Andy Judge

Grove Networks has been serving the Miami area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How You Handle Your Mouse Says a lot About You

b2ap3_thumbnail_mouse_authentication_400.jpgIn this day and age, a password isn’t enough to keep your accounts secure from attempted hacks. Passwords can be cracked as easily as anything. A lot of businesses have moved to two-factor authentication in order to preserve their data. There are several ways of using this for your business, but a new startup called BioCatch is developing an authentication procedure which looks at your mouse activity.

The purpose of two-factor authentication is to add an extra layer of security when logging into a device or website. Everyone is familiar with using a password to log in to their email, bank account, or social network. Two-factor authentication requires the user to know more than just the password, they have to further prove that they are who they say they are. Typically this is done by entering in a short pin sent to the user via text.

According to BioCatch, the way that a PC user uses a mouse can identify who they are. ZDNet explains:

The entire way that we use the human-machine interface embedded within each and every modern computer, browser, or website, is like a unique fingerprint. Lefties will operate a mouse differently to right-handed people, for example, and each user ‘grabs’ an icon at a different point, angle, and so on.

BioCatch can analyze the way that users use their mouse to create a profile for them. This profile is then used to determine whether or not you are who your machine says you are. It’s estimated that this method of authentication is capable of identifying and preventing fraudulent logins 80 to 90 percent of the time.

There are several variables that are taken into consideration by BioCatch’s user profiles. These variables are put into four layers of properties:

Layer One: Standard Authentication
Layer one consists of the device, network, IP address, hardware, and location - all traits that physically tie you to your PC. These are the typical authentication properties used when logging into an account. The following layers, however, take a much different approach to authentication.

Layer Two: Physical Profile
Layer two consists of mainly motion-related actions, such as moving objects around the screen, hand-eye coordination, and the mouse pointer (or finger on touch screen devices).

Layer Three: Cognitive Profile
Layer three consists of examining mental abilities, such as response time and connection time. It also looks for suspicious activity that is out of the norm. One example used by ZDnet is online banking - normally, a user would check their balance before doing anything. If a money transfer is their top priority, something might be up.

Layer Four: Invisible Challenges
BioCatch’s final layer of protection is meant to authenticate a user’s identity, but not in the traditional sense. BioCatch purposely puts problems in the way of the user in order to determine who they are. Everyone reacts to potential threats differently, and their response can be used to verify one’s identity.

Despite whether or not BioCatch’s ideas become mainstream, there’s one thing we know is certain: you need to keep yourself protected from hackers with more than just a password. Two-factor authentication might have its flaws, but it’s a better protection measure than others, especially considering how weak passwords have been recently in light of powerful, sophisticated malware.

Grove Networks can equip you with two-factor authentication methods, like SMS messages via a cell phone. Call us at (305) 448-6126 today to see what we can do for your business.

Newsletter Sign Up

Powered by ChronoForms - ChronoEngine.com

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Recent Comments

No comments yet.

Upcoming Events

No events