The 100% Guarantee of Authenticity is the Seal of Quality
NFC-Tags and Cloud-Based Authentication
While a QR code can be copied very quickly, each "tap" generates a unique cryptographically distinct URL. The information cannot be cloned or manipulated.
Cloud-Based Solution: Trusted Tag Services
HID Trusted Tag Services facilitates transactions by tapping an attached or embedded NFC tag with an NFC-enabled smartphone or tablet. Information is communicated securely. The solution ensures seamless authentication suitable for a wide range of powerful and dynamic applications.
No additional readers are required for deployment. The Trusted Tags are available in a variety of form factors and can be attached to or embedded in virtually any object. The platform also provides data analytics on every transaction. In-depth insights into consumer behavior are identified.
Data read from NFC tags has additional security and privacy attributes that change with each "tap," making counterfeiting attempts impossible. For HID Trusted Tag Services, the trusted NFC tags are combined with a cloud-based authentication platform. The result: unique and trustworthy identities.
Unique Cryptographic Code
Each time a Trusted NFC tag is "tapped," the NFC-enabled smartphone receives a URL with a unique cryptographic code. The tag generates this code at the moment of the tap. The web server that manages the user environment then determines whether the URL was accessed by someone who physically tapped on a tag or whether a shared web link was followed or if the URL was entered manually.
This cryptographic feature prevents a URL from being used multiple times without physical touch and makes it impossible to clone the tag.
If the URL is not accessed by a validated physical "tap", the transaction can be denied by the server or simply logged for later analysis.
If the location of the tag is known, each valid "tap" indicates proof of presence at the time of the "tap".