Why use SpearID FIDO2 security key?

Photo

Two-factor authentication is not enough

Photo

More and more services support two-part identification, e.g. by e-mail, text message or mobile application. Since the two-part authentication event cannot be reliably connected to the user's web browser, an attacker can hijack the account remotely. Only a physical security key can prevent an account from being hijacked by a sophisticated attack.

The problem with passwords

Photo

All identification methods based on passwords are vulnerable to data breaches, and even the longest password cannot protect the account from being hijacked. An attacker uses several different methods to circumvent or break password protection. It is also possible to bypass the two-part identification with current technologies.

Data breaches and phishing

Photo

Security is not the default on the Internet. Millions of passwords from popular services are leaked every day. Hijacking user accounts is easy, because the use of passwords alone is no longer safe. While the protection of popular online services improves, the tools of attackers develop even more.

Easy deployment. Quick login.

There are only three simple steps to deploying a SpearID FIDO2 authentication key. Best of all - all these steps are very similar for all supported services (eg Google services).

Photo

1. Registration starts by adding the SpearID FIDO2 security key to your account. In the user account settings of the supported online service, there is a point "two-step authentication" where you can add a "Security Key" security key (or security key).

Photo

2. Registration takes place by connecting the SpearID FIDO2 key to the computer's USB port and pressing the small key button on the stick. For NFC proximity reading, the key must be pressed against the back of the smartphone with the USB reading surface folded open (about 3s).

Photo

3. After successful registration, SpearID FIDO2 keys can be assigned a service-specific name to distinguish them from other security keys. Several services also offer the option of adding a PIN to the security key. Note! You should add a PIN code to the FIDO key, as some services require it to work correctly

Photo

SpearID FIDO2 works almost everywhere

SpearID FIDO2 is a certified identification key according to the FIDO standard. The number of supported online services and applications is growing all the time. In addition to FIDO-supported services, the SpearID FIDO2 key also supports other general two-part identification services. See the list of supported services below.

SpearID FIDO2 offers two different user interfaces on the same device: a USB connector for a computer and an NFC proximity reader for a smartphone.

photo
photo

Click on the services below to read the service-specific instructions for implementing and using the SpearID FIDO2 key:

Social media:

Photo Photo Photo

Gaming services:

Photo

Cryptocurrency Services:

Photo Photo

Password applications:

Photo Photo Photo

Identification services:

Photo Photo

Frequently Asked Questions

The NFC function does not work on a mobile device when I try to read the key against the back of the phone?

- Make sure that the security key is folded open and you touch the top of the phone with it according to the instructions in accordance with. - Make sure that the service you are using is ready to establish an NFC connection - The service may require that you have registered the PIN code security key in connection with.

What should I do if I lose my security key?

Having two FIDO keys is recommended. You can register more than one key for one user, so if one key fails, you can use the other.

Can I use the Bluetooth function of the dongle on my computer?

- Yes. If your device has a Bluetooth connection and the service you use supports the key's Bluetooth feature, you can take advantage of this when logging in. - MacOS does not currently support the Bluetooth feature of FIDO2 security keys, so here devices, you cannot take advantage of the Bluetooth capability.

Can I register my security key by phone?

The key can only be used for identification on the phone, but it must be taken to use and register on the computer.

Technical Specifications

  • Supported operating systems: Windows, macOS, Linux, Android, IOS
  • Supported browsers: Edge, Chrome, Firefox, Opera, Safari
  • Supported functions: FIDO U2F, FIDO2, OATH TOTP et HOTP
  • Security algorithms: HA256, AES, HMAC, ECDH, ECDSA
  • Key dimensions: 44,7x16x9 (mm)
  • Supported protocols: CTAPHID, Clavier HID, CCID, NFC, BLE
  • Manufacturing materials: aluminium, polycarbonate
  • Certifications: FIDO2 L1, CE, FCC, RoHS, WEEE
Photo