1) User Authenticates and Data is Collected
Behavioral Biometrics data is collected when the end user uses an application protected by Fraud Manager at logon and during interactions such as making a transaction. The behavior data is collected through a JavaScript component in the browser.
2) Risk Indicators Are Evaluated
Outseer Behavioral Biometrics monitors how the user enters their credentials and navigates through the session doing other interactions; it does not capture what is being typed, only how it is being done so data privacy is upheld.
A user behavioral profile is built with data including typing speed, mouse movements, device usage, and browsing habits. The profile is updated and refined on each user visit.
Advanced machine learning algorithms are used for real-time nefarious detection, to detect deviations from established behavioral norms and flag potentially fraudulent activities. This is done at both the profile and population level.
Outseer Fraud Manager also profiles the user's activity on over 100 additional risk indicators. These include signals such as device details, transactional patterns, signals from the Global Data Network and other custom risk factors.
3) Behavioral Biometrics Score Calculation
A unique Behavioral Biometrics score is produced for each user activity based on the data collected during the session and the comparison of anomalies to the user behavioral profile. This evaluates the level of threat posed from known nefarious behaviors and additionally indicates if the user was recognized as themself based on the comparison to past behaviors. This score is considered an additional signal that is considered in the overall fraud risk score, as it is complementary to the other existing signals.
4) Overall Risk Score Calculation
Additional risk signals are normalized and processed by the Outseer Risk Engine to compute an overall risk score for the user's activity. By integrating the Behavioral Biometrics score into the risk assessment, we enhance the accuracy and speed of detecting account takeover, scams and authorized push payment fraud.
6) Case Management and Analysis
The Behavioral Biometrics score and reasoning are accessible, providing additional context for investigations.