Today, the computer user’s standard login credentials function as a gatekeeper to protect from intrusions. But what happens if an intruder has acquired the password or operates on a computer which is already logged on?
Opens for a new generation of IT-security solutions
Behaviometrics offers a new generation of information security solutions simply by using the individual itself as its core asset. An asset that is extremely hard to replicate which makes it the ultimate solution against identity theft. Any unauthorized user that previously could access a computer with confidential information, either by hacking the password, logging in with stolen credentials or accessing a logged on computer, can now be stopped and the intrusion is prevented while it is happening.
BehavioSec exploits this technique by analysing and measuring characteristics of the human behavior for verification purposes. By analysing how the user works with the keyboard (typing rhythm), mouse movements (acceleration time, click frequencies) and graphical interface interaction (using programs) it is possible to recognise and confirm the identity of a person.
Definition of Behaviometrics
The word “Behaviometrics” derives from the terms “behavioral” and “biometrics”. “Behavioral” refers to the way a human person behaves and “biometrics”, in an information security context, refers to technologies and methods that measure and analyzes biological characteristics of the human body for authentication purposes – for example fingerprints, eye retina and voice patterns.In other words Behaviometrics, or behavioral biometrics, is a measurable behavior used to recognize or verify the identity of a person. Behaviometrics focuses on behavioral patterns rather than physical attributes.
Behaviometrics is measuring human behavior in order to recognize or verify the identity of a person.
How it works
Each person has a unique pattern in how they interact with a computer’s main components its keyboard, mouse and graphical user interface. The study of the user’s unique handling of these is known as Behaviometrics.
A human behavioral pattern consists of a variety of different unique “semi-behaviors”; all mixed together into a larger an utterly more unique profile. Since every persons unique Behaviometric pattern is formed not only by biometric features, like the way you move your hand, but is also influenced by more social and psychological means, like if you are native in the language you write, it is just about impossible to copy or imitate somebody else’s behavior in front of the computer.
The behavior of the person typing away on the computer is compared to the stored Behaviometric pattern. Similarities resembling the logged in user are recognized and the software calculates the possibility of it being the correct user.
- While many popular security solutions today require the user to perform additional tasks Behaviometrics will adapt to the user and does not interfere with the normal work flow. Simply by using the computer in the everyday work makes the software increasingly more efficient and the confidential information more secure.
- Behaviometrics will allow workstations to be secure even after the user has logged on to the system. Even if you leave the workstation and forget to sign out your computer stays protected.
- Where existing token-based products (such as passwords and smart cards) can be duplicated or stolen, your behavior is unique and very difficult; if not impossible to copy.