Smart tags for real things.
Our solution is a blockchain-based authentication system that uses NFC technology to verify the authenticity of physical goods — seamlessly, securely, and at scale.

[00]
product authentication
Electronic
Clothing
Shoes
Accessories
Food
Toys & Games
Cosmetics & Perfumery
Pet Supplies
Micromobility Vehicles
Medicines
And any other products
Electronic
Clothing
Shoes
Accessories
Food
Toys & Games
Cosmetics & Perfumery
Pet Supplies
Micromobility Vehicles
Medicines
And any other products
[01]
Basis of everything
Your Blockchain. Powered by Xordex Engine
A Modern, scalable & modular architecture
#1.0 A Modern, scalable & modular architecture
Xordex is a high-performance blockchain engine designed with scalability and modularity in mind. It operates through a trio of specialized node types — hub, validator, and composer — each fulfilling a unique role in transaction handling, consensus, and data orchestration.
Every node runs as lightweight containers (in Docker) with individual PostgreSQL databases, which guarantees data integrity, scalability, and seamless deployment across environments.
A Modern, scalable & modular architecture
#1.0 A Modern, scalable & modular architecture
Xordex is a high-performance blockchain engine designed with scalability and modularity in mind. It operates through a trio of specialized node types — hub, validator, and composer — each fulfilling a unique role in transaction handling, consensus, and data orchestration.
Every node runs as lightweight containers (in Docker) with individual PostgreSQL databases, which guarantees data integrity, scalability, and seamless deployment across environments.
Customizable & plug-and-play ecosystem
#2.0 Customizable & plug-and-play ecosystem
With a rich library of pluggable services — from authentication solutions and KYC to tools for tracking supply chains and implementing loyalty programs — Xordex enables businesses to tailor their blockchain network to specific use cases.
This modular approach empowers rapid development without sacrificing flexibility, allowing for fine-tuned control over network behavior and functionality.
Flexible consensus mechanisms for every use case
#3.0 Flexible consensus mechanisms for every use case
Businesses can choose the most appropriate consensus method depending on their specific needs for speed, decentralization, and trust. Xordex supports Proof of Authority (PoA) by default, and offers options for Proof of Stake (PoS), Proof of Work (PoW), and Delegated Proof of Stake (DPoS).
With customizable network parameters — fees, token emissions, denominations, and more — the engine is adaptable to a wide range of industries and user bases, ensuring scalability.
High-level security & transparent
#4.0 High-level security & transparent
Security is at the core of the Xordex design. With robust ECDSA encryption, SHA-512 hashing, and granular access control, Xordex ensures high-grade protection across the stack.
The built-in block explorer provides real-time visibility into transactions, a validator model and public APIs ensure network integrity, trustworthiness, and protection against malicious behavior.
Engineered for fast deployment & automation
#5.0 Engineered for fast deployment & automation
With full automation based on Ansible, Xordex dramatically shortens time-to-launch. A built-in SDK, preconfigured wallets, and RESTful APIs accelerate integration. From genesis block creation to live network operation, every step can be automated and version-controlled — making it ideal for workflows and minimizing human error in mission-critical environments.
The solution is available as a SaaS or can be deployed on-premises, giving businesses full control over infrastructure and compliance.
[02] Blockchain-based authentication
Just Proof. Zero Clones.
Authentication tags attached to products or packaging can be scanned by any NFC-enabled smartphone. Based on NTAG213, NTAG215, or advanced NTAG424 standards, our tags balance cost and clone protection — with support for proprietary formats.
[03]
Top Benefits
Invisible tech. Visible truth.
Cutting-edge system
Verification of tagged products using any NFC-enabled smartphone.
Flexible tag standards — from cost-effective NTAG213/215 to the highly secure NTAG424, including support for proprietary tag formats.
Data from the tag leads to an immutable blockchain record or transaction that proves product origin, integrity, and status.
Scalable across industries and suitable for any product category — electronics, perishables, cosmetics, fashion, and more.
Protection for manufacturers
Counterfeit reduction contributes to stronger brand positioning and improved profitability.
A private, fully controlled blockchain network can be deployed using Xordex's flexible, modular engine.
Available deployment two models: on-premises or cloud-based (SaaS).
Loyalty systems, supply chain tracking, and compliance modules can be seamlessly integrated into a customized blockchain network.
Trust and safety for consumers
No apps needed — simply tap the product with a smartphone to verify authenticity.
Instant, effortless, and free authenticity confirmation.
Consumers can check for product information anytime, anywhere.
Helps protect consumer health, safety, and trust.
[04]
key phases
How it works
1. Encoding
Each NFC tag is encoded with a unique identifier (UID) or, for higher security, a dynamic CMAC (for NTAG424 tags). The encryption key is securely generated by a random number generator and stored on our platform, ensuring strong isolation and protection against tampering. The tag’s embedded logic uses this key to generate an authentication token (UID or CMAC) via a cryptographic hash function (SHA-512), which is then securely linked to the product’s data on the blockchain.
1. Encoding
2. Scanning
Consumers initiate the scan by activating NFC on their device and tapping it against the product or packaging. The tag triggers a redirect to a unique scan URL that includes the tag's identifier (UID or CMAC, depending on the tag type). This URL hosts the verification result and can be configured to deliver customized content or product data.
2. Scanning
3. Verification
Our platform verifies authenticity by cross-referencing the tag’s UID and CMAC with data stored on the blockchain. For standard tags (NTAG213/215), the UID is validated against the blockchain record, while for advanced NTAG424 tags, the dynamic CMAC value is used for a higher level of security. This prevents cloning or spoofing. Once verified, the consumer sees a result, including product info, and a blockchain explorer link as cryptographic proof of the immutable record.
3. Verification
Ready to get started?
Talk to our tech experts
Talk to our tech experts