To support educational institutions during COVID 19 restrictions, all universities and schools may register and use our enterprise tier for free.
How it works
We use behavioral biometric analysis of typing rhythms to create unique biometric profiles of users' typing behavior.
Our adaptive machine learning algorithm then compares users' typing sequences (starting from 8 characters) with their profiles to confirm identities and to guarantee access is granted to only genuine account owners.
Keystroke DNA can be used as a 2nd or 3rd authentication factor, for real-time identity confirmation, as a fraud prevention mechanism, and as protection against stolen, lost or shared credentials. Offered as a service, it can be conveniently integrated into any web application with just a few lines of code.
HOW you type, not WHAT you type
We analyze behavioral typing patterns and use the unique biometric data we gather for identification purposes, independent of language, words or characters.
Any device or platform
Keystroke DNA recognizes users' identities whether they're on a keyboard or a touchscreen and can be integrated into any technology platform or authentication flow.
Our service can be easily integrated into any web application with just a few lines of code. It doesn't require any expertise in biometrics.
Keystroke DNA provides strong authentication that keeps data secure and access under control even if users' credentials are stolen, lost or shared.
Unlike static biometric authentication methods, Keystroke DNA recognizes users' dynamic typing patterns, which cannot be shared, imitated or lost.
No special hardware required
Keystroke DNA requires only a keyboard or keypad making it a convenient method of biometric authentication that adapts to your existing behavior.
Keystroke DNA provides the ability to perform real-time end-user identity verifications just by analyzing how users' type their email addresses, usernames or any unique text sequences.
Credential sharing and hacking are fundamental problems for non-biometric authentication methodologies, which is difficult or impossible to detect. Keystroke DNA solves this problem by verifying user identities through their personal and unique typing and style, which cannot be shared or imitated.
Keystroke DNA ensures a fast, convenient, and non-intrusive added layer of authentication. Unlike other methods, our service adapts to existing user behavior and performs identity verifications automatically and in real-time.
Data security and privacy
Keystroke DNA ensures the highest level of data security and data privacy. By analyzing users' behavior during attempts to access data, our algorithms are capable of detecting fraud in real time to prevent unauthorized access. We are also fully GDPR compliant and meet strong authentication requirements relating to regulatory technical standards (RTS) pertaining to PSD2.
With Keystroke DNA as a secondary authentication method, the risk of data breach and loss from stolen credentials is effectively mitigated. Our algorithms verify the legitimacy of every login attempt serving as a fail-safe, the last line of defense agains access fraud.
Keystroke DNA enables extremely effective protection against unauthorized actions and access to confidential information as it relies on an individual user's behavior as proof of identity.
Range of Applications
Keystroke DNA provides the means to dramatically increase data security and the accuracy of user identification without affecting the user experience making it ideally applicable in a wide range of industries.