Why Use Our Authentication Technology?
Your Style Protects You
KeyDyn accepts your typing rhythm better than a consumer fingerprint scanners accept your thumb scan. Our impostor detection works across social, commercial, and major financial applications.
We Recognize You
We recognize you even when you are not at your best - across devices with no extra hardware. KeyDyn automatically identifies you from both your impaired and regular typing styles.
We Change With You
KeyDyn adapts with you as your typing evolves. When dramatic personal changes occur, you manage a secondary authentication process directly.
You Are Safe
No permanent physiological or behavioral characteristics are transmitted or stored; the information used is transient, partial, password specific and safe from identity theft.
Biometric Creations specializes in keystroke dynamics, behavioral based authentication, and internet security. Your rhythm and behavior are unique.
Watch our new video!
Check it out
AT BLETCHLEY PARK DURING WORLD WAR II, TELEGRAPH RADIO OPERATORS COULD IDENTIFY THE TYPING RHYTHMS OF BOTH FRIEND AND FOE.
Over the next 50 years, there were acedemic investigations and discussions followed by numerous business attempts to capitalize on the discovery.
In 2017, Biometric Creations surpassed rigorous criteria for effective commercial use. KeyDyn achieves results more effective and more accurate than consumer fingerprint scanners.

KeyDyn authenticates the user more than 99% of the time, on the first try

Identifies imposters as imposters more than 99% of the time
Authenticates the user even when moderately mistyping

Authenticates the user when moderately cognitively impaired
Authenticates the user across hardware and in multiple environments

Learns and adapts quickly (in three samples, and over time)
Is non intrusive (users do as they always have done)

Assumes biometric profile will be stolen (as a password cannot be used to predict the next password, your biometric profile cannot predict your next profile)
Uses transient data to authenticate the user

Mitigates against attempts to simulate behavioral biometrics

Questions?
01 How is this different from a keystroke logger?
We do not store any typed characters. We use a subset of your typing rhythm and style.
02 Who is this for?
KeyDyn has military, enterprise and social media applications. Enterprise settings are ideal for corporate and financial applications. Social media settings are ideal for common internet applications.
03 If someone types my password at the same speed as me will they get in?
No. KeyDyn uses your typing speed, rhythm and style. In a population of 10,000 people your personal combination of speed, rhythm and style is generally unique.
04 What happens as my typing changes?
KeyDyn expects your typing to evolve over time and accurately tracks and anticipates your changes. In rare cases when identification is problematic, we automatically identify the issue and provide seamless secondary email authentication.
05 What happens if my hand is injured?
KeyDyn will adjust to dramatic changes in behavior, such as caused by injury, major illness, or innovative form factor changes. Radical changes may temporarily trigger self-managed secondary-authentication requests, which will stop once the new and dramatically different behavior is confirmed to be your behavior.
07 How quickly does Key.Dyn learn my typing style?
Recently we advanced how quickly a user is recognized. Previously between 9 and 16 typing samples were required. Now, we start after 3 samples.
Contact Us

Eugene Parks
CEO

Loukas Avramidis
CTO
