Hidden Keys
Hidden encryption keys are written into each tag during the encoding process.
These keys are also stored on the ixkio platform.
Leverage the power of authentication tags using your existing platform.
Authentication NFC tags feature advanced NFC chips designed to safeguard against unauthorised duplication.
They are compatible with all NFC enabled phones and require no special app to be downloaded by the user.
Ixkio offers comprehensive support for authentication tags including key storage, unique code authentication, rule creation based on outcomes, and securing the link to your website's landing page.
Hidden encryption keys are written into each tag during the encoding process.
These keys are also stored on the ixkio platform.
Tags generate a unique 'auth' code using the key on each and every scan.
This auth code is dynamically added to the scan URL.
The 'auth' code is verified by ixkio using the same tag key.
This checks that the tag is genuine and hasn't been copied.
Authentication was built into the ixkio platform from the start.
Combine with Rules, Assignment, CodeLink, Subtags and many other ixkio features
to create your own system.
Create rules to redirect users based on authentication status.
Restrict digital content based on physical products.
Manage and control authentication tags like standard tags.
Use ixkio's powerful tag Assignment systems to deploy pre-encoded tags quickly.
Protect the physical to digital from unauthorised redirect landing page access.
Activate CodeLink effortlessly. Use our Shopify App or embed a single line of code in your page.
Dynamically include Tag Code data into your redirect or API response.
Create dynamic URLs for dynamic page content or performance tracking.
Authentication support is accessible through our Flex Pro and Alpha plans,
and it can be seamlessly integrated into your existing website or platform.
Tag scans are authenticated by ixkio with users instantly redirected to pages on your current website.
Easy Start
Start integrating tags, decide content later. Use your existing website.
Dynamic Links
Update destination tag URLs remotely via ixkio as often as you need.
Full Control
Manage tags using rules, folders, tag groups and more.
CodeLink Support
Add a simple javascript snippet to your landing pages to prevent direct hits.
For users with existing apps or websites wanting to leverage the power of authentication tags.
Managed Keys
Ixkio manages the authentication and the encryption keys.
Flexible Response
Enhance API responses with ixkio stored tag data.
On Demand
Leave the encryption heavy lifting to ixkio and focus on your user experience.
Assignment Tools
Use ixkio's assignment tools to get the right tags in the right products.