Continuous Authentication

Seamless behavior-based user and device authentication without passwords. Detect imposter mobile app logins using stolen passwords.

Managing weak, lost, forgotten, and stolen passwords for enterprise desktops has been both cumbersome, costly, and all too often ineffective. This problem becomes even worse on mobile devices with small form factors where each mobile app requires its own password. Kryptowire’s Continuous Authentication technology identifies users through their own unique behavioral patterns.

Continuous Authentication leverages multiple on-board sensors of mobile devices including touch, pressure, movement, and power to recognize users based on the way they interact with the device and within the context of each mobile app. Kryptowire’s Continuous Authentication in-app instrumentation can detect imposters attempting to gain unauthorized access to data and services available on your device.

This technology was developed with the support of the Defense Advanced Research Projects Agency. Kryptowire’s Continuous Authentication technology supports a progressive trust-based permission model where a user has multiple access levels starting from non-authenticated to fully-authenticated. Contact us to see how the Kryptowire Continuous Authentication SDK can help your app defend against imposter logins.  

DHS S&T Directorate. July 21, 2016

“Smartphones provide new challenges for authenticating users and devices, but the number of onboard sensors and the computational power of these devices also present new opportunities. Since passwords often are lost, stolen, and offered for sale in bulk, continuous authentication is a new line of defense that can support new trust-based access control models.”

DHS S&T Directorate

July 21, 2016

 

2018-07-05T15:01:01+00:00

DHS S&T Directorate

July 21, 2016

 

“Smartphones provide new challenges for authenticating users and devices, but the number of onboard sensors and the computational power of these devices also present new opportunities. Since passwords often are lost, stolen, and offered for sale in bulk, continuous authentication is a new line of defense that can support new trust-based access control models.”

Continuous Authentication

Contact us to see how the Kryptowire Continuous Authentication SDK can help your app defend against imposter logins.

REQUEST A DEMO