Behavioral biometrics can be broken down into a few main categories, each providing a unique way to monitor and evaluate physical user activities. We’ll describe each in further detail below.
Keystroke Dynamics
Sometimes referred to as typing dynamics, measuring the rhythm, speed, and manner of how a person types is a common type of behavioral biometric. With keystroke dynamics, users can be profiled and identified based on how they type on a keyboard, the unique key combinations they use (whether they tend to use the left or right shift button more often), their error rate, and other factors.
Specifically, this technology will measure metrics like the pressure placed on keys, dwell time (the amount of time that a key is pressed), and flight time (the duration between when a key is released and the next key is pressed). So, keystroke dynamics are not just focused on how fast a person types, but also on a user’s specific typing rhythm and style.
In practice, a system can monitor the unique keystrokes of a user during a session and compare them to historical data to look for fraudulent or atypical behavior. If an account user is known for being a quick and accurate typer, the system may flag a session if it detects the current user is much slower and making more errors than what’s expected from the authorized user.
Even when a user is new and not known, keystroke dynamics can be used to identify bots, whose typing patterns may be too even or too rapid when compared with human users.
Mouse Interactions
Similarly, behavioral biometric systems can track a user’s interaction with a computer mouse or touchpad, including the movements and clicks they make. This technology establishes a user’s unique pattern for using a mouse, which is used to create a unique profile that can help distinguish between them and a fraudster.
In general, a system will track interactions like mouse location, length and pressure of button clicks, mouse movement speed, and more. Even small hand motions and gestures are detected and monitored with behavioral biometric technology.
Each user has a unique pattern and style of using a mouse, helping systems determine when a device user is the authorized account holder, or when there’s suspicious activity. Let’s say a specific laptop user rarely uses the touchpad and instead uses an attached mouse with slow, fluid movements. During a session where the user is making erratic movements only on the touchpad and without using the mouse, they may be flagged. Again, the user needn’t be known to flag non-human mouse interactions, like mouse movements in unnaturally straight lines, for example.
Touchscreen Interactions
A user’s touchscreen interactions can also be used to monitor for suspicious activity on a device. How a person scrolls up or down, the pressure they apply to the screen, and the speed of interactions are all important data points to help distinguish users from one another, and human users from bots.
The system will assess the typical touchscreen interactions for a given user, creating a unique profile based on their behaviors. In the future, all touchscreen activities will be monitored and compared against this stored data to help ensure that only the rightful user has access to the device.
For instance, if a device user normally scrolls on the left side of the screen (indicating they’re likely left-handed) and uses medium pressure, it would be abnormal if the user suddenly switched to scrolling on the left side of the touchscreen and using very light pressure.
Device Movement Patterns
How a person handles their device is another important behavioral biometric monitored to prevent fraud. This differs from how the user interacts with the touchscreen, instead focusing on the angle of how the device is held and the speed the device is moving.
This relies on two sensors of a mobile device, the gyroscope, which measures the rotation and orientation of the device, as well as the accelerometer, which reflects the acceleration of the device's movement.
Behavioral biometrics systems can analyze data from these sensors to create a profile of the user’s typical movements and behaviors. Detected anomalies may indicate potential fraud and trigger additional security measures like re-entering their password or another fingerprint or facial scan.