News Security

HID Debuts Trusted Tag Services Offerings

Offers Internet of Things authentication for smart mobile devices

HID Global has released its HID Trusted Tag Services offering. Combining trusted tags with existing secure cloud authentication services, HID Global’s latest solution confers everyday objects with unique and trusted identities that can be read by NFC-enabled mobile devices in a wide variety of IoT applications announced the press release.

With NFC technology, smartphones and tablets can interact with everyday objects in new and exciting ways, ranging from tapping a “smart poster” for an interactive brand experience to authenticating the value of a luxury item to verifying the visit of a home health aide in a patient’s home.

HID Trusted Tags can be attached to or embedded into an object and then “tapped” by a smart device to communicate secure information. HID Trusted Tag Services does not require users to modify their devices or download apps; however, unlike traditional approaches QR codes or static NFC tags that are vulnerable to tag cloning and tampering, the data read from a trusted tag has additional security and privacy attributes that change on every tap, providing a secure audit trail and making the taps uncloneable.

“By enabling smartphones to effortlessly double as tag readers and communicate with our authentication service, HID Global is helping organizations to easily expand into the IoT,” said Marc Bielmann, VP (Identification Technologies), HID Global. “HID Trusted Tag Services enable trusted transactions and instill confidence that individuals scanning the tags are both who and where they claim to be. The solution is based on the same proven technology used in online banking, and it is secure, trusted and easy to use.”

NFC tags for HID Trusted Tag Services will be available later this year in a variety of form factors, such as inlay and packaged tags.

Related posts

Kodak Alaris Claims First Ever BLI PaceSetter Award in Distributed Capture from Keypoint Intelligence

enterpriseitworld

The Top 7 Ways Cyberscammers and Malware Operators Abuse Google Forms, According to Sophos Research

enterpriseitworld

TiE Sustainability Summit to enable $100 million funding for Social Enterprises

enterpriseitworld