Hidden encryption keys are written on each tag during the encoding process.
These keys are also stored on the ixkio platform.
Leverage the power of authentication tags using your existing platform.
Authentication NFC tags contain special NFC chips which are designed to prevent copying.
They work with all NFC enabled phones and require no special app to be downloaded by the user.
Authentication was built into the ixkio platform from the start.
Combine with Rules, Locus and all the standard ixkio features to create your own system.
Create authentication rules to provide access to restricted content to registered users and marketing content to your customers.
Ixkio allows you to combine rules to create multi-layered responses.
Use authentication tags with Locus or direct response to enable supply chain control.
Enable anyone, anywhere in the world to check the authenticity of a product or pallet.
Tags are authenticated by ixkio and then users are seamlessly redirected to pages on your existing website.
Start integrating tags, decide content later. Use your existing website.
Update destination tag URLs remotely via ixkio as often as you need.
Manage tags using rules, folders, tag groups and more.
For users who simply need a straightforward authentication response direct to the registered or open users.
No external development required. Ixkio provides the authenticated response.
Supply Chain Control
Just add a tag for instant supply chain control.
Set dates, simple data and text directly on tag scan.
Use Locus to manage tags in location.
For users with existing apps or websites wanting to leverage the power of authentication tags.
Ixkio manages the authentication and the encryption keys.
Avoid supply problems - use any NTAG or EM|Linq chips together.
Deploy your tags, call the API, done.