SecureAuth Named a Leader in KuppingerCole Leadership Compass Report for Customer Identity and Access Management

Biobehavioral Authentication Demystified

Dr. Abdulrahman Kaitoua
July 29, 2019

Get the latest from the SecureAuth Blog

Even though your fingerprint and face scan may not be as unique as you thought, it turns out there is one characteristic of you that is truly unique and can’t be duplicated. That characteristic is your personality. No, we are not referring to if you are funny or smart, introverted or extroverted, we are referring to your behaviors; and more specifically your digital behaviors. Combine the ability to privately and securely track your digital behaviors with the latest in AIML technologies and you have the recipe for the next wave of Identity authentication.

AIML Comes Of Age

For those who are still acronym-challenged, AIML stands for Artificial Intelligence Markup language and according to Wikipedia:

“The XML dialect called AIML was developed by Richard Wallace and a worldwide free software community between 1995 and 2002. AIML formed the basis for what was initially a highly extended Eliza called “A.L.I.C.E..” (“Artificial Linguistic Internet Computer Entity”), which won the annual Loebner Prize Competition in Artificial Intelligence three times, and was also the Chatterbox ChallengeChampion in 2004.”

You also can’t have a discussion on AIML without discussing Machine Learning.  TechTarget describes it as:

“Machine learning (ML) is a category of algorithm that allows software applications to become more accurate in predicting outcomes without being explicitly programmed. The basic premise of machine learning is to build algorithms that can receive input data and use statistical analysis to predict an output while updating outputs as new data becomes available.”

Fundamentally, a tool is usually targeted at a specific problem set.  In this case the basis is to better understand, interpret and act on more human-centric linguistics and measurable behaviors.  This has opened the doors for insightfully uses in the identity and access management market specifically for authentication solutions.

Biobehavioral Authentication Is Immutable

Behavioral biometrics are a relatively new field of science. describes it as:

“Behavioral biometrics are a relatively new modality in the biometrics landscape, with clear applications in enterprise security, online banking, and mobile commerce. Generally, a behavioral biometrics system matches a user’s behavior against a profile built from hundreds of physiological, cognitive, and contextual traits. The result is two-fold: a user can be passively and continuously authenticated simply by behaving normally online; and service providers implementing behavioral systems can detect malware and other cyber-threats designed to mimic human behavior.”

And in another article titled “Behavioral Biometrics To Become Increasingly Standard in Fraud Detection” they reported:

“Gartner, Inc. has recently released its 2014 Market Guide For Online Fraud Detection in which the firm singles out passive biometric analysis as a feature that will start to become much more standard in the next three years.

According to the report, passive biometric analysis will become a standard feature of at least 30 percent of one-stop fraud detection solutions by 2017. This is a massive amount of growth considering that today that statistic is less than one percent.”

As it applies to IT Security, we like to refer to it as biobehavioral authentication, which takes this principle of behavioral biometrics and applies it directly to the authentication of a digital user.  In doing so you have an immutable way of identifying that credential as being valid.

The Biobehavioral Authentication Solution

Acceptto was the first to understand, develop and deliver continuous and biobehavioral authentication. Our company was built on the foundation that the only way to ensure digital credentials are being used only by the person who those credentials represent and not some imposter or someone hijacking a device correctly authenticated by that person.

Acceptto’s eGuardian engine continuously creates, and monitors user behavior profiles based on the user interaction with the It’sMe authenticator. Every time an activity occurs, actionable intelligence is gathered and used to optimize the user profile. eGuardian is capable of autonomously and continually learning new policies and adapting existing ones. While policies can still be manually defined and contribute to the computation, our Biobehavioral AIML approach automatically finds the optimal policy for each transaction. eGuardian leverages a mixture of AI & ML, expert systems and SMEs to classify, detect, and model behavior, and assign real-time risk scores to continuously validate your identity prior to, during and post-authentication.

Download the Enterprise Management Associates’ Ten Priorities For Identity Management in 2019 today and then check out what Acceptto can do to ensure your employees, partners and customers can authenticate without passwords and still ensure security and privacy registering for a free demo today.


Related Stories

Pin It on Pinterest

Share This