!!! Overview [{$pagename}] founded in 2007 with a prototype of our YubiKey invention and the mission to make secure online identities truly ubiquitous. You may get started right away by ordering our products from our Web Store. With free access to our open source library and our YubiCloud hosted validation service, evaluation and implementation of the YubiKey may be done in minutes. Even though we offer the market’s lowest cost option we do not compromise on security, quality or ethics. We manufacture our Yubikeys in Sweden and USA with best practices security processes and with respect for our people and the environment. With support from a thriving developers and partner community, the Yubikey is used for a range of enterprise, open source and consumer applications, including remote access and VPN, online services, computer login and password management. Developers collaborate via the Yubico Forum. Proven by millions of users and 50,000 customers, ranging from individuals to 7 of the top 10 Internet companies enterprises, we continue to refine our inventions. Our vision is to enable Internet users to have one single and secure key for securing access across from any device to any number of services. To realize this dream, we developed our next-generation Yubikey in close collaboration with Internet thought leaders, and we are key contributor to the FIDO Alliance U2F (Universal 2nd Factor) open standards specifications. !! [FIDO] [{$pagename}] [U2F]-only Security Key and multi-technology [Yubikey NEO] both support the [FIDO] [U2F] protocol and incorporate [Smart Card] technology. “Each Security Key has an individualized secure chip which performs [cryptographic] functions triggered by a simple touch of the key. The [FIDO] [U2F] Security Key provides a unique [Public Key] and [Private Key] pair for each application it protects. The secure [Smart Card] chip is of the same class as those used in [SIM] cards, electronic passports, military electronic IDs and chip-and-PIN credit cards. Like those devices, the chip is specially “hardened” so it’s extremely difficult to steal the secrets hidden inside. The secrets contained in the Security Key belong to the end-user exclusively and are never transferred, copied or stored by a service provider or any other application provider.” The [Yubikey NEO] device supports multiple [authentication] protocols including the [FIDO] Alliance [U2F] protocol, [One-Time password], and [Smart Card] functionality (e.g., [OpenPGP], the Federal government’s [Personal Identity Verification] ([PIV]) [credential]). The device supports both contact ([USB]) and contactless ([NFC] and [MIFARE]) interfaces. The device is commercially available and can be used for [U2F] login with online services that support [U2F] (e.g., [Google], [GitHub] and [Dropbox]). The device uses [Common Criteria]-certified [Smart Card] technology-based hardware [Secure Elements] to protect encryption keys. In October [2014|Year 2014], [Google] Chrome became the first web [browser] to support the [FIDO] [U2F] protocol. [Google] also announced that they were supporting the Yubico [U2F]-compliant Security Key as a second [factor|Authentication Factor] device to strengthen the Google [2-Step Verification|Multi-Factor Authentication] process for Google accounts.!! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }]