loader image
Close
  • Use Case
    • Banking and finance
    • E-commerce and retail
    • Telecommunications and media providers
    • Administration
    • Healthcare
    • Technology and IT
  • Types of activity
    • Account sharing and device sharing
    • Employee authentication
    • Hardware-free MFA/ 2FA for clients
    • Remote working
    • Compliance with PSD2, SCA regulations
    • Anti-fraud system
    • Detection of bots and remote desktops
  • Solution
    • Behavioural biometrics
    • Device Fingerprinting
    • PureSecure
    • MobileSecure
  • Knowledge zone
    • Onepgers
    • Presentations
    • E-book
    • Webinars
    • Video
  • News
    • Blog
    • Expert texts
  • Company
    • About us
    • About BIK group
    • Privacy policy
    • European union
  • Contact
  • Use Case

    Banking and finance

    E-commerce and retail

    Telecommunications and media providers

    Administration

    Healthcare

    Technology and IT

    Account sharing and device sharing

    Employee authentication

    Hardware-free MFA/ 2FA for clients

    Remote working

    Compliance with PSD2, SCA regulations

    Anti-fraud system

    Detection of bots and remote desktops

  • Solution

    Behavioural biometrics

    Device Fingerprinting

    PureSecure

    MobileSecure

  • Knowledge zone

    Onepgers

    Presentation

    E-book

    Webinars

    Video

  • News

    Blog

    Expert texts

  • Company

    About us

    About BIK group

    Privacy policy

    European Union Projects

  • Contact
  • English
    • Polski
    • English

  • Use Case

    Banking and finance

    E-commerce and retail

    Telecommunications and media providers

    Administration

    Healthcare

    Technology and IT

    Account sharing and device sharing

    Employee authentication

    Hardware-free MFA/ 2FA for clients

    Remote working

    Compliance with PSD2, SCA regulations

    Anti-fraud system

    Detection of bots and remote desktops

  • Solution

    Behavioural biometrics

    Device Fingerprinting

    PureSecure

    MobileSecure

  • Knowledge zone

    Onepgers

    Presentation

    E-book

    Webinars

    Video

  • News

    Blog

    Expert texts

  • Company

    About us

    About BIK group

    Privacy policy

    European Union Projects

  • Contact
  • English
    • Polski
    • English

Press Release

Behave yourself – continuous authentication method presented by Digital Fingerprints

Digital Fingerprints is all about continuous authentication based on your natural behaviour. Imagine a scenario: When you come home, you use a key. Once you are in, you can do everything. Sometimes there is a second layer of protection, such as a code required to open a safe or a biometric reader next to your locker. Using keys or codes is not convenient for repetitive tasks. Imagine typing codes to access your fridge every time you want a snack. Our approach is to constantly look at the way you interact with your computer or smartphone and learn how you do things.

“During a single online session, we check several dozens to several hundreds of times if a person using your credentials behaves the way you did before. We use modern AI techniques together with stream processing in order to protect you against cyber attacks. Stolen credentials, account takeovers, frauds, identity theft are real threats, especially in the digital age. All you need to do is to be yourself and … that’s it. “
– says CEO, Mateusz Chrobok.

We all know that using credentials is not an optimal way to gain access to computer systems. Sooner or later, they might be lost, cracked or mishandled. When they are more secure, they tend to be lengthy and complex – thus hard to remember and harder to use on a daily basis. To be on the safe side, we need something more. Although the typical second-factor authentication is often a crucial step in increasing the level of security, it still requires typing codes, carrying hardware tokens and most of the time it is very inconvenient. Imagine that your bank, webmail or any other service that cares about your protection uses an invisible factor of authentication that proves your identity continuously. This is what digital.fingerprints does. We look at the way how you do things and not what you do. We care about your typing speed, not that your password is “password1”. Privacy and security are our core values in creating the business that is both ethical and secures data provided by the users. It is a part of our manifesto, available at https://fingerprints.digital/manifesto/. We are fully compliant with PSD2 Strong Customer Authentication and GDPR.

“We believe that behavioural biometrics is the way to protect you with an additional and reliable layer of security with no impact on your experience with services that embed this technology. The system studies your behaviour, stores it in the form of machine learning models and then uses it to judge whether it is you, or someone else, that tries to use your privileges.”
– says CTO, Sebastian Czarnota.

Privacy of your behaviour is directly related to the data that we process. We do not, and we never will acquire any data that is perceived as sensitive i.e. your passwords, the text that you write or what services do you use. Instead, we acquire the information on how you type, how you move through a particular service and how you interact with it. We feel that this is the way the balance between the privacy and capability to protect the users should be.

We do not use your data for any other reason than for the protection of your account. We do not sell your data to anyone. Your data is not used beyond the fingerprints.digital service. We believe that GDPR is a great way to move forward with protecting privacy of customers. We aim to provide a higher level of protection for your data and help the providers of services to protect your resources.

Our core features are:

  • Strong protection of user data & approach to privacy
  • Quick adaptation to changes in user behaviour
  • Short time from event to scoring of behaviour
  • Providing continuous authentication
  • Configurable quality of models depending on risk modelling

Talk with us about continuous authentication, Invisible multi-factor authentication, CyberSecurity, Machine Learning, Ethics in user data processing.


First bank in Poland to launch Digital Fingerprints
Next Article

Digital Fingerprints © Copyright 2022
Created by <code-One>

Use Case

Banking and finance
E-commerce and retail
Telecommunications and media providers
Administration
Healthcare
Technology and IT

Solutions

Behavioural biometrics
Device Fingerprinting
PureSecure
MobileSecure
About us
About group
EU project
Privacy policy
Contact

Digital Fingerprints S.A. ul. Żeliwna 38, 40-599 Katowice. KRS: 0000543443, Sąd Rejonowy Katowice-Wschód, VIII Wydział Gospodarczy, Kapitał zakładowy: 128 828,76 zł – opłacony w całości, NIP: 525-260-93-29

Biuro Informacji Kredytowej S.A., ul. Zygmunta Modzelewskiego 77a, 02-679 Warszawa. Numer KRS: 0000110015, Sąd Rejonowy m.st. Warszawy, XIII Wydział Gospodarczy, kapitał zakładowy 15.550.000 zł opłacony w całości, NIP: 951-177-86-33, REGON: 012845863.

Biuro Informacji Gospodarczej InfoMonitor S.A., ul. Zygmunta Modzelewskiego 77a, 02-679 Warszawa. Numer KRS: 0000201192, Sąd Rejonowy m.st. Warszawy, XIII Wydział Gospodarczy, kapitał zakładowy 7.105.000 zł opłacony w całości, NIP: 526-274-43-07, REGON: 015625240.

Zarządzaj zgodami plików cookie
Aby zapewnić jak najlepsze wrażenia, korzystamy z technologii, takich jak pliki cookie, do przechowywania i/lub uzyskiwania dostępu do informacji o urządzeniu. Zgoda na te technologie pozwoli nam przetwarzać dane, takie jak zachowanie podczas przeglądania lub unikalne identyfikatory na tej stronie. Brak wyrażenia zgody lub wycofanie zgody może niekorzystnie wpłynąć na niektóre cechy i funkcje.
Funkcjonalne Always active
Przechowywanie lub dostęp do danych technicznych jest ściśle konieczny do uzasadnionego celu umożliwienia korzystania z konkretnej usługi wyraźnie żądanej przez subskrybenta lub użytkownika, lub wyłącznie w celu przeprowadzenia transmisji komunikatu przez sieć łączności elektronicznej.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statystyka
Przechowywanie techniczne lub dostęp, który jest używany wyłącznie do celów statystycznych. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Przechowywanie lub dostęp techniczny jest wymagany do tworzenia profili użytkowników w celu wysyłania reklam lub śledzenia użytkownika na stronie internetowej lub na kilku stronach internetowych w podobnych celach marketingowych.
Manage options Manage services Manage vendors Read more about these purposes
Zobacz preferencje
{title} {title} {title}