© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
Home / FIDO Alliance / FIDO | Claims and Calculations | Nok Nok Labs and ThreatMetrix

FIDO | Claims and Calculations | Nok Nok Labs and ThreatMetrix

  • Author
    Nok Nok News
  • Published
    18 Sep 2017
  • 0 comments
    Join Conversation
FIDO Alliance

When we started Nok Nok Labs, I often said that our vision for Modern Authentication was that it was a “Game of Signals” – one that consisted of claims & calculations.

Users and devices provide a signal through an authentication claim (e.g. a password, a smart-card, a biometric etc). The relying party would process that claim and then often look at other signals (e.g. location, device integrity signals etc.) and the resulting calculation determined the final result.

Back in 2011 user authentication events were weak signals (e.g. passwords or phishable OTPs or strong authentication that was easily defeated by malware) with no alternatives. As a result, relying parties had to invest deeply in the calculation and amass many more signals to determine the result of the authentication claim. Weak signals create uncertainty and doubt that can cripple the business with excessive friction or create an opportunity for compromising credentials. Indeed, the Verizon Data Breach study reports credential compromise as the leading cause of data breaches. Fully 80% of hacking-related breaches leveraged either stolen passwords and/or weak or guessable passwords.

Existing strong authentication did not help a lot. It remains shocking to see how much of our deployed “strong authentication” is really vulnerable to phishing, MiTM and malware attacks. Gone are the days when authentication was supposed to be about a magic credential – a complex password, OTP token/smart-cards or assorted fanciful authenticators – that gave you keys to the kingdom.

Our vision led us to create the FIDO Alliance with our partners and seed it with our inventions leading to the first FIDO protocol aimed at strengthening the user-claim so that it could be strong signal. The standards allow the use of ANY method of authentication (e.g. tokens, biometrics, wearables etc.) while maintaining a simple consistent developer API and without changing the backend. It also provides the strong assurance that this was indeed the right user. It also characterizes the authentication environment and resists or eliminates phishing and MiTM attacks because of way we designed the cryptographic protocol.

In a recent speech, Treasury Secretary Steve Mnuchin hailed the FIDO Authentication standards and the FIDO Alliance’s work with NIST as an exemplary innovation in public-private partnerships and vital to enabling financial inclusion and banking the unbanked. We are proud to have contributed in a key role to that partnership with NIST. We continue to be the innovation leader at the FIDO Alliance and a key author/editor of its most widely deployed standards as well its upcoming standards.

Our NNL S3 Authentication platform is the industry’s leading standards-based way to deliver assurance that the business is dealing with the right user, right device and right context for cloud, mobile and IoT applications. The strong signals delivered by our platform can be transformative to risk platforms allowing the business to deliver frictionless user interaction, meet emerging regulations for authentication and data privacy and to personalize user interactions with confidence.

This announcement today by ThreatMetrix validates our vision of Modern Authentication – watch this space for more to come.

Nok Nok News

Related Posts

Quantum is Knocking!
FIDO Alliance Open Banking Opinion

Quantum is Knocking!

Friction and Fatigue = Fraud: not with Passkeys!
FIDO Alliance Passkeys

Friction and Fatigue = Fraud: not with Passkeys!

Missing the Forest for the Trees
FIDO Alliance Passkeys

Missing the Forest for the Trees

Nok Nok’s FedRAMP High Journey: Next Step in Federal Cybersecurity
FIDO Alliance Government

Nok Nok’s FedRAMP High Journey: Next Step in Federal Cybersecurity

Leave a Reply (Cancel reply)

Your email address will not be published. Required fields are marked *

*
*

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Copy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語