| Technology: | Cybersecurity - Authentication |
The solution SecureAuth requires authorization on a fingerprint (many smartphones are equipped with the corresponding scanners today), however even if authorization was undergone, a system attentively watches features of behavior of the user. For example, it can react to "atypical" clicking of keys, the movement of the cursor of a mouse and also unusual geographic location of point of entry of the user and time of the login. A system also keeps track of hardware characteristics of the device from which the user logged in.
If a number of signs demonstrates that in a system the stranger logged in (even despite the biometric scanner), to him access will be immediately blocked.
See Also
