is a software that learns the neuromuscular speed processes between your brain and your fingers by measuring the way you type. It then clearly recognizes you from anyone else. STROKK adds a security layer that increases the security level of any password by a factor of 10,000*
adds an invisible biometric layer that can be integrated into any existing system access, from the Microsoft Windows system to an intranet or internet webpage. Users do not change anything to their login habits, while allowing a control center to transparently certify a user identity in real time. STROKK is based on the concept of behavioral biometrics, or "neuromuscular" behavior.
STROKK is a second factor authentication (2FA) in one single step, by being transparent to the user. If you already have a 2FA running on your system, then STROKK adds an additional layer and your system becomes 3FA (STROKK is compatible with most existing 2FA).
STROKK leaves random password guessing attack obsolete, and stolen credentials entirely insignificant, since successful possession of the secret key is only a mere condition of the entire authentication chain.
STROKK is ideal for National Security, Administration, Military, Banks, Oil Companies and more generally, companies with needs to identify and certify users to protect their sensitive information.
Although keystroke dynamics is governed by a person’s neurophysiological pathway to be highly individualistic, it is also influenced by his or her psychological state. As a "behavioral" biometrics, typing exhibits instabilities due to transient factors such as emotions, stress, drowsiness or early stage of neurodegenerative diseases. STROKK is developed to detect, classify, adapt and can report these states of mind.
• can be implemented without any change on user’s side, on any platform, in any language, at any level
• adds a cost effective extra layer of protection: no additional hardware is needed - detects and prevents fraudulent authentication attempts
• renders stolen credentials useless
• blocks password sharing
• certifies a user working on a company PC or server
• prevents identity theft
• might be used as forensic proof
• may allow to discover the identity of an impostor if he/she is from the same entity staff