Existing authentication techniques are vulnerable to many attacks and abuses, such as password-capturing spyware, network sniffing, social engineering and unauthorized sharing. In this context, a new identity verification technology termed continuous authentication uses behavioural biometrics to ensure that the user is not using an identity that has been highjacked or stolen.This is performed by monitoring and processing periodically biometrics infromation from human computer interactions data such as mouse movements and keystrokes.