• Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
12 Dec
3 Min read

3 truths and no lies for identity protection and authentication in 2020

December 12, 2019 Nok Nok News Industry News 0 comments

As we wrap up another year (and another decade), my thoughts are turning to 2020 and what we need to keep an eye out for next year as we put our plans together. 2019 has been one to remember from big data leaks like last week’sTrueDialogue blunder to groundbreaking new technology like the first-ever standards-based authentication for wearables.

The countless data leaks and breaches that plagued many during the past year will bring an increased interest in personal privacy as user data becomes more valuable than ever. With rising demand from consumers and regulatory bodies, organizations will need to evolve their authentication practices to stay afloat and succeed. Here are my top three “truths” for 2020 as we approach the next wave of reliance on strong authentication protocols.

Cyber policy and data privacy will receive double the airtime this election season vs. in ‘16

As we approach the 2020 election, candidates will more aggressively and thoroughly build data privacy and cybersecurity into their platforms alongside more traditional hot-button topics like healthcare, tax reform and more. In order to legitimize their candidacy, they will need to demonstrate a deep understanding of cyber and privacy that impact everyday citizens. Voters will scrutinize candidates on how equipped they are to tackle these pressing challenges and then cast their vote accordingly.

Value of data continues to rise, what was once silver is now platinum: The bounty on privacy will soar

As digitization continues in 2020, data will become more valuable than ever before. Information that may have previously seemed trivial to the everyday consumer will actually hold significant value for stakeholders and hackers across the spectrum. Adversaries or real-life “data bounty hunters” will hunt for new ways to exploit it, governments will seek better ways to access it, enterprises will adopt stronger security measures to protect it and end-users will demand better privacy to secure their personal information. Furthermore, with the rise of AI and machine learning, crucial data that impacts how medical decisions are made, where/how autonomous cars move, and more will become increasingly more mainstream — and increasingly more lucrative to threat actors pining for the information.

The entire globe will need to step up their authentication game

From first world countries pioneering digital transformation efforts to developing ones in the early stages of adoption, more and more people are transacting online and exposing their identities unwillingly. With every device in hand having the ability to access critical personal, financial and healthcare information, comes larger risks and the greater need for a global focus on authentication. European regulations such as PSD2 and GDPR are leading the charge, but 2020 will bring a more dire need for innovation in standards-based protocols and authentication. In order to strengthen security, enable more commerce and allow for widespread adoption of new technologies worldwide, new key sectors such as manufacturing, energy, healthcare and more will adopt robust authentication protocols to provide safety and security to the citizens relying on them.

While the authentication industry has made great strides in recent years, there is still a long way to go to ensuring that identities are truly secure. I believe that 2020 will bring great progress in this fight. I wish each and every one of you a very happy holiday season and a 2020 with much success.

Read more
24 Sep
5 Min read

113 recitals and Brexit ain’t one of them – A PSD2 Survival Guide

September 24, 2019 Nok Nok News Industry News 0 comments

Did you know the Payment Services Directive 2 (PSD2) directive (Directive2015/2366/EU) starts out with 113 introductory recitals?  You can check them out for yourself.

It includes such gems as:

#29: “‘authentication’ means a procedure which allows the payment service provider to verify the identity of a payment service user or the validity of the use of a specific payment instrument, including the use of the user’s personalised security credentials”

 #30: “‘strong customer authentication’ means an authentication based on the use of two or more elements categorised as knowledge (something only the user knows), possession (something only the user possesses) and inherence (something the user is) that are independent, in that the breach of one does not compromise the reliability of the others, and is designed in such a way as to protect the confidentiality of the authentication data”

#72: “the payment service provider is to prove that the payment transaction was authenticated, accurately recorded, entered in the accounts and not affected by a technical breakdown or some other deficiency of the service provided by the payment service provider.”

And even; #100: “competent authorities are granted the necessary power, including the power to impose penalties, where the payment service provider does not comply with the rights and obligations laid down in this Directive, in particular if there is a risk of re-offending or another concern for collective consumer interests.”

The driving force behind PSD2, which is focused on governing electronic and non-cash payments, is a drive for Strong Customer Authentication (SCA) – a process that makes online payments more secure and reduces fraud while increasing authorization rates. 

3D Secure 2 (3DS2) provides an easy way to merchants to implement PSD2 SCA compliant flows when they make an online purchase. This allows the merchant to “authenticate” both the customer’s identity and that they are the valid holder of the credit card they’re using to complete the purchase

Because of this, merchants need to build additional authentication capabilities into their checkout flow in order to continue to process transactions once PSD2 goes into effect. And that date is coming fast. PSD2 was previously slated to start this month, September 2019, but has been pushed back to early 2020 to accommodate unprepared service providers – and likely – to get Brexit in the rear view mirror.

It’s a foregone conclusion that PSD2 is going to start impacting merchants very soon.  The questions now revolve around how many merchants will suffer, how seriously and what will happen to UK merchants once card issuers start declining payments that require SCA but which have not been authenticated via 3DS.

Feeling the pressure?  Here are three steps to take in Q4 2019 to be PSD2 ready in 2020.

Merchants need to simplify or build

Well the good news is that if you are able to operate on a major payment service provider like PayPal or Stripe, you are going to be compliant, as they already put in the engineering effort. The bad news is that most merchants with significant transaction volumes are not using those payment service providers (PSPs) for their full checkout process.  

Those merchants need to build authentication into your checkout flow. Whether you want to retain control over the checkout experience directly, or you use a different PSP, you’ll have to implement 3D Secure 2.0 into your payment flow yourself. But once you do, you’ll be compliant.

Banks need to capture the PSD2 disruption and turn it to their advantage

While PSD2 is ostensibly about authentication, it also provides a major challenge to the banking industry. Banks are now required to provide (non-bank) PSPs with direct connectivity to customer account data. While this seems to be a major step towards commoditization in the EU banking sector, it also opens potentially lucrative opportunities for banks to monetize insights from their proprietary data sets.  

A recent report from McKinsey suggest that fast moving banks “could retain their role as trusted financial anchor, as customers would not find it attractive to provide third parties access to their data or accounts.”

Banks that can provide a technology platform and SCA services to merchants and even other less sophisticated banks can stand out in the opportunities that drive in a post PSD2 world.

Merchants and Banks can accelerate their SCA compliance with FIDO

It may come as a surprise, but there is an easy button for PSD2 compliance. It’s called FIDO – the Fast Identity Online. FIDO is not a company, but an open industry standard for SCA compliance.

FIDO Authentication is available to any organization to implement freely, and once deployed, banks and PSPs may accept a variety of FIDO-compliant authenticators that meet the SCA requirements of PSD2. The FIDO architecture offers a true “best of both worlds” solution to the problems that drove the creation of multi-factor authentication requirements.

With asymmetric cryptography, biometrics, and cryptographic privacy, the result is a single-gesture, multi-factor authentication event packaged for consumers in a very simple user experience that fulfills both merchant and banking needs for PSD2 SCA.

When, and where to turn for solutions?

PSD2 is on a 5+ year odyssey of bringing modern consumer authentication strategies and protections to European consumers. Delayed twice already, it’s unlikely to be delayed further. Banks and merchants who have not made appropriate investments need to move with precision to ensure they are compliant and not subject to fines.  

Fortunately, SCA  solutions can be tested and deployed in a timely manner at a reasonable price. Nok Nok Labs, a founder of the FIDO Alliance and holder of more than 100 patents in the space, provides a ready-to-deploy authentication system that delivers SCA compliance today. We look forward to sharing our process for rapid testing and deployment so you can reach your PSD2 objectives.

Read more
27 Aug
4 Min read

The “Anti-Pattern” of Server-Side Biometric Secrets

August 27, 2019 Nok Nok News Biometrics, Industry News 0 comments

The Guardian and Forbes reported that researchers traced a massive leakage of 28 Million biometric and personal records to a company whose products are used worldwide for physical access control to a UK based company. The leak included centrally stored fingerprint, facial recognition, photos, unencrypted usernames and passwords, logs of facility access, security levels and clearance and personal details of staff and comprised over 23 gigabytes of data. The breach reinforces the problem with server-side biometrics and adds to a series of such prior breaches such as the OPM data breach that leaked the biometrics and personal information of US Govt. employees.

This leak points to an “anti-pattern” that security professionals and corporations should understand clearly. A pattern is an idea of how to solve a problem within a class of problems, that repeats itself. An anti-pattern is an idea of how not to solve it because implementing that idea would result in bad design.

The old proverb goes, “Why did Willie Sutton rob banks?….because the money was there!” Biometrics that are transported and aggregated centrally on the server for storage and matching are the worst kind of anti-pattern. They create stores of secrets on the server-side that are attractive for hackers to breach. The possibility of a scalable attack is large, the economic returns are very attractive, and remediation is very complicated.

By contrast, biometrics that work only on your personal device and are never shared, stored or matched on the server are an effective and secure pattern. By distributing the sensitive information and protecting it with extraordinary security, there is no central repository to attack. In other words, Willie Sutton would be out of business as a bank robber and instead be reduced to trying to pick pockets – not a scalable endeavor.

Apple, Samsung and others have proven that by distributing and localizing biometrics to a personal device that is in your control and by placing extraordinary controls around the biometric capture and matching, you can use biometrics as an effective secure pattern. In this case, the data is distributed, and you can at best try a targeted attack on individuals, one at a time – even that is so difficult that the economic incentives are not attractive.

Nok Nok Labs believes deeply in the idea that for privacy, security and the prevention of catastrophic failures like the breach above, corporations should only use the client-side-only biometric pattern as implemented by reputable vendors. We believe this so deeply that we incorporated this as a basic design principle in the creation of the FIDO protocols at the FIDO Alliance that we founded in 2013. The protocols created a more resilient distributed security pattern and are backed today by industry leaders such as Google, Microsoft, Intel, ARM, Samsung, Lenovo, VISA, MasterCard and others who have joined the alliance.

The FIDO protocols represent a good pattern to solve the problem of server-side secret aggregation. Users can leverage a method of authentication that is natural and convenient such as the client-side-store-and-match biometrics on a personal device including a phone or a physical token such as a USB or Bluetooth dongle. The standard ensures that there are no aggregations of secrets (as would be the case with passwords) and is designed to mitigate scalable attacks of all kinds such as phishing, interception by Man-in-the-Middle or compromises of a central repository of passwords. Developers get a simplified interface to implement this, and operators can rely on a single backend infrastructure regardless of device, method of authentication or security requirements. In other words, the standard ensures simplicity for the user, developer and operator.

It’s a well-kept secret that FIDO is already deployed widely and used daily by nearly a billion users at major brands such as Intuit, Bank of America, T-Mobile, Cigna, Google and Microsoft in the US and across Asia at DOCOMO, Softbank, Yahoo! Japan, and some of the largest banks in the region. It is expected to be deployed by most forward-thinking brands by 2020.

Read more
30 May
1 Min read

A Banner Year for FIDO

May 30, 2019 Nok Nok News FIDO Alliance, Industry News 0 comments

What if you could authenticate with phishing protection, support dedicated security hardware or security hardware integrated in your users’ everyday devices, allow users to choose PINs, or the biometric modality of their choice – wouldn’t that be great?

These were the questions that led us to form an industry alliance (FIDO Alliance) and explore how those aspirations could work (see FIDO and WebAuthn).

We were thrilled when the industry implemented broad support for these specifications in major operating systems (e.g. Android and Windows 10) and major web browsers (e.g. Chrome, Edge, Firefox, and Safari Technology Preview) alike.

Now, the momentum continues as the Kuppinger Cole analysts publicly acknowledge our great work. We are thrilled that the FIDO Alliance and W3C WebAuthentication received the EIC2019 Award for the “Best Future Technology / Standard Project“.

This award encourages us to continue our path towards next generation authentication – to help companies around the globe deploying this new technology and making the authentication experience more secure and more convenient for their users. What’s next?

Read more
25 Apr
3 Min read

An Ounce of Prevention – Cloud Infrastructure Providers as Vectors for Scalable Attacks

April 25, 2019 Nok Nok News Industry News 0 comments

The Economic Times reported Wipro as saying “We detected a potentially abnormal activity in a few employee accounts on our network due to an advanced phishing campaign. Upon learning of the incident, we promptly began an investigation, identified the affected users and took remedial steps to contain and mitigate any potential impact.”

From the news so far, it seems the intent of the attackers was to use Wipro as a staging ground for attacks on Wipro’s customers, effectively entering through a trusted door. If the Verizon Data Breach Report is any indication the odds are better than 80% that the breach targeted employee and administrative credential compromise as the attack vector of choice.

Some of the most respected brands such as Wipro spend money on the best training for anti-phishing and attack detection in the misguided belief that this is an adequate measure. The fact is that security measures that rely on end-users to make the distinction on a legitimate request vs. a fraudulent one are doomed to failure. Too often, companies like Wipro and their service provider community rely on post-attack detection rather than investing in preventative measures such as phishing-proof authentication such as those based on the FIDO standards.

Ironically, earlier in April, the US National Counterintelligence and Security Center (NCSC) launched National Supply Chain Integrity Month to raise awareness about growing threats to the supply chains of the private sector and U.S. Government.

“Foreign intelligence entities and other adversaries are increasingly exploiting supply chain vulnerabilities to steal America’s intellectual property, corrupt our software, and surveil our critical infrastructure,” said NCSC Director William R. Evanina.

“Bypassing our security perimeters, they’re infiltrating our trusted suppliers to target equipment, systems, and information used every day by the government, businesses, and individuals. The cost to our nation comes not only in lost U.S. innovation, jobs, and economic advantage, but also in reduced U.S. military readiness,” he added.

If we can learn anything from history, it would be that the Wipro attack is the tip of the iceberg. A few years ago, Google was attacked by “Operation Aurora”, a wide-ranging compromise of Google’s systems aimed at altering source-code, infiltrating administrative accounts with the goal of accessing accounts of dissident Chinese activists. Given the increasing reliance on cloud and infrastructure service providers, such attacks will continue to grow because they represent a “scalable” attack vector that involves a large payoff.

We strongly recommend both customers and service providers invest deeply in modern authentication that is phishing resistant, multi-factor, standards based and widely supported as well as proven at scale. The FIDO standards pioneering by Nok Nok Labs are one such essential building block of a preventative approach to security that is needed to mitigate the catastrophic consequences of attacks on providers like Wipro.

Read more
15 May
3 Min read

Facebook Joins the FIDO Alliance | Another Big Milestone Towards Security, Ease of Use and Privacy in Authentication.

May 15, 2018 Nok Nok News FIDO Alliance, Industry News 0 comments

Facebook was a very early participant in 2011 in the informal incubation efforts that Nok Nok Labs conducted prior to creating the non-profit FIDO Alliance. It is also with some delight that we welcome back Brad Hill (@hillbrad) who will be Facebook’s representative to FIDO. We collaborated closely with Brad during his tenure at PayPal as co-authors of the FIDO-UAF specification and created the very first FIDO implementations. Brad has been a great supporter of the core principles we articulated for FIDO from its inception including security, ease of use and privacy by design.

More recently, during his early tenure at Facebook, Brad provided key feedback to the FIDO2 design work that we authored over the last few years with Google, Microsoft and others to fulfill the key goal of extending FIDO enablement from securing apps to securing browsers. As you might have seen, browser implementations are starting to roll out with initial support for different authenticators.

Passwords drive cost in a dozen dimensions that are not always readily apparent. Beyond the inconvenience factor, password reset and account takeover handling costs are spiraling. Damages accrue to individuals, companies and puts national infrastructure at risk. Most pernicious is the risk to the reputation of companies like Facebook who have to manage the integrity of the information being posted onto their networks. Their users also rely on them to provide them with adequate account security for their personal information and the networks need to ensure that only the right actors can participate in the social content of the network. Privacy requirements & accompanying violations, in particular, are gaining teeth with the EU’s General Data Protection Regulation (GDPR), the most comprehensive data privacy directive anywhere. FIDO powered solutions can provide a standards-based foundation to tackle these requirements.

Learn More

Facebook, like Amazon (who joined the Alliance earlier this year), Microsoft and Google while being technology players are also among the largest relying parties dealing with billions of consumers among them. These companies and their peers now have an unparalleled opportunity to make a dent in the password problem by providing FIDO-based authentication to their users at-scale, delivering simplicity, security and privacy in the authentication process and use that as a building block for their overall privacy commitments to their users. Facebook’s membership on the FIDO Board is a great milestone for Nok Nok’s vision for modern authentication towards a world without passwords and cementing FIDO’s future as a foundational building block for internet security.

Read more
20 Mar
3 Min read

Web Authentication | WebAuthN | Now a CR (Candidate Recommendation)

March 20, 2018 Nok Nok News Industry News 0 comments

Today marks another significant milestone in replacing the universal reliance on passwords and Nok Nok Labs is proud to be one of the co-authors and designers of the WebAuthN specification with Google, Microsoft, PayPal and others.  Today’s significant achievement is the W3C Web Authentication specification reaching “Candidate Recommendation” (CR) status. This is a major milestone for transforming the way authentication works and one that we should pause to celebrate.

Web Authentication specifies a JavaScript API to be implemented by web browsers and will allow a website to trigger convenient and strong authentication using biometrics, tokens and other methods of authentication directly from the browser.  This milestone fulfills a key goal we set for ourselves when the founders of Nok Nok Labs created the FIDO Alliance in February of 2013 with a vision to change how authentication worked in the modern computing ecosystem.

Today’s milestone means that browser vendors will now start to deliver strong authentication, based on our work at the FIDO Alliance, that can be accessed through a standard JavaScript API across browsers and operating systems.  The final standard will work its way through the W3C this year with a focus on interoperability and stitching up any issues that emerge into a final W3C standard. This is the starting signal for browsers to deliver the FIDO way of doing strong authentication.  

We have provided our customers and partners early briefings and access to some of this work through our partnerships with Microsoft and Google. Our products support this emerging standard in addition to the other well established FIDO standards (UAF and U2F) allowing for the broadest coverage of use cases and security models, all delivered at web-scale and carrier-grade quality through the NNL S3 Authentication Suite.  As inventors and authors of the key ideas behind this standard we are able to provide trusted guidance to our community about how best to adapt these standards to use cases.

In future posts, we will start to detail what we designed this standard to achieve, the use cases it works best for and how we expect it to roll out over the next two years.

We’re enormously proud that our vision and ideas were accepted and shared by the broad community of browser and platform vendors who will be adopting this specification over the coming year.  As one of colleagues says “…some problems are too big for any one company, no matter how large or powerful to solve on their own – it requires an ecosystem that can agree on a common standard”.  Today’s CR is a huge step further in that direction.

Read more
10 Jul
4 Min read

What is the State of Biometrics?

July 10, 2017 Nok Nok News Biometrics, Industry News 0 comments

Each of these interactions, thanks to biometrics, can be accomplished seamlessly and without friction. Switching from a casual inquiry, to a personal, non-sensitive account, to a private, highly-secured account is accomplished with a swipe of a fingertip or by blinking into a camera. The advent and mass adoption of consumer-grade biometrics has drastically changed the expectations of the consumer. No longer are they required to create and remember a highly entropic code to use as a shared-secret, now they can simply look at a that sliver of glass and blink.

And this is only the first wave. As consumers are seeing multiple different modes of biometrics crop up on their iPhones and Samsung devices, older platforms are embracing the innovation as well – the W3C is working with the FIDO Alliance to integrate strong authentication – incorporating biometrics – into the standard web browser requirements, Microsoft’s Modern Keyboard will have a fingerprint sensor hidden in a normal looking key. The way in which we interact with our smartphones is becoming the way in which we interact with all computing devices.

This allows us to explore a new way of thinking about consumer-grade security. Rather than one large, all access door – we can introduce a multi-gate system where access to information or functionality at a lower level can be a simple fingerprint swipe, but higher levels of access require additional levels of proof of identity. Historically, a single password was the only thing necessary to access and approve all levels of a transaction–from seeing a balance, to paying a regular bill, to transferring vast amounts funds. Now, a fingerprint can be used to view an account balance, but a consumer would need a fingerprint plus a facial recognition scan to pay a bill or a fingerprint, face and voice authentication to transfer funds. Even in combination – the friction to the user will still be less than typing in a complicated password on a tiny touch-screen.

It is not just those engaged in the biometric field that feel that way. There are significant indicators from both the public and private market that show biometric adoption is increasing. Government organizations are issuing statements like the recent cybersecurity Executive Order in the US, PSD2 in Europe which focuses on financial organizations, the National Cyber Security Strategy out of the United Kingdom – all make specific mention of how to handle biometrics and what biometrics are good for. In the private market, we are seeing adoption from almost every vertical – from Mobile Network Operators, to Payment Providers, to Financial Institutions, even companies focused on the Internet of Things are looking for ways to include biometrics.

But there is still work to be done. While we have policy makers in the government like the National Institute of Standards and Technology issuing guidelines to embrace biometrics and deprecate other less secure methods of authentication – department heads, like those at the Social Security Administration, still cling to their outdated models of passwords, one-time-passwords, email resets and SMS messaging. There are still advocates for server-side biometric storage that refuse to learn the lessons of the Office of Personnel Management breach in 2015. Financial Institutions – while claiming to be centers of innovation – seem to be in a never ending cycle of evaluating and piloting without ever deploying. During all this time of debate and delay, the malicious actors out there are becoming more savvy, more experienced and are developing more sophisticated means of breaching newly deployed technology.

At the end of the day, the State of Biometrics is mixed – it is both the best of times and the worst of times.

Read more
  • 1…8910

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語