© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
Home / Learning Series / Cross-Device Authentication

Cross-Device Authentication

  • Author
    Nok Nok News
  • Published
    25 Jan 2023
  • 0 comments
    Join Conversation
Learning Series Video

Welcome to the Nok Nok Video Learning Series. We will look into passwordless authentication, one of the cool new technologies to make authentication more convenient, and more secure. Our focus today are Cross-Device Authentication user experiences. In the previous video, we created a passkey on a smartphone. In this video, we will see how we can authenticate a session on a laptop with this passkey.

A recent development is the Multi-Device Credential. In our previous video we created such a Multi-Device Credential on a smartphone. This credential is a kind of passkey that can be backed up from one device and stored to another. In practice, this is often enabled using trusted cloud services such as Icloud Keychain. This passkey was automatically restored to my laptop. Now I can use this passkey in my laptop to securely sign in without a password. This credential sync works across devices on the same device family. For example, all my Apple devices today. Other platforms are in the process of adding this feature as well.

There is another approach that works across device families. For example, to use a passkey on your smartphone to authenticate your laptop session. This approach lets you use your smartphone as a security key with the passkey remaining on the smartphone but being used by your laptop. To securely bind your smartphone and laptop, typically you scan a QR code shown on the laptop. Then the smartphone and laptop communicate over BLE to ensure physical proximity. Some smartphones remember the QR code binding and don’t require it for subsequent authentications.

Here is a third cross-device authentication method. This is an Out-of-Band method that works across all device families even smart TVs and similar devices. While it doesn’t verify the physical proximity of the two devices, it requires no special support in the primary device. A QR code is displayed on the primary device and scanned by your smartphone. This invokes the passkey on your smartphone to authenticate the session on the primary device.

Our last cross-device authentication method in this video is Push-Out-Of-Band. This method, like the previous one, doesn’t verify device proximity. And it works across all device families without special support in the primary device. You enter your user name on the primary device and the server sends a notification to your smartphone. This triggers the use of your passkey and authenticates the session on the primary device.

We have shown the user experience of major passwordless-flows using one of our DEMO applications. Nok Nok’s next generation platform allows you to easily implement and deploy passwordless authentication to internet scale. This helps you to improve the customer experience, reduce fraud and operating costs, and enable your organization to be passwordless.

Tagged with:
cross-device authenticationpasskeyspasswordless authentication
Nok Nok News

Related Posts

Cyber Hero Micro Briefing Series with Matt Topper
Cyber Heros Featured Video

Cyber Hero Micro Briefing Series with Matt Topper

Cyber Hero Micro Briefing Series with Rolf Lindemann
Cyber Heros Featured Video

Cyber Hero Micro Briefing Series with Rolf Lindemann

Cyber Hero Micro Briefing Series with Tammi Hayes
Cyber Heros Video

Cyber Hero Micro Briefing Series with Tammi Hayes

Intro to Cyber Hero Series – From the Beginning
Cyber Heros Video

Intro to Cyber Hero Series – From the Beginning

Leave a Reply (Cancel reply)

Your email address will not be published. Required fields are marked *

*
*

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Copy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語