I-Check Student Verification

I-Check Student Verification

With education increasingly moving online, it is now more important than ever to verify that the correct person is doing the work. CPaT’s I-Check can recognize people by the way they type, using a person’s Behavioral Biometrics to verify a student’s identity. We call this Enhanced Multi-Factor Authentication. Behavioral Biometrics are identifiable, unique characteristics about someone’s behavior. Completely based on typing style, CPaT’s I-Check creates an I-Check Digital Identity for the student by evaluating how a few words are typed on a keyboard. CPaT’s I-Check provides a reliable and secure verification approach that is Private and GDPR Compliant.

How I-Check Works

I-Check recognizes people by the way they type utilizing behavioral biometrics to verify a student’s identity – we call this Enhanced Multi-Factor Authentication. Behavioral biometrics are identifiable, unique characteristics about someone’s behavior. Completely based on typing style, I-Check identifies the student by evaluating how a few words are typed on a physical or digital keyboard.  Here is how it works:

• When I-Check Student Verification is enabled on a client’s learning management system, administrators may identify a curriculum or course as requiring student verification.

• If verification is required, when a student logs into the curriculum or course for the first time, they are prompted to enroll in I-Check. This enrollment process is completed once when using a computer with a keyboard and a second time for using a mobile device.

• When a student launches a lesson that requires student verification, they are prompted to type a verification phrase. The data is captured for comparison against the student’s previously saved typing biometric.

• The student is always prompted to verify their identity when launching a course, but additional prompts may be done at completion of, or intervals during, the course.

• I-Check provides a report that allows administrators to identify users who have questionable verification matching scores. The administrator is then able to investigate the questionable student and validate or invalidate the training. This allows administrators to manage the verification exceptions quickly and efficiently while not having to spend any time on students who have high verification scores.

i-check learning

I-Check Power

• I-Check is Reliable. With easy verification of a student’s typing behavior, verification can be captured on any device. All that is needed is the device and the student. These verifications are captured and retained for future analysis allowing for replicable and confirmable results and improved understanding of unique individual situations.

• I-Check is Practical. I-Check requires no special user training or instruction to implement. I-Check can be accessed by students in both online and offline environments on computers, tablets and mobile devices running Apple IOS or Google Android. No additional hardware purchases are required. I-Check leverages technology already contained in the CPaT Approach LMS and CPaT Mobile App making it cost effective and very easy to implement.

• I-Check is Efficient. I-Check is exception-based. Rather than requiring administrators to review vast amounts of data, I-Check proactively highlights potential verification issues for further analysis and allows for the addition of supporting evidence within the application. Investigations can be easily resolved or be escalated for further consideration.

• I-Check is Private. We also know that privacy and protection of Personal Data are significant priorities for airlines and students. I-Check is compliant with GDPR requirements. Further, since I-Check utilizes the typing pattern for a specific phrase, this specialized information is not useful outside of the I-Check system. Finally, I-Check utilizes enterprise-level security protocols and does not record what is typed, only the way that it’s typed. Student information is safe with I-Check.


I-Check Score

I-check score

The I-Check Score provides administrators a detailed analysis of I-Check verifications. With this report, the administrator can evaluate the confidence level of the student verification and examine the four base factors that go into the I-Check Score: password resets, BioCheck enrollments, location changes, and BioCheck verifications. Combining this information with a detailed report of current and past BioCheck validity results, administrators can investigate and resolve questions concerning student identity.

TypingDNA logo

CPaT delivers I-Check in collaboration with TypingDNA. Since 2014, TypingDNA has provided biometric identification systems to many industries including banking, finance and education. Utilizing TypingDNA’s technology, CPaT’s I-Check verifies that the correct pilot is at the computer screen doing their training. When student’s enroll, I-Check records their behavioral biometric profile consistent with TypingDNA guidelines. When student’s are verified, I-Check captures a new typing pattern for comparison against the existing profile. Further, previous typing patterns are retained for future use and analysis.

TypingDNA is a cyber security company that develops proprietary, AI-based behavioral biometrics technology. TypingDNA focuses on typing biometrics (a.k.a. keystroke dynamics), identifying users based on how they use their keyboards. Flight and dwell times, the time needed to find a key and the time needed to press a key, are measured for a text that is only a few characters long. This allows I-Check and TypingDNA to complete real-time verifications.

TypingDNA’s typing biometrics and I-Check allow airlines and their students to be protected against account take-overs and user fraud without burdening the student’s experience. Through innovation, we are rewriting the rules of how students are verified and how airlines document those validated training events for their authorities.

Don’t Make the Wrong Choice for
Student Verification

Username/Password

Passwords Are Easily Stolen

No matter what countermeasures are in place, login credentials are periodically stolen or compromised. This endangers systems, data, and the entire company.

I-Check can be used to ensure that the person attempting to use a system has been legitimately validated to train.

Password/Account Sharing

The informal sharing of named accounts is a common security risk. I-Check can differentiate between intended users and everyone else. Substitution of one user for another, without prior knowledge or consent, is both common and risky, particularly in training environments. Typing DNA algorithms can ensure that the person actually using a system is the person presumed to be using it.

User Carelessness

Even the most conscientious users may inadvertently leave workstations unattended or unlocked before stepping away. Using periodic verification, I-Check can identify the arrival of a new, unauthorized user rapidly.

Facial Recognition

Privacy Issues

Facial Recognition software creates large volumes of sensitive personal information.   This information can be hacked creating a significant liability and threat to your airline.  I-Check records typing behavior that cannot be directly associated with the person who generated it. So, the user’s identity stays with the person, protecting privacy and risk from hacking. 

Expensive to Maintain

Facial Recognition systems require large amounts of data storage needed for the vast amount of personal information being captured.  This data is expensive to maintain and secure also making General Data Protection Regulation (GDPR) compliance difficult.  I-Check does not store identifiable personal data reducing expenses and increasing compliance.

Facial Recognition can be Unreliable

Facial Recognition software can struggle to identify different genders and results may differ by race and ethnicity. Outcomes may also vary on environment and obstructions, such as facial hair or hats, can cause recognition issues. I-Check is highly accurate using Enhanced Multi-Factor Authentication.

Fingerprint Scan

Requires Expensive Physical Hardware Most computers and mobile devices are not set up for fingerprint scanning.  This requires the airline to purchase hardware  or software for each user to be verified.   I-Check looks at the way students type and interact with the keyboard device that is already a part of their computer or mobile device.

Create Significant Liability

All physical biometrics, such as fingerprints, Iris and facial scan data is susceptible to hacking and security breaches. Since a physical biometric reveals part of a user’s identity, if stolen, it can be used to falsify legal documents, passports, or criminal records, which can have great consequences for and airline.  Since I-Check does not store any physical biometric data, it is a much safer choice for student verification.

Low User Acceptance

Studies have shown that employees are reluctant to allow companies to store their fingerprints for company use.   This creates tension and anxiety within the workforce especially if data security is an issue.  I-Check only records a person’s typing pattern to create their digital identity reducing employee concerns of loss of personal information.

The Data

Supporting Studies: