Stealing Identity of the user is a crime in which hackers does the unauthorized activity under the stolen identity by using credentials such as passwords, usernames etc. User verification system provides security layer in addition to username and password by continuously validating the identity of the logged-on user based on their behavioral and physiological characteristics. We introduced a novel method that continuously verifies the user according to characteristics of their interaction with the mouse. The research contribution is in two parts. First, user signature is created according to the user's interaction with mouse while he is doing some predefined activity such as, drawing any alphabet or his signature on canvas application and it gets stored in a database and used for verification purpose. In the second part design hierarchy, to generate a user signature for the current session is discussed. The paper also discusses a decision making system to take decision about to continue the log in or log out from the system based on matching of his current signature and previously created signature. The system developed gives better verification accuracy by reducing the response time of the system. Currently most computer Systems and online websites, identifies by means of user names and passwords/ PINS. But normally hackers can easily steal the password with the help of so many techniques. Some of the techniques are phishing attacks, key logger and so on. Also sometimes a users computer remains unlocked at that time hackers can install the key logger in users computer or by sending some links to that computer, Ex. Greetings or some images etc. if user clicks on that link key logger installs on that computer, it records every keystroke including passwords, usernames, screen shots after 5-5 minutes. Also they can send that hacked data to hackers without knowing to user. The drawback of normal identification methods that only based on credentials lead to the introduction of user authentication and verification techniques that are based on behavioral and physiological biometrics which are assumed to be unique to each other and hard to steal. Authentication is performed once during the login while verification is performed continuously throughout the session. Identity Verification can be achieved by using one of the two techniques, either by Behavioral biometric system or Physiological Biometric system. The behavioral biometric feature includes characteristics of interaction of user and input devices such as mouse and keyboard. And physiological biometric use the human feature that is unique to individuals. For Examples: fingerprints, iris patterns, face, blinking patterns, lip movement, gait/stride, voice/speech, signature/handwriting etc.