Your Security Partner

Opening Doors With NFC and ECC

We use doors every day to gain access to our homes, cars and offices. While lock and key mechanisms have evolved significantly, a certain lack of …

Continue reading full post

Can the Consumer Join in the Battle to Prevent Counterfeits Using NFC?

Consumers search online for authentic products at the very best prices. Unfortunately, they have no way to tell if they are purchasing a knockoff. …

Continue reading full post

Alibaba Group Sued Again Over Alleged Counterfeits

Despite efforts to combat counterfeits, Alibaba ecommerce websites reportedly “encourage, assist” fake merchandise.

Continue reading full post

Three ways NFC tags can drive revenue opportunities

NFC tags are being used to build and strengthen products in a number of creative ways. Here are three that are top of mind at TrustPoint Innovation…

Continue reading full post

Tag the World

I recently attended an NFC Forum meeting in Edinburgh, Scotland. On my last day in the city I hiked up to Arthur's Seat in Holyrood Park. I highly …

Continue reading full post

NFC Explained Through Infographics

I found some great NFC infographics to explain the technology. The first one is a comparison between RFID & NFC. It captures the differences nicely. RFID

Continue reading full post

What to do with NFC Tags? An electronic business card

Most smart phones (sans the iPhone) are NFC enabled out of the box and can read NFC tags without installing any apps. Naturally early adopters will want …

Continue reading full post

NFC use case: 2nd graders Set Up 25 Nexus Tablets in 3 minutes

About this Blog

The TrustPoint Innovation Blog covers security industry topics relating to Certificates, Elliptic Curve Cryptography (ECC), Machine-to-Machine (M2M) Communication, Near Field Communication (NFC), Vehicle-to-Vehicle (V2V) Communication, and more.

More Categories