New approach to biometric authentication in the digital age.

Biometrics
+1 (917) 498–3639
ID R&D combines a unique vision for a new authentication experience with the capabilities of a leading R&D team in the global biometric industry. ID R&D is focused on developing new and exciting authentication technologies that increase the security of interactions in the digital world with improved user experience. ID R&D has developed a portfolio of biometric technologies (including behavioral biometrics) and provides R&D services to customers looking for an edge in innovation.
Company
Research and Development
ID R&D has built a unique team of scientists and technology specialists with decades of experience and excellence in the biometric field. With dozens of articles in scientific publications, numerous industry awards and a track record of success in various performance benchmark challenges, our R&D team is thriving in the fast moving field of authentication technology. Our team's expertise includes, but is not limited to, image recognition, face recognition, voice biometrics, behavioral biometrics (analysis), Keystroke Dynamics, and biometric fusion. IDR&D builds cutting-edge technologies in all common programming languages and operating systems.
In addition to developing proprietary technology, ID R&D team provides custom R&D services that allow customers to tackle any technological challenges.

RESEARCH
AND DEVELOPMENT
OMNI BIOMETRICS
Our vision: Omni Biometrics
At ID R&D we believe that the authentication process should not be driven by the choice biometric modality chosen by an Enterprise. On the contrary, authentication procedure should be driven by a customer experience and the data that can be collected through the interaction between the user and a device. Therefore the next generation of authentication solutions should be looking for available data points and providing secure authentication of the digital persona who we've all became, not by asking users to perform one particular biometric check or another, but rather by analyzing all available data to make an authentication decision. This approach calls for an adaptive solution that looks for various authentication data sets and builds an authentication score based on the available data, including face, voice, fingerprint, and behavioral biometrics or information about the device, location, Wi-Fi networks and so on. ID R&D is scheduled to release this new generation of data driven authentication solutions in 2017.
Behavioral Biometrics
Keystroke Dynamics (KSD) is a type of behavioral biometrics that analyzes the way users interact with devices, type information, and creates unique biometric signatures that provide accurate authentication. The phenomenon of a "typing signature" was discovered during World War II when intelligence services realized that they could radio operators based on idiosyncrasies of their Morse code typing patterns.
ID R&D technology
Traditional behavioral biometric methodologies (such as Keystroke Dynamics) have evolved over the years. Through the application of other techniques, such as Deep Neural Networks and Machine Learning ID R&D has developed proprietary technologies that can provide positive authentication based on the way users type in passwords or indeed any other information.
2-Factor Authentication Password
Traditional passwords provide "knowledge-based authentication", which means that a prospective intruder would only need the password to gain access. Behavioral Biometrics can allow an Enterprise to drastically increase the security of a login process without changing the user interface / expereince. KSD could provide the Enterprise security with additional biometric confidence scores on every authentication attempt, effectively turning a traditional password login into a 2-Factor Authentication.
Password reset
Forgot your password? No problem. With KSD, an Enterprise would need to remind users of their forgotten passwords and engage in costly and user-unfriendly password re-set procedures only if the user couldn't pass a KSD test. This would save resources and drastically improve the user experience without compromising the security of authentication.
Authentication
Keystroke Dynamics can address the most annoying part of the password authentication experience – the need to remember a password. With KSD based authentication, passwords can be prompted to users, so their individual "typing signatures" could provide the Enterprise with additional confidence in the identity of their customer.
Conversational Interface
Currently no security mechanisms are available within the conversational interface (chat environment) that is taking the IT world by storm. KSD could provide this capability within a chat environment, by simply asking a user to type in a password. KSD could provide an Enterprise with a confidence score that would support an authentication decision during a chat session, enabling sensitive and secure transactions right within chat!
Fraud Prevention
Current anti-fraud procedures require banks and other financial institutions to follow-up on suspicious transactions with a phone call. The vast majority of these activities are actually "honest" transactions that just happened to be outside of the consumer's typical pattern (e.g. they were traveling or used a new service). Behavioral Biometrics can reduce the number of suspicious transactions by providing additional confirmation of users' identity during a transaction request. The reduced need for such costly outbound calls provides the Enterprise with an immediate ROI.
Use Cases
USE CASES
How it works
With KSD, a behavioral biometric template is used to identify an individual based on their typing pattern,i.e. the rhythm and speed of their typing on a keyboard, along with some additional data points. The raw data used for keystroke dynamics are dwell time, flight time and some additional data points.

When a user types a series of characters, the time that they need to find the right key (flight time) and the amount of time that they hold down a key (dwell time) are specific to that user,. These values can be calculated so that they are independent of overall typing speed. Research shows that the rhythm with which some sequences of characters are typed are extremely distinctive and provide sufficient data for user authentication.

HOW IT WORKS
DWELL TIME
FLIGHT TIME
Duration that a key is pressed
Time between the release of one key and pressing of the next key
Dwell time
Flight time
ADVANTAGES
Advantages
Software only
Easy to deploy
Small footprint
Cost effective
Minimal User Training
Software only
Easy to deploy
Small footprint
Cost effective
Minimal User Training
Please follow the link to our Keystroke Dynamics demo
Please follow the link to our Voice Antispoofing demo
NEWS
Latest news
ID R&D accepted to the Citi T4I Growth Accelerator program https://www.techforintegritychallenge.com/











CONTACTS
Contact us
ID R&D Logotype
+1 (917) 498–3639
info@idrnd.net
Created by Func.