• Solutions
    • Passwordless Authentication
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
25 Oct
3 Min read

More Banks & Credit Cards Are Using Biometrics

October 25, 2022 Nok Nok News passwordless authentication 0 comments

Thanks to the efforts of the FIDO alliance and big businesses such as Google and Apple, passwordless authentication is growing in the world of banking and credit card transactions. Biometric features are increasingly found to be fast, safe, efficient, and more secure for users, though some factors are still being addressed.

Global Adoption

Ironically, despite the United States’ reputation for developing cutting-edge technology, the American public often is slower to adopt new technologies and techniques compared to the rest of the world. For example, Alipay was one of the earliest vendors to introduce facial biometric payment in China. As a result of this early implementation, payment using facial biometrics is ahead of the curve in China compared to the United States. However, part of the reason for the slower uptake in the United States is cultural factors. Whereas Chinese shoppers don’t worry too much about whether facial biometrics are an invasion of privacy, American shoppers do and thus express reluctance. Conversely, American shoppers seem more comfortable with a fingerprint biometric than many other countries.

Another issue is trust and regulation. Europe is generally regarded as a harsher, more regulated, and thus “safer” transactional environment. So the thinking is that if biometric transactions meet the stringent demands of European Union financial regulations, that will mean they more easily exceed the safety and privacy requirements that would be in place in the United States.

Devices Matter

One of the most promising approaches for banking and credit card transactions has been using mobile devices for verification and authentication. There are multiple reasons this solution is popular, not the least of which is the ubiquity of such personal mobile devices in most of the population. However, the other advantage of this is that biometric authentication can remain private.

In this solution, biometrics and the data required for authentication remain on the phone and not in some online database where a breach would result in the theft of private information. Instead, once someone’s biometrics have been confirmed, the mobile device itself is considered authenticated. It can communicate with other networks, using a multifactor authentication system, of which biometrics is merely one link in the chain but the easiest one for people to use, while other factors handle the “heavy lifting” in the background. All of this is part of the initiatives employed by the FIDO alliance to make things easier. If you’re interested in using the FIDO protocol and moving to a passwordless authentication system, read here to learn more.

Read more
18 Oct
3 Min read

Telephone Companies Find Value In The Zero Trust Security Concept

October 18, 2022 Nok Nok News Industry News 0 comments

The United States relies increasingly on mobile devices like smartphones to send and receive data, and this meant that a need for wireless data transmission similar in volume to wired Internet connections has come into greater demand. The result is that the 5G wireless network, the latest, fastest, and largest data transmission standard, continues. The largest telecommunications companies, such as Verizon and AT&T, continue their rollout, with an estimated coverage of 175 and 100 customers. However, this also means that more security will also be required as more data is transmitted across 5G networks. And zero trust policies, with convenient password-free authentication systems, will be critical to this success.

What Is Zero Trust?

As the name implies, “zero trust” security means making no assumptions about the validity of a person or device attempting to access data and requiring multiple stages of verification and authentication throughout every step of login and transaction. This has become even more prevalent in recent years as the pandemic forced many companies to keep workers at home, using home devices, and in some cases, even their own smart devices, to remotely access data. This meant that some of the usual trust mechanics, such as knowing a valid user was correctly accessing the network because they could be physically seen at their desk, on their office computer, accessing data locally stored on that device, could no longer be taken as givens. Now, workers needed to be able to access data remotely from any number of locations and devices, making authentication of legitimate users a priority.

One of the hallmarks of zero trust protocol is constant verification. It is not enough to accept a password of biometric authentication once and then turn a blind eye to whatever that user does for the remainder of the transaction period. Verification is an ongoing process for different actions; thus, password-free authentication systems are important in streamlining this process.

Another important aspect of the zero trust approach is “limiting the blast radius.” A security protocol is extremely vulnerable if it assumes no breach will ever happen and thus has no contingencies in place if one occurs. Zero trust protocols take breaches of some kind as a given and compartmentalize access and activities so that even if a breach occurs, it can be quickly contained and quarantined, rather than allowing a single breach to gain complete, centralized control of an entire system.

If you are interested in zero trust security concepts and incorporating FIDO protocol into a password-free authentication system, read here to learn more.

Read more
11 Oct
3 Min read

Transitioning To Passwordless Authentication Easier Than Ever

October 11, 2022 Nok Nok News Industry News 0 comments

While passwords and knowledge-based access (KBA) were once the herald of cybersecurity, the evolution of technology and the proliferation of digital connectivity are slowly making passwords a thing of the past. Passwords have become a nuisance for both users, employees and IT personnel, causing frustration as users struggle to remember passwords that they need to update regularly, while costing organizations millions of dollars in OPEX and lost productivity and revenue during password recovery and resets – both behind and outside the enterprise perimeter. Passwordless authentication can help avoid this.

4 Tips For A Frictionless Transition To Passwordless Authentication

NokNok Inc has been a pioneer of passwordless authentication, encouraging organizations and enterprises to shift to improve their cybersecurity. Plenty of enterprises have started to invest in passwordless authentication but this transition can be challenging. The following tips can help for a smoother enterprise transition for everyone involved.

Manage Passwords As Best As You Can

Don’t rush the transition. If your organization must use passwords for the next few years, simply do your best to keep passwords safe. Password managers continue to be funded and enterprise versions can help prevent password loss while keeping passwords safe. Password managers offerempowering features that help employees create unique and complex passwords without the fear of forgetting them . Many offer extensive support for both web and mobile app authentication as well – including web browsers.

Multifactor Authentication Is Important

Multifactor authentication (MFA) is a great way to ease employees into passwordless technology. MFA is the next natural step for enterprises who cannot entirely shift users and employees to passwordless yet. Most passwordless platforms can be integrated into existing security infrastructure and can offer MFA combined with modern biometric authentication since most devices already offer native biometric features.

Use True SSO To Centralize Authentication

True SSO is another step that can ease the transition to passwordless authentication while improving security. True single sign-on (SSO), offered in the cloud, allows users to log on to devices and platforms using only a single set of access credentials. Modern passwordless systems also provide wide support for SSO infrastructure.

Be Realistic With Passwordless Authentication

While passwordless is definitely the future and now here to stay, it will likely take many more years before the world’s digital services become fully passwordless. Don’t expect your entire organization or your customer base to go fully passwordless in a matter of years because many are still not comfortable with biometric-based authentication. Be realistic about the changes that you can make because it is fully possible to improve security with a move toward passwordless authentication without burdening IT departments with sudden changes to their security infrastructure.  Most enterprise infrastructures and the complex ecosystems with which they are connected, are still entirely based on password and KBA. Digital transformation projects can last years to finish migration.

Nok Nok Inc offers a range of passwordless authentication, payments and transaction verification feature that meet your organization’s B2C passwordless needs where you are. We support for and integration with existing multifactor authentication for customers who are not yet ready to entirely adopt biometric-based passwordless authentication. Organizations who have shifted to our services saw 50% reduction in customer onboarding time and a staggering 78% increase in sign in customer sign-inspeed. Harness the phishing-resistant customer security offered by NokNok’s passwordless technologies. Learn more about Nok Nok Inc’s products here.

Read more
04 Oct
3 Min read

Blockchain Vulnerabilities Have Cost More Than A Billion

October 4, 2022 Nok Nok News Industry News 0 comments

2022 has been a tough year for crypto investors as blockchain platforms have been targeted by cyber attackers left and right. A total of $1.4 billion has been lost due to these attacks. Ronin, a bridge that supports Axie Infinity, has lost $615 million; Wormhole, a bridge backed by Jump Trading, lost $320 million; Horizon, a bridge by Harmony, lost $100 million; and around $200 million was stolen from Nomad.

How Were Blockchain Networks Hacked?

Cyberattackers exploit vulnerabilities in blockchain technology, specifically blockchain bridges and humans. Blockchain bridges are a type of software through which people send out tokens from one blockchain network to another. Bridges, being the piece of code that enables smart contracts to execute without human intervention, typically hold large values being transferred from one network to another. Without adequate security, these bridges are easy targets.

Although transactions must first be approved by validators to become successful, hackers are able to manipulate validators into handing over their private keys or compromise only a few accounts to withdraw funds. Bridges are central to blockchain technology, which is why their increased vulnerability is a major cause for concern.

Another way hackers steal funds is through human vulnerability. Some rely on social engineering tricks to convince a victim to send funds to them. Another method is by simply stealing cryptographic keys or private digital signatures, the access for which they gain  through apps, wallets, and other third-party vendors that authenticate users to their digital services via legacy authentication. In other words, password-based authentication.

Eliminating The Human Risk Factor With Passwordless Authentication

Cryptocurrencies are continuously expanding, and blockchain technology grows with it. Despite the advanced technology with which blockchain technologies operate, cybercriminals are still able to find ways in through something as basic as a password login.

Passwords have long been a favorite vulnerability of cyber attackers. Both methods used by cyberattackers of blockchain networks succeeded through compromised phishing and man-in-the-middle attacks resulting in stolen passwords. With the increased interconnectedness of systems nowadays, even a technology as sophisticated and secure as decentralized blockchain requires strong, passwordless authentication,  because of its distributed access.

Unphishable, key-based passwordless authentication is one way to elevate the security for blockchain networks across all platforms, especially third party applications. Nok Nok Inc, along with the global industry group (FIDO Alliance) they founded are on a mission to reduce people’s reliance on extremely vulnerable legacy password and knowledge-based system access.

Passwordless authentication is a possession-based and biometric authentication technique that relies on public-private cryptography. It generates a public-private key pair—the public key is shared with a service while the private key remains safe in the user’s device, protected by a PIN or biometrics. This system is incredibly convenient for end-users, as well as safe.

You can strengthen your cybersecurity with Nok Nok’s passwordless authentication system. To learn more about Nok Nok Inc’s industry-leading FIDO platform, contact us here.

Read more

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • World Password Day: Time to Ditch Passwords for Good?
  • Verizon 2025 DBIR: Credential Attacks Still Dominate – A Nok Nok Perspective
  • Phillip Dunkelberger Recognized as a “Champion in Security” by Portal26 at RSA Conference 2025
  • Another Step Towards a Passwordless Future

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

 

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required

[mc4wp_form id=”18773″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18790″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18789″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18788″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18787″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18786″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18785″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18784″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18783″]

MUFG-800×600

“Transactions using mobile devices are rapidly spreading and it is essential to support both usability and security. By combining Hitachi’s abundant system development capabilities and know-how in the financial system and security related fields, and Nok Nok’s globally deployed and proven FIDO certified products, we achieved this compatibility, which led to this adoption.”

– Mr. Nobuo Nagaarashi, General Manager, Financial Information Systems 1st Division, Hitachi, Ltd.

 

The M in MUFG stands for Mitsubishi, which is a combination of the words mitsu and hishi. Mitsu means three. Hishi means water chestnut, and the word denotes a rhombus or diamond shape.  In partnership with Hitachi, MUFG has enabled passwordless authentication solutions across many of the bank’s apps and services.

Coverage In The Paypers
Coverage In Finextra
intuit

“As an early adopter of FIDO, we’ve seen significant business benefits and are completely on board with continuing to leverage the latest FIDO innovations with our partner, Nok Nok.”

– Rakan Khalid, Group Product Manager, Identity.

 

Intuit has delivered passwordless authentication across mobile applications and devices using Nok Nok’s S3 Suite. The results have reduced customer friction in their Intuit application experience.

Read The Nok Nok Intuit Case Study
Watch the FIDO Alliance Webinar: The Right Mix
Watch Marcio Mello discuss Intuit’s Nok Nok implementation at Identiverse 2019:
docomo-800×600

“DOCOMO is a worldwide innovator in providing its millions of customers with simple and strong authentication backed by a standards-based approach.”

– Phillip Dunkelberger, President & CEO of Nok Nok Labs.

 

As one of Nok Nok’s earliest customers, NTT DOCOMO became the first carrier to offer a billing system that is enabled by FIDO, the first to offer a federated Identity system integrated FIDO, and was the first to offer a mobile device that authenticates via the iris biometric modality.

Coverage In Find Biometrics
Coverage In Telecompaper
bbva-800×600-2

“Traditionally, one of the biggest challenges of authentication systems has been to balance security with user experience. Due to the FIDO standard, we are confident that both elements work together seamlessly to provide customers with the highest security standards, along with a transparent and agile user experience.”

– Juan Francisco Losa, Global Technology & Information Security Officer.

Nok Nok partnered with banking leader, BBVA to improve the security and user experience of the bank’s mobile banking services through state-of-the-art biometric capabilities.

Coverage In American Banker
Coverage In Planet Biometrics
Softbank-800×600-1

“We can no longer rely on passwords for our financial or other sensitive transactions as they are weak, forgotten and easily hacked. We are very pleased with SoftBank’s decision to choose our standards-based authentication platform for their millions of customers.”

– Phillip Dunkelberger, President & CEO of Nok Nok Labs.

 

Millions of SoftBank’s mobile subscribers now have the ability to use biometrics for authentication through the mobile application “My SoftBank Plus”. With this implementation, SoftBank’s mobile users access data with the My SoftBank service using biometrics for a frictionless, simple and fast authentication experience.

Coverage In Mobile ID World
Coverage In Planet Biometrics
Coverage In The Paypers
Aflac-Japan-800×600-1

“Aflac is the first Japanese insurance provider to deploy a FIDO-certified solution, and we would like to continue collaborating with Nok Nok Labs to introduce it to banks, insurance industry and other industries.”

– Michihiko Ejiri, VP, Head of Portal Service Division, Service Technology Unit, Fujitsu Limited.

With the Nok Nok S3 Suite, Fujitsu has provided Aflac customers with strong authentication to their mobile claims payment application using any biometrics on their iOS and Android devices. The solution also provides Aflac and their customers with a scalable method to authenticate users that is interoperable with their existing security environments and reduces or eliminates the reliance on usernames and passwords.

Coverage In Find Biometrics
Coverage In Find Authority
lichtenstein-800×600-1

“For our customers, we only use the most secure products on the market that meet their requirements. Nok Nok perfectly aligns within our product portfolio and we are proud of the very trusted partnership.”

– Lukas Praml, CEO of YOUNIQX.

 

YOUNIQX Identity AG, the award-winning subsidiary of the Austrian State Printing House (OeSD) and Nok Nok partnered to deliver a electronic identity system (eID) for the citizens of the country of Liechtenstein.  This deployment represents the first time that Nok Nok’s FIDO platform has been used to deliver an eID.

FUN FACT
As of 2009 Liechtenstein’s per capita income was $139,100, the highest of any country in the world.

Learn How FIDO Supports EIDAS Regulation
Coverage In Mobile ID World
Coverage In The Paypers
Coverage In Biometric Update
Gallagher-800×600-1

“Nok Nok’s state-of-the-art, standards-based platform will deliver a tremendous user experience,”

– Steve Bell, Chief Technology Officer at Gallagher

When a horse called Joe took too much of a liking to using a car as a scratching post, owner Bill Gallagher Sr. devised a cunning electrical circuit that delivered a shock whenever the horse rocked the vehicle, and in doing so created a company.  Today, with passwordless authentication from Nok Nok, Gallagher is leading the IoT industry with innovative solutions that work in your office and in the outback.

Coverage In Biometric Update
Coverage In Mobile ID World
Coverage In Planet Biometrics
tmobile-800×600-1

“Our Forgot Password flows were running at about 65%. After we rolled out FIDO by Nok Nok, our forgot passwords dropped to 7%.”

Michael Engan, T-Mobile

 

Using the Nok Nok S3 Suite, T-Mobile has become a leader in carrier adoption of passwordless authentication. Their solutions have reduced forgotten passwords and dramatically improved customer satisfaction.

Watch Michael Engan from T-Mobile talk about their implementation of Nok Nok’s S3 Authentication Suite at Identiverse 2019.

  • 日本語