• Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
02 Apr
3 Min read

How BBVA is using FIDO to protect their customer accounts

April 2, 2021 Nok Nok News FIDO Alliance, Financial Services, Industry News 0 comments

Does your bank still think using SMS one-time passcodes are the only additional authentication factors? Mine still does, and I wish I could easily switch to another bank that is more enlightened about their security, such as BBVA. This international bank, which has customers in Spain, the US, Mexico and South America, has been a big supporter of FIDO authentication protocols and uses the Nok Nok S3 Authentication Suite.

 

Banking is one of the last bastions of old world thinking when it comes to authentication. A quick scan of a directory of banks offering multifactor authentication (MFA) show that most are still stuck in the past. BBVA is the first Spanish bank that has adopted FIDO methods for its customers.

 

FIDO leverages existing biometric methods for authentication, such as fingerprint and facial recognition, that are built-into the more recent smartphones. This means customers don’t have to go through more complex procedures to secure their transactions. Customers can also quickly check to see which of their phones and laptops have accessed their account with a list of “my secure devices,” which is a quick way to find out who has been authorized to use your account.

 

Banks though should be more forward-thinking and embrace FIDO, especially those banks that are moving towards having a more capable digital footprint. There are three reasons: First, account takeover fraud is rampant and increasing. Phishing lures are getting better, especially during the pandemic where customers are not necessarily paying attention to dodgy Covid-related messages that could cause a compromised account.

 

Second, PSD2 regulations require better authentication methods. The latest version of the Payment Services Directive of the EU has created the strong customer authentication requirement for all customer-initiated online payments and bank transfers and the EU began enforcing this requirement last year. This means when a customer wants to transfer funds, for example, they would need to make use of MFA to authenticate themselves. FIDO is one of the easiest and most secure ways to accomplish this, and the Nok Nok tools can enable this “step-up” authentication to make it seamless for the bank’s customers.

 

This means that authentication is not just accomplished when a customer logs into their account but as needed to safeguard their activities and protect the high risk accounts with a more secure process. The beauty of FIDO is that this protection is delivered without putting an additional burden on the user.

Finally, SMS-based authentication is a security sinkhole and can easily be compromised. The record of various stories about these compromises goes back several years. Most recently was this piece in Vice that described how one third-party utility can be used to gain access to your SMS identity without any subscriber even knowing it has been compromised. Banks really shouldn’t rely on SMS for any authentication activity.

 

BBVA announced last year that they began deploying Nok Nok’s software across their customer base, and since then many of their customers are using FIDO to authenticate. “Traditionally, one of the biggest challenges of authentication systems has been to balance security with user experience. Due to the FIDO standard, we are confident that both elements work together seamlessly to provide customers with the highest security standards, along with a transparent and agile user experience,” says Juan Francisco Losa, BBVA’s Global Technology and Information Security Officer.

 

Nok Nok has numerous banking customers using their FIDO tools, including the Iceland-based Landsbankinn and the South African-based Standard Bank. Now if only I could get my own bank on board with FIDO.

Read more
04 Mar
4 Min read

Why Intuit picked FIDO

March 4, 2021 Nok Nok News FIDO Alliance, Financial Services 0 comments

One of the long-time FIDO supporters gave testimony to its biggest benefits at the recent Authentication 2020 conference. The speaker was Marcio Mello, who is the head of Product for Intuit’s identity and profile platform. The benefits are saving money and time when users have to login to their SaaS financial offerings from Intuit.

Intuit was interested in FIDO for many years, and at the beginning of 2020 rolled out a FIDO application for iOS users of TurboTax, its tax preparation package. Now, if you are like me and if you use some form of this software, your goal is to spend as little time as possible using it. When you are done with your taxes and file them with the IRS, you hope this is the last time you will ever see this software until next year. Well, that works against usability in a big way, because most of us don’t remember our account passwords. Mello reminded his audience of this fact: “We have yearly active TurboTax users,” he said during his presentation. “Our users don’t come back anytime soon, so often they don’t remember their account sign-in information and then have to hassle with recovering their accounts.”

This is a perfect use case for FIDO, and Intuit created a new process so they wouldn’t have any passwords to remember. Their goal was to require as few clicks as possible to sign in. “We didn’t want to remain the identity police because we had a poor user experience,” he said. “With the old pre-FIDO ways, users had a lot of data entry to key in. The faster we can get them into our app, the better for everyone. This is because we are all in this together for a passwordless journey. And it is a long-term journey, because it isn’t just offering a quick fix.”

Intuit evaluated various FIDO vendors and picked NokNok’s S3 Authentication Suite. As part of their evaluation, they ran various stakeholder education sessions with everyone that would be involved in the rollout. They approached the project by first building the user interface for sign on and account management, then did a phased launch with the iOS version of TurboTax. Their goal was to get rid of OTP SMS for sign ins. Here is a diagram from Mello’s talk that outlines how they intended to evolve their user interface and authentication policies. 

He mentioned during his presentation that FIDO offered many benefits:

  • The ability to future-proof identity standards that are also scalable and customizable.
  •  An opportunity to lower our operational costs.
  • Improve both security and privacy by having identity credentials that remain on your mobile phone. 
  • Adding friction at the appropriate times when users are doing something riskier on their accounts. 

That last point is an important one, because it is a sign of assurance and mutual trust. Before FIDO, there was friction all over the place, which promoted just the opposite intention. They intended to use a combination of visible and invisible signals for fraud detection such as user behavior as part of the authentication process, which is the last line on the chart above.

So what happened? Their results were impressive. They found that since the beginning of the rollout in January 2020, there was a 99% reduction in users having to recover their authentication details and a corresponding big reduction in support costs and phone calls. There was also a 20% improvement in successful sign-ins, when previously moving the needle 1% had proven to be very difficult.  There was a 60% reduction in the time it takes to onboard new users through account creation on the iOS app. They quickly got 2/3rd of mobile app sign-ins via FIDO  and 23% of their users are now totally passwordless. “It is only a matter of time before all of our users will activate FIDO biometrics on their devices,” said Mello. As part of the FIDO project, they have extended FIDO authentication to other Intuit apps. “One of the advantages of FIDO is that we can customize how the initial authentication dialogs are presented for each of our applications. It isn’t a one-size-fits-all anymore around here.” They are also working on extending FIDO authentication in their  browser applications leveraging Nok Nok’s ability to support passwordless authentication across any touchpoint – mobile app, mobile web, pc web and even SmartWatches.

Read more
13 Nov
3 Min read

Passwordless authentication becomes a reality, really

November 13, 2020 Nok Nok News FIDO Alliance, FIDO2, Industry News 0 comments

Passwordless authentication has finally come of age. The final piece of the puzzle is what is happening at Apple and their support of the various FIDO2 standards, including adding the Web Authn protocols to Safari running on iOS v14 devices. These protocols are useful, because web application servers can integrate with strong authenticators already built into devices, such as Apple Touch ID/Face ID, Android and Windows Hello. This means that these servers can authenticate the user without directly receiving any private keys or any shared secrets. One of the largest MNOs NTT DOCOMO  in Japan already deploys actual passwordless apps.

Before Apple’s implementation, there was ubiquitous support for FIDO across native mobile applications on Android and iOS devices, but not for browser applications. Microsoft, Google and Firefox Mozilla added FIDO support for browsers but, without support in Safari, there was a gap to achieving passwordless. Many organizations were waiting to see if Apple would jump on the bandwagon.

Why is this particular Apple implementation important? There are several reasons. First, biometrics are now used by more people and found in more phones than ever before. Duo reports in a 2019 survey that 77% of smartphones have biometrics configured. Next, before FIDO2 you had to combine device firmware with specific software and an app that was written for this task. Now you have a standards-based approach that will work with any of the major browsers in any context. It also means that finally we can ditch our one-time password apps on our smartphones (such as Authy, Lastpass and Google and Microsoft Authenticators) and your HW OTP Tokens and just use the phones themselves as authentication devices. Finally, this makes FIDO passwordless logins the most secure mechanism of authentication and also the easiest to use. We no longer have to ask users to trade off usability with security: they can have both.

Certainly, there have been other passwordless applications outside of the FIDO effort, as mentioned in this piece in CSOonline. But all of these share common drawbacks: they are vendor-specific, they require special code to integrate with their authentication servers, they make use of existing authentication smartphone apps or they haven’t been tested at the scale that can be used by global enterprises. Speaking of which, FIDO implementations are being used today by millions of users, and they also save time and frustration. Intuit found that their FIDO-enabled mobile app had three major benefits: it cut down on phishing attempts, reduced by 20% the login times for users, and improved by 6% the number of successful logins. They are working on integrating FIDO into their websites’ logins.

Passwords are painful, no doubt. We have too many of them to easily remember, and the number of multi-factor solutions have usability compromises that require a security expert to explain and deploy. It is time to take advantage of FIDO and it is timely that we have the support by Apple of WebAuthn. This could well be a watershed event for mobile ecommerce, making a big incentive for using your smartphone for making online purchases. No more having to download an app for buying from an online storefront when you can just use your browser on iOS, Android, or Windows. You have a simple login and you can get better security than you had before.

Read more
26 Jun
3 Min read

Still not a FIDO believer? Apple Just Made a Big Bet

June 26, 2020 Nok Nok News FIDO Alliance, Industry News, Opinion 0 comments

It’s been an exciting week as Apple has once again shown its commitment to stronger, standards-based authentication by adding support for Web Authentication Platform Authenticators to iOS, iPadOS, macOS and Safari. With browsers like Safari allowing their users to leverage Face ID or Touch ID based platform authenticators to log in to websites, the final puzzle piece in the authentication game is in place!
Complete Puzzle

It is great to see how quickly Apple has added support for FIDO to their platforms – allowing their users to leverage strong passwordless FIDO authentication. Furthermore, the move by Apple means that users can take advantage of Nok Nok’s passwordless authentication directly in browsers running on iPhones, iPads and Macs going forward, meaning Nok Nok’s reach on mobile browsers increases to approx. 70%.

This milestone has been a long time coming, arriving on the heels of massive momentum for FIDO:

In late 2019 as part of Safari 13, Apple announced support for Web Authentication when using FIDO Security Keys, i.e. the ability to use hardware tokens for strong authentication. These FIDO Security Keys are often deployed by enterprises for workforce authentication.

In February of 2020, Apple joined the FIDO Alliance, which was seen as a public commitment to FIDO and it fueled the expectation of full FIDO support on Apple devices soon.

For large scale customer authentication deployments, however, the first 2 steps didn’t have a significant effect in practice as most customers don’t carry FIDO security keys with them.

The recent announcement to add “Web Authentication Platform Authenticator” to Safari 14 addresses this important use case.
Today, passwordless customer authentication is already practical in Mobile Apps running on Android or iOS devices and in Web Browsers running on Windows 10 PCs and Android smartphones.

Once Safari 14 is shipping and users have updated to this version of Safari, FIDO passwordless authentication can be used on iOS, iPadOS and macOS powered devices – expanding FIDO support to all major platforms – a significant milestone towards a new more secure modern authentication framework for today’s digital world. With coverage across all major platforms, and the many benefits of moving off legacy authentication, there is no reason to wait to embark on your passwordless journey.

And with Nok Nok’s certified Universal Server, organizations can perform and manage FIDO passwordless authentication across all platforms, even including Smart Watches, through a single developer API. The Nok Nok S3 Authentication Suite supports all verification steps mentioned in Meet Face ID and Touch ID for the web – WWDC 2020 – Videos and it supports many more features to make passwordless authentication easy for organizations to deploy.

Read more
30 May
1 Min read

A Banner Year for FIDO

May 30, 2019 Nok Nok News FIDO Alliance, Industry News 0 comments

What if you could authenticate with phishing protection, support dedicated security hardware or security hardware integrated in your users’ everyday devices, allow users to choose PINs, or the biometric modality of their choice – wouldn’t that be great?

These were the questions that led us to form an industry alliance (FIDO Alliance) and explore how those aspirations could work (see FIDO and WebAuthn).

We were thrilled when the industry implemented broad support for these specifications in major operating systems (e.g. Android and Windows 10) and major web browsers (e.g. Chrome, Edge, Firefox, and Safari Technology Preview) alike.

Now, the momentum continues as the Kuppinger Cole analysts publicly acknowledge our great work. We are thrilled that the FIDO Alliance and W3C WebAuthentication received the EIC2019 Award for the “Best Future Technology / Standard Project“.

This award encourages us to continue our path towards next generation authentication – to help companies around the globe deploying this new technology and making the authentication experience more secure and more convenient for their users. What’s next?

Read more
12 Nov
2 Min read

Android Protected Confirmation and FIDO

November 12, 2018 Nok Nok News FIDO Alliance 0 comments

The feature provides safeguards against account takeover by prompting the user for confirmation during certain transactions deemed important enough to warrant special care. In such scenarios, a protected security environment displays the confirmation message to the user in such a way as to guarantee that the message hasn’t been corrupted by malicious software.

To use Android Protected Confirmation, an app generates a key in the hardware-protected Android Keystore. The app transmits an attestation certificate that certifies that the key can only be used to sign Protected Confirmations. Later when a user confirms a transaction prompt by double pressing the power button, a signed assertion is generated to provide a “what-you-see-is-what-you-sign” interaction. The added confidence of Protected Confirmation can serve to boost security in various use cases, such as person-to-person money transfers, authentication, and medical device control.

Rewind to a few years ago, when Nok Nok worked with Trusted Execution Environment (TEE) vendors to develop a proof-of-concept showcasing exactly this concept. The notion of a tamper-proof transaction display is built in to FIDO, which can completely shut down the possibility of a user being phished to divulge their credentials.

Protected Confirmation is currently implemented only on the Google Pixel 3, although other device vendors may follow suit. However, the FIDO standard, which is supported across all operating systems and mobile devices, encapsulates this protected confirmation functionality (dubbed “Transactions” in FIDO parlance).

Though welcome and necessary, rapid changes in platform security features make it a challenge for app developers to keep up. Using FIDO authentication is one way to deal with this rapid change; by leveraging the latest security features, app developers can get back to developing the non-security features of their core product. Additionally, with FIDO you don’t need to change your app or backend infrastructure to take advantage of the mix of security capabilities available now and in the future.

Read more
18 Jul
3 Min read

What is FIDO2?

July 18, 2018 Nok Nok News FIDO Alliance, FIDO2 0 comments

Whether you’re a developer, IT Manager or end-user, you’re familiar with the problems with passwords. They tax end-users, make your infrastructure vulnerable, and are susceptible to scalable attacks. Nok Nok Labs founded the FIDO Alliance in 2013 and brought its key inventions to create a framework of FIDO standards to help eliminate passwords.

With FIDO, end users get simple and unphishable authentication appropriate to their use case, developers get a single API that shields them from the complexity of authenticators and security mechanisms, and IT operators get a single backend that can select the right authenticator for a user by policy regardless of end-user platform or use case.

FIDO makes it possible to deliver strong authentication to users at population scale and changes the economics of authentication. FIDO protocols are now widely deployed commercially to over 3 billion users by the world’s largest Payments, Banking, Insurance, and Telecom companies. So far, FIDO protocols have addressed the mobile use case at scale across all operating systems and allowed authentication in browsers and on non-mobile devices through the use of the phone or a USB token as an authentication factor.

To reach an even wider audience, Nok Nok Labs has worked with Google, Microsoft and a few other partners to bring FIDO natively into Browsers and Operating systems. This new effort, best understood as “FIDO for Browsers”, sits next to the existing FIDO protocols that can be thought of as “FIDO for Mobile Apps”. The new work provides a standard API that allows users to log in with FIDO in a browser without a password and to use phones or tokens as authenticators.

FIDO2 is comprised of two parts. First, there is Web Authentication (aka WebAuthn), which is the JavaScript API (application programming interface), a W3C standard. The FIDO Alliance and the W3C worked together to develop this new standard that platform vendors are incorporating into major browsers, for example, Mozilla, Chrome, Edge, and WebKit. Second, there is the Client to Authenticator (CTAP) protocol. CTAP allows FIDO2-capable devices to interface to external authenticators over bluetooth, USB, or NFC. Web Applications do not use CTAP directly.

Here you see a high-level architectural view of FIDO2:

Here you see the 3 components on the client side:

  • Web pages that use the W3C WebAuthn JavaScript API, for example, using an SDK from Nok Nok Labs
  • The Web browser that implements the WebAuthn API and connects to the FIDO2 subsystem of the underlying operating system.
  • Authenticators that the subsystem accesses to verify the user.

The server side has the relying party’s web application connected to a FIDO2 Server, for example, from Nok Nok Labs.

For more details on WebAuthn, you can review the W3C JavaScript API. As you may note, the WebAuthn API is extensive. Nok Nok provides an SDK with a simpler API that handles the lower-level REST (Representational State Transfer) and WebAuthn calls. With the Nok Nok SDK, integrating FIDO2 into your application is considerably simplified.

Platform support for FIDO2 and WebAuthn is evolving. It is supported on Edge, Chrome, and Firefox browsers, and in Android apps. WebAuthn is a W3C approved standard. Over time the list of platforms and browsers should expand, so stay tuned! You can also try out FIDO now.

Try Now

Read more
15 May
3 Min read

Facebook Joins the FIDO Alliance | Another Big Milestone Towards Security, Ease of Use and Privacy in Authentication.

May 15, 2018 Nok Nok News FIDO Alliance, Industry News 0 comments

Facebook was a very early participant in 2011 in the informal incubation efforts that Nok Nok Labs conducted prior to creating the non-profit FIDO Alliance. It is also with some delight that we welcome back Brad Hill (@hillbrad) who will be Facebook’s representative to FIDO. We collaborated closely with Brad during his tenure at PayPal as co-authors of the FIDO-UAF specification and created the very first FIDO implementations. Brad has been a great supporter of the core principles we articulated for FIDO from its inception including security, ease of use and privacy by design.

More recently, during his early tenure at Facebook, Brad provided key feedback to the FIDO2 design work that we authored over the last few years with Google, Microsoft and others to fulfill the key goal of extending FIDO enablement from securing apps to securing browsers. As you might have seen, browser implementations are starting to roll out with initial support for different authenticators.

Passwords drive cost in a dozen dimensions that are not always readily apparent. Beyond the inconvenience factor, password reset and account takeover handling costs are spiraling. Damages accrue to individuals, companies and puts national infrastructure at risk. Most pernicious is the risk to the reputation of companies like Facebook who have to manage the integrity of the information being posted onto their networks. Their users also rely on them to provide them with adequate account security for their personal information and the networks need to ensure that only the right actors can participate in the social content of the network. Privacy requirements & accompanying violations, in particular, are gaining teeth with the EU’s General Data Protection Regulation (GDPR), the most comprehensive data privacy directive anywhere. FIDO powered solutions can provide a standards-based foundation to tackle these requirements.

Learn More

Facebook, like Amazon (who joined the Alliance earlier this year), Microsoft and Google while being technology players are also among the largest relying parties dealing with billions of consumers among them. These companies and their peers now have an unparalleled opportunity to make a dent in the password problem by providing FIDO-based authentication to their users at-scale, delivering simplicity, security and privacy in the authentication process and use that as a building block for their overall privacy commitments to their users. Facebook’s membership on the FIDO Board is a great milestone for Nok Nok’s vision for modern authentication towards a world without passwords and cementing FIDO’s future as a foundational building block for internet security.

Read more
23 Mar
5 Min read

FIDO | From Whence We Came

March 23, 2018 Nok Nok News FIDO Alliance 0 comments

The FIDO (Fast IDentity Online) Alliance was founded by a small group of companies including Nok Nok Labs five short years ago. A lot has happened in five years. We have progressed, pushed forward and our solution has built up an Alliance of over 250 of the worlds largest organizations all dedicated to solving one of the largest problems in today’s digital world: Authentication.

Five years ago, Nok Nok set out on a mission to solve a problem. Passwords had become an ungainly mess. One analysis of 6 million online accounts from that time revealed that there were only 10,000 unique passwords covering 99.8% of accounts. 73% of banking accounts were using passwords that were shared amongst other online services. From a security point of view, that is a massive problem. From a user’s point of view, the password problem could be proxied by a different statistic: cart abandonment. In 2013, 71.6% of online carts were abandoned. 31% of those were abandoned due to friction. .

 

SOURCE: Statista

It’s clear that the problem we had 5 years ago was significant and the underlying themes still resonate. Passwords, quite simply, are not designed for the modern computing ecosystems   We needed to design something better.

Nok Nok Labs knew that solving a systemic issue with computing would need a consortium of institutions to agree to the design and architecture of a fundamentally revolutionizing concept. And thus the FIDO Alliance was born.

The design parameters were straightforward: any new solution needed to provide for (1) User Experience, (2) Interoperability, (3) Privacy and (4) Security. The final solution had to be user friendly as widespread adoption was critical for viability.

Use Cases and Usability

The friction a user experiences due to username and passwords means that any authentication based on that scheme would have to be limited to granting access to an account. By creating something was both easier to use and provided additional identity assurance signals , end-users could be prompted to authenticate at any time without significantly increasing their friction and risking them abandoning their engagement.

The biometric revolution took off, it became clear that simple biometrics, like fingerprints, could provide the strong signal needed to not only provide account access but also confirm transactions, or log-in through a desktop or laptop or even through a kiosk or ATM. Usability drove usage and during the course of the last few years, FIDO-based authentication has reached out to over 3 billion users. It is deployed across the United States, China, Japan, Europe and Africa.

Interoperability

3 billion users from markets as diverse as mobile network operators, finance, healthcare and physical access control is a testament to a founding principle of the standard: Interoperability.  

The modern computing ecosystem is not a homogenous one. The FIDO specifications were designed so that their recommendations could be realized on any device for any application using any method of authentication. Therefore, it is now possible to perform strong authentication on a device from Apple, from Samsung, from Fujitsu – using a variety of biometrics from fingerprints to facial recognition. And each permutation or combination of FIDO-certified products (of which there are over 400) will provide the same level of privacy and security.

Privacy

FIDO-based solutions are being used by some of the largest banks and telecommunications companies in the world. These are institutions that are responsible for protecting your most details secrets. It was vital, in the design of the FIDO solution, that privacy was forefront.

First and foremost, biometric data that is used in an authentication event is never sent to a centralized server. The data stays on the user’s device, in the user’s control. Second, the FIDO protocol is based on asymmetric public key cryptography in such a way that users cannot be linked or tracked based on the information the company stores.

Security

One of the biggest flaws in the username/password system of authentication is the storage of shared secrets in a centralized database.  This allows one single breach to gain access to the entire dragons hoard of data that can be reused for attack after attack. The solution that Nok Nok Labs created and was encoded into the FIDO protocol was the decentralization of valuable identifiers. Private keys and the users biometric data would rest on the personal devices of the billions of FIDO users – making it infeasible for a bad actor to compromise the whole system.

Results

In the five years since the Alliance began, we have seen remarkable progress. Business have seen the cost of authentication go down significantly without compromising security. One financial institution reporting a savings of almost $3 million per year. Other reports include a decrease of requests for password resets by 60%. Multiple organizations have hailed how quickly this new architecture has been able to incorporate new technology like the Apple FaceID. And we are just getting started. The mission that Nok Nok started 5 years ago to transform authentication for the modern computing ecosystem is being realized and there are great things ahead.

* * *

If you would like to know more about Nok Nok’s work with Ericsson – please download our case study.

Ericsson Case Study

Read more
18 Sep
3 Min read

FIDO | Claims and Calculations | Nok Nok Labs and ThreatMetrix

September 18, 2017 Nok Nok News FIDO Alliance 0 comments

When we started Nok Nok Labs, I often said that our vision for Modern Authentication was that it was a “Game of Signals” – one that consisted of claims & calculations.

Users and devices provide a signal through an authentication claim (e.g. a password, a smart-card, a biometric etc). The relying party would process that claim and then often look at other signals (e.g. location, device integrity signals etc.) and the resulting calculation determined the final result.

Back in 2011 user authentication events were weak signals (e.g. passwords or phishable OTPs or strong authentication that was easily defeated by malware) with no alternatives. As a result, relying parties had to invest deeply in the calculation and amass many more signals to determine the result of the authentication claim. Weak signals create uncertainty and doubt that can cripple the business with excessive friction or create an opportunity for compromising credentials. Indeed, the Verizon Data Breach study reports credential compromise as the leading cause of data breaches. Fully 80% of hacking-related breaches leveraged either stolen passwords and/or weak or guessable passwords.

Existing strong authentication did not help a lot. It remains shocking to see how much of our deployed “strong authentication” is really vulnerable to phishing, MiTM and malware attacks. Gone are the days when authentication was supposed to be about a magic credential – a complex password, OTP token/smart-cards or assorted fanciful authenticators – that gave you keys to the kingdom.

Our vision led us to create the FIDO Alliance with our partners and seed it with our inventions leading to the first FIDO protocol aimed at strengthening the user-claim so that it could be strong signal. The standards allow the use of ANY method of authentication (e.g. tokens, biometrics, wearables etc.) while maintaining a simple consistent developer API and without changing the backend. It also provides the strong assurance that this was indeed the right user. It also characterizes the authentication environment and resists or eliminates phishing and MiTM attacks because of way we designed the cryptographic protocol.

In a recent speech, Treasury Secretary Steve Mnuchin hailed the FIDO Authentication standards and the FIDO Alliance’s work with NIST as an exemplary innovation in public-private partnerships and vital to enabling financial inclusion and banking the unbanked. We are proud to have contributed in a key role to that partnership with NIST. We continue to be the innovation leader at the FIDO Alliance and a key author/editor of its most widely deployed standards as well its upcoming standards.

Our NNL S3 Authentication platform is the industry’s leading standards-based way to deliver assurance that the business is dealing with the right user, right device and right context for cloud, mobile and IoT applications. The strong signals delivered by our platform can be transformative to risk platforms allowing the business to deliver frictionless user interaction, meet emerging regulations for authentication and data privacy and to personalize user interactions with confidence.

This announcement today by ThreatMetrix validates our vision of Modern Authentication – watch this space for more to come.

Read more
  • 123

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語