Mbasic

☛ Securely Embedded with Unique ID : Verify product genuineness
☛ Memory to link the product to Digital world : Consumer Engagement - Create deeper, more personal relationships, Leverage Social media
☛ Launch Promotional campaigns : Vouchers or Coupons (Time bound, First come First serve basis, exclusive vouchers)
☛ Security : Can be programmed to Read-only or Read/write with password protection, based on customers application
☛ Data retention - 10 years
☛ Operating range - 10 cm using dedicated reader, ~4cm using Mobile phones

Target applications
✔ Smart advertisement
✔ Goods and device authentication
✔ Vouchers and coupons
✔ Electronic shelf labels
✔ Bluetooth or Wi-Fi pairing

Madvanced

☛ Comes with extended features on top of features supported by Mbasic targeted for smart packaging and brand protection
☛ Tag Tamper functionality : Designed to detect tampering or modification to packaging
☛ Status-driven messaging pre/post retail : The tamper functionality can be used to direct customers to different web links before and after opening the product Eg: Tapping a smartphone to a beauty product's NFC tag before you buy lets you explore options, with interactive guides that let you do things like identify your skin type, find your favorite fragrance profile, or scan an image of your face so you can experiment with lip color or different styles. After the sale, the NFC tag becomes a link to how-to tutorials, suggestions for new beauty regimens, expert styling tips, or previews of new products.

Target applications:
✔ Applications supported by Mbasic
✔ Product Integrity verification
✔ Smart packaging
✔ Pre/Post sale customized messaging

Mpremium

☛ Supports all the Mbasic features
☛ State-of-the-art features for security and privacy protection - architected to provide AES-128 cryptographic operation, new SUN authentication mechanism upon each read-out by an NFC enabled mobile device
☛ Optionally comes with TagTamper feature (Extra cost)

Target Applications:
      Industrial
            ✔ Advanced anti-counterfeiting
            ✔ Secure supply-chain traceability and authorized data access
      Secure Identification & Access
            ✔ Auditable trail of presence
            ✔ Authenticated documents
            ✔ NFC Consumer Engagement
      Secure Transaction and Retail Payments
            ✔ Exclusive, hyper-personalized content experiences
            ✔ Status-driven messaging pre/post retail (TagTamper)
            ✔ Tamper-proofing (TagTamper)
            ✔ Trusted offers for vouchers, loyalty coupons, etc.