SP&T News

News
HID service offers Internet of Things (IoT) authentication for smart mobile devices

HID Global announces its HID Trusted Tag Services offering. Combining trusted tags with existing secure cloud authentication services, HID Global’s latest solution confers everyday objects with unique and trusted identities that can be read by NFC-enabled mobile devices in a wide variety of IoT applications.


March 25, 2014
By Staff

With NFC technology, smartphones and tablets can interact with everyday objects in new and exciting ways, ranging from tapping a “smart poster” for an interactive brand experience to authenticating the value of a luxury item to verifying the visit of a home health aide in a patient’s home.

HID Trusted Tags can be attached to or embedded into an object and then “tapped” by a smart device to communicate secure information. HID Trusted Tag Services does not require users to modify their devices or download apps; however, unlike traditional approaches QR codes or static NFC tags that are vulnerable to tag cloning and tampering, the data read from a trusted tag has additional security and privacy attributes that change on every tap, providing a secure audit trail and making the taps uncloneable. HID Global’s patented tag technology optimize security and convenience, eliminates the need for special readers or other equipment for tag authentication, and enables new use cases that require proof of presence.

“By enabling smartphones to effortlessly double as tag readers and communicate with our authentication service, HID Global is helping organizations to easily expand into the IoT,” said Marc Bielmann, vice president of Identification Technologies with HID Global. “HID Trusted Tag Services enable trusted transactions and instill confidence that individuals scanning the tags are both who and where they claim to be. The solution is based on the same proven technology used in online banking, and it is secure, trusted and easy to use.”

HID Trusted Tag Services support a variety of IoT applications. In the DOOH market, trusted tags eliminate abuse of retail loyalty programs, gaming and sweepstakes campaigns connected to marketing displays by requiring consumers to interact with an authentic tag to generate an entry into a program. In the home healthcare market, caregivers tap an authentic tag placed in a patient’s home, providing an indisputable EVV record for healthcare agencies to use for billing and reimbursement. It also creates an audit trail should claims come under scrutiny.

Advertisment


Print this page

Related

Tags



Leave a Reply

Your email address will not be published. Required fields are marked *

*