USING BIONICIDS TO STOP IMPERSONATION AND MANIPULATION ATTACKS
The fundamental building block of a BionicID™ is behavioral biometrics.
Revelock collects thousands of non-PII parameters starting with behavioral biometrics - how a user handles a device - and layers on behavioral analytics - when from where and what the user accesses as well as which device and network and all the associated data about that device and network that is used to access a protected website or mobile application server.Impersonation Attacks start with stolen credentials, and Revelock Active Defense prevents malware or phishing attacks from stealing user credentials in the first place.Revelock Active Defense also allows banks to determine the appropriate actions to take when malware attacks or phishing attacks are detected on user devices - and immediately, automatically, and silently protect those users as well as alert the bank’s fraud teams. In today’s post-breach world, stolen credentials are readily available for bad actors to use to impersonate legitimate users. Stolen credential attacks require a different approach to stop since they are executed by credential stuffing bots and manually by humans. These kinds of attacks are detected, and account takeovers are prevented by Revelock BionicID™ analysis.

- The first is to protect users at the point of attack immediately.
- The second is to simultaneously alert the bank’s fraud teams of the attack and execute a follow-up response – ranging from sending user notifications, stepping up authentication, terminating a session, or locking the account –stopping fraud before it happens.

What is BionicID™ analysis best suited for?
BionicIDs™ are most commonly used for anti-fraud or user verification applications but have primarily been used by financial institutions to stop online fraud. For example, in online behavioral biometrics in banking applications, BionicID™ analysis can provide effective fraud protection against manipulation or impersonation-based attacks such as Account Takeover (ATO) fraud, as well as malware-based ones such as Remote Access Trojan (RAT). Besides online banking access, BionicID™ analysis can also be applied to other use cases such as detecting New Account Fraud, Card Not Present, or when 3D Secure verifications are required.
Does BionicID™ data collection or analysis impact the user experience?
BionicID™ data collection is entirely transparent for end-users, and the data analysis is invisible without requiring users to take any extra steps. Furthermore, it works in the background and provides passive biometric verification to confirm the person behind the online session is always the genuine user. When a BionicID™ anomaly is detected, it generates the need for additional authentication (multi-factor authentication). Similarly, during a 3D Secure stepped-up verification, users may be required to take additional steps to verify their identity. Deep learning algorithms continuously evaluate the incoming flood of behavioral biometric data on the financial institution’s side. This evaluation will result in a seamless and secure user experience or, in the case of anomalous activity, trigger an automated response to stop an attack and follow-up alert to notify the bank of the attack and the actions taken to prevent it.
Does BionicID™ data collection/analysis comply with SCA/PSD2?
BionicID™ data collection and analysis comply with Strong Customer Authentication (SCA) requirements. They can be used as a component of multi-factor authentication as required by the EU’s Second Payments Services Directive (PSD2). Strong Customer Authentication is required through PSD2 every time someone attempts to pay online or access their online banking services. The authentication must be carried out by the Payment Service Provider (PSP). It must occur through at least two different factors that satisfy two of three categories: possession (device), knowledge (password or PIN), and inherence (something the user has - physical biometrics such as a fingerprint or behavioral biometric security). When combined with deep learning technology, behavioral biometrics for human identification can authenticate a user invisibly and throughout their entire online banking session, meaning a factor of authentication (in this case inherence) under SCA is fulfilled with no user action required. Additionally, the use of BionicIDs™ is also compliant with other international cybersecurity standards and regulations set forth by NIST 800-171, ISO 27001, HIPAA, FINRA, and FISMA.