If you have a process running continuously on the device to evaluate trust, that process itself should be able to obtain a hardware id unique to the device, and that’s the real trust id. The device is the key. The typing speed and camera should just be used to confirm that the device isn’t likely stolen.
1 Like