NoPassword™ Behavioural and Continuous Authentication
Ultimate security and convenience with NoPassword Intelligent Behavioral and Continuous Authentication
Leveraging User Behavior for Continuous Authentication
Once a user is successfully authenticated based on their biometric, NoPassword continuous authentication engine monitors the user’s behavior on their smartphone, browser, desktop, and workstation to ensure there is no account takeover.
If NoPassword continuous authentication detects any changes in user’s behavior or is unable to authenticate the user based on their behavior, NoPassword risk based and granular access control is triggered to decide whether to limit user’s access, initiate another biometric authentication, or end the user’s session.
Human and Hidden Multi-Factor Authentication
Behavioral and Continuous Authentication
Seamless Continous Auth
Limit User Access
Behavioral Authentication for Enterprise Workforce
Behavioral and continuous authentication can be used for managing workforce access and privileges.
At any point after successful authentication, if user’s suspicious or unusual behavior is detected, NoPassword can limit the user access to non-sensitive applications or ask the user to perform additional biometric authentication.
Behavioral Authentication for Enterprise Customers
Behavioral and continuous authentication can be used for managing customers and partners access and privileges.
At any point, if user’s suspicious or unusual behavior is detected, NoPassword can limit the user access to non-sensitive information, block certain activities (such as online transaction or online authorization), or ask user to perform additional biometric authentication.
Applications used on what platform, when and where are valuable information that would help detect user’s behavioral pattern for continuous authentication.
Online activity and what resources they request to access, along with time and locations are data are considered to better authenticate the user based on their behavior and limit access when necessary.
Screen Touch Pattern
User’s touch information are leveraged, specifically screen touch patterns to enable a high level of accuracy for authentication and prevent account takeover.
How the user handles their phone is also used by NoPassword to continuously authenticate the user, including how the user picks up their phone, holds it up, and whether the user is left-handed or right-handed. This information is unique to every user and these factors that can be used to identify the user based on behavior, along with user’s walking pattern for example.
User’s keystrokes, flying time between the keys, etc. is information that is used to authenticate the user on their phone, tablet, laptop, and desktop.
Mouse Movement Pattern
How the user moves their mouse or uses their device touchpad are valuable factors that improve NoPassword behavioral and continuous authentication on their laptop and workstation.