TypeWATCH

TypeWATCH applies keystroke dynamics to build a ‘digital fingerprint’ of users based upon their unique typing characteristics.

TypeWATCH provides continuous security after the user logs-in, applying state-of-the-art keystroke dynamics

TypeWATCH continuously monitors for breaches by analyzing the typing patterns of each user. If an intruder is detected, TypeWATCH can lock the system against further use, take a picture of the intruder and more.

What is TypeWATCH

TypeWATCH is completely transparent to the user, so that he/she doesn’t even notice it. It is designed to run in the background, constantly watching the typing rhythms produced by the users in their daily routine (never asking for dedicated text input) and watching for unauthorized access attempts. This means that it has no impact on how a user normally types, when typing in an e-mail, a document, or even a tweet, Facebook post, for example.

TypeWATCH has no hardware requirements which lowers cost and complexity, and does not offer another point-of-failure into the system.

TypeWATCH does not register what is being typed as it is a statistical analysis tool that learns the legitimate user’s typing behavior solely through the analysis of his unique typing rhythms (timing measurements).

Why TypeWATCH

TypeWATCH is a secure method of identification engineered to be flexible enough even for the work processes where users are required to change places swiftly at individual workstations. Each authorized worker can access data and applications easily and securely.

When an intruder is detected, TypeWATCH automatic applies the defined security policy - a challenge password, take a picture and/or a print-screen, lockout the workstation, etc.) accordingly and logs events which can be monitored and audited for compliance purposes.

TypeWATCH has a passive enrollment phase where the legitimate user is required to type some text to build a dynamic profile. Once gathered, TypeWATCH is ready to start detecting unauthorized users.

6 reasons why you should trust TypeWATCH

  1. Precise as it guarantees around 99% accuracy and makes it virtually impossible to mimic another person’s typing pattern

  2. Persistent as it is constantly accessing the typing samples against a dynamic pattern it stores of the legitimate user

  3. Dynamic as it offsets tiredness, switching of computers / keyboards, mood, influence of alcohol and medications, etc, and sets individual thresholds to every user to increase performance

  4. Simple as there is no special hardware needed as with other biometrics, a standard keyboard is sufficient

  5. Secure as data security is guaranteed from the input (keyboard) to the output of the matching algorithm

  6. Auditable as an intruder can be identified by means of matching the typing sample against the profile database

Fill the form below to request a demo of TypeWATCH

Fields marked in red are required

TypeWATCH FAQs

After finishing TypeWATCH installation am I already protected?

No. After the installation is completed, TypeWATCH starts an Enrollment Phase to learn the user typing patterns needed to create his/her profile. After the Enrollment Phase is completed, TypeWATCH will protect the computer. 

In case someone remotes into my computer (my password is compromised), will TypeWATCH identify this and log the intruder out/give alerts?

Yes. Remote desktop connections are also controlled by TypeWATCH, and if an intruder were to 'remote in' to your system, they would be identified and TypeWATCH would take the specified actions to cut off access.  

Roughly how long does it take to log out an intruder? Does it require a minimum number of characters or will it log out sooner than that?

Currently, TypeWATCH does verifications after a fixed number of characters has been entered (verification window). However, depending on the moment an intruder starts using the system, they can be logged out after typing less than that, especially if they have a significantly different typing pattern from the authorized user.  Over time, we will reduce the minimum number of characters required for each verification window while still maintaining the algorithm efficacy, which is currently greater than 99%.  

Can I set different security levels in TypeWATCH?

Yes, if that feature is allowed by the system administrator. Choosing security levels can be done in the Options menu and by doing so the user can increase or decrease the sensitivity of protection. 

How can I pause TypeWATCH? Is that possible?

Yes, but only if that feature is allowed by the system administrator. The pause can be done in the Options menu and the user can choose an interval of time and a reason for pausing TypeWATCH.

Is the profile roaming? I.e. If a colleague were to log into my computer legitimately, can she still use the computer using her own profile? Or will she be logged out, because the profile on the machine is tied to me?

Yes. The user profile is roaming. It is connected to the user login which is entered, and will be available in any domain that the machine logs into.  

Will there be a "Mouse" Dynamics and if so, when is the projected timeframe?

We are into the R&D phase of our “Pointer Dynamics” technologies, which includes the usage of both pointing devices such as a computer mouse as well as touch screens. We believe that this will be a significant enhancement to TypeWATCH in the future.  

Does the analyzed keystroke data contain the actual password or string being analyzed?

No. TypeWATCH starts validating the user keystroke data, right after the user logs on. The system does not record strings or text typed by the user. 

Is the output of the TypeWATCH analysis binary (pass/fail) or a gradient score?

In some way can be considered a gradient score because there are, at the moment, 3 different intrusion levels (yellow, orange and red). 

Does TypeWATCH analyzes the logon/password, do continuous validation, or both?

TypeWATCH only does continuous validation after the logon. There is no password analyzer. That is why TypeWATCH does not replaces user authentication. It is a method to validate the user digital identity after login

Does TypeWATCH require an active enrollment session, or does it have a passive enrollment option?

Passive, in the sense that the user does not need to do anything to enroll. 

We use cookies to deliver and improve our services as well as show you content based on your preferences. By using our website, you agree to this use of cookies, detailed in our Privacy Policy.