Technology

Security that cannot be forged

TrueTap is built on cryptographic foundations that make physical counterfeiting of the authentication layer technically impossible — not just difficult, impossible. Every chip, every tap, every verification is governed by mathematics that cannot be bypassed.

Core Principles

How the security model works

Encrypted Chip Identity

Each TrueTap chip is provisioned at manufacture with a unique cryptographic identity — a private key that never leaves the chip's secure element. It is never transmitted, never stored in plaintext, and never duplicable.

Challenge-Response Authentication

Every tap initiates a cryptographic challenge-response exchange. The verifier sends a random nonce; the chip responds with a signed assertion. Because each nonce is unique, replay attacks are mathematically defeated — the same response can never be reused.

HSM-Backed Key Management

TrueTap's verification infrastructure uses Hardware Security Modules (HSMs) for all key operations. Root keys are stored in certified hardware — never in software — ensuring the highest assurance level for key management.

Real-Time Verification

Verification events complete in under 200ms end-to-end. Our edge-distributed verification network ensures low-latency responses globally, with offline verification capability for field deployment scenarios.

Immutable Audit Logs

Every verification event is cryptographically logged with timestamp, device identifier, geographic context, and result. Logs are append-only and tamper-evident — suitable for regulatory audit and legal chain of custody.

Distributed Verification Network

Verification nodes are distributed globally on edge infrastructure — minimising latency and eliminating single points of failure. Regional data residency configurations are available for government programmes with sovereignty requirements.

Standards & Compliance

Designed to the highest international standards

ISO/IEC 14443

Proximity card standard governing NFC chip communication and anti-collision protocols.

ICAO 9303

International Civil Aviation Organisation standard for machine-readable travel documents.

FIPS 140-3

US Federal cryptographic module security standard. TrueTap HSMs operate at Level 3.

SOC 2 Type II

Annual third-party audit of TrueTap's security, availability, and confidentiality controls.

Technical Architecture

Detailed architecture documentation

Detailed architecture diagrams, cryptographic specification, and protocol documentation — available under NDA to qualified enterprise and government prospects.

Request Technical Brief
Security First

Review the full technical specification

Our security team is available to walk through the cryptographic architecture, compliance posture, and integration requirements for your programme.