TypeWATCH applies keystroke dynamics to build a ‘digital fingerprint’ of users based upon their unique typing characteristics.
TypeWATCH is completely transparent to the user, so that he/she doesn’t even notice it. It is designed to run in the background, constantly watching the typing rhythms produced by the users in their daily routine (never asking for dedicated text input) and watching for unauthorized access attempts. This means that it has no impact on how a user normally types, when typing in an e-mail, a document, or even a tweet, Facebook post, for example.
TypeWATCH has no hardware requirements which lowers cost and complexity, and does not offer another point-of-failure into the system.
TypeWATCH does not register what is being typed as it is a statistical analysis tool that learns the legitimate user’s typing behavior solely through the analysis of his unique typing rhythms (timing measurements).
TypeWATCH is a secure method of identification engineered to be flexible enough even for the work processes where users are required to change places swiftly at individual workstations. Each authorized worker can access data and applications easily and securely.
When an intruder is detected, TypeWATCH automatic applies the defined security policy - a challenge password, take a picture and/or a print-screen, lockout the workstation, etc.) accordingly and logs events which can be monitored and audited for compliance purposes.
TypeWATCH has a passive enrollment phase where the legitimate user is required to type some text to build a dynamic profile. Once gathered, TypeWATCH is ready to start detecting unauthorized users.
No. After the installation is completed, TypeWATCH starts an Enrollment Phase to learn the user typing patterns needed to create his/her profile. After the Enrollment Phase is completed, TypeWATCH will protect the computer.
Yes. Remote desktop connections are also controlled by TypeWATCH, and if an intruder were to 'remote in' to your system, they would be identified and TypeWATCH would take the specified actions to cut off access.
Currently, TypeWATCH does verifications after a fixed number of characters has been entered (verification window). However, depending on the moment an intruder starts using the system, they can be logged out after typing less than that, especially if they have a significantly different typing pattern from the authorized user. Over time, we will reduce the minimum number of characters required for each verification window while still maintaining the algorithm efficacy, which is currently greater than 99%.
Yes, if that feature is allowed by the system administrator. Choosing security levels can be done in the Options menu and by doing so the user can increase or decrease the sensitivity of protection.
Yes, but only if that feature is allowed by the system administrator. The pause can be done in the Options menu and the user can choose an interval of time and a reason for pausing TypeWATCH.
Yes. The user profile is roaming. It is connected to the user login which is entered, and will be available in any domain that the machine logs into.
We are into the R&D phase of our “Pointer Dynamics” technologies, which includes the usage of both pointing devices such as a computer mouse as well as touch screens. We believe that this will be a significant enhancement to TypeWATCH in the future.
No special hardware is required.
No. TypeWATCH starts validating the user keystroke data, right after the user logs on. The system does not record strings or text typed by the user.
In some way can be considered a gradient score because there are, at the moment, 3 different intrusion levels (yellow, orange and red).
TypeWATCH only does continuous validation after the logon. There is no password analyzer. That is why TypeWATCH does not replaces user authentication. It is a method to validate the user digital identity after login
Passive, in the sense that the user does not need to do anything to enroll.