Continuous authentication eliminates the periods of “trust” between logins during which user identity is uncertain. Any form of authentication that requires user input, for example
Practically speaking, no. While in theory the capture and replay of user activity is possible, as a real-world task such an attack would be prohibitively
Is continuous authentication a type of multi-factor authentication (MFA) or is it something else entirely?
It’s complicated. Plurilock considers all of its products to be MFA solutions, as they enable the use several identity factors to confirm identity—some combination of
Is Plurilock accuracy affected when a user is injured, ill, or begins to use new keyboard or pointing hardware?
Yes. in each of these circumstances, behavior is likely to change, and as a result, Plurilock will refuse to confirm the user’s identity. Though each
Plurilock leverages a small amount of lightweight code to gather and analyze ambient, observable data about a user that is generated as they compute. As
Plurilock authentication is invisible to users, more cost-effective, and more secure than MFA that is achieved using one-time codes delivered via SMS or authenticator apps.
Plurilock authentication is both invisible, more cost-effective, and more secure than MFA that is achieved using hardware tokens. Under ideal conditions, hardware tokens add an
Behavioral-biometric solutions are lower-friction, more difficult to fool, are more privacy-safe, and are capable of continuous authentication. While methods for defeating many traditional biometric solutions