Integrating Crysp with existing systems is easy and can be completed in a matter of hours.
This verifies users’ devices using persistent identifiers that are not stored on the device but recreated on-the-fly when needed. The identifiers are created from data that may naturally drift over time with updates and other events. Device Verify keeps up with such changes to avoid the problem of false negatives common to other device fingerprinting implementations. It also provides up-to-date insights about a device’s reputation and state, including whether a screen lock is enabled and if it is jail-broken or rooted.
This verifies users based on how they enter a credential on a touchscreen or keyboard. Every user has a unique rhythm of typing, from how long a key is pressed to the time between keys. On smart devices, there is additional discernable data available from the accelerometer, gyroscope and touch sensors, such as touch pressure and size. By using only the deltas in this data, Touch Verify is able to verify how a credential is entered without actually learning the credential. There is no explicit “enrollment” required as users’ behavior can be trained invisibly, as and when they normally login.
This verifies users based on their proximity to “safe zones” created using their location history. No actual locations are stored to provide this service. Location Verify also helps detect proxies and find inconsistencies in reported locations.
This verifies users based on how they swipe a pattern on a touchscreen. In addition to touch-related sensor and timing data, it also uses swipe angles, pressure and velocities. It can verify any swiped pattern, including free-form ones drawn on a touchscreen.
This verifies users using push notifications sent to their registered mobile device or email account. Users verify themselves with one tap on their mobile device or in their email from any device.
This enables verification of fingerprints on devices with fingerprint readers. Crysp abstracts away the complexities of supporting different devices and provides a simple and consistent way of leveraging this biometric.