SHOW YOUR Aydii™ TO ENTER

Aydii™ is a simple, and highly effective, software solution for security, license protection and user identification. Our patented technology is scalable from a single home user to corporate and government enterprises. Look for announcements about the launch of Aydii Personal™ and Aydii Business™, coming soon to a computer near you.

Sign me up for Aydii™ product news.

WHAT IS Aydii™

We have bundled our patented technology into a system that takes traditional password authentication security to a whole new level, revolutionizing the industry. Did you know the way you type is as unique as you are? With Aydii™, users must enter the right password and type it correctly based on their previously established individual stored keystroke signatures. It is called "Keystroke Dynamics," and it is a really big deal.

Our system is a revolutionary and foolproof security mechanism and it is all patented under "Key Sequence Rhythm Recognition System and Method"

HOW DOES Aydii™ WORK

Keystroke Dynamics, or "typing rhythms," is a biometric identification system that analyzes the behavior of a user when typing on a computer keyboard. Aydii™ uses this method to measure “dwell time” (the amount of time a person spends pressing a key) and “flight time” (the time it takes for a person to move his or her finger from one key to the next). Everyone's is different, from hunt and peck to sophisticated typists. In nearly an instant, Aydii™ compares stored keystroke signatures to determine if the person logging in is an authorized user or an impostor.

Share Aydii TM with a friend.

FAQ

The following Frequently Asked Questions are some of the more common questions our clients generally ask.
We look forward to having a discussion with you. For a demonstration of our product, click here.

IS THE TECHNOLOGY PATENTED?

Yes. Key Sequence Rhythm Recognition System and Method.
US 7,206,938 B2 issued April 17, 2007
US 7,802,103 B2 issued September 21, 2010

604-850-3294

Yes, keystroke dynamics technology is proven daily in live online applications. People across the web are using AydiiTM on our customers’
websites every day. It is statistically impossible to breach a system that has AydiiTM installed.

WHAT ARE KEYSTROKE DYNAMICS?

Keystroke dynamics, or typing dynamics, refers to the detailed timing information that describes exactly when each key was depressed and
when it was released as a person is typing. They are known as a behavioral biometric, or performance biometric.

3232334721

Yes. Typing patterns are as unique to people as their fingerprint or retina.

(669) 205-7614

Our customers are businesses that provide information or experiences online. They come to us for a solution to the following problems:

1) Online Cheating – students or professionals giving their user name/password to someone else to take a test for them.

2) Quiet Fraud – sharing logon credentials for access to paid content.

3) Malicious Fraud – phishing & other hacker type fraud.

4) Legal Requirements – mandated use of multi-factor authentication.

HOW DOES IT WORK?

AydiiTMuses Keystroke Dynamics to analyze the way users type their password. We use that analysis to identify a real user from an imposter.
We often use the analogy of throwing darts to help explain our technology. What we do is measure the way a user types their password (the dart)
and compare (throw) it against their password signature (the dart board), or a set of previously typed samples. When the patterns match, the user
gains access (a bull’s-eye).
By matching typing patterns, we are able to add a layer of security that protects our customers (web based information or service providers)
and their customers (the end users).

DO YOU WATCH EVERY KEYSTROKE ALL THE TIME?

No, we only monitor passwords.
Most typing rhythms are random, which means they have no patterns. However, with certain words and small phrases people unconsciously
develop consistent patterns due to muscle memory. This is especially true with frequently typed words, like passwords.

IS AydiiTM A FORM OF STRONG AUTHENTICATION? IS AYDII A FORM OF TWO-FACTOR AUTHENTICATION?

AydiiTM is one of the strongest methods of user authentication.

There are four ways to authenticate someone’s identity online:

1. Something the user knows (e.g. user name, passwords, PINs)

2. Something the user has (e.g. smart-cards, tokens, RFID badges)

3. Something the user is (e.g. finger scans, facial, iris recognition)

4. Something the user does (e.g. voice recognition, typing patterns)

“Strong” means passwords, #1, paired with either #2, #3, or #4.
The combination of passwords with something else (another factor) constitutes “Strong” in generally accepted definitions.
AydiiTM is 2-factor strong authentication (#1 knows and #4 does).

9039802725

This does happen, but not very often. It has been our experience that real users miss their password signature at about the same rate that
they misspell their password. In most cases, if a person misses their rhythm, just like with a typo, they are re-prompted and most-likely “hit”
the second time.
In most cases, users miss because they are either tired or fatigued, have a cut on their finger or are in a different state of mind,
perhaps from drinking alcohol. It is extremely rare for a user to not be able to gain access through the AydiiTM solution.

WHAT DO YOU MEAN BY PERFORMANCE/BEHAVIORAL BIOMETRIC?

It means we ask our user to do something and measure their performance. It is similar to a normal biometric because it is something inherent
to the user. However, it is a performance, so if a password is lost, stolen, or otherwise compromised it can easily be changed unlike an iris scan
or fingerprint...users only have one set of those.

6822214220

Yes. AydiiTM works across keyboards and platforms. Users’ patterns translate from home desktops to work laptops inherently.
Where users can develop consistent patterns, we can measure them.

WHAT IF I CAN’T TYPE?

AydiiTM does not require touch-typing or any specific typing skills.
All we need is consistent patterns, which occur among users of all typing skills. In fact sometimes “hunt and peck” typists develop their trustable password more quickly than “touch typists”.

peachlet

No. Our job is to help make them safer to use. Passwords are still the gold standard for authenticating online users. But AydiiTM solves the issue
of password compromises when hackers get into company databases. Even if an imposter has your password, they still can’t access your account
because the WAY you type your password is unique to you.

The problems with passwords are:

A. Anyone who learns a password can use it to logon.

B. To combat (A), many organizations force frequent password changes, which results in making them hard
to remember and often difficult to type.

AydiiTM addresses both these issues. With our technology only the real user can perform his/her Password Signature.
Additionally, AydiiTM gets stronger with time so mandatory password changes are no longer necessary, from
both the security and legal points of view.

DOES AydiiTM REQUIRE ADDITIONAL HARDWARE?

No additional hardware is needed to run AydiiTM.

DO USERS NEED TO BE TRAINED TO USE AydiiTM?

NO. Users do what they are used to doing – they type their username and password.

WHAT BROWSERS DOES AydiiTM WORK ON?

ALL. AydiiTM uses HTML5, which is supported on all browsers.

202-215-4790

ALL. We find consistency in users across new, old, ultra-mobile laptops and desktops alike.

WHAT HAPPENS AFTER MULTIPLE INVALID ATTEMPTS?

This is completely up to our customers’ discretion.

A user trying to logon with the wrong password is different from a user with the correct password and the wrong Password Signature.
In the latter case, we recommend alerting rather than lockouts. Alerting can reveal impostor activity or password sharing while it is occurring.
Account lockouts are a top reason for help desk calls, which AydiiTM helps minimize with easier to remember passwords and alerting.

(639) 288-8781

There are currently two methods of creating a AydiiTM password:

1) AydiiTM — Accelerated Process
The Accelerated Process has users create a Password Signature in just a few quick entries, which typically takes 15-20 seconds. Once registered,
AydiiTM continues to auto-tune to their signature.

2) AydiiTM — Transparent Process
The Transparent Process unobtrusively enrolls users. In this model users continue to log on normally, as always. AydiiTM observes each password
entry and silently builds a profile unique to the user. Once a user demonstrates consistent muscle memory, AydiiTM automatically activates
trustable verification. A byproduct of this approach is that shared passwords show up as failures to enroll. This helps organizations enforce
password policy compliance.

IS IT EASY TO IMPLEMENT?

Integration into customer’s existing application is extremely easy and quick. Simply embed our control into the existing logon form.

(559) 233-3911

It is FREE. You can complete the online demo at no cost. We don’t ask to get paid until you have your first paying customer.

469-865-3590

Yes. We have enterprise products based on the same technology. We support SSO, VPN, Web Portal access and more.