FB pixel

Behavioral biometrics: What is it and how does it work?

Behavioral biometrics: What is it and how does it work?
 

Behavioral biometrics are increasing in popularity against a backdrop of increasingly sophisticated cyberattacks, as conventional authentication methods can fall short of stopping malicious actors.

The advent of multi-factor authentication (MFA) technologies, particularly those relying on biometrics, has presented hackers with a new challenge, but no system is ever entirely secure.

To provide persistent, adaptive authentication while also reducing end-user friction, some organizations have turned to a relatively new form of biometric authentication, one measuring users’ behavior patterns. Here’s an overview of this evolving technology.

What is behavioral biometrics?

It is a technology that measures unique patterns in human activity. The term is often juxtaposed to physical or physiological biometrics, which refer to analysis of human characteristics like iris patterns or fingerprints.

Behavioral biometric tools can identify people from patterns in activity like gait or keystroke dynamics.

These tools are used by financial institutions, businesses, governments and retailers for user authentication, rather than 1:N identification.

Unlike conventional authentication methods that work when a person’s data is collected, for example by touching a sensor, behavioral biometric systems can authenticate continuously.

How does behavioral biometrics work?

Behavioral biometrics compare an individual’s identifying pattern to past behavior, often providing continuous authentication throughout an active session or recording.

The behavior is sometimes captured by an existing device, like a smartphone or a laptop, and sometimes by a dedicated device such as a sensor array for measuring footfalls in gait recognition.

The biometric analysis returns a score that represents the probability that the person performing the actions is the one who set the baseline behavior for the system.

Dissimilarity between a customer’s behavior and the expected profile prompts a step up to additional layers of authentication that can include a fingerprint scan, taking a selfie or other requests.

The technology can be employed as part of employee or customer access control, preventing account takeover, detecting social-engineering scams and spotting money laundering.

Article Topics

 |   |   |   |   | 

Latest Biometrics News

 

Somalia makes biometric digital ID mandatory for inter-state travel

Somalians flying domestically will have to show their biometric ID cards in a new development. The measure was introduced on…

 

AVPA, academics, advocacy groups trade letters over age assurance tech

New rifts have opened up in the debate over the safety and privacy status of age assurance technology. An open…

 

What happens to your accounts when you die? OpenID calls for digital estate action

When people die, the fate of their digital accounts depends on a series of fragmented policies and legal systems rife…

 

Incode says account recovery deepfake fraud soft spot in expanded attack surface

Deepfakes take center stage in a webinar presented by Incode and hosted by Maxine Most, founder of the Prism Project…

 

Iran’s authorities using NtechLab’s live facial recognition to crush dissent

Images of masked protestors emerging from Iran during the country’s recent brutal crackdown on dissent illustrate their fear of the…

 

Idemia Public Security, Proof partner on single portable digital credential

Idemia Public Security and Proof have formed a strategic partnership to enable a “trusted, broadly usable, privacy-preserving identity experience through…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events