How TAGBASE Works
From Tap to Trust: The Secure Verification Flow Behind TAGBASE
TAGBASE enables secure, app-free verification of physical products using tamper-proof NFC tags and a two-step verification process. This system combines encrypted NFC hardware, dynamic URLs, and real-time backend validation — all accessible through a mobile browser.
Tap-to-Verify Flow
Product with TAGBASE tag is tapped using an NFC-enabled smartphone.
The NFC chip (NTAG 424 DNA) triggers a dynamic, signed URL.
The browser opens the URL and sends a verification request to the TAGBASE backend.
The backend checks:
Tag UID and cryptographic signature
Session and delta validation
Activation status and tag configuration
A verification result is returned (authentic or invalid), with optional redirect or content.
Key Technologies Involved
NTAG 424 DNA
Tamper-resistant chip with AES-128 encryption, UID, and secure counters
Secure URL Generation
Each tap generates a unique URL with a cryptographic message authentication code (CMAC)
2-Step Verification
Ensures tap came from real hardware by checking state change between first and second tap
Mobile Browser
No app needed — verification handled entirely via web
TAGBASE Backend
Stateless endpoint validation system with cryptographic replay protection
Session Tracking
Tracks anonymous device sessions to enable delta checks and prevent replays
Verification Timeline (Simplified)
[User Tap 1] --> [Secure URL] --> [Backend stores session data]
[User Tap 2] --> [Updated URL] --> [Backend compares deltas, returns result]
First tap establishes a short-lived session.
Second tap is required to complete full verification.
This prevents cloned links from being used in isolation.
Example User Experience
A customer picks up a product (e.g. luxury perfume).
They tap the TAGBASE NFC tag with their smartphone.
A browser window opens instantly — no app needed.
TAGBASE verifies the tag in real time.
Customer sees a success screen ("This product is authentic").
Optionally, the screen may also include:
Product origin
Ownership/minting status
Loyalty rewards or exclusive content
Why This Approach Works
Dynamic verification: Links expire, tags rotate, and results depend on state changes — not just static identifiers.
Hardware-tied logic: Without access to the physical tag’s chip, a valid verification cannot be generated.
App-free design: Simplifies adoption and ensures anyone can verify without friction.
Last updated