• Skip to main content
  • Skip to footer

Photos Not Passwords for Secure Login Authentication | Netlok

Photolok® is a highly secure passwordless authentication and access login using photos not passwords.

  • About Photolok
    • Frequently Asked Questions
  • How It Works
    • How Photolok Works
    • Photolok User Guide
  • About Us
    • Company Overview
    • The Netlok Story
    • Executive Team
    • Blog
  • Contact Us
  • Photolok® Login

Frequently Asked Questions | FAQ

The following Frequently Asked Questions and answers provide the background and support information for Netlok’s innovative privacy and security solutions as well as the advantages of its products.  The specific instructions on how to use Netlok’s Photolok are available in the Photolok User Guide, which contains step-by-step instructions with screen shots.

Have more questions? Contact us here.

 

FAQs - Frequently Asked Questions

1. Who is Netlok?

Netlok is a cybersecurity software company that provides solutions for Identity and Access Management (IAM). Our mission is to make logging in frictionless, highly secure, and habit-forming by providing a passwordless login method (called Photolok) that is simple to use. Photolok is an innovative password replacement that uses photos instead of passwords. Photolok has earned three cybersecurity innovation awards in the process. To learn more, see our Home Page and/or view the following video:  https://youtu.be/OWLYPw_6VQs

2. How does Netlok’s Photolok protect privacy?

Photolok protects your privacy in two ways:

First, it minimizes the information it collects from customers.  We do not ask for your preferences, profile information, current location, etc. like most social media companies. To use Photolok, we only ask for the following information: first and last name, mobile phone with text capability, and email address. Most of this information is already available publicly.

Second, Netlok does not sell or give customer information to third parties.

3. How does Netlok’s Photolok protect against online cyberattacks?

Photolok is more effective than password login because 81% of online breaches originate with compromised passwords, which makes passwords the weakest point of Internet security.  Photolok is more than a password replacement.  It also protects against BOTS, keylogging, shoulder surfing, external and internal penetrations.  In addition, Photolok allows the user to label photos for situational security.  The Duress photos work like a silent alarm that sends security alerts to the appropriate parties in situations where you have been forced to open your device and are in potential danger.  You can also use a 1-Time photo to protect against shoulder surfing.

4. How does Photolok replace passwords?

Photolok uses photos instead of passwords to login to an authorized Internet and/or Intranet site. By replacing passwords with Photolok, the online user does not have to keep making their passwords longer nor change them more frequently to gain better security. Instead, after the user clicks their pre-chosen photos in the two photo panels, the user enters their authorized Internet or Intranet destination. It’s that simple. To see a short video on how the login works, see How It Works.

5. What are Photolok’s Strengths and Capabilities?
  1. Usability: Since it’s easy for users to remember, select, and change their login photos, the users’ online experience is simplified and frictionless.
  2. Cost-effective: Password resetting is eliminated, while photos are automatically saved in seconds.
  3. Ad Revenue & Branding: In a business setting, photos can be used for co-op advertising, company and fan club branding, etc. to help offset the growing cost of cybersecurity operations.
  4. Authenticator Ready: Usable with Google, Microsoft, Authy, and other authenticators.
  5. MFA Agile: Photolok can be used by itself or integrated with other login methods such as biometrics, Single Sign On apps, desktop, and mobile devices.
  6. Bad Actor Attacks Averted: Common hacking methods like BOTS and keylogging are blocked because the user’s photos are randomized within the photo pages and the encrypted identity codes are concealed inside the photos (patented steganography).
  7. Situational Security Alerts: The user can label photos (1-Time, Duress) for security alerts and protection in unsecure situations and/or forced entry circumstances.
  8. Agile Security Coding and Customization: Photolok’s source code supports rapid changes in security levels and facilitates customized integration with customer access methods.
  9. Patent Protected: The patents have been granted in USA, Japan, Canada, Mexico, Australia, and 10 EU countries.
  10. WordPress Plugin: Photolok has developed a WordPress plug-in that can be used as a password replacement for WordPress users.
6. How does a new user get their photos?

To make it easy for first time users, Netlok provides the user 3 photos during the account creation process, which they can change once they log in to their account.

7. What happens if the user forgets their photos?

The login page has a button called “Forgot My Photos.” When the user clicks “Forgot My Photos” and follows the instructions on the screen, the user will enter “Managed Your Photos” and be able to view their current photos to refresh their memory.

8. How often does the user need to change their photos?

Most companies will have to decide what works best for their company and what are the best practices for their industry. Some of the advantages of using Photolok is that it only takes a few seconds to change a labeled photo, the photos are easy to remember, and the user does not need to write them down.

9. What are the best practices in using Photolok photos?

The best practices are:

  1. Do not show, describe, or share your photos with anyone
  2. Do not post your photos on any social media sight
  3. Use “1-Time Use” photos in public areas or in situations where you think someone may be shoulder surfing or trying to see your photos
  4. Use the “Duress” photo when forced to open your device (see 11 below).
10. What is a “1-Time Use” photo?

A 1-Time Use photo can only be used during the login process to prevent shoulder surfing. The 1-Time photo is removed from your account after one use.

11. What is a “Duress” photo?

The Duress photo works like a silent alarm to notify others that the user has been forced to enter their device by an unauthorized party and they need help. Two alerts are executed when a Duress photo is clicked: 1) a text message and 2) an email message. The recipients of these alerts must agree in advance to the action steps that are required when they receive a Duress alert.

12. Can Photolok be used with mobile devices?

Yes, Photolok can be used with smart phones, tablets, and laptops devices as long as they are connected to the Internet and have a signal strength of 2 bars or better. The speed and bandwidth of the Internet source affects the operating speed of Photolok.

Footer

  • Photolok Home
  • How It Works
  • About Us
  • Blog
  • Contact Sales

Netlok LogoFOLLOW US ON SOCIAL MEDIA

©2015-2022 Netlok. All rights reserved.

Privacy Policy       Terms of Use

Copyright © 2022 · Atmosphere Pro on Genesis Framework · WordPress · Log in

  • Photolok Home
  • How It Works
  • About Us
  • Blog
  • Contact Sales