NoPassword™ Behavioural and Continuous Authentication

Ultimate security and convenience with NoPassword Intelligent Behavioral and Continuous Authentication

Book a Demo

Leveraging User Behavior for Continuous Authentication

Once a user is successfully authenticated based on their biometric, NoPassword continuous authentication engine monitors the user’s behavior on their smartphone, browser, desktop, and workstation to ensure there is no account takeover.

If NoPassword continuous authentication detects any changes in user’s behavior or is unable to authenticate the user based on their behavior, NoPassword risk based and granular access control is triggered to decide whether to limit user’s access, initiate another biometric authentication, or end the user’s session.

Human and Hidden Multi-Factor Authentication
  • Smartphone
  • Browser
  • Desktop
  • Workstation
Behavioral and Continuous Authentication
  • Seamless Continous Auth
  • Limit User Access
  • Step-Up Auth

Behavioral Authentication for Enterprise Workforce

Behavioral and continuous authentication can be used for managing workforce access and privileges.

At any point after successful authentication, if user’s suspicious or unusual behavior is detected, NoPassword can limit the user access to non-sensitive applications or ask the user to perform additional biometric authentication.  

Behavioral Authentication for Enterprise Customers

Behavioral and continuous authentication can be used for managing customers and partners access and privileges.

At any point, if user’s suspicious or unusual behavior is detected, NoPassword can limit the user access to non-sensitive information, block certain activities (such as online transaction or online authorization), or ask user to perform additional biometric authentication.

NoPassword Intelligent Continuous Authentication

Behavioural and Continuous Authentication layers:

Application Usage

Applications used on what platform, when and where are valuable information that would help detect user’s behavioral pattern for continuous authentication.  

Online Activities

Online activity and what resources they request to access, along with time and locations are data are considered to better authenticate the user based on their behavior and limit access when necessary.

Screen Touch Pattern

User’s touch information are leveraged, specifically screen touch patterns to enable a high level of accuracy for authentication and prevent account takeover.  

Smartphone Handling

How the user handles their phone is also used by NoPassword to continuously authenticate the user, including how the user picks up their phone, holds it up, and whether the user is left-handed or right-handed. This information is unique to every user and these factors that can be used to identify the user based on behavior, along with user’s walking pattern for example.

Typing Pattern

User’s keystrokes, flying time between the keys, etc. is information that is used to authenticate the user on their phone, tablet, laptop, and desktop.

Mouse Movement Pattern

How the user moves their mouse or uses their device touchpad are valuable factors that improve NoPassword behavioral and continuous authentication on their laptop and workstation.

© 2018 NoPassword Inc. All Rights Reserved. Powered by NoPassword Inc.

Modernize enterprise workforce and consumer identity by substituting passwords with NoPassword Human and Hidden Multi-Factor Authentication (H²MFA™).

Try NoPassword