Got a website? Improve 2FA for your users. 🚀 Replace SMS codes with better UX. Learn more

TypingDNA Chrome Authenticator

Verification codes in your browser, secured by the way you type

No need to use your smartphone to authenticate.
Get your 2-step verification codes using your typing pattern.

Get Chrome extension

Features

Typing biometrics as a security layer

TypingDNA uses proprietary artificial intelligence to analyze a user’s unique typing pattern. Your verification codes are protected by the way you type.

Sign in

Verification OTP codes in your browser

No need to use your smartphone to authenticate. Get 2-step verification codes directly in your browser.

authentication-solutions

One-click to autofill verification codes

Click the verification code in the TypingDNA authenticator to paste it directly into the required field on a webpage.

Code autofill
authentication-solutions

Secret keys vault

Securely store secret keys so you never lose access to your verification codes.

authentication-solutions

Just say Grab QR codes

Connect accounts that require verification codes with one click.

authentication-solutions

See QR codes

Easily backup secret keys on your phone authenticator app.

How it works

1

Type your e-mail and password

2

Typing pattern authentication happens in the background

3

See OTP codes. Click to autofill in desired websites

Securing your data with unique typing biometric encryption

TypingDNA employs your unique typing biometric pattern (the way you type) to create a primary encryption key for every registered user. This key is only accessible upon successful TypingDNA authentication.

This primary key, also called a “master key” is utilized for encrypting and decrypting your so called “secrets” (QR codes) which are stored exclusively on your local device. These secrets are used to generate the temporary 6-digit OTP/2FA codes required by your apps. It is advisable to maintain duplicates of your secrets and register QR codes within your mobile app as well.

It is important to note that some websites prevent texts from being pasted in the 2FA input fields from an app/extension, or even if they allow it, they will consider the code to be invalid, unless you type it char by char.

See quick guides on how to use with

authenticator authenticator authenticator authenticator authenticator
All guides

Works with

authentication-solutions authentication-solutions authentication-solutions authentication-solutions authentication-solutions authentication-solutions authentication-solutions authentication-solutions authentication-solutions authentication-solutions authentication-solutions authentication-solutions authentication-solutions authentication-solutions authentication-solutions

...and +1000 more

Frequently asked questions

Where are secret keys stored?

They are locally stored on your device.

Can I use same user account on multiple devices?

No. Your user account is stored locally on your device and it only works on the same device and in the same browser. However, you can use the same email to register on a different device. In this case, it will be considered a new/different user.

What happens if I use a different keyboard?

On very different keyboards people tend to type differently. Since a larger reject rate is expected when you switch keyboards please try to type as natural and normal as possible on different keyboards.

What is the chance of being rejected?

The chance of being rejected by our authentication systems reduces gradually as you use the authenticator. Immediately after installation and during first days of usage we do have a larger false reject rate and from time to time we ask you to type a second time (double verification). False rejects happen mostly when you type in a different/uncomfortable position, with random pauses, and at very different speeds.

Is this free?

Yes. You can use it for free.

How unique are the typing patterns?

Any two typing patterns are different, even those from the same individual. In order to perform typing biometrics authentication, you need to rely heavily on artificial intelligence technology.

What is the chance of a takeover?

For someone to be able to see your 2FA OTP codes, they need to 1. have full access to your computer/browser, 2. know your credentials (email + password) and 3. type like you. That being said, some people do type very similar. Our current false acceptance rate is similar to face recognition’s when using web cameras. For business/premium purpose we offer options to statistically have approx. 0.1% false positives.