• Solutions
    • Passwordless Authentication
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
28 Jun
3 Min read

Reduce Cart Abandonment with Passkey Authentication

June 28, 2023 Matt Lourie E-Commerce, FIDO Alliance 0 comments

Reduce Cart Abandonment with Passkey Authentication

Matt Lourie, Sr. Director of Engineering

Passkey authentication is a solution to streamline the login and registration process, enhancing the overall user experience.

Developers of e-commerce web applications constantly face the challenge of improving user experience and increasing conversion rates. One common issue that online businesses struggle with is shopping cart abandonment. This blog explores the impact of complex login processes on cart abandonment rates and introduces passkey authentication as a solution to streamline the login and registration process, enhancing the overall user experience.

The Problem With Shopping Cart Abandonment

A recent study conducted by the FIDO Alliance sheds light on the significant losses faced by online retailers in the U.S. due to complex login processes. The survey found that 58% of shoppers abandon their carts and halt their purchases due to difficulties encountered during the sign-in process. Password-related frustrations, such as forgetfulness or the need to create new accounts, deter consumers from completing transactions. Additionally, 28% of respondents expressed that the hassle of setting up and remembering new passwords would discourage them from signing up for a new account. The study reveals a clear need for a simpler and more convenient authentication solution.

The Power of Passkeys

Passkeys offer a practical solution to address the challenges associated with complex login processes. Passkeys are a new and better way of signing in to websites and apps without passwords. They are unique digital keys that are stored on your device and verified with your biometric sensor, such as your fingerprint. Passkeys are more secure and convenient than passwords because they can’t be reused, guessed, or stolen. 

In the study, consumers expressed a preference for on-device biometrics, such as fingerprint or facial recognition, as alternatives to passwords. These methods were perceived as quicker and easier to use, with 68% believing they were more expedient than traditional two-factor authentication. Retailers that offer on-device authentication were seen as more invested in  customer experience, privacy, and security, and were more likely to be recommended to others. Passkeys help retailers stand out from competitors and create a positive brand image.

By eliminating the need for users to remember multiple login credentials, passkeys significantly enhance the overall user experience and encourage repeat visits. Users no longer have to struggle with password-related frustrations, leading to increased customer satisfaction and reduced cart abandonment rates.

Nok Nok Makes Implementing Passkeys Easy

Contrary to popular belief, implementing passkey authentication doesn’t require extensive coding or technical expertise. To help web developers, we have created a comprehensive video tutorial as part of our learning series. Our video tutorial demonstrates the step-by-step process of adding passkey authentication to your web app. Watch our video today, sign up for a free trial, and unlock the potential of passkeys to boost your conversions and improve customer satisfaction!

Read more
26 Jun
6 Min read

AI Brings Need for Robust Security

June 26, 2023 Nok Nok News Cybersecurity 0 comments

Title:  AI Brings Need for Robust Security to the Next Level
By: Dr. Rolf Lindemann

New technologies often enable new business models.  That is not a new observation.  The latest new technology is (or more precisely the latest technological break-through has been made using) Artificial Intelligence or “AI”.  Whenever the first signs of such new business models are visible, they trigger discussions around potential benefits and threats of the new technologies.  The latest discussion that caught my attention was the potential (mis-)use of AI for running large scale attacks.  I think it is worth putting that in perspective, because there is an underlying pattern here.  If that catches your attention, you are invited to follow me…

Years back, the internet brought us search engines that made information available in an instant.  To collect and keep updated all that information is an enormous and expensive effort (fixed cost), but it pays off since the cost per query is negligible but the revenue per search generates (advertising) revenue .  This is typically called a scalable business model .  

First phase of scalable attacks. What works “for good” often also works “for bad”, meaning that people with bad intentions can create scalable business models based on scalable attacks.  We have seen those already.  Back in 2013, hundreds of millions of passwords were stolen adding up to more than a billion stolen passwords at that time .   In some way that was the first phase of scalable attacks.  Those were focused on authenticating returning users.  Nok Nok was one of the founding members of the FIDO Alliance that published FIDO Authentication specifications which protect against scalable attacks and hence brings robust security to authentication.

Second phase of scalable attacks was focused on knowledge-based authentication , i.e. asking for your mother’s maiden name, name of your first pet, your first car model, social security number etc. to then assume it is only you that could correctly answer those questions.  Unfortunately, the search engines in the internet (see above) often can find the answer to such questions hence making it easy for attackers to create new accounts on behalf of a user.  This is not really surprising as that type of information was not considered a secret by any party and as a result was shared frequently.  Essentially breaking Identity Verification.   As a result, the Federal Financial Institutions Examination Council (FFIEC) stated that identity verification generally shall not solely depend on knowledge-based questions .   Document-centric identity proofing evolved as a response to this attack .  This means that users scan their picture ID and their face and let a remote service verify they match.  

Third phase of scalable attacks.  When your mom calls you on the phone, how do you know it is her?  First, you might see her phone number in the display of your phone.  Second, you will recognize her voice, and third, during the call you will recognize the way she interacts with you.  Now, maybe there is a number four: you will recognize her face when she uses a video call.  So that makes four independent methods – that looks pretty secure.  Maybe let’s not rely on the phone number as we know about the “Caller ID” spoofing attacks – yet another method lacking robust security: the Caller ID is not cryptographically tied to the phone line.  

So, what about her voice?  This is where AI comes in.  You might have heard about DALL-E , the engine using a large-language model that creates images based on your instructions (and the hundreds of millions of images used for training).  There is a similar engine called VALL-E, which simulates anyone’s voice after being trained with just 3 seconds of audio .  When I first saw this technology being used in a Bond movie , I considered it “science fiction” – now it is real and might soon be easily available to anyone on the darknet.  

What about mom’s face video?  The publicly used term for that is “Deepfake”.  There are very convincing examples available on the internet .  The Chaos Computer Club (CCC), Europe’s largest association of hackers, demonstrated how to attack a prominent document-centric identity proofing service using such an attack .  Again, these types of  tools might soon be easily available to anyone on the darknet (or already are, but I have not checked).  

So, the only security method that remains is the way she interacts with you.  I am sure this interaction does not change that frequently, so someone observing it once will likely be able to replicate it using the tools mentioned above.  Again, neither my voice nor a video recording of me are considered a secret.  They are often even available on the internet.  So methods that are only secure if no one can replicate such public information at the right time are not robust.

What are the “lessons learned” here?  When it comes to security that is robust against scalable attacks, we cannot rely on the difficulty to create voices nor videos of other people.  Instead, we really must use cryptographic methods directly backed by something the user possesses, like electronic ID cards and hardware backed wallets or indirectly backed by something the user possesses, like cloud wallets with strong proven security using strong user authentication backed by FIDO security keys, passkeys or similar .

The recent advances in AI make it very clear that we have to accelerate the shift towards robust security for all remote interactions as methods that were only theoretically attackable (but not practically attacked) before are practically attacked now (or will be in the near future).  This shift towards robust security will then help us to keep fraud under control, accelerate business and provide peace of mind to users – getting us closer to the ePromiseland .

Read more
23 Jun
1 Min read

Cyber Hero Series – It’s a bird, it’s a plane, it’s Tushar!

June 23, 2023 Nok Nok News Cyber Heros 0 comments

This week’s blockbuster premiere is a comedy, drama and a romance all wrapped in one with one of the perennial favorite actors, Tom Hanks – “Asteroid City.” And as is the case with any movie written and directed by Wes Anderson – there is a mix of styles and different time periods.

In today’s edition of the Cyber Hero Origins series, our second digital comic, we go back in time a little and look at how our Cyber Hero Tushar Phondge has spent a career eradicating passwords, working toward putting into the hands of individuals – not big companies – the control over the types of personal information that is shared. His mission – self-sovereign identity.

Nok Nok says THANK YOU, Tushar, for learning as a boy how to tinker with cars and applying that same passion to cyber security – evangelizing and implementing FIDO-based passwordless authentication solutions along the way.

Read more
16 Jun
2 Min read

Cyber Hero Micro Briefing Series with Tammi Hayes

June 16, 2023 Nok Nok News Cyber Heros, Video 0 comments

One of the most highly anticipated summer superhero movies is out today – “The Flash.”  While she can’t travel back in time like The Flash to change what’s happened in the past, our Cyber Hero this week, Tammi Hayes, has been there since the beginning, making us all more secure on the internet.

Tammi has been a cybersecurity champion for over two decades, pioneering its evolution since the early dot-com era. Her involvement with RSA, however, marked merely the beginning of her cybersecurity odyssey.

In this week’s episode of Cyber Hero Origins, Tammi describes her journey to becoming a cybersecurity evangelist and how she’s raised awareness for FIDO and Nok Nok – pushing forward the discourse on passwordless security and helping FIDO to become a globally accepted standard for all industries.

Thank you, Tammi! Your continuous efforts in cybersecurity are not merely a testament to your expertise and dedication, but it also serves as an inspiration for others!

Listen to her full podcast episode from earlier this week and subscribe to our blog to stay up to date on all the comics and podcasts premiering this summer in our Cyber Hero Origins series!

Read more
09 Jun
1 Min read

Cyber Hero Origins – Rakan Khalid

June 9, 2023 Nok Nok News Cyber Heros 0 comments

This week’s expected summer movie blockbuster is “Transformers – Rise of the Beast.” At the same time we are excited to present to you a “transformer” in his own field Rakan Khalid, Head of Product, Identity Verification and Authentication. Rakan is our first Cyber Hero Origin in the form of a comic! 

A little about why Rakan is a true Transformer and Cyber Hero: as a young person he took it upon himself to transform for his father, a doctor in Dubai, what was a paper based patient record system into an easy to manage electronic format. Fast forward through impressive jobs at Intel and eBay, and now Rakan is evangelizing FIDO-standards based passwordless authentication to protect his employer and their customers from breaches and fraud – not an easy transformation as people hold tightly to vulnerable passwords.

Nok Nok says THANK YOU to Rakan, one of many unsung cyber heroes who are responsible for thought leadership in his organization driving FIDO-based passwordless authentication. 

Subscribe to our blog and stay tuned, as we have comics and podcasts premiering all summer!

Read more
02 Jun
2 Min read

Intro to Cyber Hero Series – From the Beginning

June 2, 2023 Nok Nok News Cyber Heros, Video 0 comments
Intro to Cyber Hero Series - From the Beginning.
Read more

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • World Password Day: Time to Ditch Passwords for Good?
  • Verizon 2025 DBIR: Credential Attacks Still Dominate – A Nok Nok Perspective
  • Phillip Dunkelberger Recognized as a “Champion in Security” by Portal26 at RSA Conference 2025
  • Another Step Towards a Passwordless Future

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

 

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required

[mc4wp_form id=”18773″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18790″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18789″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18788″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18787″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18786″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18785″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18784″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18783″]

MUFG-800×600

“Transactions using mobile devices are rapidly spreading and it is essential to support both usability and security. By combining Hitachi’s abundant system development capabilities and know-how in the financial system and security related fields, and Nok Nok’s globally deployed and proven FIDO certified products, we achieved this compatibility, which led to this adoption.”

– Mr. Nobuo Nagaarashi, General Manager, Financial Information Systems 1st Division, Hitachi, Ltd.

 

The M in MUFG stands for Mitsubishi, which is a combination of the words mitsu and hishi. Mitsu means three. Hishi means water chestnut, and the word denotes a rhombus or diamond shape.  In partnership with Hitachi, MUFG has enabled passwordless authentication solutions across many of the bank’s apps and services.

Coverage In The Paypers
Coverage In Finextra
intuit

“As an early adopter of FIDO, we’ve seen significant business benefits and are completely on board with continuing to leverage the latest FIDO innovations with our partner, Nok Nok.”

– Rakan Khalid, Group Product Manager, Identity.

 

Intuit has delivered passwordless authentication across mobile applications and devices using Nok Nok’s S3 Suite. The results have reduced customer friction in their Intuit application experience.

Read The Nok Nok Intuit Case Study
Watch the FIDO Alliance Webinar: The Right Mix
Watch Marcio Mello discuss Intuit’s Nok Nok implementation at Identiverse 2019:
docomo-800×600

“DOCOMO is a worldwide innovator in providing its millions of customers with simple and strong authentication backed by a standards-based approach.”

– Phillip Dunkelberger, President & CEO of Nok Nok Labs.

 

As one of Nok Nok’s earliest customers, NTT DOCOMO became the first carrier to offer a billing system that is enabled by FIDO, the first to offer a federated Identity system integrated FIDO, and was the first to offer a mobile device that authenticates via the iris biometric modality.

Coverage In Find Biometrics
Coverage In Telecompaper
bbva-800×600-2

“Traditionally, one of the biggest challenges of authentication systems has been to balance security with user experience. Due to the FIDO standard, we are confident that both elements work together seamlessly to provide customers with the highest security standards, along with a transparent and agile user experience.”

– Juan Francisco Losa, Global Technology & Information Security Officer.

Nok Nok partnered with banking leader, BBVA to improve the security and user experience of the bank’s mobile banking services through state-of-the-art biometric capabilities.

Coverage In American Banker
Coverage In Planet Biometrics
Softbank-800×600-1

“We can no longer rely on passwords for our financial or other sensitive transactions as they are weak, forgotten and easily hacked. We are very pleased with SoftBank’s decision to choose our standards-based authentication platform for their millions of customers.”

– Phillip Dunkelberger, President & CEO of Nok Nok Labs.

 

Millions of SoftBank’s mobile subscribers now have the ability to use biometrics for authentication through the mobile application “My SoftBank Plus”. With this implementation, SoftBank’s mobile users access data with the My SoftBank service using biometrics for a frictionless, simple and fast authentication experience.

Coverage In Mobile ID World
Coverage In Planet Biometrics
Coverage In The Paypers
Aflac-Japan-800×600-1

“Aflac is the first Japanese insurance provider to deploy a FIDO-certified solution, and we would like to continue collaborating with Nok Nok Labs to introduce it to banks, insurance industry and other industries.”

– Michihiko Ejiri, VP, Head of Portal Service Division, Service Technology Unit, Fujitsu Limited.

With the Nok Nok S3 Suite, Fujitsu has provided Aflac customers with strong authentication to their mobile claims payment application using any biometrics on their iOS and Android devices. The solution also provides Aflac and their customers with a scalable method to authenticate users that is interoperable with their existing security environments and reduces or eliminates the reliance on usernames and passwords.

Coverage In Find Biometrics
Coverage In Find Authority
lichtenstein-800×600-1

“For our customers, we only use the most secure products on the market that meet their requirements. Nok Nok perfectly aligns within our product portfolio and we are proud of the very trusted partnership.”

– Lukas Praml, CEO of YOUNIQX.

 

YOUNIQX Identity AG, the award-winning subsidiary of the Austrian State Printing House (OeSD) and Nok Nok partnered to deliver a electronic identity system (eID) for the citizens of the country of Liechtenstein.  This deployment represents the first time that Nok Nok’s FIDO platform has been used to deliver an eID.

FUN FACT
As of 2009 Liechtenstein’s per capita income was $139,100, the highest of any country in the world.

Learn How FIDO Supports EIDAS Regulation
Coverage In Mobile ID World
Coverage In The Paypers
Coverage In Biometric Update
Gallagher-800×600-1

“Nok Nok’s state-of-the-art, standards-based platform will deliver a tremendous user experience,”

– Steve Bell, Chief Technology Officer at Gallagher

When a horse called Joe took too much of a liking to using a car as a scratching post, owner Bill Gallagher Sr. devised a cunning electrical circuit that delivered a shock whenever the horse rocked the vehicle, and in doing so created a company.  Today, with passwordless authentication from Nok Nok, Gallagher is leading the IoT industry with innovative solutions that work in your office and in the outback.

Coverage In Biometric Update
Coverage In Mobile ID World
Coverage In Planet Biometrics
tmobile-800×600-1

“Our Forgot Password flows were running at about 65%. After we rolled out FIDO by Nok Nok, our forgot passwords dropped to 7%.”

Michael Engan, T-Mobile

 

Using the Nok Nok S3 Suite, T-Mobile has become a leader in carrier adoption of passwordless authentication. Their solutions have reduced forgotten passwords and dramatically improved customer satisfaction.

Watch Michael Engan from T-Mobile talk about their implementation of Nok Nok’s S3 Authentication Suite at Identiverse 2019.

  • 日本語