![]() ![]() In a nutshell, they prevent cloning by generating a new unique code on each scan which can be verified by a third party server. However, authentication isn't just about preventing counterfeit products, it can also be used for access control, user authentication, connecting to an NFT and the metaverse, ticketing, gaming, document authenticity and much more. They allow the user to not only identify the handbag but also provide a very high level of security that the tag (and therefore the bag that the tag is attached to) is in fact the item it claims to be. However, there's no guarantee that the tag, and therefore the handbag is actually genuine or the handbag the user thinks it is.Īuthentication tags take that extra step. ![]() ![]() It might provide specific information on that exact handbag. It might provide information about the supply chain, the store that sold it, perhaps even the previous owners. Identification is the ability of the tag to identify that particular model of handbag. We will use the example of an NFC tag being attached to, say, a handbag. To make things clear, let's define the difference between identification and authentication. The ability to add an NFC tag into a product to allow authentication with just a mobile phone by any user, anywhere. Seritag consider these to be an important development to the NFC tag authentication landscape. Recently however, there's a new generation of authentication NFC tags arriving on the market. This isn't the article to go into the pros and cons, but the point is that you have options. ![]() For example, if you are an advertising agency and are looking to create a link between your physical packaging and your website - you might consider NFC, but you'll also consider QR codes. However, to an extent, NFC has always been a 'optional' technology rather than an 'essential' technology. NFC tags have a wide and growing number of uses. ![]()
0 Comments
Leave a Reply. |