June 28, 2018

White Paper: Hardware-backed Keystore Authenticators (HKA) on Android 8.0 or Later Mobile Devices

Enabling Any Relying Parties to Create FIDO UAF (1.1 or later) Client Apps

This paper introduces the details of a hardware-backed Keystore authenticators (HKA) implementation approach, based on the first commercial deployment. It takes advantage of secure Android Keystore with key attestation and fingerprint sensors in hardware on standard off-the-shelf Android 8.0 or later mobile devices. Since it is enabled only by Android applications, any RPs and application developers can develop their own secure FIDO UAF 1.1 authenticators.

MORE Implementation & Deployment


PSD2 Support: Why Change to FIDO

Banks in Europe have deployed customer authentication solutions for several...

July 1, 2020

2020 FIDO Hackathon in Korea: Learn & Implement Phase

Joon Hyuk Lee, APAC Market Development Director, FIDO Alliance Editor’s...

June 19, 2020

White Paper: Multiple Authenticators for Reducing Account-Recovery Needs for FIDO-Enabled Consumer Accounts

When a service deploys FIDO Authentication, it must have a...

June 4, 2020

FIDO & eIDAS: Providing Secure and Seamless Electronic Services in the EU

Megan Shamas, Director of Marketing, FIDO Alliance Over the last...

May 15, 2020
Download Specs
Sign up for updates!Get news from FIDO Alliance in your inbox.

By submitting this form, you are consenting to receive communications from: FIDO Alliance, 401 Edgewater Place, Suite 600, Wakefield, MA, 01880, US, http://www.fidoalliance.org. You can revoke your consent to receive emails at any time by using the unsubscribe link found at the bottom of every email.