HID Trusted Tag® Services

Key takeaways

  • Trusted Tags use HF, NFC, and BLE frequencies for identification
  • Cryptographic authentication adds unique asset identities
  • HID Cloud Authentication verifies one-time passwords securely
  • Applications include compliance, security, and anti-counterfeiting
VP Sales

Talk to the product expert

Marie Glotz, VP Sales

Detailed product information

Proof of presence and compliance

HID Trusted Tag Services facilitate trusted transactions by simply tapping an attached or embedded trusted tag with a mobile smartphone or tablet to securely communicate information. A frictionless authenticated experience fuels more powerful and dynamic IoT applications across multiple industries – healthcare, retail, company security, facilities/ building management and many more to automate compliance services.

Trusted Tag Services can extend additional HID products and services, including: HF-RFID deployments, Location Services and Condition Monitoring platforms.

Key Facts

  • Trusted Tag™: Identification and Sensing component using HF/NFC/BLE frequencies

  • Cryptographic Authentication: Adds unique and trusted identities to organization’s assets, easily read by NFC/BLE enabled mobile devices (Current Apple iOS or Android OS)

  • HID Cloud Authentication Service: Strong authentication verifies authentic cryptographic one-time password (OTP) from the secure asset tag

Applications:

  • Maintenance & Inspection: Proof of compliance

  • Security Patrol Automation

  • Anti-counterfeit / Brand Protection

  • Secure Electronic Visit Verification

Product Images

HID Trusted Tag® Services
Source: HID