• Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
25 Jan
3 Min read

Cross-Device Authentication

January 25, 2023 Nok Nok News Learning Series, Video 0 comments

Welcome to the Nok Nok Video Learning Series. We will look into passwordless authentication, one of the cool new technologies to make authentication more convenient, and more secure. Our focus today are Cross-Device Authentication user experiences. In the previous video, we created a passkey on a smartphone. In this video, we will see how we can authenticate a session on a laptop with this passkey.

A recent development is the Multi-Device Credential. In our previous video we created such a Multi-Device Credential on a smartphone. This credential is a kind of passkey that can be backed up from one device and stored to another. In practice, this is often enabled using trusted cloud services such as Icloud Keychain. This passkey was automatically restored to my laptop. Now I can use this passkey in my laptop to securely sign in without a password. This credential sync works across devices on the same device family. For example, all my Apple devices today. Other platforms are in the process of adding this feature as well.

There is another approach that works across device families. For example, to use a passkey on your smartphone to authenticate your laptop session. This approach lets you use your smartphone as a security key with the passkey remaining on the smartphone but being used by your laptop. To securely bind your smartphone and laptop, typically you scan a QR code shown on the laptop. Then the smartphone and laptop communicate over BLE to ensure physical proximity. Some smartphones remember the QR code binding and don’t require it for subsequent authentications.

Here is a third cross-device authentication method. This is an Out-of-Band method that works across all device families even smart TVs and similar devices. While it doesn’t verify the physical proximity of the two devices, it requires no special support in the primary device. A QR code is displayed on the primary device and scanned by your smartphone. This invokes the passkey on your smartphone to authenticate the session on the primary device.

Our last cross-device authentication method in this video is Push-Out-Of-Band. This method, like the previous one, doesn’t verify device proximity. And it works across all device families without special support in the primary device. You enter your user name on the primary device and the server sends a notification to your smartphone. This triggers the use of your passkey and authenticates the session on the primary device.

We have shown the user experience of major passwordless-flows using one of our DEMO applications. Nok Nok’s next generation platform allows you to easily implement and deploy passwordless authentication to internet scale. This helps you to improve the customer experience, reduce fraud and operating costs, and enable your organization to be passwordless.

Read more
23 Jan
2 Min read

Same-Device User Experience

January 23, 2023 Nok Nok News Learning Series, Video 0 comments

Welcome to the Nok Nok Video Learning Series. We will look into passwordless authentication, one of the cool new technologies to make authentication more convenient, and more secure. Our focus today is the Same-Device User Experience. To onboard new users, you can ask fewer questions providing a simpler experience for accessing your digital services, called progressive profiling. This can be done on any device for web apps and native apps. In this device, we use a web app on IOS using the Safari browser. We ask the user to register a passkey even before we run an identity verification process. So the user can resume the sign up process at any time in the case of hiccups.

In practice, banks will run a document-centric ID proofing process. But for simplicity in this demo, we only use a simple email OTP binding. Behind the scenes the user is bound to the device with a FIDO passkey, turning devices into a possession factor. Your user can then sign in securely and easily the next time. This improves the authentication success rate and reduces the authentication time. The passkey credential is shared on the same device making it seamless to switch between web apps and native apps. As a result, the Same-Device User Experience has the same convenient and phishing-resistant authentication experience in the browser and the native app on the same device. In our next video, we will focus on the Cross-Device Authentication Experience.

Read more
17 Jan
3 Min read

Apple Introduces New iPhone Security Features

January 17, 2023 Nok Nok News Industry News 0 comments

The smartphone has become a vital device for many users, and the iPhone is one of the most common models today. As a result, a lot of important data and accounts are accessible through the use of an iPhone, meaning that security has become far more important for these devices. Multifactor authentication, which is a process of using more than one verification system, has been crucial in increasing cybersecurity. As documented by Forbes, Apple has introduced new ways to improve that security further.

Physical Security Returns

The iPhone is now adding an additional layer of multifactor authentication security in the form of “security keys.” Unlike passkeys, which are entirely digital in form, a security key is a physical object, such as a token that uses NFC technology or a USB device that plugs directly into the phone.

The security key operates by being paired and recognized by only a single device. When attempting to access an iPhone with security key features enabled, in addition to multifactor authentication measures such as face or fingerprint recognition, the security key must either be in proximity to the iPhone or plugged directly into it, depending on the nature of the key. The iPhone will only unlock if the presence and validity of the security key are confirmed.

Why This Matters

Today’s smartphones, including the iPhone, often contain some of the most important data and access in a person’s life. In addition to personal materials such as photos and messages, accounts for everything from banking to shopping are typically part and parcel of accessing an iPhone. In other words, people who have phones stolen and accessed aren’t just losing a convenient form of communication; they may also be granting thieves access to their financial data, work data, and personal data.

This is why multifactor authentication is crucial for device security, especially for devices like iPhones that are small and can be easily lost or stolen. If a phone is lost, the security key requirement prevents others from accidentally accessing the device. In the event of theft, criminals cannot use the data on the phone for broader criminal activities, such as identity theft, emptying bank accounts, and using credit cards to make purchases. 

iPhones are incredibly convenient devices, especially with more and more interactions centralized online. However, that same convenience also means the devices are particularly vulnerable and can cause enormous damage if unauthorized users access them. 

If you’re interested in passkeys and increased cybersecurity, learn more here about Nok Nok’s multifactor authentication technology and passwordless security measures.

Read more
12 Jan
1 Min read

Customers Don’t Need a Password

January 12, 2023 Nok Nok News passwordless authentication, Video 0 comments

In this video, we discuss how your customers don’t need a password with a passwordless authentication solution from Nok Nok. Eighty percent of all cybercrime starts with stolen passwords. Beyond that your customers hate passwords, forget passwords, and use up your valuable resources to reset passwords. But with Nok Nok’s solutions, your customers don’t need a password. That’s because Nok Nok provides passwordless authentication, including expert support for passkeys, that allows customers to easily and securely access your services. That saves time, saves money, and improves the trust your customers have placed in your brand. Choose the company with the largest banks, telcos, and financial services trust to protect their customers. Choose Nok Nok, the global leader in passwordless authentication.

Connect with us on Linked IN

Schedule a Free Learning Session

Read more
22 Nov
3 Min read

Nok Nok Now Provides Full Passkey Support

November 22, 2022 Nok Nok News Press Release 0 comments

Nok Nok, one of the founding partners in the FIDO Alliance, or “Fast IDentity Online,” is now announcing full support for passkeys to offer digital service providers an alternative to traditional password verification with safer, faster, passwordless authentication combined with passkeys.

Over 80% of successful digital intrusions result from password credential theft, either through sophisticated phishing techniques to steal passwords or personal secrets or user negligence in failing to use strong, secure passwords that are difficult to remember. With digital cyber crime accelerating, single password verification systems are becoming increasingly vulnerable as all it takes is one stolen password to assume significant or complete control of a customer’s system.

Passkeys As A Solution

Passkeys are a phishing-resistant replacement for passwords that provide faster, easier, and more secure sign-ins to websites and apps across a user’s devices. Unlike passwords, passkeys are resistant to phishing, are always strong, and are designed so that there are no shared secrets.  Different user authenticators can be used, such as various biometric factors like face or fingerprint identification, but this is also combined with additional authentication procedures, such as verifying encrypted keys on a personal device, such as a phone, for additional security.

For clients who already support FIDO, the technology behind passkeys, the Nok Nok S3 authentication platform now fully. supports single-device and multi-device passkeys and requires no code changes. For clients who do no already support FIDO, the Nok Nok S3 suite provides passkey support for both single-device and multi-device passkeys on one authentication infrastructure. Integrating passkeys not only makes user registration and sign-in more secure but also makes them faster and less prone to error and frustration.

Improving User Experiences

Because of the ease of passwordless authentication based on passkeys, businesses have found that passkey sign-in dramatically reduces user friction during sign-in while also reducing credential theft from phishing attacks since there are no shared secrets with passkeys. Passkeys are the next-level multi-factor authentication designed to replace passwords. Even though a typical “strong password” is possible with a long string of random alphanumeric characters, these passwords are harder to remember and they still require a second authentication factor such as SMS or email of passcodes.  Passkeys do away with passwords and the need for a second code for authentication (two factor authentication). because the technology behind passkeys provides multi-factor authentication in one simple, user step.

Passwordless authentication with passkeys offer a 99.5% sign-in success rate and typically speeds up the sign-in process for users by anywhere from 100-200%. This means fewer sign-in failures, less frustration, and perhaps most importantly, people not abandoning a service because they find the traditional multifactor authentication process too restrictive, demanding, and inconvenient. Thus, they switch to another service that treats them better.

These initiatives by the FIDO alliance continue to provide more security to businesses and their data, with more convenience and speed for customers. Do you need to learn more about FIDO protocol and moving to a passwordless authentication system, read here to learn more.

Read more
  • 12

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語