• Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
07 Feb
3 Min read

Step Away From the Server With Device-Based Security

February 7, 2017 Nok Nok News Cybersecurity 0 comments

From our spearphishing- and spyware-heavy world today, that seems like a very lofty goal, but it’s exactly the one that four out of five IT decision-makers agree is in our imminent future. In a new study, the vast majority of organizations said they want to move beyond passwords and two-factor authentication and use stronger methods to secure their sites and apps. Nearly half of the respondents wanted to implement biometrics in the next five years and move away from passwords.

Massive companies are in on this trend. In late January, Facebook said it was joining the likes of Google, Salesforce and Dropbox, to name a few, to move to support FIDO-compliant universal second factor keys. As a founding member of the FIDO alliance, Nok Nok Labs is committed to providing enhanced security.

However, to get rid of passwords and deploy strong authentication, including options like biometrics, companies need to implement device-side secrets rather than server-side secrets. To get to these password-free Elysian fields, enterprises need to take a systematic approach to implementing password-less authentication.

Thumbprint-, iris- and face-scanning software has the advantage of being extremely user friendly — have you ever forgotten your thumbprint? However, if companies continue the practice of storing this type of information on public servers, that means if hackers get sophisticated enough to routinely replicate these features, it could be worse than where we are with passwords today. You can’t get a new iris the same way you can get a new password. We have already seen a case where fingerprints were stolen, via the U.S. Office of Personnel Management breach in 2015.

The Nok Nok Labs S3 Suite addresses strong biometric security by leveraging device-based authentication. This ensures that a breach would be unlikely, since the attacker would have to have ownership of the device, plus the biometric data to access it.

Typical biometric security doesn’t prevent password hacks. In general, features like Touch ID use biometrics on the device, but they don’t replace a username and password. Instead, the fingerprint releases the password, which is stored in a secure enclave. Because there still is a password involved, there is still a security problem.

For biometric authentication to really work, it must have no password involved and be device based instead of server based. When using the Nok Nok Labs S3 Suite, the biometric signifier is enacted and the device unlocks an app-specific private key based on the local authentication. That key, not the biometric information itself, is sent to a server through FIDO-standardized protocols and it matches up with a public key on a server. The private key information never leaves the device, and the public key is the only information stored on the server. The public key cannot be used in an attack, because it has no value without the private key information. This is the FIDO Alliance’s vision for the future, and it’s one Nok Nok Labs is committed to.

Read more
  • 12

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

info@staging.noknok.com

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • info@staging.noknok.com

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語