The visual elements on the Ticto wearable change in an unpredictable manner thanks to the use of a cryptographic algorithm. This algorithm is contained within the Secure Element processor of the Ticto wearable. The use of cryptography prevents anyone who does not have a valid Ticto wearable from displaying the same visual sequence.
The intuitive Ticto App is used to activate and deactivate your Ticto wearable for different locations and zones you are authorized for. Several exciting new features will be added in the near future.
An intuitive management console allows managing Ticto wearables, Ticto users, managing locations and zones, managing authorization rules, managing configuration settings, and more. A documented API allows integrating with existing systems and repositories like Active Directory servers, Visitor Management platforms and Identity and Access Management systems.
Worried about active Ticto wearables being passed on to non-authorized people? You can virtually tie each Ticto wearable to the mobile phone of their user. In case the Ticto wearable would be passed on or stolen, the device would stop showing its Tictogram. Need an even more advanced form of authentication. Link your Ticto wearable to a biometrics device, making it impossible to falsify authentication.
Ticto has very ambitious plans. New wearable form factors are in the works. Exciting new App capabilities are on our roadmap. Smart integration with IP video surveillance solutions will deliver an unmatched end to end solution for presence control. And think of bringing together people and things … you want to visualize authorized use of objects such as vehicles or machinery? We’re ready to work with you.