Why Use Our Authentication Technology?

1
Your Style Protects You

KeyDyn accepts your typing rhythm better than a consumer fingerprint scanners accept your thumb scan. Our impostor detection works across social, commercial, and major financial applications.

2
We Recognize You

We recognize you even when you are not at your best - across devices with no extra hardware. KeyDyn automatically identifies you from both your impaired and regular typing styles.

3
We Change With You

KeyDyn adapts with you as your typing evolves. When dramatic personal changes occur, you manage a secondary authentication process directly.

4
You Are Safe

No permanent physiological or behavioral characteristics are transmitted or stored; the information used is transient, partial, password specific and safe from identity theft.

Biometric Creations specializes in keystroke dynamics, behavioral based authentication, and internet security. Your rhythm and behavior are unique.

Watch our new video!

Check it out

AT BLETCHLEY PARK DURING WORLD WAR II, TELEGRAPH RADIO OPERATORS COULD IDENTIFY THE TYPING RHYTHMS OF BOTH FRIEND AND FOE.

Over the next 50 years, there were acedemic investigations and discussions followed by numerous business attempts to capitalize on the discovery.

In 2017, Biometric Creations surpassed rigorous criteria for effective commercial use. KeyDyn achieves results more effective and more accurate than consumer fingerprint scanners.

Try Key.Dyn

KeyDyn authenticates the user more than 99% of the time, on the first try


a

Identifies imposters as imposters more than 99% of the time


Authenticates the user even when moderately mistyping

a

Authenticates the user when moderately cognitively impaired

Authenticates the user across hardware and in multiple environments

a

Learns and adapts quickly (in three samples, and over time)

Is non intrusive (users do as they always have done)

a

Assumes biometric profile will be stolen (as a password cannot be used to predict the next password, your biometric profile cannot predict your next profile)

Uses transient data to authenticate the user

a

Mitigates against attempts to simulate behavioral biometrics

Questions?

01 How is this different from a keystroke logger?

We do not store any typed characters. We use a subset of your typing rhythm and style.

02 Who is this for?

KeyDyn has military, enterprise and social media applications. Enterprise settings are ideal for corporate and financial applications. Social media settings are ideal for common internet applications.

03 If someone types my password at the same speed as me will they get in?

No. KeyDyn uses your typing speed, rhythm and style. In a population of 10,000 people your personal combination of speed, rhythm and style is generally unique.

04 What happens as my typing changes?

KeyDyn expects your typing to evolve over time and accurately tracks and anticipates your changes. In rare cases when identification is problematic, we automatically identify the issue and provide seamless secondary email authentication.

05 What happens if my hand is injured?

KeyDyn will adjust to dramatic changes in behavior, such as caused by injury, major illness, or innovative form factor changes. Radical changes may temporarily trigger self-managed secondary-authentication requests, which will stop once the new and dramatically different behavior is confirmed to be your behavior.

07 How quickly does Key.Dyn learn my typing style?

Recently we advanced how quickly a user is recognized. Previously between 9 and 16 typing samples were required. Now, we start after 3 samples.

Contact Us

mkd-team-image

Eugene Parks

CEO
mkd-team-image

Loukas Avramidis

CTO
mkd-team-image

Emma Fanning

Marketing Manager