LogoLogo
About Legitimate
  • Welcome to Legitimate
  • Products
    • 🛣️Overview
    • ✔️Verify Experience
    • 🔢Digital Product Passport
    • 👻Privacy Regulation Compliance
  • Legitimate Tags
    • 📡Tag Catalog
    • 📝Technical Specs
    • 📲Programming Process
    • How to Apply a Legitimate Heat Press Tag
  • Brand Guidelines
    • 🔠Branding
      • 🎈Brand Assets
      • 🗂️Templates
  • PROJECT DOCS
    • Required Activation Assets
      • Image Specs
      • Animation Specs
      • Header Logo Spec
    • What can you do on Legitimate Dashboard
    • What is a SKU
    • How to Manage an individual SKU
    • Managing your SKUs on Legitimate Dashboard with a third-party CMS integration
      • How to Activate your tags using Legitimate Dashboard
      • How to use the Legitimate Builder.io integration
      • Figma to Builder.io Integration with Legitimate
  • Managing your SKUs on Legitimate Dashboard with API Access
    • Setting up API or redirect link on Legitimate Dashboard
  • Managing your Organization in Legitimate Dashboard
  • What does each datapoint mean in the analytics section of Legitimate Dashboard
  • Assets Management in Legitimate Dashboard
  • How to export SKU owners information
Powered by GitBook
On this page
  • Legitimate Tags
  • Encryption
  • URL Format
  • Durability

Was this helpful?

Export as PDF
  1. Legitimate Tags

Technical Specs

PreviousTag CatalogNextProgramming Process

Last updated 11 months ago

Was this helpful?

Legitimate Tags

Legitimate Tags utilize NFC technology and are secured by an industry standard encryption algorithm called AES-CMAC. NFC stands for near field communication, a technology that enables devices to read data from NFC tags, tiny microchips with antennae embedded inside stickers, tags, or other materials. Similar technology powers hotel room keys, contactless credit cards, transit passes, and access key fobs. These tags do not contain batteries.

We chose NFC technology because most modern smartphones released in the last few years already have NFC readers built in. They are located at the top of the Apple iPhone and middle of most Android phones.

Encryption

URL Format

Legitimate's encoding process programs the Legitimate Tags to use the AES-CMAC algorithm to compute the URLs in the following format in order to submit to our servers for verification.

https://tap.legitimate.tech/?uid=XXXXXXXXXXXXXX&ctr=YYYYYY&cmac=ZZZZZZZZZZZZZ

uid - unique identification code of the Legitimate Tag (14 hex characters)

ctr - counter for the number of reads of the Legitimate Tag (6 hex characters)

cmac - AES-CMAC checksum signature (16 hex characters)

Durability

The tags can be tapped and read more than 200,000 times and will retain data for more than 30 years. They can be operated in -30℃ to 70℃ temperature and a protective casing can be added for additional heat and water resistance as well.

Our Legitimate Tags feature a secure industry standard encryption called which prevents our tags from being copied or duplicated. The tags contain a secure enclave that stores a 128-bit private key which cannot be read and requires the same private key to reprogram the tag. A counter on the tag stores the number of times the tag has been tapped and read. The AES-CMAC algorithm then computes a checksum based on the number of reads, the tag's unique identifier, and the private key programmed into the tag. Our servers will then validate the checksum and make sure it matches the read count and tag identifier. Checksums submitted to our servers are tracked and cannot be used again.

Please see our for more details.

📝
AES-CMAC
Tag Types