WHAT IS BEHAVIORAL BIOMETRIC ANALYSIS?
July 14, 2021
Behavioral biometric technology is a highly accurate authentication technology that can identify users based on their behavior patterns.
It identifies unique, individual characteristics in how people type and interact with their mobile device or computer, instead of other common technologies that identify users based on their physical attributes (fingerprints, facial recognition), what they have (key fobs or phones), or what they know (passwords or out-of-wallet questions). Digital IDs rooted in behavioral biometrics are as unique to a person as fingerprints. They can quickly and accurately verify the identity of a user from one session to the next and continuously verify the identity during a single session. Any anomalies detected in the user’s behavior at any point in their online session can signal that someone else is impersonating them and that there is a security breach or attempted fraud.
Physical vs. Behavioral Biometrics
Physical biometrics relates to a person’s biology, parts of the human body that can serve as an identifier – such as a fingerprint or retina scan. While behavioral biometrics refers to a person’s unique pattern of behavior – such as the rhythm and cadence with which they usually type on their computer keyboard or the way they move the mouse. We encounter physical biometric analysis for security purposes more often than we think, for example, when we unlock our mobile phones with a touch or go through an e-passport gate after looking into a camera. However, behavioral biometrics is a comparatively newer technology gaining ground in online banking fraud prevention. Its power lies in authenticating genuine users - without requiring additional steps that add friction to the process - and spotting fraudsters who return to a bank’s system.
Keystroke Dynamics | Typing patterns that include a combination of keystroke speed, keystroke duration, variations in these for particular key sequences, and characteristic patterns that occur when typing common groups of keystrokes. |
Touchscreen Swipes / Mobile Interactions | Unique ways users swipe, tap, pinch-zoom, type, or apply pressure on the touch screens of mobile devices like tablets and phones. |
Cursor Movements | Unique patterns in mouse or trackpad cursor movement, including paths, tracking speed, direction changes, and clicks. |
Handling | The way an individual holds or handles a mobile device provides another unique behavioral biometric factor. |
What is a BionicID™
The fundamental building block of a BionicID™ is behavioral biometrics. Revelock collects thousands of non-PII parameters starting with behavioral biometrics - how a user handles a device - and layers on behavioral analytics - when from where and what the user accesses as well as which device and network and all the associated data about that device and network that is used to access a protected website or mobile application server. Revelock takes a unique approach to verify users at every point in the customer journey by continually asking the question, “are you really you?”. Other behavioral biometrics companies compare users against a database of known bad, or segments of good actors, trying to answer the question “do you look like a bad or good actor?”. This approach can be effective. Still, in many cases, it is not granular enough.
BionicID
![]() | |
Revelock’s BionicID is a “cyber-DNA” or a digital fingerprint, built using thousands of parameters about the user’s context, based on behavioral biometrics, behavioral analytics and device profiling, network data, geolocation, malware patterns, and other threat intel data. As a result, it recognizes the real person behind each user in as little as two interactions, with a 99.2% accuracy in just milliseconds! |
What makes Revelock’s BionicID™ solution unique in fraud prevention?
BionicID™ data collection and analysis is the foundational technology in Revelock’s multi-channel fraud prevention solution. Revelock’s Fraud Detection & Response Platform is unique. It does not just detect anomalies, score risks and raise alerts; it also empowers fraud teams to simply configure the system to handle a number of fraud cases automatically. This active defense approach protects users without them even knowing about threats, reduces call center costs, and reduces the burden on fraud analysts. In addition, it frees fraud teams from handling routine alerts and instead uses Revelock Hunter to investigate more complex cases. With Revelock, analysts can take a pre-emptive defense approach, take down bad actors and mule accounts and stop fraud before it happens.