Posted by: Pete Horadan
So I’ve laid the foundation for the idea of unique signatures, now let’s look at them in more detail.
On the access side, we start by creating a Device Signature for each machine that accesses an application. We track over 80 unique attributes of the machine, and utilize a proprietary statistical method for understanding the patterns and the evolution of change to the patter for a given machine. Using this approach, we can tell with great accuracy, which machines accessing a system are unique and create associations between devices and visitors.
Another of our algorithms—keystroke dynamics—can actually get to the individual level if required. Keystroke dynamics works in conjunction with our Device Signature, analyzing visitor-specific typing rhythms. While typing a string of characters, every person exhibits a series of keystroke timing events, or a “biometric signature.” The measurement and comparison of visitor-specific typing rhythms is called keystroke dynamics. Keystroke dynamics derives a unique Biometric Signature of the visitor—essentially enabling systems to infer individual people using the system, independent of location or system.
Accurate contextual information has been the focus of our latest technology break-throughs here at Scout Analytics. Using our experience in creating complex algorithms that produce a highly accurate device and biometric tracking, we’ve developed new algorithms that take the incoming IP address and translate that information into insights about the business or legal entity associated with the user. By linking IP address information with firmographic and geolocation data from online databases, a Network Signature is derived that can be used for segmentation of behavioral profiles.
The predictions produced by behavioral analytics are only as good as the quality of the data behind it. We’re focused on doing it right.