HID Global, the globally renowned company in trusted identity solutions, has announced that Collectors Universe, Inc. has added HID Trusted Tag Services to its Professional Coin Grading Service (PCGS) coins and banknote holders, so as to enable collectors to quickly and easily validate the authenticity, grade, and condition of their PCGS collectibles, with a tap of their NFC-enabled smartphone. Product authentication technology With the rare coin market exceeding US$ 3 billion, product authentication technology has swiftly become a necessity to prevent counterfeit coins and banknotes without compromising the encapsulation or condition of the collectibles. Collectors Universe first launched HID Trusted Tag Services with approximately 100,000 coins and received overwhelmingly positive feedback from customers. The company has purchased an additional two million HID Trusted NFC Tags to embed into broader segments of the PCGS inventory. HID Trusted Tag Services HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays “HID Trusted Tag Services is the single biggest leap forward for third-party grading since the inception of the collectibles market. I hope that every third-party grading service in the industry considers integrating similar technology into their product lines as well. It’s simply that important for the hobby as a whole,” said Brett Charville, President of Professional Coin Grading Service. HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays. Collectors just tap their phone to a holder to authenticate their collectible through the HID Cloud Authentication service. Anti-counterfeiting technology Each tap generates a unique one-time URL that automatically launches Collectors Universe’s proprietary PCGS Cert Verification app or opens a web browser to display information about the collectible’s authenticity. The single-use URLs help prevent threats such as spoofing or other attempts to circumvent the HID Trusted Tag Services. “With the HID solution, Collectors Universe is the first in the numismatic industry and among the first in any of the collectibles fields to utilize this type of anti-counterfeiting technology at scale,” said Collectors Universe Chief Information Officer, John Nelson, adding “The technology provides peace of mind to customers who seek reassurance that their investment is going toward a verifiable collectable.” NFC technology and cloud authentication services “HID Trusted Tag Services was specifically designed for Internet of Things use cases that benefit from combining our trusted NFC technology and cloud authentication services to enable new, convenient experiences for customers,” said Mark Robinton, Vice President of IoT Services with HID Global. Mark adds, “Product authentication and brand protection are some of the many applications we automate by leveraging smartphones to streamline and simplify processes that were previously manual and paper-based.”
If one employee stands less than six feet away from another employee, a fob attached to a lanyard around his or her neck emits an auditory beep – an immediate reminder to observe social distancing. If an employee were to be diagnosed with COVID-19, a cloud-based database provides a record of who at the company the sick employee had contact with. These capabilities of HID Location Services ensure social distancing and provide contact tracing to enable companies to return to work safely. They have been deployed in a pilot program at HID Global’s Corporate Headquarters in Austin, Texas. Social distancing using a BLE beacon To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. The building area covered by each reader constitutes a “zone,” and the system records when two beacons are signaling from the same zone, which indicates contact between employees. In effect, the system records – historically and forensically – who was near whom (and for how long) using the zone-based approach. “In the workplace, we provide organizations with visibility into the location of their workforce,” says Mark Robinton, Vice President, IoT Services Business Unit at HID Global. Pilot program spans variety of environments By documenting where a sick individual moved in the building, the system also can guide any need to close off a certain area for deep cleaning. Instead of quarantining a whole building, a company could quarantine a small subset of employees who were likely exposed. Importantly, the system only reports data, while management makes the actual decisions about how to respond. The site of the pilot program is the 250,000-square-foot HID Global facility in Austin, which includes a variety of environments, including manufacturing areas, an executive suite, cubicles, a training area, a cafeteria, and lobbies. This spectrum of use cases enables the pilot program to evaluate how the system works in various scenarios. The building in Austin has two floors, plenty of natural lighting and emphasises sustainability in its design. HID Location Services ensure social distancing and provide contact tracing Pilot starts small and expands For the pilot program, 80 readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. The fobs emit an audible beep, which employees have overwhelmingly said they prefer. Observers overseeing the pilot program have documented employee reaction and comments. It emits a blinking LED light, which can be seen by the offending co-worker There were challenges in setting up the pilot program remotely to ensure fewer employees were on site during the pandemic. The equipment was provisioned in Florida and then shipped to the Austin location. Fine-tuning was required to adjust the signal strength of the BLE beacons. The badges were initially more powerful, but the strength was dialed back to be comparable to the fobs and within the six-foot social distancing range. Signal strength is also a variable in diverse environments – the 2.4 Ghz signal tends to reflect easily off metal, so adjustments in signal strength are needed in a factory setting, for example, versus a collection of cubicles. “This facility is large enough and diverse enough that it provides great test results and quality data to analyze,” says Dean Young, Physical Security Manager at HID Global. “Our employees are eager to be part of the pilot to demonstrate that we use the technologies we provide to our customers, and they want to help us stay in compliance with social distancing and contact tracing.” Ensuring privacy while protecting employees HID Global’s headquarters had approximately 425 employees before the coronavirus pandemic lowered the number drastically to include only essential workers. As more people return to work, additional fobs and badges are being issued to expand the scope of the pilot program. The program is also incorporating contact tracing of suppliers and others who visit the facility. Except when triggered by contact among employees, locations are not recorded. Each employee’s location is always available in real-time (e.g. in case of an emergency), but they are not “tracked.” Through BluFi placement and geofence capabilities, the system closes off private areas where location should not be monitored, such as a rest room. Geofencing also identifies when employees enter and/or exit the area covered by the pilot program. Although each beacon is associated with an employee, the employee’s identity is not part of the data stored in the cloud, so there are no privacy concerns. Data is completely anonymized, and no personally identifiable information (PII) is stored in Bluzone. Other computer systems in a company, such as a human resources (HR) program, can privately and securely store the identities associated with each beacon. Other applications for HID location services In addition to social distancing and contact tracing applications, HID Location Services offer other use cases ranging from asset tracking and employee safety/security to location analytics. For example, the system can analyze room usage for better building management and operational efficiency. It can also quickly find people in emergency situations. These use cases ensure continued value for a system even after concerns about social distancing and contact tracing have faded. The system can analyze room usage for better building management and operational efficiency Another big selling point is the ability of a company to be better prepared in case of a future pandemic, or a second wave of this one, says Robinton. The HID Location Services social distancing and contact tracing applications will be available at the end of Q3 and will be rolled out through HID Global’s existing integrator channel. Vertical markets likely to embrace the technology include healthcare, where hospitals need to track patients as they come in and to know which other patients or staff they may have been exposed to. The financial sector is another likely market, as is manufacturing, which is looking to avoid the prospect of shutting down an entire plant. It’s better to address the three or four people who were near a sick employee than to shut down the plant. In the hospitality industry, fobs can be used to signal duress by the housekeeping staff.
As organizations around the world resume operations, new requirements for creating a safe workplace for employees are driving the need to automate approaches to manage employee social distancing and conduct contact tracing. HID Global, a worldwide provider in trusted identity solutions, announced landmark additions to its HID Location Services IoT ecosystem that simplify and streamline managing these protocols, and drive compliance to federal, state and local requirements to help prevent workplace exposure to COVID-19. HID BEEKS™ Aware fob The new HID Location Services for Workplace Safety physical distancing application leverages Bluetooth Low Energy (BLE) HID BEEKS™ Aware fobs that alert employees when they are closer than 6 feet (2 meters) for a specified period of time. The new contact tracing application uses the same HID BEEKS Aware fob or a BEEKS badge/badge holder that is easily added to existing ID cards, providing a full digital trail of an employee’s whereabouts and historical interactions while at work. This makes it possible to rapidly respond to cases and activate isolation procedures as needed. The physical distancing application is currently being piloted and adopted by major healthcare institutions and enterprise organizations worldwide, including at HID’s North American headquarters and manufacturing facility in Austin, Texas. HID Location Services for Workplace Safety “Digitally managing social distancing is critical to encouraging the necessary behavioral shifts that will create a safer and more secure environment to which employees feel comfortable returning to work,” said Mark Robinton, Vice President of IoT Services, Identification Technologies with HID Global. “Our goal with HID Location Services for Workplace Safety is to use our established IoT ecosystem to help organizations restore productivity with confidence by making it easier for everyone to adjust to workplace physical distancing and taking the manual leg-work out of contact tracing.” Its real-time time monitoring and analytics capabilities can help ensure compliance Employers define distancing policies and alert parameters; zones can be created with geo-fences around high-traffic areas (breakrooms, hallways, lobbies) to minimize large congregations of people. HID BEEKS Aware BLE fobs are issued to employees, visitors and contractors to carry while at work. Using peer-to-peer capabilities, the fob will flash and sound a brief audible alert when employees are within 6 feet (2 meters) for more than 2 minutes (or as configured by administrator). Contact tracing reporting With a click of a button, detailed reporting enables contact tracing using historical data on movement and interactions in order to trigger safety protocols. For standalone contact tracing, employers can couple the functionality with existing employee ID badges. Fast set up using HID BEEKS devices, secure HID Bluzone Cloud Software, and HID BluFi™/ other gateways. Immediate access to real-time analytics that include location data such as interaction type and contact duration (including start and end times). Uses existing enterprise networks or Bluetooth over Wi-Fi network connectivity and cloud services to simplify implementation. No additional infrastructure, hardware or network wiring needed. Building upon a proven IoT ecosystem HID Location Services is already in broad use by Fortune 500 companies for managing building occupancy, optimizing office and facility space, asset tracking and monitoring the health of equipment. The latest workplace safety additions to HID Location Services underscore the IoT ecosystem’s ability to quickly scale and adapt to the dynamic requirements of today’s hospitals, manufacturing facilities, and enterprise organizations. Its real-time time monitoring and analytics capabilities can help ensure compliance to a number of other safety requirements, such as hand hygiene policies and other regulations introduced as part of the “next normal.” Organizations are able to leverage their investment beyond today’s global health crisis, since HID Location Services lays the foundation to easily add even more IoT applications-all of which can be centrally managed on a single platform.
HID Global, a global provider of trusted identity solutions, announced that Tasmania’s Old Kempton Distillery (OKD) has deployed its Internet of Things (IoT) enablement platform, HID Trusted Tag Services, to combat counterfeiting of its world class whiskeys, gins and other liquor products. HID’s innovative IoT platform for brand protection, combined with the web application developed by local integrator AusNFC, enables Old Kempton Distillery to guard against gray market activities and allows customers to authenticate their product at the point of sale. It also strengthens the appellation registration for the Australian island state of Tasmania, which boasts some of the most pristine water and climate conditions for manufacturing premium, top-shelf liquor products. Taking Measures To Prevent Counterfeiting HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience"“Old Kempton Distillery makes one of the world’s finest whiskeys, and with counterfeiting in our industry becoming a global issue, we recognized the need to take proactive steps to protect our brand,” said Robbie Gilligan, Business Manager and Brand Ambassador for Old Kempton Distillery. “We were seeking the best brand protection technology available and a solution that would also allow us to securely engage with our customers, long after a sale. We believe that HID Trusted Tag Services and the support provided through AusNFC provide just that.” Beyond its anti-counterfeiting features, HID’s IoT offering opens a new and powerful avenue for Old Kempton Distillery to stay connected with customers via direct and hyper-personalized communications that helps the distillery build brand loyalty in a privacy-preserving, closed environment. “We find HID’s solutions to be applicable to many different industries,” said Larry Hower, CEO of AusNFC. “HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience.” Working Of The System The distillery’s solution incorporates HID Trusted Tag Services into the AusNFC web application that drive the front-end mobile experience on customers’ phones. A HID cryptographically secure Near Field Communication (NFC) tag is embedded into the label of every liquor bottle, which links to HID’s cloud authentication service. By tapping their iPhone or Android phone to the bottle, the customer activates a secure communications channel that authenticates the provenance of their premium product – down to the actual bottle number. Each tap generates a unique URL, preventing counterfeiters from copying, spoofing or manipulating the URL for false verification. Combining Cloud Authentication With NFC Tags The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied“HID’s IoT technology is enabling mass adoption of brand protection by major brands worldwide that are seeking to address more sophisticated attempts by fraudsters focused on imitating their products,” said Mark Robinton, Director of Business Development and Strategic Innovation at HID Global. “Manufacturers and consumers alike can rest assured that their product can be authenticated at every stage of its lifecycle – from production to the shopping bag.” HID Trusted Tag Services combine HID’s cloud authentication services with its trusted NFC tags that come in many form factors for variety of product shapes and sizes requiring brand authentication. HID’s trusted NFC tags are embedded into each product during the manufacturing process, and are easily read using NFC-enabled smartphones (both Android and iOS v11 and newer). The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied, and the extended security features in HID’s cloud authentication service provide privacy-preserving brand authentication and consumer engagement in a closed and trusted environment.
HID Global, a globally renowned company in trusted identity solutions, has announced that Tasmania’s Old Kempton Distillery (OKD) has deployed its Internet of Things (IoT) enablement platform, HID Trusted Tag Services, to combat counterfeiting of its premium whiskeys, gins and other liquor products. HID Trusted Tag Services HID’s innovative IoT platform for brand protection, HID Trusted Tag Services, combined with the web application developed by local integrator, AusNFC, enables Old Kempton Distillery to guard against gray market activities and allows customers to authenticate their product at the point of sale. It also strengthens the appellation registration for the Australian island state of Tasmania, which boasts some of the most pristine water and climate conditions for manufacturing premium, top-shelf liquor products. HID IoT platform We were seeking the best brand protection technology and a solution that allows us to securely engage with customers" “Old Kempton Distillery makes one of the world’s finest whiskeys, and with counterfeiting in our industry becoming a global issue, we recognized the need to take proactive steps to protect our brand,” said Robbie Gilligan, Business Manager and Brand Ambassador for Old Kempton Distillery. Robbie adds, “We were seeking the best brand protection technology available and a solution that would also allow us to securely engage with our customers, long after a sale. We believe that HID Trusted Tag Services and the support provided through AusNFC provide just that.” Direct, hyper-personalized communications Beyond its anti-counterfeiting features, HID’s IoT offering opens a new and powerful avenue for Old Kempton Distillery to stay connected with customers via direct and hyper-personalized communications that helps the distillery build brand loyalty in a privacy-preserving, closed environment. “We find HID’s solutions to be applicable to many different industries,” said Larry Hower, CEO of AusNFC. Larry adds, “HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience.” Integration with AusNFC web application The distillery’s solution incorporates HID Trusted Tag Services into the AusNFC web application that drive the front-end mobile experience on customers’ phones. An HID cryptographically secure Near Field Communication (NFC) tag is embedded into the label of every liquor bottle, which links to HID’s cloud authentication service. Secure communications channel By tapping their iPhone or Android phone to the bottle, the customer activates a secure communications channel that authenticates the provenance of their premium product, down to the actual bottle number. Each tap generates a unique URL, preventing counterfeiters from copying, spoofing or manipulating the URL for false verification. IoT technology for brand protection HID’s IoT technology is enabling mass adoption of brand protection by major brands worldwide" “HID’s IoT technology is enabling mass adoption of brand protection by major brands worldwide that are seeking to address more sophisticated attempts by fraudsters focused on imitating their products,” said Mark Robinton, Director of Business Development and Strategic Innovation at HID Global. Mark adds, “Manufacturers and consumers alike can rest assured that their product can be authenticated at every stage of its lifecycle, from production to the shopping bag.” HID cloud authentication and NFC tags HID Trusted Tag Services combine HID’s cloud authentication services with its trusted NFC tags that come in many form factors for variety of product shapes and sizes requiring brand authentication. HID’s trusted NFC tags are embedded into each product during the manufacturing process, and are easily read using NFC-enabled smartphones (both Android and iOS v11 and newer OS). The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied, and the extended security features in HID’s cloud authentication service provide privacy-preserving brand authentication and consumer engagement in a closed and trusted environment.
Protecting major brands against counterfeiting and gray market activities is a global challenge, which yields the same result regardless of the industry: lost sales and a poor customer experience that are damaging to the brand. HID Global, a worldwide provider of trusted identity solutions, has responded to this escalating issue by increasing its investments in HID’s IoT-based brand protection services and expanding its community of partners who develop and deliver seamless front-end experiences to global brands and consumers. Securely Authenticating Products With Mobile HID leverages Apple’s NFC read capabilities to drive mass adoption and help the average consumer avoid being duped by counterfeit products" These initiatives are bringing peace of mind to both manufacturers seeking to safeguard their brands and consumers who want to verify the authenticity of their purchases in a trusted IoT environment. HID Trusted Tag Services make this possible by securely authenticating products from the time of production, through every step of the distribution process, and at the point of consumer sale–all with a simple tap of an Android or iOS phone. “As a pioneer of brand protection, HID is able to quickly leverage Apple’s NFC read capabilities to drive mass adoption and help the average consumer avoid being duped by counterfeit products,” said Mark Robinton, Director Business Development and Strategic Innovation at HID Global. “Our solution goes beyond adding trust to the global supply chain; it also opens a secure channel for brands to engage directly with consumers as part of their brand loyalty strategy.” Authentication Solutions To Prevent Counterfeiting In the United States, New York City based partner Blue Bite has launched an authentication suite, which uses HID Trusted Tag Services for major European brands, in partnership with Italy based Temera. “Brands are adopting product authentication to help protect against the negative effects of counterfeiting," said Mikhail Damiani, Blue Bite CEO. "We've developed a highly secure and scalable authentication solution that uses the power of NFC to empower both brands and customers alike in their fight against this growing issue." In Canada, Toronto based partner Authentic or Not is working with HID to provide a secure brand authentication experience to major brands. Ahmer Beg, Founder and CEO of Authentic or Not, added, “With our patented technology, we are in the business of adding intelligence to products and unlocking real-world engagement with consumers. HID Trusted Tag Services provide the secure bridge between products and the digital world to make this possible. We see a future where counterfeit goods can be easily rooted out and brands can provide customers with VIP experiences through our platform.” Using HID Trusted Tag Services In the United Kingdom, London based partner Skute is using HID Trusted Tag Services to unlock real-time, hyper-personalized experiences for a new wave of fan engagement. “Our platform is shifting the paradigm in fan engagement by giving consumers secure, authentic and direct access to their favorite musical artist, athletes, teams and brands, all via a variety of creative form factors so organizations can facilitate exclusive direct marketing experiences. This exclusivity translates to the younger market too–in industries such as gaming, toys and music–where Skute gives parents peace of mind that their children can safely engage with various channels in a ‘ring fenced’ IoT ecosystem,” said Dan Lewis, CEO of Skute. In Australia, Tasmanian based partner AusNFC uses HID Trusted Tag Services with their web application Old Kimpton Distillery and McHenry Distillery. “We believe that HID Trusted Tag Services are changing the game for securely authenticating brands. Being able to stay connected and engage with their consumers as part of building brand loyalty was a deciding factor when Old Kimpton Distillery and McHenry Distillery chose HID for brand protection,” said Larry Hower, CEO of AusNFC. Combining Cloud Authentication With NFC Tags HID Trusted Tag Services combine HID’s cloud authentication services with its trusted NFC tags that come in many form factors for variety of product shapes and sizes requiring brand authentication. HID’s trusted NFC tags are embedded into each product during the manufacturing process, and are easily read using NFC-enabled smartphones (both Android and iOS v11 and newer). The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied, and the extended security features in HID’s cloud authentication service provide privacy-preserving brand authentication and consumer engagement in a closed and trusted environment.
HID Global, a worldwide provider in trusted identity solutions, announced that 85-year-old fire protection provider RAEL Automatic Sprinkler Company and integrator Automated Decision have deployed HID Trusted Tag Services at one of Manhattan’s most iconic skyscrapers. The combined solutions help secure, digitize, automate and streamline inspection and maintenance of the building’s massive fire and safety sprinkler system. "HID Trusted Tag Services are a real competitive differentiator for us when we bid for projects now," said David Israel, President, RAEL Automatic Sprinkler Company. "We plan to deploy it in other noteworthy buildings and we’re exploring using it for other mission-critical equipment we inspect and repair as well." The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app HID Trusted Tag Services HID Trusted Tag Services empower robust Internet of Things (IoT) applications by attaching unique and trusted identities to virtually any object that can be read by mobile devices. Smartphones and other devices can then be used for innovative use cases, without compromising the privacy of end users. The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app. The deployment includes HID’s trusted and tamper-evident NFC tag using dual NFC and QR code technology; unique cryptographic authentication and a unique QR code placed on every component of the RAEL sprinklers. After authenticating to HID’s cloud authentication service, RAEL technicians move through the building, tapping each applied tag with their mobile devices to authenticate upon completion of their component inspection or repair. Proof Of Presence Each individual tap generates a unique encrypted code appended to a URL to provide proof of presence. This process confirms the technician was physically at the site and conducted the required sprinkler inspections and repairs. "Proof of presence was critical for us,” said Israel, “as property managers are now expected to deliver a much higher level of compliance reporting." The solution also logs the user, tap time and date into the Automated Decisions work order management platform. Mobile online access provides inspectors with service request maintenance records, sprinkler part specifications, diagrams and photographs. Combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs Combined Tag Services And Mobile Devices "That RAEL and Automated Decisions are leveraging our offering for fire and safety at an immense, iconic skyscraper reinforces the breadth of IoT use cases that our identification and sensing portfolio addresses," said Mark Robinton, Director of Business Development & Strategic Innovation, Identification Technologies with HID Global. "Facility managers are also increasingly seeking to combine the use of HID Trusted Tag Services and mobile devices to automate other safety and security functions, including guard tour and key management, as buildings become more intelligent and connected." In addition to providing peace of mind to RAEL and their property management clients, RAEL also reported the combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs, improved first-time fix rates and fewer repeat visits.
MyTAG.io and HID Global created a system that integrates data key management, security patrol and contractor services into a single interface CityPoint is one of London’s most iconic structures. The arched roof with cantilevered buttresses reaches 417 feet (127 meters) skyward, flanked by low-rise extensions creating two 12-story galleria and a ground floor winter garden with sloping, glazed roofs. CityPoint’s 35 stories of structural steel, glass and aluminum includes over 706,000 sq. feet (65,600 sq. m) of office space, ground-level shops and restaurants, a fitness center, multi-level underground parking and basement level storage. The tallest in London when it was first built in 1967, the CityPoint building has evolved along with the historic city, adapting to changing demands by implementing advanced technology to keep pace with today’s requirements. “Technology and tenant needs have changed dramatically since this building first opened 50 years ago,” said Lee Murray, CityPoint building manager. “CityPoint thrives today by adapting quickly to change, and striving to operate our facilities at the forefront of technology.” Challenges Operated by CityPoint’s Estate Management Team, CityPoint’s mission is to ensure an optimal environment for businesses to conduct enterprise activities, while maintaining high security standards that protect tenants, their guests, their assets, as well as CityPoint staff and contractors. Thousands of people pour into and out of the building with each day’s cycle, while CityPoint staff and contractors maintain 24-hour watch over the operations. Among their daily functions, three potential areas of improvement had been identified for the facility: Automated Key Management. Over 220 physical keys unlock distinct areas within the facility. CityPoint staff is assigned varying levels of authorization, designating which keys they are allowed to use to access secure areas as needed. A manual, paper-based system for tracking the distribution and collection of keys had proven time consuming, ineffective and inaccurate, resulting in lost and stolen keys on a regular basis. Improved Security Patrol. Security officers and contractors patrol 280 designated points within the building and an additional 15 points on the surrounding grounds every day. A handheld wand was used to collect a digital timestamp at each numbered checkpoint, with the data downloaded to computers only after the completion of each individual patrol. Incident reports were handwritten, meaning they were largely un-actionable until each patrol was finished. Even then, the written reports had to be cross-referenced with the numerical checkpoint data for verification. Better Contractor Management. Dozens of mechanical and security contractors on site daily help keep CityPoint running smoothly. A significant operational expense, CityPoint lacked a means for accurately auditing billable time for contracted services. “MyTAG showed us how their solutions integrated with NFC technology from HID Global could enhance the accuracy and efficiency of all three areas with a common platform,” said Lee Murray. Several hundred HID Global NFC tags were deployed to identify assets, checkpoints and people throughout the facility Solutions MyTAG.io and HID Global partnered to create a system for CityPoint that integrates data key management, security patrol and contractor services into a single interface to deliver more accurate information in real time. Near field communication (NFC) technology enabled seamless deployment of the solution throughout the facility, with minimal investment in infrastructure. Cloud-based solutions, including MyTAG’s security management software and HID Trusted Tag® Services, allowed CityPoint to deploy this comprehensive solution using their existing computer infrastructure, standard NFC-enabled smartphones and tablets, and NFC readers that connected to computers via USB. The cloud-based system further enabled CityPoint’s estate management team to customize the interface with their commercial property information, employee information, contractor details and other data to provide complete control and visibility into facility operations. “The CityPoint solution required placement of unique identifiers at hundreds of points within the building and the surrounding grounds outside, in addition to equipping the staff and contractors,” said Mark Robinton, Direcor of Business Development and Strategic Innovation with HID Global. “HID Global offers the industry’s broadest, most flexible line of NFC transponders to meet different environmental and security needs, which made it possible to fulfill the exceptional and diverse requirements at CityPoint.” Several hundred HID Global NFC tags were deployed to identify assets, checkpoints and people throughout the facility. HID Epoxy Tag Keyfob transponders, designed to provide unique identities to keys, were ideal for CityPoint’s key management application. HID Inlays & Labels were used to designate numerous patrol checkpoints throughout the building. NFC Stickers custom-printed with a CityPoint illustration fit seamlessly with the building’s interior design standards, while clearly marking each point for guards to tap on their daily tours. To designate outdoor checkpoints, HID Poly Tag transponders were chosen for their ability to withstand exposure to seasonal elements. Familiar ISO Card badges enable contractors to check in and out easily at NFC terminals. “HID Trusted Tag Services enables proof of presence, with frictionless authentication - which is the ideal match for commercial and private real estate properties” A simple tap is all the training most personnel needed to ensure effective system deployment, while HID Trusted Tag® Services – in contrast to traditional NFC tags - ensured each tap with an NFC device is secure, unique and impossible to clone. Key Management: To use a physical key, a user can now just tap a tablet computer with the keyfob and enter an authorized identity. The user is then notified of when the key is due to be returned. When returned, the user taps the tablet again to check the key back in. MyTAG.io generates a main dashboard screen showing all keys that are checked out, who has them, and when they are due back. Security Patrol: On patrol, security guards can now simply tap each checkpoint on his/her designated tour with their NFC-enabled smartphone. MyTAG.io identifies each checkpoint by name, and automatically uploads timestamp information and updates databases in real time. The MyTAG.io system records a guard’s progress automatically and can trigger an alert should too much time pass between checkpoints. If a guard encounters an incident, they can use their smartphone to generate a detailed report – including photo or video evidence if necessary – and immediately escalates activity as needed according to preset protocols. Contractor Management: Contractors are now issued pre-printed NFC ISO cards upon arrival at CityPoint. They tap a tablet computer to check in and confirm their identities. Another tap records the completion of their assignment, and the card is returned to facility management for re-use. Benefits “HID Trusted Tag Services enables proof of presence, with frictionless authentication - which is the ideal match for commercial and private real estate properties,” said Mike George, managing director of MyTAG. “With full integration into MyTAG.io, the opportunities are limitless to deploy secure proof of presence and other trusted NFC capabilities throughout CityPoint as their business needs continue to evolve.” CityPoint has significantly reduced staff time previously spent manually logging and tracking keys, not to mention time and resources spent replacing lost or stolen keys. Not only can the team account for each key instantaneously, they now have access to historical issuance and return activities to better understand which keys are in greatest demand and by whom. The improved security patrols deliver greater peace of mind for tenants and staff, through more timely, accurate and detailed reporting The improved security patrols deliver greater peace of mind for tenants and staff, through more timely, accurate and detailed reporting. Even when an individual security guard is on patrol, the guard is constantly connected to facilities management, creating proven interactions at every checkpoint. MyTAG.io can track the time lapse between checkpoints, and in the event that a guard does not reach a consecutive point in the prescribed amount of time, the system can trigger an appropriate alarm – from a reminder message to the guard, to an alert for facilities staff to investigate further. This provides added assurance to guards that they have constant communication with facility staff, even when walking tours alone. Results CityPoint reports that the NFC and cloud-based solution has reduced the time it takes for individual security patrols, due to the increased efficiency of digital tracking versus the previously cumbersome manual recording of checkpoints and incidents. Eliminating the paperwork also enables each guard to more effectively observe surroundings. CityPoint has also recognized improvement in the management of their contract employee partners. More accurate, auditable time and attendance ensures CityPoint is paying only for services rendered, and contractors are ensured fair compensation for work completed. Reports detail site visits and activities, providing management insight and substantiation for contractor invoices.
HID Global, a provider of trusted identity solutions, announced its extended portfolio of innovative Internet of Things (IoT) solutions with its latest offerings that help organizations take the leap to a new level of asset and equipment management.HID Location Services for Item Management precisely monitors the location and movement of assets and equipment across multiple locations or in a specific area, and the new HID Condition Monitoring Services provides real-time analysis of equipment performance and health. The offerings provide a simple solution for streamlining the daily operations in hospitals, manufacturing facilities, and a wide range of industrial organizations requiring instant, actionable data to optimize workflow, processes, and equipment efficiency.Preventing Equipment Failure“Every day, organizations seek to address pressing concerns around the misuse, tampering, and theft of assets, as well as unforeseen equipment downtime. HID’s latest solutions make it possible to quickly locate items, provide valuable equipment data to optimize equipment efficiency, and react quickly to critical events or instantly know when equipment fails,” said Mark Robinton, Director of Strategic Innovation with HID Global.“Our new condition monitoring services enable operations teams to move from a reactive or prescriptive stance to a more knowledge-based, predictive model that makes it possible to receive advanced warning of issues with equipment and proactively plan for scheduled maintenance based on algorithms and data analytics.”Predictive And Actionable AnalysisHID Conditioning Monitoring Services enable organizations to create predictive and actionable analysis for optimal performance of vending machines, conveyor belts, heating and cooling systems, medical equipment, and other equipment. In addition, the services help determine the health and predict failure of motors, generators and other motorized machinery, while also leveraging its powerful policy engine to quickly identify potential issues and provide alerts so organizations can take action to reduce downtime. The new HID Location Services for Item Management capabilities dramatically enhance item and asset management The new HID Location Services for Item Management capabilities dramatically enhance item and asset management by quickly locating a broad range of items, such as ladders, carts, and emergency hospital equipment. In scenarios where an item’s location impacts workforce safety, facility managers can use geo-fences to easily deploy alerts by simply establishing policies that monitor incoming vehicles, hazardous materials, or dangerous equipment in multiple locations.Seamless Deployment And Lower Deployment CostEnabled by Bluvision, an HID Global company, the offerings are based on a common platform for seamless deployment and lower deployment cost, plus they leverage Bluetooth Low Energy (BLE) for precise, real-time location services. Both include an HID cloud service, Bluetooth beacons in multiple form factors, and BluFi gateways; deployment simply entails plugging in AC-powered BLE/WiFi gateways and attaching beacons to items and equipment.The solutions’ cloud-based model and minimal hardware requirements also eliminate expensive infrastructure setup of antennas, servers, and wired infrastructure to further reduce the total cost of ownership.
The new IoT solutions provide real-time location to locate and monitor critical medical equipment From hospitals to homes, HID Global provides the broadest portfolio of solutions to establish, create, use, and manage trusted identities in the healthcare environment. The company will demonstrate its compliant multi-factor authentication portfolio for electronic prescription of controlled substances (EPCS) as well as solutions to protect patient data. HID Global will also showcase its innovative Internet of Things (IoT) solutions for healthcare, along with intelligent visitor management systems that enhance security at the HIMSS Annual Conference & Exhibition next week in Orlando, Florida. Healthcare Security Solutions HID Global’s healthcare security solutions can be found in Booth #7752 and the Intelligent Health Pavilion (Kiosk #17) at the Orange County Convention Center in Orlando, Florida from February 19-23, 2017. Demonstrations include: Architectural options to support strong authentication for EPCS: Complying with Drug Enforcement Administration (DEA) two-factor authentication requirements with EPCS solutions that help implement electronic prescribing systems with DEA-compliant biometrics and identity-proofing using Public Key Infrastructure (PKI) certificates. Secure access to patient data, facilities, and supplies: Improving security and the user experience using the same smart card for opening doors and accessing hospital supplies to also tap in to laptops, tablets and phones for easy, secure access to patient data, cloud apps, and web services. Intelligent patient visitor identity management: Centrally managing the entire visitor lifecycle to enhance security by streamlining manual processes for a first-class visitor experience that integrates with EHR Systems to provide real-time patient information. The IoT in healthcare for a secure and connected environment: Creating electronic visit verification (EVV) solutions for secure proof of presence in home healthcare using cloud-based services that provide accountability and data accuracy to reduce billing fraud. New IoT solutions provide real-time location services to locate and monitor critical medical equipment. HID Global will be featured in emergency room, outpatient room, and medical surgery tours to show compliant authentication for EPCS Intelligent Health Pavilion (IHP) Tours iHome Tour: In the home environment, HID Trusted Tag Services deliver a secure and seamless EVV method for in-home caregivers to accurately document their arrival and departure, helping providers improve efficiency and maintain more accurate service records. Hospital Tour: HID Global will be featured in emergency room, outpatient room, and medical surgery tours to show compliant authentication for EPCS, as well as using tap authentication to mobile devices with a hospital ID badge plus patient and visitor ID management. Conference Speaking Sessions Trusted Identities across the Healthcare Continuum, presented by Sheila Loy, Director of Healthcare Strategies with HID Global, who will step through how organizations can provide a seamless trusted identity experience in the healthcare environment on Monday, February 20, from 1:00-1:20 p.m. in the Innovation Theater. IoT Workshop Panel: Real Time IoT in Holistic Healthcare Ecosystem, Mark Robinton, Director of Business Development and Strategic Innovation with HID Global, will explore connecting healthcare assets, property, and critical medical equipment to IoT applications on Tuesday, Feb 21, 2017, from 1:00-1:50 p.m.
HID Trusted Tag Services solution for CMMS extends HID Global’s broad set of complementary solutions that secure IoT applications and facilitate smart building environments HID Global, a provider of secure identity solutions, announced new solutions that secure Internet of Things (IoT) applications to improve the convenience and effectiveness of monitoring heating and cooling systems, along with a variety of manufacturing and safety equipment. The company’s latest HID Trusted Tag Services solution for Computerized Maintenance Management Systems (CMMS) joins HID Global’s trusted identity solutions that solve key challenges faced by facility managers in an IoT and smart building ecosystem. The new solution provides secure “proof of presence” of maintenance and inspection teams to automate and drastically simplify service order management. Cloud-Based Maintenance Systems The HID Trusted Tag Services solution seamlessly integrates with CMMS systems to link physical assets to cloud-based maintenance systems and IoT applications. This automates service calls, with a simple tap of a mobile device, to streamline monitoring and maintenance of fire safety, back-office systems, and cafeteria equipment. The offering enables field service teams to easily acquire service history and repair manuals, as well as open service tickets and confirm service call times, duration, and status. All service events can be monitored and tracked locally, regionally, or globally using a mobile device. The solution can also be used to more effectively manage compliance and inspection workflows for regulated equipment. “HID Global is known for leveraging the power of mobile to protect people, assets and data, and we continue to drive innovation with new HID Trusted Tag Services use cases that meet the expanding requirements of today’s facility manager,” said Mark Robinton, Director of Business Development and Strategic Innovation with HID Global. “HID Trusted Tag Services is the missing link to take a CMMS to the next level for secure, intuitive and mobile management of high-value facilities, equipment, and assets across an organization. Optimizing facility operations is now an imperative, and HID Global is ahead of the demand curve with offerings that help make buildings smarter.” "HID Trusted Tag Services isthe missing link to take a CMMSto the next level for secure,intuitive and mobile managementof high-value facilities" Secure IoT Applications “Our mission is to transform how facilities management professionals and commercial contractor partners collaborate on cloud-based service automation for fire safety and other equipment, without a swamp of paper, processes or protocols,” said Steven Gottfried, Founder of ServiceChannel, an HID Global partner. “HID Global shares our vision and its HID Trusted Tag Services for CMMS will enable us to offer and deliver services that are seamless, easier to manage and empower a more responsive, productive mobile workforce.” The HID Trusted Tag Services solution for CMMS extends HID Global’s broad set of complementary solutions that secure IoT applications and facilitate smart building environments: Automate maintenance and inspection processes: For facilities equipment, heating and cooling, sprinklers, fire extinguishers, data centers, IT equipment, video surveillance systems and other building systems with HID Trusted Tag Services for CMMS. Proving presence at security guard tours: HID Trusted Tag Services securely automates guard patrol rounds with a tap of their mobile phone to trusted tags placed at security checkpoints to log their tour. Key management, security patrol and contractor services can be managed via a single interface to deliver more accurate and actionable information in real time. Using smartphones to open doors, gates, and smart building services: HID Mobile Access is transforming the facility manager and tenant experience by enabling users to open doors with smartphones and activate HVAC, lighting, and other building systems. Providing convenient and secure access to data, and cloud-based applications: Building occupants can use ActivID Tap Authentication for Microsoft to authenticate to applications and services by simply tapping mobile devices with the same smart cards that are used to open doors. Integrating seamlessly with other secure services in the smart building: HID Global’s embedded solutions extend the use of trusted identities to automate and increase security for applications including time and attendance, secure print management, elevator access, cashless vending, and other common building occupant applications. HID’s Mobility Initiative HID Global’s smart building offering is part of the company’s mobility initiative spanning solutions, investments and strategic alliances aimed at creating a more convenient, trusted and secure experience in today’s increasingly connected, mobile-first world. The solutions are powered by the company’s Seos credential technology, which makes it possible to carry trusted IDs in mobile devices and empower users with new applications and capabilities. Save
The system enables secure proof-of-presence with frictionless authentication using HID Trusted Tag Services HID Global®, worldwide leader in secure identity solutions, recently announced it has been selected by CityPoint to streamline security and management systems for its 35-story office building used by thousands of people on a daily basis in London, UK. Securing CityPoint Staff In partnership with MyTAG.io, HID Global’s cloud-based services and Near-Field Communication (NFC) tags were deployed to automate CityPoint’s paper-based system for tracking 220 physical keys; improve their security guard patrol of 295 checkpoints; and create a better solution for auditing billable contractor hours. CityPoint’s overall goal of the new system was to maintain the highest security standards to protect CityPoint staff, tenants, guests and assets, while ensuring seamless day-to-day operation of the building. Integrating Key Management, Security Patrol & Contractor Services The new cloud-based system combines MyTAG.io’s security management software with HID Trusted Tag® Services, and enables CityPoint to deploy the solution using their existing IT infrastructure along with standard NFC-enabled smartphones, tablets and NFC USB readers. The system integrates key management, security patrol and contractor services into a single interface to deliver more accurate and actionable information in real time. ”HID Trusted Tag Services enables secure proof-of-presence with frictionless cloud authentication, which is the ideal match for commercial and private real estate properties,” said Mike George, Managing Director of MyTAG.io. “With full integration into MyTAG.io, the opportunities are limitless to deploy proof-of-presence and other trusted NFC capabilities throughout CityPoint as their business needs continue to evolve.” "Technology and tenant needshave changed dramatically sincethis building first opened 50 yearsago, and CityPoint thrives todayby adapting quickly to change, whilestriving to operate our facilities atthe forefront of technology" HID Global’s NFC-enabled Epoxy Tag Keyfob transponders, Inlays and Labels, Poly Tag transponders and familiar ISO Card badges were deployed to identify assets, checkpoints and people throughout the facility. A simple tap was the only training needed to ensure effective system deployment, while HID Trusted Tag Services – in contrast to traditional NFC tags – also ensures each tap with an NFC smart device is secure, unique and impossible to clone. Most Flexible Line Of NFC Tags “The CityPoint solution required placement of unique identifiers at hundreds of points within the building and the surrounding grounds outside, in addition to equipping the staff and contractors,” said Mark Robinton, Director of Business Development, Identification Technologies with HID Global. “As part of our NFC continuum, HID Global offers the industry’s broadest, most flexible line of NFC tags, coupled with our innovative HID Trusted Tag Services. This made it possible to fulfill the diverse environmental and security requirements at CityPoint.” With the new solution, CityPoint has significantly reduced the amount of time and resources spent managing and replacing lost or stolen keys. Today, CityPoint can account for each key in real time, and they have access to historical issuance and return activities to better understand which keys are in demand. Patrolling security guards now tap each tour checkpoint with their NFC-enabled smartphone, providing more timely and detailed reporting. As a result,CityPoint has reported an increase in efficiency based on digital tracking, which has reduced the time it takes for each individual security patrol. CityPoint has also noted improvement in the management of their contract employee partners, where more precise, auditable time and attendance ensures CityPoint is paying only for services rendered, and contractors are ensured fair compensation for work completed. “Technology and tenant needs have changed dramatically since this building first opened 50 years ago, and CityPoint thrives today by adapting quickly to change, while striving to operate our facilities at the forefront of technology,” said Lee Murray, CityPoint Building Manager. “MyTAG.io showed us how their solutions, integrated with NFC technology from HID Global, could enhance the accuracy and efficiency across our key management, security guard patrol and contract management functions -- all using a common platform.”
The expanding range of proof of presence, brand protection and asset tracking applications add trust to NFC transactions HID Global®, a worldwide leader in secure identity solutions, is driving innovation for securing Internet of Things (IoT) applications that are opening new opportunities across numerous markets. The company’s expanding range of proof of presence, brand protection and asset tracking applications add trust to Near Field Communications (NFC) transactions, creating new paths for HID Global partners to develop solutions that would otherwise be vulnerable to risk or simply not possible. The portfolio of identification innovations exemplifies the company’s NFC continuum, an initiative to broaden the use of HID Trusted Tag Services® and NFC tags. NFC Solutions Innovation “HID Global has been at the forefront of enabling new applications that leverage NFC tags for data gathering, data analysis and digital marketing over the past several years,” said Mark Robinton, Director of Business Development and Strategic Innovation with HID Global. “Continuing our journey of NFC solutions innovation, HID Trusted Tag Services are pioneering novel use cases, such as electronic visit verification (EVV), time-and-attendance and other burgeoning IoT applications that are fundamentally changing the way organizations conduct business.” The company has a solid track record of collaborating with partners to champion successful pilots and deployments of breakthrough solutions that securely connect users to verify a person is where they said they are, enable small data analytics for promotions, improve processes and enhance security: HID Global partner Dial-N-Document® integrated HID Trusted Tag Services into a web-based documentation system that interfaces with the services for a secure EVV solution. NFC Trusted Tags placed in the homes of Integrity Home Care patients provide proof of presence and visit documentation for mobile clinicians. HID Global has been at theforefront of enabling newapplications that leverage NFCtags for data gathering, dataanalysis and digital marketingover the past several years Partnering with Tamoco, HID Trusted Tag Services powered the first out-of-home (OOH) campaign for Tribeca Film Festival in New York City. Film fans “tapped” promotional posters 8,195 times with 1,156 unique mobile devices, enabling real-time engagement and performance of the campaign. HID Global’s award-winning RFID tag and NFC solution, in partnership with system integrator Fundación Ada Byron (FAB), replaced a cumbersome, outdated tracking and employee payment system for picking grapes at Bodega Norton Winery in Argentina. Latest innovations, partnering with MyTAG Ltd, include security industry applications, such as key management, proof of presence, time and attendance and lone worker solution programs. “Our partnership with HID Global has empowered MyTAG to develop innovative NFC-based solutions that boost safety and security processes in key management, lone worker and guard tour programs practices,” said Mike George, Managing Director of MyTAG Ltd. “Our industry-leading solutions replace antiquated paper-based processes, improve accuracy by reducing human error, and provide real-time tracking and reporting, while monitoring keys and the safe return of employees for greater peace of mind to businesses and their employees.” HID Global NFC Tags HID Global’s NFC tags are sold in a variety of form factors, from very small and embeddable to large and robust solutions, in order to satisfy different application requirements. Adding to this portfolio, HID Trusted Tag Services combine the company’s patented NFC tags with its cloud-based authentication platform to add unique and trusted identities to everyday objects that can be read by NFC-enabled smart devices. The services are also designed for future support of Bluetooth® using HID Global’s award-winning Seos® technology.
HID Global®, a worldwide leader in secure identity solutions, recently announced the commercial availability of HID Trusted Tag® Services, a cloud-based authentication platform that adds trust to “proof of presence” and Internet of Things (IoT) applications using NFC technology. Proven in numerous pilot deployments with HID Global partners, HID Trusted Tag Services provides a comprehensive and easy-to-use secure authentication environment that delivers significantly greater convenience and security than alternative solutions. Creates Secure Internet Of Things Applications “By combining trusted NFC tags and our cloud-based authentication platform, HID Trusted Tag Services delivers a robust offering for integrators to create powerful and secure Internet of Things applications,” said Mark Robinton, Director, Innovation and Business Development with HID Global. “HID Global has applied our industry-proven best practices to provide an innovative solution that couples advanced security with ease of implementation to excel far beyond NFC labels, static tags or QR codes. This enables integrators to enhance their applications by adding trusted ‘proof of presence’ capabilities and advanced analytics while maintaining control of their end users’ experience.” HID Trusted Tag Services have been successfully piloted in use cases that included detecting and preventing URL sharing in digital out of home (DOOH) marketing campaigns, and authenticating home health service delivery in electronic visit verification applications. The pilots reinforce the offering’s unique ability to optimize security and prevent cloning by authenticating each tap of a tag through an automatically changing URL, while eliminating the inconvenience of other cryptographic solutions that require installation of dedicated apps for each use case. The solution can also be used to validate the authenticity of documents, goods and additional items for brand protection and other purposes. Custom Tag Form Factors Available Powered by award-winning Seos® technology, HID Trusted Tags feature 8 kilobytes (KB) storage capacity to support practically any use case, and the tags are available in different shapes, sizes and materials: secure contactless ISO cards, epoxy tag key fobs and self-adhesive wet inlays that turn any location into a hot spot for NFC-enabled smartphones or readers. HID Global also offers the option to design custom tag form factors for special customer needs, and HID Trusted Tag technology can be embedded into virtually any RFID tag form factor. HID Trusted Tag Services are available now. Demonstrations Of HID Trusted Tag Services HID Global will be conducting live demonstrations of HID Trusted Tag Services at upcoming events: HIMSS: HID Trusted Tag Services demonstrations for electronic visit verification in HID Booth #7636 and at Kiosk #26 in the HIMSS Intelligent Health Pavilion (IHP) at the McCormick Place Convention Center in Chicago from April 13-15, 2015. RFID Journal Live!: HID Trusted Tag Services demonstrations for electronic visit verification and digital out of home campaigns in HID Booth #118 at the San Diego Convention Center from April 15-17, 2015. Other April demos: Electronic visit verification demo at ISC West in Las Vegas, and digital out of home campaign demonstrations at Cards Asia and Cards Brazil.
How To Ramp Up Perimeter Security With License Plate Reader TechnologyDownload
Solve Access Control Challenges in the Healthcare SectorDownload
Getting the Most Value From Software Subscription AgreementsDownload
Shifting Trends in Operation Centers and Control Rooms for 2021Download