Your Security Partner

A Novel Approach to Key Sharing – Connect With the Facts V2

Car Door Handle

As keyless entry systems become ubiquitous, concerns about security are growing and gaining attention. Key sharing is one area that continues to present unique and significant challenges for car owners and manufacturers alike. …

Continue reading full post

Making the Right Choice: Security and NFC/RFID Tags

Depending on the application, NFC/RFID tags may or may not require some level of security. If you were only interested in tracking assets, a simple serial number …

Continue reading full post

Petition to Support NFC on iPhone

NFC is a great technology. It allows us to easily access and share information. Its functionality is perfect for our smartphone-connected world. At …

Continue reading full post

Smartphones as Keys: Are They Secure?

Car Door Handle

A couple of months ago, Volvo unveiled their new keyless entry system at MWC 2016. Like many other manufacturers, Volvo is looking at taking advantage …

Continue reading full post

Counterfeit Wines, A Multi Billion Dollar Problem

Is your favourite wine real or counterfeit?

Counterfeit wines made headlines in the world of rare wine collecting with two fascinating stories. The first story is the New Yorker’s …

Continue reading full post

Opening Doors With NFC and ECC

We use doors every day to gain access to our homes, cars and offices. While lock and key mechanisms have evolved significantly, a certain lack of …

Continue reading full post

A Behind the Scenes Look at How the TrustPoint Innovation Team Keeps our Tech Secure

Elliptic Curve Cryptography

Near Field Communication, Internet of Things and Vehicle-to-Vehicle — these are all emerging technologies that promise to improve our lives. Without …

Continue reading full post

Should Consumers Care About Counterfeit Goods?

We know manufacturers care about counterfeits. High quality counterfeits compete directly with the genuine article leading to lost sales. Low …

Continue reading full post

Are Intermediaries in Supply Chains Legally Responsible for Counterfeit Goods?

Trust in the Supply Chain

Intermediaries refer to all parties in the supply chain. They include raw material suppliers, manufacturers, distributors, shipping companies, …

Continue reading full post

What NFC Does For Your Phone

The most common use for NFC technology is to turn a smartphone into a digital wallet. It can collect and store the data from credit and debit cards …

Continue reading full post

Taylor Swift: Shaking Off Counterfeits in China

Taylor Swift has long held a passionate stance on the protection of intellectual property in the music industry, and is not afraid to stand up for …

Continue reading full post

How is NFC Revolutionizing Advertising Campaigns?

The options for using NFC tags in advertising are endless. NFC (or near field communication) is a wireless technology that facilitates fast and efficient …

Continue reading full post

Government Officials and Device Security

Government officials need their electronic devices to be secure. Blackberry security has recently come under scrutiny from Shafiq Qaadri, a Liberal MPP

Continue reading full post

How To Get Signatures On Smaller NFC Tags

BlackSeal currently requires NFC tags with about 500 bytes of memory available to be able to fit a URL plus a signature on the tag. But is it possible …

Continue reading full post

Can the Consumer Join in the Battle to Prevent Counterfeits Using NFC?

Consumers search online for authentic products at the very best prices. Unfortunately, they have no way to tell if they are purchasing a knockoff. …

Continue reading full post

Alibaba Group Sued Again Over Alleged Counterfeits

Despite efforts to combat counterfeits, Alibaba ecommerce websites reportedly “encourage, assist” fake merchandise.

Continue reading full post

QR Codes vs. NFC Tags

QR Codes vs. NFC Tags

In this post we compare two technologies: NFC tags and the well-established QR codes.

Continue reading full post

Other Ways NFC Tags Can Make Life Easier

Lone Luggage

NFC tags can be used in a wide variety of ways to help make your life easier.

Continue reading full post

BlackSeal Gives Valuable Insight Into Consumer Behaviour

Understanding the customer’s behaviour is key to the success for most manufacturers. Billions have been spent in research. Countless hours have gone …

Continue reading full post

Defending Against Counterfeit Goods While Adding Value to the Consumer and the Manufacturer

In 2013 the World Customs Organization (WCO) said, “Counterfeit goods account for nearly 10 percent of worldwide trade, an estimated $500 billion …

Continue reading full post

BlackSeal Android App

BlackSeal Android App

Yesterday we announced the release of BlackSeal. Included with the release is the BlackSeal app. This post discusses the app’s unique security features.

Continue reading full post

Announcing BlackSeal – A new era of authentic goods

BlackSeal

Today we are announcing BlackSeal, a new type of authenticity service. It solves the problem of adding provable authenticity to physical products.

Continue reading full post

Fake Goods Continue to Plague the Sports Industry

Clothing

In a recent CTV W5 Episode investigators highlight the extent of counterfeit goods in apparel, memorabilia and event ticket markets. They highlight a …

Continue reading full post

Three ways NFC tags can drive revenue opportunities

NFC tags are being used to build and strengthen products in a number of creative ways. Here are three that are top of mind at TrustPoint Innovation…

Continue reading full post

NFC Security Part 1: NFC Tag Reader/Writer

NFC security is highly dependant on the targeted application and mode of operation. This post explores the three modes of NFC: Tag Reader/Writer, Card …

Continue reading full post

Tag the World

I recently attended an NFC Forum meeting in Edinburgh, Scotland. On my last day in the city I hiked up to Arthur’s Seat in Holyrood Park. I highly …

Continue reading full post

What is the purpose of NFC NDEF Signature Records?

This question was posted a few years ago by Eric Vétillard in this blog post.

Continue reading full post

NFC Explained Through Infographics

I found some great NFC infographics to explain the technology. The first one is a comparison between RFID & NFC. It captures the differences nicely. RFID

Continue reading full post

What to do with NFC Tags? An electronic business card

Most smart phones (sans the iPhone) are NFC enabled out of the box and can read NFC tags without installing any apps. Naturally early adopters will want …

Continue reading full post

NFC use case: 2nd graders Set Up 25 Nexus Tablets in 3 minutes

NFC provides a better retail user experience than Bluetooth LE

With Apple’s introduction of iBeacon & Bluetooth LE (BLE) some have proclaimed the end of Near Field Communication (NFC). These two technologies are …

Continue reading full post

Near Field Communication (NFC)

My plan is to write about mobile wireless technologies & security. As the chair of the NFC Forum Security WG I come across many interesting opinions …

Continue reading full post

Machine-to-Machine (M2M) Certificates Versus Traditional Certificates

Conceptually there is little difference between traditional certificates and new M2M certificates; both are intended to authenticate identities via a …

Continue reading full post

About this Blog

The TrustPoint Innovation Blog covers security industry topics relating to Certificates, Elliptic Curve Cryptography (ECC), Machine-to-Machine (M2M) Communication, Near Field Communication (NFC), Vehicle-to-Vehicle (V2V) Communication, and more.

More Categories