User experience guidelines for designing a consumer-facing
product leveraging Continuous Authentication.
Sudden changes in your expected behavior like type of browser, surfing speed, and time on page may indicate fraud or a security breach.
Your typical device, location, and internet connection are the main indicators of your identity.
Use your account history to your advantage. We analyze your shopping patterns to flag purchases you don't typically make.
Your typing speed, device orientation, and other patterns of use are unique to you, and can make sure someone else isn't using your device.
What is Continuous Authentication?
View an explanatory video.
Guidelines by Customer Journey
Use Continuous Authentication in Practice.
Guidelines by Topic
Explore the foundational concepts of Continuous Authentication.