Overview#Yubico founded in 2007 with a prototype of our YubiKey invention and the mission to make secure online identities truly ubiquitous.
You may get started right away by ordering our products from our Web Store. With free access to our open source library and our YubiCloud hosted validation service, evaluation and implementation of the YubiKey may be done in minutes.
Even though we offer the market’s lowest cost option we do not compromise on security, quality or ethics. We manufacture our Yubikeys in Sweden and USA with best practices security processes and with respect for our people and the environment.
With support from a thriving developers and partner community, the Yubikey is used for a range of enterprise, open source and consumer applications, including remote access and VPN, online services, computer login and password management. Developers collaborate via the Yubico Forum.
Proven by millions of users and 50,000 customers, ranging from individuals to 7 of the top 10 Internet companies enterprises, we continue to refine our inventions. Our vision is to enable Internet users to have one single and secure key for securing access across from any device to any number of services. To realize this dream, we developed our next-generation Yubikey in close collaboration with Internet thought leaders, and we are key contributor to the FIDO Alliance U2F (Universal 2nd Factor) open standards specifications.U2F-only Security Key and multi-technology Yubikey NEO both support the FIDO U2F protocol and incorporate Smart Card technology. “Each Security Key has an individualized secure chip which performs cryptographic functions triggered by a simple touch of the key. The FIDO U2F Security Key provides a unique Public Key and Private Key pair for each application it protects. The secure Smart Card chip is of the same class as those used in SIM cards, electronic passports, military electronic IDs and chip-and-PIN credit cards. Like those devices, the chip is specially “hardened” so it’s extremely difficult to steal the secrets hidden inside. The secrets contained in the Security Key belong to the end-user exclusively and are never transferred, copied or stored by a service provider or any other application provider.”
The Yubikey NEO device supports multiple authentication protocols including the FIDO Alliance U2F protocol, One-Time password, and Smart Card functionality (e.g., OpenPGP, the Federal government’s Personal Identity Verification (PIV) credential). The device supports both contact (USB) and contactless (NFC and MIFARE) interfaces. The device is commercially available and can be used for U2F login with online services that support U2F (e.g., Google, GitHub and Dropbox). The device uses Common Criteria-certified Smart Card technology-based hardware Secure Elements to protect encryption keys.
In October 2014, Google Chrome became the first web browser to support the FIDO U2F protocol. Google also announced that they were supporting the Yubico U2F-compliant Security Key as a second factor device to strengthen the Google 2-Step Verification process for Google accounts.