HID Global Unveils Trusted Cloud Service for Creating and Tracking NFC Tags

Company Unveils HID Trusted Tag Services Platform for deploying NFC tags for asset and document certification.

HID Global announced a new cloud-based platform for secure Near Field Communications (NFC) tags and services that eliminates the inherent risks of authenticating original documents, processes, data-logging and high-value assets with traditional sign-off procedures. The HID Trusted Tag Services platform secures assets and protects consumers from counterfeit goods while improving authentication convenience by using contactless readers or any NFC-enabled smartphone. HID Trusted Tag transponders can be embedded within an item or attached to a document to establish its unique identity, and presented to any NFC-enabled reader or smartphone to verify its authenticity.

The HID Trusted Tag Services ecosystem includes a comprehensive range of tag, inlay and card solutions as well as the HID Trusted Tag authentication transaction environment. This environment enables cloud-based provisioning of identity certificates to the NFC tags, as well as the revocation of certificates at any time, such as when a batch of high-value items has been stolen. HID Global is extending technology licenses to qualified partners to enable third-party development of secure NFC products and applications that can be used within the company’s HID Trusted Tag Services platform infrastructure.

Authentication tags can be attached to a document with an electronically signed and cryptographically secure digital certificate of authenticity from the owner or trusted certification entity. Impossible to clone or duplicate, these tags can also be embedded in a product or incorporated in tamper-resistant stickers that can be attached to products and equipment. Users can verify authenticity with complete confidence at any time in the product or document’s lifetime. With NFC-enabled smartphones, this authentication process can be performed anywhere, at any time, using a smartphone application.

The HID Trusted Tag Services platform includes NFC and other RFID tags, as well as HID Global’s secure TIP boundary for conducting authenticated transactions. TIP uses an identity model called the Secure Identity Object to safeguard all authentication transactions between HID Trusted Tag transponders, phones and readers. The HID Trusted Tag service can be used with any NFC-enabled smartphone or mobile device within the service’s secure TIP boundary. HID Trusted Tag solutions can also be used with authentication certification platforms and RFID tags from other manufacturers, and HID Global also plans to expand its own tag offering with a variety of Trusted Tag application-specific and custom follow-on products.

Featured

  • Using Modern Technology

    Using Modern Technology

    Workplace violence is a serious and growing challenge for many organizations — including those in the healthcare industry. Read Now

  • The Core Value Proposition

    The Core Value Proposition

    Machine and deep learning algorithms are everywhere in our lives. Masquerading as AI, they are only in their infancy. Have a conversation with a ChatGPT chatbot, and it becomes clear just how far we have come in a short time and how far we have to go. Read Now

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

Featured Cybersecurity

New Products

  • SecureAuth

    SecureAuth

    The acceleration of digital transformation initiatives as a result of COVID-19 has created a lasting impact on how businesses empower their workforce and engage customers. 3

  • Kangaroo Home Security System

    Kangaroo Home Security System

    Kangaroo is the affordable, easy-to-install home security system designed for anyone who wants an added layer of peace of mind and protection. It has several products, ranging from the fan-favorite Doorbell Camera + Chime, to the more comprehensive Front Door Security Kit with Professional Monitoring. Regardless of the level of desired security, Kangaroo’s designed to move with consumers - wherever that next chapter may be. Motion sensors, keypads and additional features can be part of the package to any Kangaroo system in place, anytime. Additionally, Kangaroo offers scalable protection plans with a variety of benefits ranging from 24/7 professional monitoring to expanded cloud storage, coverage for damage and theft. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3