Behavioural Biometrics

The Behavioural Biometrics challenge method represents the inherence factor in SCA. This low-friction method analyzes cardholder behaviour and device characteristics to distinguish legitimate customers from fraudsters.

Inherence Factor

Analyses unique behavioural patterns and device fingerprints.

Low Friction

Invisible to cardholder-no additional input required.

Second Factor

Must be combined with another method for SCA compliance.

⚠️

Behavioural Biometrics only works for browser-based transactions. It does not support app-based transactions because JavaScript is disabled in those cases.


How It Works

Behavioral Analysis

Apata analyzes how the cardholder interacts with their device:

  • Typing patterns and speed
  • Mouse movements and clicks
  • Scrolling behaviour
  • Touch gestures (mobile)

These patterns are unique to each individual and difficult for fraudsters to replicate.

Device Fingerprinting

Apata generates a unique fingerprint using device characteristics:

  • Canvas rendering (shapes, colors, text)
  • Browser configuration
  • Hardware characteristics
  • OS and version

Each device produces consistent, unique results that are nearly impossible to fake.

How canvas fingerprinting works:

  1. JavaScript asks the device to draw shapes (circle, star, text)
  2. The exact colors, line thickness, and spacing are unique to the device/OS/browser combination
  3. The same device produces identical results each time
  4. Images are rendered invisibly with no user impact
Multi-Device Support

Apata maintains separate behavioral profiles for each device:

  • Mobile behaviour compared only to past mobile transactions
  • Desktop behaviour compared only to past desktop transactions

This ensures accurate profiling across different devices.


Configuration

Basic Settings
FieldDescription
NameUser-friendly identifier
AliasUnique identifier (alphanumeric, dashes, underscores). Cannot be changed after creation.
DescriptionOptional details about the method
Authentication Method
FieldDescription
Default Value(10) Other - reported to payment schemes
MatchersOverride auth method value based on Protocol Version
📘

Behavioural Biometrics has minimal configuration options because it operates automatically in the background during other challenge methods.


Usage Requirements

⚠️

Important: Behavioural Biometrics must be combined with another challenge method to meet SCA requirements.

Recommended combinations:

Primary MethodWhy It Works
SMS OTP + Behavioural BiometricsBest UX-SMS provides possession, biometrics provides inherence
Email OTP + Behavioural BiometricsAlternative possession factor
Static Password + Behavioural BiometricsPassword provides knowledge, biometrics provides inherence

Failure Handling

What happens if Behavioural Biometrics fails?

Failure does not block the transaction. Instead:

  1. The ACS falls back to another authentication method (e.g., KBA)
  2. This allows the system to learn and adapt to new or changing behaviours
  3. Two factors are still assessed

Common failure reasons:

  • JavaScript disabled in browser
  • Insufficient behavioral data collected
  • New device not yet profiled
  • Browser extensions interfering

Performance

Expected Performance
MetricExpected
Device Fingerprinting Accuracy90%+
False Positive Rate< 1% (industry benchmark)
📘

Performance improves over time as the system gathers more behavioral data. Accurate fraud metrics depend on Fraud Reporting from issuers.


Fallback Configuration

To configure fallback from Behavioural Biometrics:

  1. In your Challenge Profile, add Behavioural Biometrics as a second factor
  2. Click Add challenge method with fallback
  3. Configure KBA or another method as the fallback

Example flow:

SMS OTP (1st factor)
    ↓ success
Behavioural Biometrics (2nd factor)
    ↓ failure
KBA (fallback 2nd factor)

Limitations

LimitationDescription
Browser onlyDoes not work for app-based transactions
JavaScript requiredMust be enabled in cardholder's browser
Learning periodAccuracy improves as behavioral data is collected
Must combineCannot be used as a standalone method

Related Topics

  • Challenge Profile – Combine with other methods
  • KBA – Common fallback method
  • SMS OTP – Recommended primary method to pair with
  • SCA – Strong Customer Authentication requirements