Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

11/26/2013
03:47 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

FPC And Nok Nok Labs Deliver Infrastructure For Fingerprint-Based Strong Authentication

End-to-end infrastructure solution uses fingerprint sensors on smartphones and tablets

GOTHENBURG, Sweden and PALO ALTO, California, November 26, 2013 /PRNewswire/ --

Fingerprint Cards (FPC) and Nok Nok Labs today announced an end-to-end infrastructure solution for strong and simple online authentication using fingerprint sensors on smartphones and tablets.

"Through this partnership, we offer mobile and tablet OEMs the ability to quickly integrate FPC's swipe and touch-based fingerprint sensors that are now also enabled for strong online authentication," said J rgen Lantto, Executive Vice President, CTO and Head of Strategy and Product Management at FPC. "This solution is the first result of our collaborative efforts to support the FIDO Alliance and is intended to help the alliance achieve its mission to transform the nature of online authentication, and to enable our customers to be part of its ecosystem."

"Nok Nok Labs' Multifactor Authentication Server allows any company to rapidly integrate smartphones and tablets using FPC's fingerprint sensors into their online authentication experience and minimize their reliance on weak passwords,"

said Phillip Dunkelberger, President and CEO, Nok Nok Labs. "Companies can now use fingerprint-based authentication as an 'ignition key' to create new classes of innovative and unique mobile experiences. Services such as mobile payments and user personalization can be implemented in ways that are more natural, faster and secure than before."

The two companies have initially implemented the joint solution utilizing the

FPC1080 fingerprint sensor, Nok Nok Labs' client and server technology, and commercially available Android smartphones using the FPC1080 fingerprint sensor in order to demonstrate readiness to support the emerging FIDO-based ecosystem.

As members of the FIDO Alliance, FPC and Nok Nok Labs are helping to define the FIDO Alliance's standards for universal strong authentication and are committed to supporting market adoption of the FIDO standard.

"We saw a tremendous opportunity to work with Nok Nok Labs to enable a rich and powerful ecosystem that will support FIDO standards and help realize the vision of the FIDO Alliance," said Mr. Lantto. Mr. Dunkelberger observed, "As a founding member of the FIDO Alliance, Nok Nok Labs appreciates the commitment of FPC to the FIDO Alliance. We expect that our collaboration will drive future innovation that will accelerate adoption of our joint commercial solution."

About Fingerprint Cards AB (publ)

Fingerprint Cards AB (FPC) develops, produces and markets biometric components that through the analysis and matching of an individual's unique fingerprint verify the person's identity. The technology consists of biometric sensors, processors, algorithms and modules that can be used separately or in combination with each other. The competitive advantages offered by the FPC's technology include unique image quality, extreme robustness, low power consumption and complete biometric systems.

With these advantages and the ability to achieve extremely low manufacturing costs, the technology can be implemented in volume products such as smart cards and mobile phones, where extremely rigorous demands are placed on such characteristics. The company's technology can also be used in IT and Internet security, access control, etc. Fingerprint Cards AB (FPC) is listed on the Nasdaq OMX Stockholm (FING B) and has its head office in Gothenburg.

About Nok Nok Labs

Nok Nok Labs, Inc., based in Palo Alto, CA, was founded to transform online authentication for modern computing. The company is backed by a team of security industry veterans from PGP, Netscape, PayPal & Phoenix, and have deep experience in building Internet scale security protocols and products. The company's ambition is to enable end-to-end trust across the web using authentication methods that are natural to end-users and provide strong proof of identity. For more information, visit http://www.noknok.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.