US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join on LinkedIn
In focus

Network / IP - News

HID Global announces HID Trusted Tag Services

Published on 20 March, 2014

HID Global®, a worldwide leader in secure identity solutions, recently announced its HID Trusted Tag™ Services offering. Combining trusted tags with existing secure cloud authentication services, HID Global’s latest solution confers everyday objects with unique and trusted identities that can be read by NFC-enabled mobile devices in a wide variety of IoT applications.

With NFC technology, smartphones and tablets can interact with everyday objects in new and exciting ways, ranging from tapping a “smart poster” for an interactive brand experience to authenticating the value of a luxury item to verifying the visit of a home health aide in a patient’s home.

HID Trusted Tags can be attached to or embedded into an object and then “tapped” by a smart device to communicate secure information. HID Trusted Tag Services does not require users to modify their devices or download apps; however, unlike traditional approaches QR codes or static NFC tags that are vulnerable to tag cloning and tampering, the data read from a trusted tag has additional security and privacy attributes that change on every tap, providing a secure audit trail and making the taps uncloneable. HID Global’s patented tag technology optimise security and convenience, eliminates the need for special readers or other equipment for tag authentication, and enables new use cases that require proof of presence.

“By enabling smartphones to effortlessly double as tag readers and communicate with our authentication service, HID Global is helping organisations to easily expand into the IoT,” said Marc Bielmann, vice president of Identification Technologies with HID Global. “HID Trusted Tag Services enable trusted transactions and instill confidence that individuals scanning the tags are both who and where they claim to be. The solution is based on the same proven technology used in online banking, and it is secure, trusted and easy to use.”

HID Trusted Tag Services support a variety of IoT applications. In the DOOH market, trusted tags eliminate abuse of retail loyalty programs, gaming and sweepstakes campaigns connected to marketing displays by requiring consumers to interact with an authentic tag to generate an entry into a program. In the home healthcare market, caregivers tap an authentic tag placed in a patient’s home, providing an indisputable EVV record for healthcare agencies to use for billing and reimbursement. It also creates an audit trail should claims come under scrutiny.

Bookmark and Share
Latest in
Network / IP Security Events

See privacy and cookie policy
Browsing from the Americas? Looking for US Edition?
View this content on US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition