Behavioral Biometrics History, Applications, and Technology
From Morse Code to touchscreens
A brief history of key events and developments in behavioral biometrics
Morse code authentication in WWII
The earliest form of behavioral biometrics dates to World War Two. During the war, Allied forces became adept at recognizing one another based on individual signaling patterns, using these to authenticate sensitive messages.
Machine learning gets its name
Artificial intelligence pioneer Arthur Samuel gives this name to a theoretical computer’s ability to learn on its own, without human intervention—a capability that would someday become critical to behavioral biometrics.
First model of acoustic speech production
MIT Drs. Gunnar Fant and Kenneth Stevens first model speech production using x-rays of speaking subjects. Their findings are the first suggest a link between behavior—in this case, speech—and individual biology and identity.
Behavioral components of speech mapped
Dr. Joseph Perkell creates an early form of biometric modeling using full-motion x-rays and the previous work of Drs. Fant and Stevens. This work would eventually lead to the biometric voice recognition tools still in use today
Birth of the world wide web
Computer scientist Tim Berners-Lee invents the World Wide Web (WWW) As the world’s first publicly accessible way of visiting web pages via hyperlinks, the WWW would lead to the eventual development and popularization of the Internet as we know it today.
I dream of big data
Tim Berners-Lee dreams up a new technology, called the ‘semantic web’ where computers are able to scan and analyze all data available on the Internet.
Sept 11th and continuous authentication1
In a now highly-networked world, the the September 11th, 2001 attacks on the World Trade Center draw attention to the need for continuous authentication as a new security measure in global information systems.
Data mining and biometrics converge
The U.S. Defense Advanced Research Projects Agency (DARPA) launches Total Information Awareness (TIA), the first large-scale use of technologies designed to mine data sets for identifying biometric information.
Early Plurilock research
A University of Victoria team develops innovative new algorithms that rapidly and transparently identify computer users as they work. This team will later become Plurilock, and the algorithms will later be patented.
DARPA launches active authentication program
In pursuit of increased security across devices operated by the U.S. military, DARPA launches the Active Authentication (AA) program—the first widespread application of behavioral biometrics authentication.
Plurilock is founded
After 35,000 hours of research, development, and algorithm refinement by top Ph.D scientists (who literally wrote the book on Behavioral Biometrics) Plurilock emerges as a major player in the authentication scene
Plurilock is officially founded and launches its AWARE and DEFEND products using now patented algorithms to bring continuous authentication to highly-regulated environments like government, critical infrastructure, financial services, and healthcare.
- Traore, D., and Ahmed, A. 2012. Continuous Authentication Using Biometrics: Data, Models, and Metrics. University of Victoria
Stay informed. Join our low-volume mailing list for Plurilock and cybersecurity news and updates.
PLURILOCK IS THE LEADER IN ADVANCED AUTHENTICATION
Plurilock Lead Capture Block
Welcome to Plurilock!
We’d love to hear about your interest in our products.
We'd like to provide you with more info. How can we reach you?
|*||By submitting this form, you agree to receive periodic news, updates, and offers from Plurilock.|
© 2020 Plurilock. All Rights Reserved.