Your Security Partner

Counterfeit Wines, A Multi Billion Dollar Problem

Is your favourite wine real or counterfeit?

Counterfeit wines made headlines in the world of rare wine collecting with two fascinating stories. The first story is the New Yorker’s …

Continue reading full post

Are Intermediaries in Supply Chains Legally Responsible for Counterfeit Goods?

Trust in the Supply Chain

Intermediaries refer to all parties in the supply chain. They include raw material suppliers, manufacturers, distributors, shipping companies, …

Continue reading full post

What NFC Does For Your Phone

The most common use for NFC technology is to turn a smartphone into a digital wallet. It can collect and store the data from credit and debit cards …

Continue reading full post

Taylor Swift: Shaking Off Counterfeits in China

Taylor Swift has long held a passionate stance on the protection of intellectual property in the music industry, and is not afraid to stand up for …

Continue reading full post

How is NFC Revolutionizing Advertising Campaigns?

The options for using NFC tags in advertising are endless. NFC (or near field communication) is a wireless technology that facilitates fast and efficient …

Continue reading full post

How To Get Signatures On Smaller NFC Tags

BlackSeal currently requires NFC tags with about 500 bytes of memory available to be able to fit a URL plus a signature on the tag. But is it possible …

Continue reading full post

Alibaba Group Sued Again Over Alleged Counterfeits

Despite efforts to combat counterfeits, Alibaba ecommerce websites reportedly “encourage, assist” fake merchandise.

Continue reading full post

QR Codes vs. NFC Tags

QR Codes vs. NFC Tags

In this post we compare two technologies: NFC tags and the well-established QR codes.

Continue reading full post

Other Ways NFC Tags Can Make Life Easier

Lone Luggage

NFC tags can be used in a wide variety of ways to help make your life easier.

Continue reading full post

BlackSeal Gives Valuable Insight Into Consumer Behaviour

Understanding the customer’s behaviour is key to the success for most manufacturers. Billions have been spent in research. Countless hours have gone …

Continue reading full post

Defending Against Counterfeit Goods While Adding Value to the Consumer and the Manufacturer

In 2013 the World Customs Organization (WCO) said, “Counterfeit goods account for nearly 10 percent of worldwide trade, an estimated $500 billion …

Continue reading full post

BlackSeal Android App

BlackSeal Android App

Yesterday we announced the release of BlackSeal. Included with the release is the BlackSeal app. This post discusses the app’s unique security features.

Continue reading full post

Announcing BlackSeal – A new era of authentic goods

BlackSeal

Today we are announcing BlackSeal, a new type of authenticity service. It solves the problem of adding provable authenticity to physical products.

Continue reading full post

Fake Goods Continue to Plague the Sports Industry

Clothing

In a recent CTV W5 Episode investigators highlight the extent of counterfeit goods in apparel, memorabilia and event ticket markets. They highlight a …

Continue reading full post

Three ways NFC tags can drive revenue opportunities

NFC tags are being used to build and strengthen products in a number of creative ways. Here are three that are top of mind at TrustPoint Innovation…

Continue reading full post

NFC Security Part 1: NFC Tag Reader/Writer

NFC security is highly dependant on the targeted application and mode of operation. This post explores the three modes of NFC: Tag Reader/Writer, Card …

Continue reading full post

What is the purpose of NFC NDEF Signature Records?

This question was posted a few years ago by Eric VĂ©tillard in this blog post.

Continue reading full post

What to do with NFC Tags? An electronic business card

Most smart phones (sans the iPhone) are NFC enabled out of the box and can read NFC tags without installing any apps. Naturally early adopters will want …

Continue reading full post

About this Blog

The TrustPoint Innovation Blog covers security industry topics relating to Certificates, Elliptic Curve Cryptography (ECC), Machine-to-Machine (M2M) Communication, Near Field Communication (NFC), Vehicle-to-Vehicle (V2V) Communication, and more.

More Categories