Security that cannot be forged
TrueTap is built on cryptographic foundations that make physical counterfeiting of the authentication layer technically impossible — not just difficult, impossible. Every chip, every tap, every verification is governed by mathematics that cannot be bypassed.
How the security model works
Encrypted Chip Identity
Each TrueTap chip is provisioned at manufacture with a unique cryptographic identity — a private key that never leaves the chip's secure element. It is never transmitted, never stored in plaintext, and never duplicable.
Challenge-Response Authentication
Every tap initiates a cryptographic challenge-response exchange. The verifier sends a random nonce; the chip responds with a signed assertion. Because each nonce is unique, replay attacks are mathematically defeated — the same response can never be reused.
HSM-Backed Key Management
TrueTap's verification infrastructure uses Hardware Security Modules (HSMs) for all key operations. Root keys are stored in certified hardware — never in software — ensuring the highest assurance level for key management.
Real-Time Verification
Verification events complete in under 200ms end-to-end. Our edge-distributed verification network ensures low-latency responses globally, with offline verification capability for field deployment scenarios.
Immutable Audit Logs
Every verification event is cryptographically logged with timestamp, device identifier, geographic context, and result. Logs are append-only and tamper-evident — suitable for regulatory audit and legal chain of custody.
Distributed Verification Network
Verification nodes are distributed globally on edge infrastructure — minimising latency and eliminating single points of failure. Regional data residency configurations are available for government programmes with sovereignty requirements.
Designed to the highest international standards
ISO/IEC 14443
Proximity card standard governing NFC chip communication and anti-collision protocols.
ICAO 9303
International Civil Aviation Organisation standard for machine-readable travel documents.
FIPS 140-3
US Federal cryptographic module security standard. TrueTap HSMs operate at Level 3.
SOC 2 Type II
Annual third-party audit of TrueTap's security, availability, and confidentiality controls.
Detailed architecture documentation
Detailed architecture diagrams, cryptographic specification, and protocol documentation — available under NDA to qualified enterprise and government prospects.
Review the full technical specification
Our security team is available to walk through the cryptographic architecture, compliance posture, and integration requirements for your programme.