity. In some arrangements, the query is conveyed to the consumer through an identity protection entity which is different than the institutional entity.
展开▼