When a user logs in to a system or requests access to a new resource, their behavioral patterns are compared to the model. Is the user logging in from an expected IP address? Do their keystroke dynamics match the user's typical patterns?
User behaviors are scored based on how anomalous or unusual they are. Requests can be automatically granted, flagged or blocked based on score thresholds set in the security system.
Identity verification is usually not based on behavioral biometrics alone. Rather, behavioral biometric factors are commonly used as part of an adaptive authentication system, which changes authentication requirements based on security context. For example, if a user logs in from their normal IP address—a behavioral biometric—they might need to enter only a password. But if they log in from an unexpected address, they might need to enter a password and a fingerprint scan.
Behavioral biometrics is also used in continuous authentication and monitoring tools, such as user behavior analytics (UBA) systems. These track user activity patterns at all times, even beyond logins and access requests. If a user deviates from the norm at any time during a session, a UBA can alert the security team.