BEHAVIORAL BIOMETRICS

Data Fusion.png

DATA FUSION

All available observations are fused together to generate a data set for each user that characterizes their behavior. Background motion and location as well as phone interaction characteristics make up the core input streams.

deep-learning.png

DEEP LEARNING

Deep neural networks are trained on these data streams to find the key aspects that distinguish this user from all others. Where someone carries a device, the length of their stride, the difference in behavior from home to work, all of these parameters are taken into account.

Behavioral Detection.png

BEHAVIOR DETECTION

The same fusion and learning methods are also used to identify key events that coincide with fraudulent behavior. Understanding and detecting when devices change hands gives special insight into fraudulent activity.

OUR TEAM

We are a young and hungry international team made up of world renowned-machine learning experts, data scientists and software engineers.

Learn More

JOBS

We're always looking for people who are passionate about the intersection of machine learning, mobile data and human behavior. 

Learn More

rawpixel-com-310778-unsplash.jpg
 

FRAUD PROTECTION

aacount takeover.png

ACCOUNT TAKEOVER

Verify not only that requests are coming from a user device, but also that the requesting person is actually your user. Devices and software can be spoofed or emulated, but human behavior characteristics can't.

social engineering.png

SOCIAL ENGINEERING

Making a user type a password or thumbprint creates friction. TwoSense allows ID to be verified without explicit action on the user's part. Reduce friction, but maintain security.

multiple-locations.png

MULTIPLE LOCATIONS

Verify user location, call placement, and ID of callees as soon as the call hits your system. If everything checks out, authentication is frictionless. If there are any discrepancies, your team is alerted to proceed with caution.

 
 

Once you use two-factor authentication, you go through more hoops, you're more aware of security, you're spending a certain amount of time each month [on it]. […] In the future we need to make the secure systems easier to use. Getting a nice user interface to a secure system is the art of the century.

Tim Berners-Lee

Inventor of the World Wide Web

 

 
jose-martin-ramirez-c-651-unsplash.jpg