View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Networks
March 24, 2015

Trusted Tag adds proof of presence to IoT apps using NFC

HID's cloud-based authentication platform already deployed in DOOH campaigns.

By CBR Staff Writer

Secure identity solution maker HID Global is now offering its cloud-based authentication platform, dubbed ‘HID Trusted Tag Services’, for Internet of Things (IoT) applications using NFC technology.

The company highlighted that the HID Trusted Tag Services will add "proof of presence" which will provide a comprehensive and easy-to-use secure authentication environment.

HID Trusted Tag Services has already been deployed in digital out of home (DOOH) marketing campaigns for detecting and preventing URL sharing, and was also used in home health service delivery in electronic visit verification applications.

According to HID Global, the solution can also be used to authenticate documents and other goods.

The Trusted Tags feature 8 KB of storage capacity and the tags are available in different shapes, sizes and materials.

HID Global Innovation and Business Development director Mark Robinton said: "By combining trusted NFC tags and our cloud-based authentication platform, HID Trusted Tag Services delivers a robust offering for integrators to create powerful and secure Internet of Things applications.

"HID Global has applied our industry-proven best practices to provide an innovative solution that couples advanced security with ease of implementation to excel far beyond NFC labels, static tags or QR codes. This enables integrators to enhance their applications by adding trusted ‘proof of presence’ capabilities and advanced analytics while maintaining control of their end users’ experience."

Content from our partners
Rethinking cloud: challenging assumptions, learning lessons
DTX Manchester welcomes leading tech talent from across the region and beyond
The hidden complexities of deploying AI in your business

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.