Behavioral Authentication · since 2007

AI may steal your identity.
Take it back.

We identify people by how they type, move, and act. Not what they remember. Not the device in their hand. Not data we ever collect about them.

The Fourth Factor

Something you do.

Three factors verify an artifact. The fourth verifies the act.

A ledger

Since the 1980s, authentication has asked the same three questions. Each verifies something separable from the person. Each one can therefore be taken.

We built software that measures the performance of an action and matches it to the person producing it. The credential is the doing. It cannot be remembered, stolen, or handed off.

01
Know A password
Something the person remembers.
It can be copied, guessed, or phished.
02
Have A phone or key
Something the person carries.
It can be lost, stolen, or handed off.
03
Are A fingerprint
A static body feature.
It can be cloned from a surface or photograph.
04
Do A performance
How the person acts in the moment.
Being, in fact, that person.
— Positioning
Know who you are in touch with.
Use Cases

Six places the signal already works.

UC·01 / Security

Password-less login that can't be phished.

The credential is the performance. Replaying a stolen password fails because the person typing isn't the one who set it.

  • Windows Credential Provider deployed
  • No password store to breach
  • Continuous re-verification during session
UC·02 / Authorship

Prove who actually wrote the document.

Every essay, form, or report carries a signature in how it was written. AI cannot fake the performance that produced it.

  • Academic integrity verification
  • Fraud and ghostwriting detection
  • Runs silently during normal typing
UC·03 / Controls

Parental consent that can't be handed off.

A child cannot perform as the parent. A verified gatekeeper approves access, and the system detects substitution instantly.

  • COPPA-compliant consent workflow
  • No personal data collected on minors
  • Substitution detection during use
UC·04 / Provenance

Cryptographic signature for what was posted.

A post, comment, or data submission carries the performance of the person who produced it — verifiable after the fact.

  • Chain-of-custody for user-generated content
  • Synthetic-content rejection at the source
  • Audit trail without storing the author
UC·05 / Medical

Catch neurological drift before symptoms show.

Changes in typing rhythm correlate with cognitive decline and post-concussion recovery. The keyboard becomes a daily clinical instrument.

  • Longitudinal cognitive baseline tracking
  • Concussion return-to-play assessment
  • Passive, continuous measurement
UC·06 / TickStream®

Windows login without a password at all.

A Credential Provider that replaces the Windows login with a cadence-authenticated sign-in. Nothing to remember, nothing to phish.

  • Native Windows Credential Provider
  • Zero-training enrollment in under a minute
  • Silent continuous re-verification after sign-in
Method

Read the signal. Verify the performance.

Three measurements. One identity.

The system observes three physical signals during any normal interaction: how long a key is held, how long before the next key, and how the body steadies the device. Each signal is noisy alone. Together they form a signature.

  1. 01 Observe Dwell, flight, pressure, and motion captured while the person performs a normal action.
  2. 02 Compute A Euclidean performance score is calculated against the person's stored baseline, on-device.
  3. 03 Decide Below threshold: continue silently. Above threshold: interrupt, log, or step up. No data leaves.
TYPING CADENCE · 1200MS WINDOW "know who you are in touch with" — BASELINE — IMPOSTER LIVE EUCLIDEAN 0.034 ✓ MATCH
Portfolio

The moat is in the filings.

US 9,450,971
Device- and method-based identity verification via behavioral analysis of input signals.
2016
US 9,785,765
Continuous authentication system using keystroke dynamics over an active session.
2017
US 10,229,255
User verification based on typing cadence on a touch-input device.
2019
US 10,489,577
Identifying an author of a document from physical measurements of production.
2019
US 10,956,558
Methods and systems for behavioral biometric authentication without stored PII.
2021
US 11,314,860
Credential provider for logon using behavioral performance in lieu of password.
2022
US 11,789,041
Detecting cognitive state change from keystroke distribution drift.
2023
Integrations

No new stack. Drops into yours.

Six drop-in adapters. No new identity provider. No rip-and-replace. The credential flows through the tools already running in the environment.

01
Credential Provider
Windows 10 · 11
Native logon replacement, MSI-installed.
02
SAML 2.0 / OIDC
Any federated IdP
Drop-in step-up module. Weeks, not quarters.
03
Web SDK
Any browser
One script tag. No changes to existing forms.
04
Mobile SDK
iOS · Android
Touch, cadence, and motion on-device.
05
LMS Extension
Canvas · Blackboard · Moodle
Exam and assignment authorship verification.
06
REST API
Everything else
JSON in, verdict out. Server-to-server.
Team

The people behind the filings.

Founder / CEO
John D. Rome

Signal-processing researcher. Named inventor on 24 of the company's 27 issued patents. Previously at Trident Systems.

LinkedIn
Co-Founder / COO
Tom Ketcham

Enterprise deployment, federal contracts, government compliance. Former DHS program manager.

LinkedIn
Chief Scientist
Dr. Mara Liang

Behavioral biometrics PhD (CMU). Author of the Euclidean scoring model used in TickStream.

LinkedIn
Head of Engineering
Samir Walia

Twenty years shipping credential-provider code. Led Windows integration team from v1 through v6.

LinkedIn
General Counsel
Patricia Schwegman

IP strategy since inception. Drafts every patent before filing. Partner, Schwegman Lundberg & Woessner.

Firm page
Medical Advisor
Dr. Hal Greenberg, MD

Neurologist. Co-authored the concussion-recovery paper that validated the medical signal in clinic.

LinkedIn
Contact

When you have to know— for sure.

Watch the signal in thirty-five seconds.

A live demo of TickStream replacing the Windows login. No slides. No sales pitch. Just the product running.

Enterprise inquiries

sales@intensityanalytics.com

Mailing

Box 288 · 3879 E. 120th Avenue
Thornton, CO 80233-1658