securitylinkindia

Number of LEGIC Connect Users Rises by 1.3 Million in Just Six Months

In November 2018, LEGIC’s software service Connect crossed the magic threshold of 1 million users. Only six months later, LEGIC Connect has reached a new milestone, chalking up 2.3 million users. This growth underscores the importance of mobile identification media and is an indicator of LEGIC Connect’s immense popularity and market success. Over two million people across the globe now use LEGIC Connect, benefiting from its simple and secure method for distributing virtual keys. It’s a compelling system, taking only a few seconds to assign or withdraw access or usage authorizations for a wide variety of applications without having to use a physical media. It is a centrally managed, global service that is available at all times. Whether used in corporate access, hospitality, mobility, IoT or any other application areas, LEGIC Connect enables trendsetting, highly flexible service models worldwide. LEGIC Connect is a 24/7 software service comprising the LEGIC mobile software development kit (SDK) and the LEGIC trusted service. It boasts high levels of security and ease of integration. Any kind of mobile authorization data are encrypted and sent to smart devices. With genuine end-to-end security between the back-end system and the reader, LEGIC Connect has a security mechanism that is unrivaled in the world. The mobile authorization data is encrypted in the LEGIC trusted service. No critical keys are stored in the customer’s app, with the mobile SDK alone ensuring secure communications with the LEGIC trusted service and the LEGIC reader IC. The latter decrypts the mobile authorization data, and the user obtains the access rights for the respective desired application. Proven cryptographic security mechanisms are used in redundant hardware security modules to ensure reliable security.  

Read More

Faster Security Investigations Unveiled as Part of IndigoVision’s New Product Innovations at America’s Largest Security Event

Security innovator IndigoVision has introduced a range of new features that would lead to faster security investigations and drive down industry storage costs as part of its presence at ISC West 2019 in Las Vegas. Trusted in installations across the world, and with 25 years of experience in developing complete end-to-end security surveillance solutions, IndigoVision’s latest innovations were unveiled as part of an array of new features being introduced to Control Center, its intuitive security management solution. Focusing on advanced analytics, cyber-security and ease of use, Control Center v16.0 will offer operators a powerful new line-up of features to help combat security threats. Faster security investigations: Users will be able to save time and instantly zero in on specific events with the introduction of timeline preview, which provides a thumbnail of the recorded video timeline. Lower storage costs: Users will benefit from improved compression and longer retention times thanks to Control Center’s support for the latest video compression standard, H.265. Reduced eyestrain for users: Control Center v16.0 now adds to its core grey/ white view with a new dark mode, which has been specifically designed to reduce eyestrain in darker control room environments. IndigoVision added to its Ultra and BX camera ranges with the introduction of an exciting new line-up which offers users multiple form factors, low light sensitivity, augmented analytics and wide dynamic range (WDR) giving operators improved image clarity. The new HD Ultra X cameras will deliver enhanced performance through the company’s ground breaking SMART, core™ and CyberVigilant® in-camera technology which give users the ability to detect and respond quickly to potential cyber-threats. NDAA compliance also means these cameras are pre-approved for installation in government sites within the United States and other areas of the world where this legislation has been adopted. Operators will also be able to access next level detection and cyber-security with IndigoVision further expanding its advanced analytics metadata and its award-winning CyberVigilant® technology to select cameras from its BX camera range. The BX420 4K Minidome, BX430 4MP microdome and BX630 HD/ 4K bullet and fixed cameras will now have an enhanced intruder detection enabling Control Center to safeguard against an increased range of threats.  

Read More

EZVIZ Cloud Platform Receives CSA STAR Certification

EZVIZ Cloud Platform has recently achieved CSA STAR certification for its information security management systems (ISMS). The CSA STAR certification is a rigorous third party independent assessment of the security of a cloud service provider. It is an international certification program established by the founders of global standards – the British Standards Institution (BSI) and the international Cloud Security Alliance (CSA), which are the world’s leading organizations dedicated to defining best practices that help ensure secure cloud computing environments. The CSA STAR certification was issued by DNV GL for the information security management of EZVIZ Cloud services, and design and development, operation and maintenance services for overseas cloud platform of EZVIZ. “We are proud of obtaining the globally recognized CSA STAR certification. It demonstrates our dedication to security management and control systems, which are essential for the security of our computing environment and the trust of our customers of EZVIZ Cloud,” said Li Xingbo, Vice President of Hangzhou Ezviz Software Co., Ltd. EZVIZ is committed to the utmost quality and safety of its products and actively improves security compliance through professional qualification certifications. Previously, EZVIZ Cloud successfully obtained the ISO9000, ISO14000, and OHSAS18000 qualifications. In 2017, EZVIZ Cloud was also awarded the ISO27001: 2013 certification in the field of international authoritative information security, becoming the leading company to obtain this certification in the domestic home IPC (IP camera) field. EZVIZ, a global smart home security brand, is the consumer and residentially focused subsidiary of Hikvision. EZVIZ creates a safe, convenient and smart life for users through its intelligent devices and cloud-based platform. EZVIZ empowers partners to share their unique cloud services and build a thriving IoT ecosystem together.  

Read More

Alvium Honored by Allied Vision Systems Design 2019 Innovators Award Program

Allied Vision was presented with two Silver level awards in the product categories of ‘Cameras – Visible’ and ‘Embedded Vision – Cameras’ at the fifth Annual Vision Systems Design Innovators Awards presentation, held during Automate 2019 in Chicago, Illinois. Alvium was recognized by a panel of esteemed experts from system integrator and end-user companies. The Alvium camera series is Allied Vision’s next generation camera solution built on an innovative camera platform. It was designed to bridge the worlds of industrial machine vision and embedded vision, and provide a full range of cameras that offers system designers a previously unknown level of freedom. Equipped with either USB3 or MIPI CSI-2, the popular embedded interface, Alvium can be used in both worlds. At the heart of the Alvium camera series, is the proprietary System on Chip (SoC), ALVIUM® technology, that combines an image signal processor (ISP) with a powerful image processing library (IPL). This enables image corrections and preprocessing to be completed in the camera rather than the host system. Furthermore, ALVIUM® Technology was developed with intelligent power management where only the used functionality draws power. The idea of simple and easy integration was fundamental in Alvium’s design. It comes available in three housing options – bare board, open housing, or closed housing (USB3 models only). Alvium’s small footprint allows system designers maximum flexibility with space constrained system designs. Also, software integration is straightforward. ALVIUM® technology supports various embedded boards such as the NXP i.MX6/8 and NVIDIA Jetson platforms. One driver is needed for each platform to operate all Alvium camera models. Designers can control the camera via Video4Linux (V4L2), Direct Register Access or GenICam, the machine vision standard programming interface. Alvium offers resolutions ranging from VGA to 21 Megapixels. The ALVIUM® SoC supports all common sensor interfaces allowing for quick integration of current and new sensors, therefore, making it future-proof. Focusing on what counts “ This prestigious program allows Vision Systems Design to celebrate and recognize the most innovative products and services in the vision and image processing industry,” said Alan Bergstein, Publisher of Vision Systems Design, “Our 2019 Honorees are an outstanding example of companies who are making an impact in the industry.” “We are very proud to have Alvium receive two awards from Vision Systems Design’s Innovators Award Program,” said Andreas Gerk, President & CEO of Allied Vision, “We’d like to thank Vision Systems Design and the judges for this honor. This recognition further validates our direction for future camera solutions. The versatility of Alvium allows us to focus on what counts – our customers and their applications.”  

Read More

APS Man Ramanjit Singh Oberoi Hits Boston Marathon Track

Fifty nine (59) years old Ramanjit Singh Oberoi, Head – Credit Control, AP Securitas Group has once again defied his age and upheld that age is just a number. He has participated in the Boston Marathon on 15 April 2019 with around 30000 runners, and finished the 26 mile (42 Kms) run in three hours and forty minutes. He believes that everything is achievable, if one pursues one’s passion single mindedly. “I discovered running rather late in life when almost people are slowing down. But I saw how it made me feel – I feel free and doubly alive. When I am on the road, in the hills, I start singing. It’s the most enjoyable part of my life, I will not give it up,” said Mr. Oberoi. “An Individual’s pursuit of excellence needs to be encouraged and supported. We at APS are deeply involved in Raman’s journey of marathons. We find more and more members of the APS family taking part in shorter runs. It is not uncommon to see people talking of building stamina and adopting a healthier life style. His strenuous hard work also inspires us to imbibe this indomitable spirit in our work place and become a better professional and service Provider “ – Anil Puri CMD, APS Group Now at the age of 59, he has an enviable track record of huge successes in various marathons. His unbounded energy and enthusiasm found inspiration in the APS environment and he ran his first half-marathon at the age of 55. He has participated in 23 half-marathons and 3 full-marathons before qualifying for the Boston Marathon 2019 (USA). Raman reflects and embodies the indomitable spirit of a ‘Security Man.’ Anil Puri, CMD – AP Securitas, celebrated the achievement, and felicitated Raman at a grand party thrown in his honour.  

Read More

Hikvision Hosted the Second AI Cloud Summit in Hangzhou

Hikvision, the world’s leading supplier of innovative security products and solutions, successfully hosted the second ‘Shaping Intelligence’ AI Cloud Summit at Hangzhou Whitehorse Lake International Exhibition Centre during 29-30 March 2019. Under the theme of ‘Data Enrichment with AI,’ the summit served as a platform for AI cloud ecosystem partners to exchange knowledge on leading-edge AI and big data technologies and applications. It comprised a main forum and four sub-forums on the topics of finance, commerce, public services and smart governance for cities. Over 3,000 participants took part in the event including Hikvision customers, industry leaders, academic experts and partners. “We believe that, as a fusion platform, the AI Cloud will be able to support our customers in their quest to unleash the full potential of AI and IoT. Ubiquitous intelligence will be the new normal of the AI era; intelligent applications and their data generation will be the engine” – Yangzhong Hu CEO, Hikvision Vision of the future: Fusion of Intelligent IoT and Information Networks One of the most important topics discussed at the conference was how Hikvision’s AI Cloud platform can support the integration of IoT and information network data in order to drive the future development of new, intelligent applications. Ideas discussed included the development of a computing architecture that unites cloud and edge computing, plus a data architecture that can enable the integration of intelligent IoT and information network data. Providing fully open platforms for mutual development The Hikvision AI Cloud was developed to solve real-world challenges across different vertical markets, and to create continuous value to end users. The cutting-edge architecture is designed to enable collaboration between partners across edge computing, industry applications, service platforms, standard systems, and much more. As an example of this, Hikvision demonstrated how the launch of its AI algorithm training system has enabled partners to train algorithms easily for specific customer application needs and deployment. Using a digitised event exhibition area of 6,000 square metres, Hikvision and its ecosystem partners demonstrated versatile AI solutions including smart retail, smart campus, smart financial service, smart construction, smart agriculture and so on. In addition, intelligent transportation system (ITS) was showcased including intelligent buses, intelligent road networks, intelligent airports and intelligent railway systems – all designed to boost passenger safety and enhance the travel experience. AI applications to empower industrial users At the four sub-forums held on the second day, end users from different markets exchanged thoughts and shared use cases of collaborating with Hikvision AI deployment. At the commercial forum, partners from retail, energy, property management and logistics explored how AI can increase business insight and transform how businesses operate. At the smart governance for cities forum, traffic authorities from different parts of China shared successful AI applications, including how e-police solutions help identify traffic violations and reduce the number of human injuries and fatalities. By merging video information with other systems and algorithms, traffic big data can be visualised on city maps to further guide traffic and improve urban commuting. At the finance forum, banks including China Construction Bank and the Industrial and Commercial Bank of China overviewed their digitised transformation with AI in banking security and management, showcasing how AI-powered big data was a key enabler in this process. The public services forum focused on how AI technology can support the improvement of public services management. Among other sessions, Hikvision partners introduced AI applications for distance learning, smart classrooms, campus safety and enhanced learning environments.  

Read More

Development of Cyber-Sustainable Video Surveillance Systems

Cybersecurity is a trending topic in the video surveillance market. As a result of international regulations, companies are assessing the potential security risks of video surveillance systems, deploying crisis management policies and developing mitigation plans for events related to a data breach. Customers desire trustworthy products and vendors are rushing to fill this gap to satisfy the market demand. Multiple vendors are offering a great number of solutions, however the choice and diversification perplexes customers, who often have difficulty identifying the best solution for their needs. In this paper, Videotec puts forward its vision with regard to developing safe products and describes its strategy for cyber security. Introduction Customers are currently overwhelmed by the perpetual advertisement of products related to cyber security. At tradeshows and in sector magazines, multiple products are being promoted as key elements for cybersecurity. Unfortunately, cyber-safe products cannot be marketed with the same strategy as other devices, for example, explosion-proof rated cameras. The key difference is that for threats that do not concern software a set of well-defined and well-documented requirements exist. In general it is possible to universally define safety requirements for installation in special environments such as a drilling rig, a marine vessel or along a railway. For soft ware, similar requirements exist but there is less clarity than with their counterparts when it comes to security. Furthermore, a device’s firmware and video m a n a g e m e n t software (VMS) are updated by each vendor to introduce new features or to fix bugs. Every update may have an impact on the complete video surveillance system reliability. Finally, security researchers continuously identify new issues that may reduce the safety of the system, even if no change is applied to the facilities. Deploying a cyber-secure system is a challenging task under these ever changing conditions. Other aspects of security such as mechanical, electrical or environmental are not subject to similar uncertainty. As an example, designing an explosion-proof system is a well-known process, involving classifying zones, identifying the nature of the explosive elements such as gases or dusts, and deducting the product requirements. During the lifespan of the system, the identified risk sources do not change. Similarly, during installation on a marine vessel, the video surveillance equipment is commissioned and will not change until the entire ship is refurbished. The result of the lack of certainty that characterizes software and the existence of complex standards that have a restricted competent audience is a professional market that is trying to incoherently fill this gap by pursuing certifications and stamps, or by adopting aggressive advertisement strategies, based on over-optimistic promises on product features. Orientation between different cyber-security certification options Several certification options are currently available on the market, and these can be placed in two main groups – System certification and Product certification. As the name suggests, system certification addresses cyber-security at a system level. This group includes ISO27001, NIST SP 800-53 and ISA/ IEC62443-3. In these frameworks, risks related to information management are evaluated across every aspect of the organization – information generated by the devices, storage, access control to the information and physical security to protect data from being stolen from data centers. Since these certifications must be flexible to adapt to a heterogeneity of systems, they define frameworks to perform the system analysis and the assessment of the risks of such systems, but they do not punctually mandate explicit requirements. System certifications delegate the definition of such requirements to the organization willing to achieve the certification. In contrast, product certifications are narrow in scope, targeting a single component subject to certification. A single component can be a camera, a networking switch or video management software. In this category are the EMV standard for credit and debit cards, the UL2900 series and ISO/ IEC 15408, also known as ‘common criteria.’ It is clear that pursuing a system-level certification involves the customer and the integrator installing the video surveillance system. Manufacturers should target product certifications and drive efforts to ease the integration of their products into the frameworks of system-level certification that is being pursued by their customers. Videotec’s strategy for cyber-secure video surveillance systems Videotec started developing its DeLux technology several years ago. At that time, Videotec had a clear vision for its products i.e., developing safe products for all possible tasks – mechanical, electrical, electromagnetic and software – according to current and future security requirements. The mission of the DeLux technology was, and still is, to provide a reliable, safe and future-proof platform that integrates with all products. Sharing a common platform between multiple products is challenging. It requires deep planning of product design to ensure the platform will function perfectly within any product. It also implies that new software releases are compatible with any previously released camera. Thus, every time a new product is released the effort to validate the software increases. Due to this decision, Videotec guarantees that any new security feature and any bug fix will be available to its customers regardless of product age and whether it is still present in the current product catalogue. From the beginning of the DeLux project, two key points were immediately clear. The first point is that software architecture must be flexible enough to guarantee integration into very different products, and at the same time it needs dedicated components that guarantee the un-exploitability of the device. For this reason, the code executed by the device is partitioned into different security domains, making sure that processes that implement the protocol interfaces towards the video management software cannot harm the internal components that accomplish video acquisition, perform compression and constantly monitor the correct function of the unit. The second point that Videotec immediately understood is that ensuring the correct functioning of the software in every device is as important as the software running in just the cameras. For this reason, Videotec started developing internal tools that perform automated testing on the entire set of devices that incorporate the DeLux technology. Every night,…

Read More

SECONA Shield Awards 2019

The fifth edition of the SECONA Shield Awards, powered by Secutech India, was held at a glittering function on 26 April 2019, at Bombay Exhibition Centre, Mumbai during Secutech India – one of India’s largest exhibitions on security, safety & fire. The Shield Awards are one of the ‘first’ of its kinds which have recognized the contributions of many ‘superstars’ of Indian security & safety sector – they are women and men, working day and night to provide products, services, and even ideas that can make the communities truly safe. Like every year, SECONA Shield Awards 2019 was focused on recognizing the contributions of individuals, organizations and teams, who inculcated innovation and excellence in their offerings. There were over one hundred finalists in various award categories. Winners were highly joyful and expressing their sense of achievement. They mentioned the recognition as a special honour in front of the industry peers. The award ceremony was held in the backdrop of the heinous terrorist attacks at Pulwama and Sri Lanka, and hence on behest of Prasad Patil, Chairman, SECONA, a one-minute silence was observed for the martyrs of Pulwama and the victims of Christchurch and Colombo. He also thanked the Indian armed forces for their selfless contributions towards protecting Indian citizens and assets. This year there was a special awardee – little P. Srihitha, just 9 year old, who recently donated her entire birthday savings to Chennai police for the installation of CCTV cameras. This must have been the first such instance in the whole world; and hence SECONA decided to honour Srihitha and her family, who came all the way from Chennai, for their outstanding thoughtfulness and generosity. Srihitha certainly stole the show with her poise and charm. Mr. Patil mentioned that the scale of awards is becoming bigger every year that keep individuals and organisations eagerly looking forward to it. In that sense, SECONA Shield awards are indeed the most awaited and the most coveted awards in the Indian security and safety industry. During the event, SECONA relaunched the Religious Premises Security Guide (2019). The booklet was unveiled by Mr. Patil along with Manish Gandhi (Exhibition Director, Secutech India); Sudhir Deshpande (Co-director, SECONA & MIPL); Col. Samrendra Kumar – Retd. (Co-Founder and MD, Mitkat) and Ashish Dhakan (MD & CEO, Prama Hikvision). Mr. Patil appealed to the audience to help their respective places of faith in terms of installation of various security technologies. India is exposed to uniquely diverse risks, which require customized and localized solutions to mitigate them. There is a need to encourage local research and innovation in technology, and that is one of the key objectives of SECONA and the Shield Awards. Efforts to design or Make in India, or at least adapt technologies to the context of Indian risks often find resonance in the shortlisting of finalists and the final selection of the winners, which is what was noticed in the several awards for OEMs, projects and integrators. Eight educational institutions from all over India were shortlisted as finalists for the prestigious ‘Safe Educational Institute of the Year award.’ The award was shared by three institutions – in the higher education category, the Sanjeevani Group of Institutes, Kopargaon; and in schools category, the Orchid School and the Pawar Public School, Bhandup, Mumbai. This year, SECONA introduced the popular choice award in two categories through an online poll – the Security Professional of the Year and the Sales Professional of the Year in Security/ Safety which were respectively won by Sanjeev Mishra, Reliance, and Shantanu Krishna, Pinkerton. The Amit Popat Award for the Entrepreneur of the Year in Safety/ Security was presented to Roshan Bohra, ESSL for his sterling achievements in the field of biometrics and access control. ESSL is now the leading player in that domain in India and spreading its wings rapidly in the international market. This year, the Lifetime Achievement Award was conferred on Manohar Bidaye, the Founder and Chairman of ZICOM. Mr. Bidaye has been one of the earliest entrants and a true change maker in the Indian security industry. He mentioned that he is happy to see the growth of the security technology sector, and is satisfied that as an early pioneer Zicom has had an important role to play.  

Read More

Bradley Business Center Deploys 3xLOGIC infinias Cloud Access Control

The Bradley Business Center, located in Chicago, has installed a 3xLOGIC infinias Cloud access control system throughout the redevelopment project. HTML Global, an IT managed services provider (MSP), oversaw system installation and continues to provide remote system management. Bradley Business Center (BBC) is the largest redevelopment project on Chicago’s north side, comprising over 500,000 square feet, spread over 22 acres. The BBC offers a unique shared office environment for entrepreneurs and professionals, and boasts a wide array of features and amenities. At present, the 3xLOGIC infinias system manages a total of 43 internal doors throughout the complex, split between BBC managed doors and those for a tenant company, Compass Health Center. The two organizations manage their own access separately but use some of the same network and PoE switches. BBC managed doors are mainly those controlling common areas and shared amenities – parking, fitness facility, rooftop terrace, and others. They also includes data rooms and other sensitive areas within the office space. Both organizations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions when requested. “When we started with BBC, they were looking to us for our knowledge base, and we installed a few doors at that time. Then, we built out the system as they added new offices and common areas to be managed,” explained William Hunt, Managing Director, HTML Global, “The distributed Ethernet network can easily handle all the doors and that simplified installation and on-going management. The BBC property management staff don’t want a server onsite, so a cloud solution nicely fits their needs. Another advantage for BBC is our RMR services, and the fact that a cloud-based system is mainly operating expenses, not hardware capital expenses – that’s economically advantageous for a property management business.” “There are so many other advantages to a cloud-based system, especially our ability to add doors when any of the resident companies want to join the system, or to expand the number of doors for existing customers. We can add one door or hundreds of doors upon request,” said Hunt, “Compass likes the system functionality and ease-of-use so much, they recently expanded it to their Northbrook location, too. That way, when staff move between the two facilities, they only need one set of credentials.” BBC controls access by zone and/ or amenity for each credential holder. Administrators can add zones and close access to other zones with a few keystrokes. Door control is granular, making it easy to provide all areas access to senior staff and highly-limited access, for example, for contractors and temporary workers. Such high-level control and ease of use is accomplished with minimal hardware on site. Many administrators were up and running on the infinias system with very little training, if any. With a cloud-based access control system, new tenants can join the system with ease, or a tenant can be removed from the system in a matter of minutes. Hunt said, “As an MSP, we are overseeing a system that updates itself automatically, and because BBC management doesn’t have a full-time IT person, that’s where we come in.” The future looks bright for HTML Global with the Bradley Business Center. Current office space is nearing fully-leased status, and BBC management is looking to expand their property offerings into additional buildings located on the same parcel. Hunt is impressed with another feature of the cloud-based system, “The network is set up on PoE switches, so if a door isn’t acting properly, we can fix things remotely, we don’t need to roll a truck – that’s very cost-effective.”  

Read More

Tasmanian Distillery Knocks Out Counterfeiters with HID’s IoT Platform

Tasmania’s Old Kempton Distillery (OKD) has deployed HID Internet of Things (IoT) enablement platform, HID Trusted Tag® Services, to combat counterfeiting of its world class whiskeys, gins and other liquor products. HID’s innovative IoT platform for brand protection, combined with the web application developed by local integrator AusNFC, enables Old Kempton Distillery to guard against grey market activities and allows customers to authenticate their product at the point of sale. It also strengthens the appellation registration for the Australian island state of Tasmania, which boasts some of the most pristine water and climate conditions for manufacturing premium, top-shelf liquor products. “Old Kempton Distillery makes one of the world’s finest whiskeys, and with counterfeiting in our industry becoming a global issue, we recognized the need to take proactive steps to protect our brand,” said Robbie Gilligan, Business Manager and Brand Ambassador for Old Kempton Distillery, “We were seeking the best brand protection technology available and a solution that would also allow us to securely engage with our customers, long after a sale. We believe that HID Trusted Tag services and the support provided through AusNFC provide just that.” Beyond its anti-counterfeiting features, HID’s IoT offering opens a new and powerful avenue for Old Kempton Distillery to stay connected with customers via direct and hyper-personalized communications that helps the distillery build brand loyalty in a privacy preserving, closed environment. “We find HID’s solutions to be applicable to many different industries,” said Larry Hower, CEO of AusNFC, “HID Trusted Tag services is changing the game for authenticating brands and staying connected to buyers through a mobile experience.” How it works The distillery’s solution incorporates HID Trusted Tag services into the AusNFC web application that drive the front-end mobile experience on customers’ phones. An HID cryptographically secure near field communication (NFC) tag is embedded into the label of every liquor bottle, which links to HID’s cloud authentication service. By tapping their iPhone or Android phone to the bottle, the customer activates a secure communications channel that authenticates the provenance of their premium product – down to the actual bottle number. Each tap generates a unique URL, preventing counterfeiters from copying, spoofing or manipulating the URL for false verification. “HID’s IoT technology is enabling mass adoption of brand protection by major brands worldwide that are seeking to address more sophisticated attempts by fraudsters focused on imitating their products,” said Mark Robinton, Director of Business Development and Strategic Innovation at HID Global, “Manufacturers and consumers alike can rest assured that their product can be authenticated at every stage of its lifecycle – from production to the shopping bag.” The power of HID Trusted Tag services HID Trusted Tag services combine HID’s cloud authentication services with its trusted NFC tags that come in many form factors for variety of product shapes and sizes requiring brand authentication. HID’s trusted NFC tags are embedded into each product during the manufacturing process, and are easily read using NFC-enabled smartphones (both Android and iOS v11, and newer). The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied, and the extended security features in HID’s cloud authentication service provide privacy-preserving brand authentication and consumer engagement in a closed and trusted environment.  

Read More