Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

11/26/2013
03:47 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

FPC And Nok Nok Labs Deliver Infrastructure For Fingerprint-Based Strong Authentication

End-to-end infrastructure solution uses fingerprint sensors on smartphones and tablets

GOTHENBURG, Sweden and PALO ALTO, California, November 26, 2013 /PRNewswire/ --

Fingerprint Cards (FPC) and Nok Nok Labs today announced an end-to-end infrastructure solution for strong and simple online authentication using fingerprint sensors on smartphones and tablets.

"Through this partnership, we offer mobile and tablet OEMs the ability to quickly integrate FPC's swipe and touch-based fingerprint sensors that are now also enabled for strong online authentication," said J rgen Lantto, Executive Vice President, CTO and Head of Strategy and Product Management at FPC. "This solution is the first result of our collaborative efforts to support the FIDO Alliance and is intended to help the alliance achieve its mission to transform the nature of online authentication, and to enable our customers to be part of its ecosystem."

"Nok Nok Labs' Multifactor Authentication Server allows any company to rapidly integrate smartphones and tablets using FPC's fingerprint sensors into their online authentication experience and minimize their reliance on weak passwords,"

said Phillip Dunkelberger, President and CEO, Nok Nok Labs. "Companies can now use fingerprint-based authentication as an 'ignition key' to create new classes of innovative and unique mobile experiences. Services such as mobile payments and user personalization can be implemented in ways that are more natural, faster and secure than before."

The two companies have initially implemented the joint solution utilizing the

FPC1080 fingerprint sensor, Nok Nok Labs' client and server technology, and commercially available Android smartphones using the FPC1080 fingerprint sensor in order to demonstrate readiness to support the emerging FIDO-based ecosystem.

As members of the FIDO Alliance, FPC and Nok Nok Labs are helping to define the FIDO Alliance's standards for universal strong authentication and are committed to supporting market adoption of the FIDO standard.

"We saw a tremendous opportunity to work with Nok Nok Labs to enable a rich and powerful ecosystem that will support FIDO standards and help realize the vision of the FIDO Alliance," said Mr. Lantto. Mr. Dunkelberger observed, "As a founding member of the FIDO Alliance, Nok Nok Labs appreciates the commitment of FPC to the FIDO Alliance. We expect that our collaboration will drive future innovation that will accelerate adoption of our joint commercial solution."

About Fingerprint Cards AB (publ)

Fingerprint Cards AB (FPC) develops, produces and markets biometric components that through the analysis and matching of an individual's unique fingerprint verify the person's identity. The technology consists of biometric sensors, processors, algorithms and modules that can be used separately or in combination with each other. The competitive advantages offered by the FPC's technology include unique image quality, extreme robustness, low power consumption and complete biometric systems.

With these advantages and the ability to achieve extremely low manufacturing costs, the technology can be implemented in volume products such as smart cards and mobile phones, where extremely rigorous demands are placed on such characteristics. The company's technology can also be used in IT and Internet security, access control, etc. Fingerprint Cards AB (FPC) is listed on the Nasdaq OMX Stockholm (FING B) and has its head office in Gothenburg.

About Nok Nok Labs

Nok Nok Labs, Inc., based in Palo Alto, CA, was founded to transform online authentication for modern computing. The company is backed by a team of security industry veterans from PGP, Netscape, PayPal & Phoenix, and have deep experience in building Internet scale security protocols and products. The company's ambition is to enable end-to-end trust across the web using authentication methods that are natural to end-users and provide strong proof of identity. For more information, visit http://www.noknok.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17672
PUBLISHED: 2019-10-17
WordPress before 5.2.4 is vulnerable to a stored XSS attack to inject JavaScript into STYLE elements.
CVE-2019-17673
PUBLISHED: 2019-10-17
WordPress before 5.2.4 is vulnerable to poisoning of the cache of JSON GET requests because certain requests lack a Vary: Origin header.
CVE-2019-17674
PUBLISHED: 2019-10-17
WordPress before 5.2.4 is vulnerable to stored XSS (cross-site scripting) via the Customizer.
CVE-2019-17675
PUBLISHED: 2019-10-17
WordPress before 5.2.4 does not properly consider type confusion during validation of the referer in the admin pages, possibly leading to CSRF.
CVE-2019-17676
PUBLISHED: 2019-10-17
app/system/admin/admin/index.class.php in MetInfo 7.0.0beta allows a CSRF attack to add a user account via a doSaveSetup action to admin/index.php, as demonstrated by an admin/?n=admin&c=index&a=doSaveSetup URI.