Platform Overview
TAG IT Network combines NFC hardware, blockchain technology, and AI to create an end-to-end product authentication platform.
Architecture Overview
TAG IT Network is built on a three-layer architecture designed for security, scalability, and ease of integration:
Hardware Layer
The foundation of our authentication system consists of tamper-evident NFC chips embedded in physical products. These chips contain unique cryptographic identifiers that cannot be cloned or duplicated, ensuring each product has a verifiable digital identity.
Blockchain Layer
All authentication data is stored on the blockchain, providing an immutable record of product provenance, ownership transfers, and verification history. Smart contracts handle the business logic for registrations, transfers, and dispute resolution.
Application Layer
The application layer provides APIs, SDKs, and user interfaces for interacting with the platform. This includes the REST and GraphQL APIs, mobile SDKs for iOS and Android, and the web dashboard for brand management.
Each layer operates independently but communicates through well-defined interfaces, allowing you to integrate at any level based on your needs.
Core Components
The TAG IT Network platform consists of five core components that work together to deliver comprehensive product authentication:
- NFC Tags - Secure, tamper-evident hardware tags with unique cryptographic identifiers. Available in various form factors including stickers, cards, and embedded chips.
- Smart Contracts - Deployed on Polygon, these contracts manage product registration, ownership transfers, and verification logic with complete transparency.
- ORACULS AI - Our proprietary AI engine that analyzes scan patterns, detects anomalies, and identifies potential counterfeit activity in real-time.
- Mobile SDKs - Native SDKs for iOS and Android that enable seamless NFC scanning and verification directly in your mobile applications.
- Dashboard - A comprehensive web interface for brands to manage products, view analytics, configure settings, and monitor authentication activity.
How It Works
The authentication flow follows a simple five-step process from tag to verification result:
- Tag - Products are equipped with TAG IT NFC chips during manufacturing or distribution. Each tag is registered on the blockchain with the product's metadata and brand information.
- Scan - End users or supply chain participants scan the NFC tag using a smartphone or dedicated reader. The tag transmits its unique identifier and cryptographic signature.
- Verify - The signature is verified against the blockchain record. ORACULS AI analyzes the scan context for any anomalies or suspicious patterns.
- Record - Each verification event is recorded on the blockchain, building a complete history of the product's journey through the supply chain.
- Display - The verification result is displayed to the user, including product details, authenticity status, ownership information, and complete provenance history.
The entire verification process typically completes in under 2 seconds, providing instant authentication results to your users.
Supported Networks
TAG IT Network smart contracts are deployed on the Polygon blockchain ecosystem:
- Polygon Mainnet - Production environment for live product authentication. All mainnet transactions are final and publicly verifiable.
- Polygon Amoy Testnet - Development and testing environment. Use testnet for integration development and QA before deploying to production.
Always test your integration thoroughly on testnet before deploying to mainnet. Testnet tokens have no real value and can be obtained from public faucets.
Security Model
Security is fundamental to the TAG IT Network platform. Our multi-layered security model ensures product authenticity cannot be compromised:
- Cryptographic Signatures - Each NFC tag generates unique cryptographic signatures that are mathematically impossible to forge. The private key never leaves the secure element of the chip.
- Immutable Records - All product registrations and verification events are stored on the blockchain, creating a tamper-proof audit trail that cannot be altered or deleted.
- Decentralized Verification - Verification does not rely on any single point of failure. Anyone can independently verify a product's authenticity using the public blockchain data.
Additional security measures include:
- Tamper-evident tag designs that show physical evidence of removal attempts
- AI-powered anomaly detection to identify suspicious scan patterns
- Rate limiting and anti-replay protection for all API endpoints
- Regular third-party security audits of smart contracts and infrastructure