© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
Home / Multifactor Authentication / Flexible Authentication Strategy Key to Meeting Business Demands

Flexible Authentication Strategy Key to Meeting Business Demands

  • Author
    Nok Nok News
  • Published
    20 Mar 2017
  • 0 comments
    Join Conversation
Multifactor Authentication Opinion

We are six months out from the rumored launch of a rumored new iPhone. As a result, of course, article after article has been posted confirming that, yes, we love our Apple rumors.

Joking aside, these rumors do contain an interesting development for the iPhone. If true, the iPhone 8 will do away with the home button and introduce a new method of unlocking your device – unlock by facial recognition.

We have long been a proponent of biometric authentication. However, the introduction of a new form of authentication on what is arguably the most popular platform in use today creates a long list of headaches for business who plan on being compatible with and thriving on the new iPhone. Fortunately, Nok Nok Labs has a solution in the market today that can help business with precisely these sorts of headaches.

The problem isn’t the introduction of new, novel technology. The problem isn’t changing behaviors and customers’ patterns. The problem that creates headaches for businesses is that they are deployed on a technological stack of systems that is not designed to seamlessly integrate these new, novel pieces of technology, behaviors and customer patterns. In 2015, Apple introduced the iPhone 5S and kicked off a wave of adoption for everyday consumers with fingerprint sensors. Businesses had to rush to find a way to integrate their mobile applications with Apple’s fingerprint APIs. Even now, two years later, we are still pleasantly surprised when we find a new application has fingerprint-integration rather than kludgy password-based authentication. If the iPhone 8 does rely on facial recognition rather than fingerprints, a whole new wave of work will be required to integrate with that feature. Even those who had already integrated with the fingerprint will have to recode, redesign, retest and rework their existing systems to adapt to a changing landscape.

If only there was a better way.

Fortunately, there is.

The solution is to do away with one-off integrations and embrace a flexible framework for authentication. The FIDO Alliance has published a protocol for accomplishing just that. And this protocol has been vetted and embraced by over 250 companies around the globe including heavyweights such as Google, Microsoft, MasterCard and RSA. Nok Nok Labs built the first implementation of this protocol and offers its customers a way to instantiate an authentication system that can flexibly accept identities from fingerprint sensors, facial or voice recognition applications, even secure PINs or third-party dongles and tokens like the YubiKey. The business will perform a single integration of a server, add just a handful of lines of code to their mobile application, and simply chose the types of authenticators that they wish to accept. As new technology becomes available and is adopted by their customers, the business needs only to change a policy in their configuration to accept it or not.

Feel free to visit our resources page to explore in more detail what our technology is capable of. Also, you can reach out to us directly at [email protected] if you have questions or would like to have a more robust discussion about how we might be able to help your authentication strategy.

Nok Nok News

Related Posts

Quantum is Knocking!
FIDO Alliance Open Banking Opinion

Quantum is Knocking!

When Securing Transactions, Global Experience Gets it Done
Biometrics Opinion

When Securing Transactions, Global Experience Gets it Done

2024 Security Industry Predictions: Consolidation, ROI, and the AI Hype Train
Cybersecurity Opinion

2024 Security Industry Predictions: Consolidation, ROI, and the AI Hype Train

Still not a FIDO believer? Apple Just Made a Big Bet
FIDO Alliance Industry News Opinion

Still not a FIDO believer? Apple Just Made a Big Bet

Leave a Reply (Cancel reply)

Your email address will not be published. Required fields are marked *

*
*

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Copy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語