The 100% Guarantee of Authenticity is the Seal of Quality
NFC Tags Conquer New Business Fields
In this interview, Mark Robinton and Rahul Kothari explain the benefits for end users, which applications the solution is designed for, and what makes the solution so special.
INTERVIEW WITH MARK ROBINTON AN RAHUL KOTHARI
1. What is the Objective of Trusted Tag Services?
Robinton: The ultimate goal is to provide an authentication solution that is easy and convenient for the end user, and to provide a pleasant user experience. The verification processes run in the background, virtually automated – seamless to customer. All the user has to do is "tap" an NFC-enabled smartphone to the object. When a "tap" is made, either a green checkmark or a red "X" appears.
The one-time authentication via the cloud cannot be copied and cloned. As a result, one gains security without having to compromise on convenience. The solution also offers a wide range of form factors and thus a high degree of flexibility. Another important factor in times of global chip shortages is that HID Global is technology agnostic in terms of specific chip suppliers. So if the chip must be replaced due to supply chain issues or cost, authentication is carried out using the same principle. An app or other software is also not required. As such, the Trusted Tag concept offers simplicity, security and convenience at the same time.
2. In which application scenarios can the Trusted Tag simplify and secure processes?
Robinton: We focus on three main categories. First, on digital proof of presence, which can be used in the medical field to document and prove that caregivers are definitely present in a patient's home.
Second, the Trusted NFC tag provides proof of identity. This can be, for example, the employee ID card, which enables access controls and proof of authorization. One application is the documentation of personnel and their work authorization on large construction sites.
Thirdly, there is counterfeit protection. The genuineness of a product can be immediately authenticated and verified with Trusted NFC tags. If a customer purchases an original product with this verification, they can use it for resale to prove authenticity with the tag history. There is no need for renewed verification by an expert.
3. Let's stay with the example of product authentication.
Kothari: The market for collectibles is a rapidly growing market. There is a huge demand for coins, baseball cards or video games. Two examples: Older "Super Mario" video games are trading for around $200,000 and "The Legend of Zelda" was recently acquired for $187,000. In the sports sector, jerseys or signed autographs are also very much in trend. Sneakers, such as Air Jordans, are also very popular.
4. How does the solution work for valuable collectibles?
Kothari: The Trusted Tag solution is used to authenticate these products in real time. Collectors Universe uses Trusted NFC tags to prove the authenticity of the products and to verify the information on the label. Collectors and dealers can thus verify PCGS-sealed coins in real time. The Trusted NFC tags are embedded in the coins and holders with discrete inlays that are not visible behind the PCGS labeling. The collector taps the coin holder with an NFC-enabled smartphone to authenticate the collectible via the Cloud Authentication Service.
Each tap generates a unique cryptographic one of a kind URL that automatically launches Collectors Universe's proprietary PCGS Cert Verification App or opens a web browser to display information about the authenticity of the coin or banknote.
5. What benefits does the end user receive from Trusted NFC tags?
Kothari: The user or customer does not have to install an app, but instead receives the information automatically via a "tap". The biggest advantage is the unique authentication via the cloud, which cannot be copied. While a QR code can be copied very quickly, each "tap" generates a unique cryptographically distinct URL.
The information cannot be cloned or manipulated. The second aspect is the tremendous flexibility offered by the variety of form factors. These include key fobs, stickers, labels, smart cards, inlays, coins and hard tags.
Robinton: In addition, the security application of the product itself is exciting. Security is built in "invisibly" without much effort on the part of the end user. In many security aspects today, multi-factor authentication is used. For example, a user enters a password and then receives the required code. So the time for the log-in process is extended.
One of the key advantages of the Trusted NFC tag solution is that we do not add any additional burden to this interaction. Whether the QR code is scanned or the NFC tag or Trusted Tag is read, the smartphone is tapped and the interaction started. Nothing else has to be done, because the security feature has already been built in behind the scenes, so to speak.
6. How do you see this impacting the buyer's journey?
Kothari: If a company can offer a genuine experience with a product, then the entire sales experience for the customer is optimized and sales transactions are stimulated. The brand and the customer come into direct contact, so to speak, which is far more than just sealing a deal. The customer is given the opportunity to return to the product and use it again. For example, in the form of a discount promotion for the next product that is launched or an exclusive invitation to an event. This gives companies a direct connection to the end consumer.
7. Many companies are currently affected by supply chain restrictions and chip shortages. Is HID Global also affected by this?
Robinton: HID Global is independent of chip vendors. We support chips from a wide variety of vendors. This means that if a chip is unavailable due to supply chain issues or cost, another can be easily substituted. Authentication is done through the same principle and service. The fact that we are not tied to a specific provider is a key advantage for customers.