PRODUCTS

Our LIME Tags™ protect products and supply chains with the most advanced security methods, sensors, and wireless connectivity options, including NFC and RFID. Use our LIME Tags with Veridify®, our integrated authentication and marketing platform, to monitor and protect your products anywhere in the world. readmore

TECHNOLOGY

We use the most advanced security methods to secure low-power and no-power devices that are part of the Internet of Things. Our Public Key methods provide strong authentication and data protection solutions with no network connectivity required and no key databases to distribute or manage. readmore

MARKETS

Anti-counterfeiting and supply chain security solutions for electronics, pharmaceuticals, fashion, liquor markets and more. We provide authentication and protection for non-traditional payment platforms, the Smart Grid, machine-to-machine (M2M), wireless sensors, and other low-power or no-power embedded devices and sensors. readmore
  • PARTNERS

      Our LIME Tags™ protect products and supply chains with the most advanced security methods, sensors, and wireless connectivity options, including NFC and RFID. Use our LIME Tags with Veridify®, our integrated authentication and marketing platform, to monitor and protect your products anywhere in the world. readmore
  • TECHNOLOGY

      We use the most advanced security methods to secure low-power and no-power devices that are part of the Internet of Things. Our Public Key methods provide strong authentication and data protection solutions with no network connectivity required and no key databases to distribute or manage. readmore
  • MARKETS

      Anti-counterfeiting and supply chain security solutions for electronics, pharmaceuticals, fashion, liquor markets and more. We provide authentication and protection for non-traditional payment platforms, the Smart Grid, machine-to-machine (M2M), wireless sensors, and other low-power or no-power embedded devices and sensors. readmore