Authentication

Product and location security without
running around.

Leverage the power of authentication tags using your existing platform.

Open & Accessible

Authentication NFC tags feature advanced NFC chips designed to safeguard against unauthorised duplication.

They are compatible with all NFC enabled phones and require no special app to be downloaded by the user.

Ixkio offers comprehensive support for authentication tags including key storage, unique code authentication, rule creation based on outcomes, and securing the link to your website's landing page.

  • Authenticate productsSafeguard against counterfeits with a single tag.
  • User interactionPromote customer engagement
  • Secure supply chainsConfidently control movement of parts and goods
  • Proof of presenceEnhance patrol and round management

Hidden Keys

Hidden encryption keys are written into each tag during the encoding process.

These keys are also stored on the ixkio platform.

Unique Codes

Tags generate a unique 'auth' code using the key on each and every scan.

This auth code is dynamically added to the scan URL.

Verification

The 'auth' code is verified by ixkio using the same tag key.

This checks that the tag is genuine and hasn't been copied.

Full Ixkio Features

Authentication was built into the ixkio platform from the start.
Combine with Rules, Assignment, CodeLink, Subtags and many other ixkio features
to create your own system.

Authentication Rules

Create rules to redirect users based on authentication status.

Restrict digital content based on physical products.

Assignment

Manage and control authentication tags like standard tags.

Use ixkio's powerful tag Assignment systems to deploy pre-encoded tags quickly.

CodeLink

Protect the physical to digital from unauthorised redirect landing page access.

Activate CodeLink effortlessly. Use our Shopify App or embed a single line of code in your page.

Subtags

Dynamically include Tag Code data into your redirect or API response.

Create dynamic URLs for dynamic page content or performance tracking.

Two Ways To Use Authentication

Authentication support is accessible through our Flex Pro and Alpha plans,
and it can be seamlessly integrated into your existing website or platform.

Redirect

Tag scans are authenticated by ixkio with users instantly redirected to pages on your current website.

Easy Start
Start integrating tags, decide content later. Use your existing website.

Dynamic Links
Update destination tag URLs remotely via ixkio as often as you need.

Full Control
Manage tags using rules, folders, tag groups and more.

CodeLink Support
Add a simple javascript snippet to your landing pages to prevent direct hits.

API

For users with existing apps or websites wanting to leverage the power of authentication tags.

Managed Keys
Ixkio manages the authentication and the encryption keys.

Flexible Response
Enhance API responses with ixkio stored tag data.

On Demand
Leave the encryption heavy lifting to ixkio and focus on your user experience.

Assignment Tools
Use ixkio's assignment tools to get the right tags in the right products.