Latest Tweets
  • No public Tweets found
Recent Comments

    Behavioral Biometrics

    The definitive plurilock guide

    From Morse Code to touchscreens

    A brief history of key events and developments in behavioral biometrics

    Behavioral Biometrics: Chapter 2

    1940s

    Behavioral Biometrics History: Morse Code

    Morse Code AUTHENTICATION IN WWII

    The earliest form of behavioral biometrics dates to World War Two. During the war, Allied forces became adept at recognizing one another based on individual signaling patterns, using these to authenticate sensitive messages.

    1959

    Behavioral Biometrics History: Mind

    Machine Learning Gets Its Name

    Artificial intelligence pioneer Arthur Samuel gives this name to a theoretical computer’s ability to learn on its own, without human intervention—a capability that would someday become critical to behavioral biometrics.

    1960s

    Behavioral Biometrics History: Xray

    First MODEL OF acoustic Speech Production

    MIT Drs. Gunnar Fant and Kenneth Stevens first model speech production using x-rays of speaking subjects. Their findings are the first suggest a link between behavior—in this case, speech—and individual biology and identity.

    1970

    Behavioral Biometrics History: Speech

    Behavioral Components of speech MAPPED

    Dr. Joseph Perkell creates an early form of biometric modeling using full-motion x-rays and the previous work of Drs. Fant and Stevens. This work would eventually lead to the biometric voice recognition tools still in use today

    1991

    Behavioral Biometrics History: WWW

    Birth of the world wide web

    Computer scientist Tim Berners-Lee invents the World Wide Web (WWW) As the world’s first publicly accessible way of visiting web pages via hyperlinks, the WWW would lead to the eventual development and popularization of the Internet as we know it today.

    2001

    Behavioral Biometrics History: Search

    I dream of big data

    Tim Berners-Lee dreams up a new technology, called the ‘semantic web’ where computers are able to scan and analyze all data available on the Internet.

    2001

    Behavioral Biometrics History

    Sept 11th and Continuous Authentication1

    In a now highly-networked world, the the September 11th, 2001 attacks on the World Trade Center draw attention to the need for continuous authentication as a new security measure in global information systems.

    2002

    Behavioral Biometrics History: Big Data

    DATA MINING AND BIOMETRICS CONVERGE

    The U.S. Defense Advanced Research Projects Agency (DARPA) launches Total Information Awareness (TIA), the first large-scale use of technologies designed to mine data sets for identifying biometric information.

    2006

    Behavioral Biometrics History: Plurilock

    EARLY PLURILOCK RESEARCH

    A University of Victoria team develops innovative new algorithms that rapidly and transparently identify computer users as they work. This team will later become Plurilock, and the algorithms will later be patented.

    2012

    Behavioral Biometrics History: AA

    Darpa Launches active Authentication Program

    In pursuit of increased security across devices operated by the U.S. military, DARPA launches the Active Authentication (AA) program—the first widespread application of behavioral biometrics authentication.

    2016

    PLURILOCK IS FOUNDED

    2006–2016

    After 35,000 hours of research, development, and algorithm refinement by top Ph.D scientists (who literally wrote the book on Behavioral Biometrics) Plurilock emerges as a major player in the authentication scene

    2016–Present

    Plurilock is officially founded and launches its AWARE and DEFEND products using now patented algorithms to bring continuous authentication to highly-regulated environments like government, critical infrastructure, financial services, and healthcare.

    1. Traore, D., and Ahmed, A. 2012. Continuous Authentication Using Biometrics: Data, Models, and Metrics. University of Victoria

    PLURILOCK IS THE LEADER IN IDENTITY ASSURANCE USING BEHAVIORAL BIOMETRICS

    Plurilock delivers preventative, instantaneous, and continuous solutions for workplace authentication and regulatory compliance. Plurilock’s BioTracker software provides invisible authentication for endpoint detection and response (EDR) and behavioral biometrics-based user behavior analytics (UBA). These features enable transparent second-factor authentication and continuous identity verification for financial services and healthcare organizations.

    Follow

            

    Contact Plurilock

    Have a question or comment?