HID Global®, a worldwide leader in secure identity solutions, recently announced the commercial availability of HID Trusted Tag® Services, a cloud-based authentication platform that adds trust to “proof of presence” and Internet of Things (IoT) applications using NFC technology. Proven in numerous pilot deployments with HID Global partners, HID Trusted Tag Services provides a comprehensive and easy-to-use secure authentication environment that delivers significantly greater convenience and security than alternative solutions.

Creates secure Internet of Things applications

“By combining trusted NFC tags and our cloud-based authentication platform, HID Trusted Tag Services delivers a robust offering for integrators to create powerful and secure Internet of Things applications,” said Mark Robinton, Director, Innovation and Business Development with HID Global. “HID Global has applied our industry-proven best practices to provide an innovative solution that couples advanced security with ease of implementation to excel far beyond NFC labels, static tags or QR codes. This enables integrators to enhance their applications by adding trusted ‘proof of presence’ capabilities and advanced analytics while maintaining control of their end users’ experience.”

HID Trusted Tag Services have been successfully piloted in use cases that included detecting and preventing URL sharing in digital out of home (DOOH) marketing campaigns, and authenticating home health service delivery in electronic visit verification applications. The pilots reinforce the offering’s unique ability to optimise security and prevent cloning by authenticating each tap of a tag through an automatically changing URL, while eliminating the inconvenience of other cryptographic solutions that require installation of dedicated apps for each use case. The solution can also be used to validate the authenticity of documents, goods and additional items for brand protection and other purposes.

Custom tag form factors available

Powered by award-winning Seos® technology, HID Trusted Tags feature 8 kilobytes (KB) storage capacity to support practically any use case, and the tags are available in different shapes, sizes and materials: secure contactless ISO cards, epoxy tag key fobs and self-adhesive wet inlays that turn any location into a hot spot for NFC-enabled smartphones or readers. HID Global also offers the option to design custom tag form factors for special customer needs, and HID Trusted Tag technology can be embedded into virtually any RFID tag form factor.

HID Trusted Tag Services are available now.

Demonstrations of HID Trusted Tag Services

HID Global will be conducting live demonstrations of HID Trusted Tag Services at upcoming events:

  • HIMSS: HID Trusted Tag Services demonstrations for electronic visit verification in HID Booth #7636 and at Kiosk #26 in the HIMSS Intelligent Health Pavilion (IHP) at the McCormick Place Convention Center in Chicago from April 13-15, 2015.  
  • RFID Journal Live!: HID Trusted Tag Services demonstrations for electronic visit verification and digital out of home campaigns in HID Booth #118 at the San Diego Convention Center from April 15-17, 2015.
  • Other April demos: Electronic visit verification demo at ISC West in Las Vegas, and digital out of home campaign demonstrations at Cards Asia and Cards Brazil.
Download PDF version Download PDF version

In case you missed it

What new and emerging threats do security professionals face?
What new and emerging threats do security professionals face?

There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to t...

Real time crime centres - policing's new hub
Real time crime centres - policing's new hub

As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres e...

Mitigating cybersecurity risks in industrial control systems with Honeywell
Mitigating cybersecurity risks in industrial control systems with Honeywell

Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partne...

Quick poll
Which feature is most important in a video surveillance system?