HID Global Drives Initiative for Partners to Develop NFC Trusted Tag Applications

HID Global Drives Initiative for Partners to Develop NFC Trusted Tag Applications

HID Global Drives Initiative for Partners to Develop NFC Trusted Tag ApplicationsHID Global is driving an initiative for partners to develop NFC Trusted Tag applications with the launch of its HID Trusted Tag Services Software Developer Tool Kit (SDK). Operating within the Trusted Identity Platform (TIP), HID Trusted Tag Services is the company’s latest NFC innovation that offers a cloud-based service to confer trust and provide security to readily available NFC tags. In addition to its new SDK, HID Global is seeking to extend technology licenses to qualified partners to enable third-party development of novel, internet-of-things NFC applications using its HID Trusted Tag Services. HID Global’s focus areas of use for new applications include:

  • Authentication of items such as birth certificates, college diplomas, deeds of trust, and certificates of authenticity for luxury or unique items, as well as high-value works of art and other documents.
  • Secure data management for trusted chain of custody, asset service history, warranty records, secure logging and other secure transactions.
  • Trusted authorizations, including a wide range of user scenarios such as access to URLs and innovative smartphone applications such as a virtual intercom and others.

“Since introducing HID Trusted Tag Services last November, HID Global has created a comprehensive developer program for partners to accelerate time to market and cultivate a broad ecosystem of NFC Trusted Tag solutions,” said Mark Robinton, manager, Technology Innovation, with HID Global. “We invite partners to join HID Global in developing new and exciting NFC applications that offer convenient solutions for brand protection and document validation, secure data logging and enabling trusted actions, while providing a platform for managing the future internet-of-things.”

HID Global will also demonstrate its new proof-of-concept Virtual Intercom application for the first time worldwide and showcase additional NFC Trusted Tag use cases at RFID Journal Live! 2013 in the company’s booth #722 from April 30 – May 3 at the Orange County Convention Center in Orlando, Fl.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3