Features Solutions Technology Tokenomics Docs About
Docs / Getting Started / Platform Overview

Platform Overview

TAG IT Network combines NFC hardware, blockchain technology, and AI to create an end-to-end product authentication platform.

Architecture Overview

TAG IT Network is built on a three-layer architecture designed for security, scalability, and ease of integration:

Hardware Layer

The foundation of our authentication system consists of tamper-evident NFC chips embedded in physical products. These chips contain unique cryptographic identifiers that cannot be cloned or duplicated, ensuring each product has a verifiable digital identity.

Blockchain Layer

All authentication data is stored on the blockchain, providing an immutable record of product provenance, ownership transfers, and verification history. Smart contracts handle the business logic for registrations, transfers, and dispute resolution.

Application Layer

The application layer provides APIs, SDKs, and user interfaces for interacting with the platform. This includes the REST and GraphQL APIs, mobile SDKs for iOS and Android, and the web dashboard for brand management.

Note

Each layer operates independently but communicates through well-defined interfaces, allowing you to integrate at any level based on your needs.

Core Components

The TAG IT Network platform consists of five core components that work together to deliver comprehensive product authentication:

How It Works

The authentication flow follows a simple five-step process from tag to verification result:

  1. Tag - Products are equipped with TAG IT NFC chips during manufacturing or distribution. Each tag is registered on the blockchain with the product's metadata and brand information.
  2. Scan - End users or supply chain participants scan the NFC tag using a smartphone or dedicated reader. The tag transmits its unique identifier and cryptographic signature.
  3. Verify - The signature is verified against the blockchain record. ORACULS AI analyzes the scan context for any anomalies or suspicious patterns.
  4. Record - Each verification event is recorded on the blockchain, building a complete history of the product's journey through the supply chain.
  5. Display - The verification result is displayed to the user, including product details, authenticity status, ownership information, and complete provenance history.
Tip

The entire verification process typically completes in under 2 seconds, providing instant authentication results to your users.

Supported Networks

TAG IT Network smart contracts are deployed on the Polygon blockchain ecosystem:

Important

Always test your integration thoroughly on testnet before deploying to mainnet. Testnet tokens have no real value and can be obtained from public faucets.

Security Model

Security is fundamental to the TAG IT Network platform. Our multi-layered security model ensures product authenticity cannot be compromised:

Additional security measures include:

Edit this page on GitHub
Type to search documentation...