Frank Gillett presents on the opportunities for NFC in the Internet of Things. He discusses two types of IoT scenarios: connected products, which involve smart products and dispensers, and connected assets, which involve monitoring various business assets and operations. Gillett also outlines several common IoT use cases like fleet management, energy management, and facility management. Finally, he explains how IoT can help transform customer engagement by tailoring products and services, giving visibility into real-world events, and delivering richer personalized experiences over the lifetime of the customer relationship.
62. The Trusted Source for
Secure Identity Solutions
An ASSA ABLOY Group brand
The Trusted Source for
Secure Identity Solutions
An ASSA ABLOY Group brand
Abandon Status Quo: Trusted NFC Technology
is More than Just Payments
Mark Robinton: Director, Business Development & Innovation
July 22, 2016
63. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
Many uses of NFC Tags
[URL]
www.service.com
[URL]
www.service.com
The Traditional
Smart Poster
Enhanced Retail
Experiences
Transit Schedules
Other Uses
Secure documents
Brand Protection
Sweepstakes & Loyalty
Proof of Presence
Emphasis on Convenience Need for Trust
64. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
Benefits of Frictionless Trust
64
Frictionless Trusted
Trusted Benefits:
• Un-clonable Tags
• Proof of Presence
Frictionless Benefits:
• Easy customer adoption
• No Application Needed
65. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
HID Trusted Tags are NFC Forum Tag Type 4 compliant and work with any NFC
forum compatible device without requiring special apps!
How Trusted NFC works
65
http://…ABCDTap
http://…7635Tap
http://…7635Refresh
http://…B423Tap
66. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
Trusted NFC Use Cases
66
Authenticity
Prevent counterfeiting
and warranty fraud while
also engaging the
consumer
Transactions
Controlled Sweepstakes,
loyalty point issuance,
small data analytics
Proof of Presence
Proving that a person is
where they said they
were
67. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
Secure Electronic Visit Verification
Nurse’s ID
Badge
Trusted Tag
securely
mounted in
patients home
NFC
Enabled
Phone
68. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
• Live reporting on Secure Proof of
Presence
• Verified via HID Trusted Tag®
Services
• Real, precise location
• Full history
• No cloning / fake logs possible
• Management of physical keys
Trusted Guard Tour and Keys
68
69. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
Maintenance & Inspection
70. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
Secure Information Access
71. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
Secure Reviews
72. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
Virtual Intercom
73. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
Smart Badge
74. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
Secure Facility Tour
75. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
Anti Counterfeiting
Caps and
Bottles
Gold
Coins
Leather
Goods
Documents
76. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
NFC in the Next 10 Years
NFC phones will be an integral tool to every service
business with the need for Proof of Presence
NFC will be embedded into documents and products for
anti counterfeiting because phones will be the best tool for
validation due to ubiquity
NFC will make consumers lives more convenient AND add
security and privacy to their transactions
77. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
Conclusion
Conferring trust to proximity transactions enables new and
exciting use cases that wouldn’t otherwise be possible or
insecure
Secure Proof of Presence can manifest itself in many end
user needs and holds the most short term promise
Conferring the trust doesn’t need to compromise the user
experience, it can still be frictionless
HID Trusted Tag™ Services uniquely offers “Frictionless
Trust” through its patented tag technology
78. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
Questions and Answers
79. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. Do not reproduce, distribute, or disclose. No unauthorized use.
An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
hidglobal.com/solutions/trusted-tag-services
80. An ASSA ABLOY Group brand
PROPRIETARY INFORMATION. No unauthorized use.
HID Trusted Tag® Services Overview
80
81. A DAY IN THE LIFE WITH IOT
Mikhail Damiani, Bluebite
84. NFC VALUE PROPOSITION
Entertainment
Offer exclusive, free
content to users
Videos
Songs
eBooks
Games
Monetary
Provide potential customers
with deals relevant to their
wants and needs
Local Offers
Coupons
Deals
Functional
Present users with useful,
informational content
Transit Schedules
App Downloads
Authentication
Product Info
Directions
Local Info
Social
Give consumers access to
social media feeds in one
central location
Instagram
Facebook
Twitter
Pinterest
85. OUT-OF-HOME
Extend a one-way interaction into a two-
way engagement
Collect Real Time Data / Analytics
Generate revenue from existing media
Provide value to consumers during dwell-time
Make physical-digital connections easier
86. RETAIL
Elevate shoppers’ retail adventures
Customer loyalty: provide exclusive content and
rewards to loyal customers; CRM Integration
Assistance during shopping experience
Give insight into a consumer’s path to purchase
Post purchase: provides real-time brand
messaging, events and exclusive offers,
feedback, etc.
87. PRODUCT
Empower products to provide perpetual
value
Remain top of mind
Give insight into a consumer’s preferences and
behaviors
Provides real-time brand messaging, events and
exclusive offers, feedback, etc.
Sequential messaging
Create meaningful relationships with consumers
88. Drive to Store
2..User enters predefined beacon region
inside store and receives a notification on
mobile device. User swipes notification to
launch corresponding app with coupon code.
1..User taps (NFC) or scans (QR)
out-of-home media to reveal
corresponding store locator.
3..User interacts with product
via NFC to access exclusive,
personalized content.
Post-Purchase
ECOSYSTEM
Mobile instantly connects users with the world around
them. Our platform enables dynamic content delivery
during a user’s journey through a series of interactions,
providing the most relevant experience based upon current
and past behavior.
89. PUMA SPARKS
EXCITEMENT FOR
IGNITE XT
PUMA collaborated with Blue Bite, Blue 449, Zenith
Media, and Austria-based mobile agency Loop, to
create a one-of-a-kind campaign to promote PUMA’s
latest sneaker, the Ignite XT, and its brand
ambassador partnerships with Usain Bolt and
Rihanna.
Deployed in collaboration with JCDecaux in Chicago,
the custom built experiential transit shelters were
outfitted with Blue Bite’s mTAG® (NFC/QR) , esca®
beacon and geofence technologies. Users tapped or
scanned the mTAGs and clicked on display ads and
notifications triggered by the beacons and geofences
to launch a mobile experience. This experience
allowed users to discover the featured Ignite XT
sneaker with the ability to purchaseit.
TECHNOLOGIES: Touchpoints, Beacons,Geofencing
DEPLOYMENT: TransitShelters
KEY MARKETS:U.S.
PARTNERS: Blue 449, JCDecaux, Loop, Zenith Media
CASE STUDY | PUMATRAC
90. MY VISION FOR THE FUTURE OF NFC
NFC Ubiquity
All major handsets will have NFC support
Most of the things (not devices) that we buy will
be embedded with NFC
NFC will be a widely used technology to aid
consumers during their shopping experience
Virtual closets will be commonplace
The counterfeit goods market will decline
Brands will have significantly more customers in
their CRMs
Product design/release cycles will shorten due
to constant feedback