• Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
14 Apr
3 Min read

FIDO | Beyond the Basics | What You Need to Know

April 14, 2017 Nok Nok News FIDO Alliance 0 comments

But now we need to set our sights beyond basic FIDO. Standards typically represent the lowest common denominator of functionality that can be agreed to across a large body of independent organizations. Certainly, more advance features that leverage FIDO are possible, and most definitely desirable.

While our product and engineering teams lead FIDO standards development, we have been busy also mapping out and delivering capabilities that go beyond basic FIDO. The following questions should be considered as your organization establishes or evolves their approach to modern authentication.

How important are risk signals and policy based authentication mechanisms?

The ability to measure certain risk oriented signals, and build policies around those signals leads to a more granular view of authentication. Three areas that we have focused on include geolocation, travel speed and device health:

  • Geolocation – This signal locates a user’s device location and can check against a policy defined list of restricted countries. This enables the administrator to deny access from disallowed locations and adjust their risk score.
  • Travel Speed – This signal determines if the user’s device has travelled too far in too short a time. It uses the device’s geolocation to calculate the travel speed from the last login location and time. With this information, users can take policy-defined action to adjust risk scores or deny fraudulent access from multiple locations within a short time interval.
  • Device Health – This signal checks for signs of tampering on the device.

Do you need to consider Out-of-band authentication and friendly-fraud scenarios?

Out-of-band authentication extends the FIDO credentials on a user’s mobile device to a second device – primarily their desktop. The omni-channel approach can bring a new desktop login modality to customers. Start a banking transaction on your phone, and finish it on your computer while leveraging the biometrics from your phone to validate the user on both devices.

Reduction of “Friendly Fraud” – In order to counter unintended fraud on shared devices, we’ve developed a method of ensuring that only biometrics authorized by the primary device or application user can authenticate to an account. This offers a major differentiator over basic FIDO for use cases that need a higher standard of security.

Do you have plans to support multiple Relying Parties in a multi-tenant capability?

For mobile network operators and other internet infrastructure vendors, the opportunity arises to become the consumer identity provider of record for many different service providers (Relying Parties) that leverage your platform and ecosystem. Does your business model postulate supporting multiple relying parties and their authentication needs in a multi-tenant capability? If so, a basic FIDO implementation will single tenant support will require a far broader investment in infrastructure and licensing than Nok Nok’s leading multi-tenant solutions in this space. Understanding the nuances of different vendor platforms and capabilities can create strategic advantage now and with future business needs.

Our development team has even more interesting new functionality in the lab that they will be sharing in upcoming release cycles. Stay tuned for additional features that extend the benefits of a FIDO approach to more use cases and value drivers.

Read more
16 Dec
3 Min read

Bipartisan U.S. Commission on Enhancing Cybersecurity & FIDO for Strong Authentication

December 16, 2016 Nok Nok News FIDO Alliance, Government 0 comments

Recently the U.S. Commission on Enhancing National Cybersecurity released its report detailing some 50 separate recommendations on how the next administration can strengthen cybersecurity across the United States.

At the core of these recommendations were two key items that have been at the heart of what Nok Nok Labs has been doing since its inception. First, the Commission calls on the new Administration to “launch a national public and private initiative to achieve major security and privacy improvements by increasing the use of strong authentication to improve identity management”. In an interview with Charlie Rose after this report was released, the Vice-Chair of the Commission, Samuel Palmisano, ex-CEO of IBM, identifies the fact that the Federal Government can play a massive role in changing how people view their method of authentication. By implementing strong authentication principles across the various government services, within various government agencies, the massive Federal Government has an opportunity to be an engine that will drive change in consumers expectations and behavior.

Additionally, the FIDO Alliance and the FIDO protocol were called out by name as an example of how to overcome identity authentication challenges. FIDO can be used on over a billion devices that are in the hands of users today, right now. Microsoft has incorporated FIDO into their Windows Hello feature and there are millions of people worldwide who are using it to authorize payments, log into accounts, check their private healthcare information and even gain access to buildings and meeting rooms.

______

What sets FIDO apart is usability.

_____

What sets FIDO apart is usability.  By giving the users the option to secure their devices using biometrics, FIDO eliminates the need to keep track of several different credentials and makes strong authentication possible at large scale.

Of course, security is a game of details. The FIDO specification is only a protocol and not a deployable technology. It needs to be built. Here at Nok Nok Labs, we have had the pleasure of working with leading organizations to develop and license our technology to secure the entirety of the required architecture — from the trusted execution environment at the silicon layer, to the ecosystem of authenticators capable of plugging into the network, to the operating systems on devices and the servers on the back end.

This expertise can be leveraged by our clients and partners to create a flexible, extensible platform capable of providing a seamless experience to their users and proof against the disruptive innovations coming in the world of biometrics.

While there will be uncertainty with the next Administration, Nok Nok Labs will continue to work to achieve our long-held goals to have FIDO be ubiquitous on devices, in applications, in authenticators, contained within browsers and operating systems and embedded in silicon. No single vendor can move this mountain on their own. We applaud the Commission in its recommendations and look forward to continuing the journey we started several years ago.

Read more
  • 123

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語