• slide-1
  • slide-2
  • slide-3
  • slide-4
  • slide-5


KeystrokeID is the biometric solution based on behaviour traits that are acquired over a certain time period the user is typing on his or her keyboard (versus a physiological characteristic or physical trait). KeystrokeID monitors and analyses all keyboard behaviour performed by the user during his/her access. Based on this keystroke behaviour performed in comparison to the user’s normal behaviour access is granted when this user is also authorized.

Strong Authentication modules for KeystrokeID:

Secure VPN Authentication
Web Sign-On
Network Sign-On
Email Sign-On
Server Based Computing

How does KeystrokeID work?
Keystroke dynamics is measured with dwell time and flight time in keyboard typing. Measurements can be recorded from every keyboard to determine Dwell time (the time a key pressed) and Flight time (the time between “key down” and the next “key down” and the time between “key up” and the next “key up”). Once the verification string is entered, it’s processed through an algorithm that compares the person’s typing behaviour to a sample collected in a previous session. The output of the comparison is a score.

KeystrokeID calculates a unique behavioural signature used to ensure the user’s identity as the system is being used. It identifies malicious computer actions and network intrusions.

KeystrokeID advantages:
Quick and very secure identification
Affordable, because it doesn’t need distribution management or replacement of tokens;
No user interference, the person that is typing does not have to know that he’s being watched;
The user does not have to be trained to use it, since he or she won’t even notice the difference with a normal logon to your network, Server Based Computing or Web Application Sign-on;
Almost no affect on someone’s privacy, you only type in the password and username and you’re identified;
The user behaviour becomes the identification token.

Go to top