Secure Proof of Presence

Secure proof of presence combines trusted Near Field Communications (NFC) or BLE and cloud-based authentication to uniquely add trust to IoT applications - ensuring services have been rendered and billed for the accurate amount of time.

proof-of-presence …

Secure Proof of Presence and Asset Management

HID Global is driving leadership with an expanding portfolio of NFC and HID Trusted Tag Services for securing IoT applications that are opening new opportunities across numerous markets. At the core of HID Global’s NFC continuum are visionary solutions that fuel a broad range of “proof of presence,” brand protection, secure transactions and asset tracking use cases.

Providing a safe environment for a company’s most valuable assets, people and property is paramount for property management and facilities managers. Adding trust to NFC IoT applications forges new paths for our partners and users.

trusted-security-patrols …

Trusted Security Guard Patrol

HID Trusted Tag Services combine NFC technology and cloud-based authentication with partner IoT applications, allowing property management to accurately track security check-points and security guards to instantly respond and report fraudulent activities throughout the building -- day and night.

Security guards are able to patrol areas of the building more easily and efficiently -- each patrol stop is automated, replacing the manual sign-in process. With a simple tap of their mobile phone to the secure Trusted Tag, guards digitally prove that the security patrol stop took place at the proper location.

maintenance-inspection …

Streamline Maintenance and Inspection

Through seamless integration with existing Computerized Maintenance Management Software (CMMS), facilities managers can easily manage service events, monitor mobile technicians and inspectors across multiple locations by simply implementing HID Trusted Tag Services. By adding a Trusted NFC Tag to manufacturing equipment, utilities, and safety equipment, assets are instantly internet-enabled to securely engage with mobile, web-based CMMS, and other preferred business applications. A simple tap with an NFC-enabled mobile device automates the maintenance and inspection process – delivering a secure, mobile experience while extending the life and performance of capital equipment.

key-management …

Simplify Key Management

Organizations can now simplify and automate physical key management by tagging each key with an NFC tag to track and trace keys more efficiently. Using applications from HID Global partners, organizations can automatically record and monitor keys logged in and out of the property.

The solution also saves time and resources by automating procedural changes, thus replacing paper-based logs. Teams can generate accurate record-keeping through automated reports and real-time accountability of missing keys. Additionally, the cost and headache of replacing keys is significantly reduced

time-attendance …

Secure Time and Attendance

Integrating HID Trusted Tag Services into partner applications enables secure proof of attendance using NFC mobile devices. This adds trust to time and attendance to effectively manage contracted services, students, mobile workforce, or maintenance technicians.


How Trusted Tag Services Works

HID Trusted Tag Services can facilitate transactions simply by tapping an attached or embedded NFC tag with an NFC-enabled smartphone or tablet to securely communicate information. This results in a frictionless authentication experience using a solution that fuels more powerful and dynamic Internet of Things applications.

Bring it all together. Hover over each component for details of the solution.

HID Trusted Tag: Programmed secure NFC tag available in a varitey of form factors NFC enabled smartphone or tablet Branded web interface and integrated application HID Cloud Authentication: Strong authentication service verifies authentic cryptographic OTP
Inlays and Labels

HID Inlays & Labels

  • Trusted Tag Eligible
  • Thin, transparent stickers
  • Excellent for DOOH materials
Robust Hard Tags

HID Epoxy Tag RFID Tags

  • Trusted Tag Eligible
  • Thin, rigid, surface printable tags
  • Can be affixed with a secure screw for "proof of presence"
ISO Card

HID Trusted Tag® Services ISO Card

  • Trusted Tag Eligible
  • Ideal as authentic ID badges
  • Printable or pre-personalized