Access Control is
Moving to Public Keys.
Your Physical
Credentials Should Too.

LEAF Verified brings modern cryptographic security to physical credentials, built on NXP's MIFARE DUOX® technology. The same public key foundation as Aliro™, with no shared secrets and no vendor lock-in. Designed for scale and open to everyone.
No LEAF membership required.

64%
of buildings are operating on outdated access systems
<1 Min
bulk credential enrollement with LEAF Verified
EAL 6+
common criteria certified

The Credential That Transforms

LEAF Verified is the  breakthrough access credential built on NXP's MIFARE DUOX® technology that delivers enterprise-grade security while removing operational complexity. Using public-key cryptography, LEAF Verified eliminates the burden of managing encryption keys—simplifying interoperability and enabling seamless deployment across any compatible LEAF Community device.

The Credential That Transforms

Bringing modern authentication to physical access control.

LEAF Verified is the  breakthrough access credential built on NXP's MIFARE DUOX® technology that delivers enterprise-grade security while removing operational complexity. Using public-key cryptography, LEAF Verified eliminates the burden of managing encryption keys—simplifying interoperability and enabling seamless deployment across any compatible LEAF Community device.

Watch the Overview Video

Public Keys in 10 Seconds

For as long as the industry has existed, credentials and readers have relied on the same fundamental approach: symmetric cryptography — shared secrets distributed across every device in the system. The industry is now moving to public key cryptography — the same public key infrastructure that secures digital drivers licenses and encrypted communications.

SYMETRIC - LEGACY
The Master Key
One key opens every lock. Compromise cascades to all.
PUBLIC KEY
The Personal Key
Each credential, its own key. One lost badge, one revocation.
PUBLIC KEY - LEAF VERIFIED
The Registered Key
Stamped genuine at the factory. Can't be copied. Can't be faked.

See How LEAF Verified Works for You

Own Your Security. Not Your Vendor's Ecosystem.

LEAF Verified is built on open standards, using the same modern public key cryptography found in online banking and Aliro. Your credentials work across any compatible device from any manufacturer. No proprietary lock-in. No vendor dependency.

Your Next System Will Be in Place for 10+ Years

Most access control deployments stay installed for over a decade. LEAF Verified is built on the same foundation as Aliro, so the credential you choose today stays relevant for the life of the system.

Breach-Resistant Architecture

Each credential carries its own private key. Compromising one card affects only that credential - your entire fleet remains secure.

Tap-to-Phone Ready

Every credential includes NDEF with a configurable dynamic URL — giving your access control software provider the capability to build self-service enrollment, provisioning, and onboarding workflows with a single tap.

Integrate Once, Support Every LEAF Verified Credential

LEAF Verified is built on open standards: ISO 14443, ISO 7816-4, and X.509 PKI. No proprietary middleware, no vendor-specific APIs. Your platform verifies every LEAF Verified credential with the same integration.

Flexible Credential Delivery

Retrieve credentials via API calls into your platform, enable QR code scans for fast downloads, or use NDEF tap-to-phone redirect. A single manifest system that adapts to your workflow.

NDEF Tap-to-Phone Platform

Every credential supports NFC Data Exchange with a configurable dynamic URL redirect, providing the foundation for you to build custom enrollment, provisioning, and onboarding workflows within your platform.

One Integration, All Credentials

Every LEAF Verified credential uses the same certificate structure and verification flow — no per-vendor integration work.

One Crypto Stack. Two Credential Types. Total Coverage.

The cryptographic building blocks required to support LEAF Verified are the same ones required for Aliro. Supporting both means implementing one crypto stack, not two. Open-source documentation makes integration straightforward.

Open-Source Integration Docs

Device onboarding documentation and reference implementations - publicy available.

Shared ECC P-256 Foundation

LEAF Verified uses the same elliptic curve cryptography as Aliro. While Aliro requires mutual authentication — a fundamentally different protocol — the shared ECC P-256 primitives mean less net-new cryptographic work on your roadmap.

LEAF Community Product Committee

Shape the credential roadmap alongside other industry leaders — your input drives what comes next.

No Proprietary Middleware

Built on open standards (ISO 14443, ISO 7816-4, X.509 PKI) with no vendor-specific software required. Everything you need is included with the credential.

Install Readers Like Light Switches. No Key Ceremonies Required.

With LEAF Verified, you never distribute secret keys to readers. No SAM cards. No key ceremonies. No site visits to rotate keys. Every credential carries its own certificate, and the reader verifies it cryptographically on the spot.

12 Minutes Under 1 Minute

Credential manifest enables bulk digital enrollment - what used to take manual card-by-card entry becomes a single import.

No Device Configuration

No vendor-specific profiles to load, no config apps to manage, no per-project device setup. Readers work out of the box with any LEAF Verified credential.

Multi-Vendor Freedom

Works across any LEAF Verified compatible reader. Choose your hardware without being locked into a single credential vendor.

1. Source customer specific reader SKU
2. Obtain vendor config app + permissions
3. Load device profile per reader
4. Enroll credentials card by card
5. Troubleshoot compatability issues
LEAF VERIFIED INSTALL
1. Select any compatible reader
2. Mount & connect
3. Import credentials in bulk

LEAF Verified & Aliro: Two Features of the Public Key Future

LEAF Verified & Aliro aren't competing - they're the two halves of the industry's transition from symmetric to public key.

LEAF Verified
PHYSICAL CREDENTIALS
Cards, fobs
Passive credentials with tap-to-phone
Shared Foundation
ECC P-256
X.509 Certificates
ISO 14443 / 7816-4
No Shared Secrets
Aliro
DIGITAL CREDENTIALS
Smartphones, smart watches, wallets
Connected devices with OTA Provisioning

The Public Key Era: Navigating LEAF Verified, MIFARE DUOX, and Aliro

What's Inside

> The Public Key Revolution
> Silicon vs. Credential vs. Community
> What Is Aliro — And What It Isn't
> Better Together: The Complementary Model
> Common Questions & FAQ

Technical Specifications

Silicon & Security Certification

Plus icon
IC Platform
NXP MIFARE DUOX®
Security Certification
Common Criteria EAL 6+
Secure Element
Hardware-based key storage
Provisioning
Wafer level via NXP EdgeLock2Go

Cryptography

Plus icon
Algorithm
Elliptic Curve Cryptography (ECC)
Curve
NIST P-256
Operations
ECDSA (Signatures) + ECDH (Key agreement)
Certificate Format
X.509 PKI
Symmetric keys required
Zero

Standards & Interoperability

Plus icon
RF Interface
ISO 14443 Type A
COMMAND STRUCTURE
ISO 7816-4 APDUs
MEMORY ARCHITECTURE
Hardware-based key storage
NFC DATA Exchange
NDEF (Configurable per credential)

Credential Identity & Enrollment

Plus icon
Unique Identifier
12 digit guaranteed unique Open ID
ID PRovisioning
Wafer-level (pre-manufacturing)
BULK Enrollment
Digital Credential Manifest via LEAF API
NDEF Capability
Tap-to-phone with dynamic URL Redirect

Resources

Device Onboarding Repo
Download
LEAF Verified Datasheet
Download
LEAF Verified One Pager
Download

Frequently Asked Questions

What is MIFARE DUOX and how does it relate to LEAF Verified?

Plus icon

MIFARE DUOX is NXP's contactless IC technology: the silicon. It provides powerful cryptographic capability but, on its own, has no application, identity, or ecosystem. LEAF Verified is what DUOX becomes when it is securely provisioned through a direct partnership between NXP and LEAF, starting at the wafer level. Think of DUOX as the raw material and LEAF Verified as the finished, deployable product.

How does LEAF Verified's security model work?

Plus icon

Every credential carries a guaranteed unique 12-digit Open ID and a LEAF Certificate that enables any compatible reader to cryptographically verify authenticity. Authentication happens on the spot using public-key cryptography. No shared secrets are ever exchanged.

Is LEAF Verified a proprietary, closed system?

Plus icon

No. LEAF Verified is built on open standards (ISO 14443, ISO 7816-4, and X.509 PKI) using the same ECC P-256 cryptography as Aliro. Integration documentation is being open-sourced so any reader manufacturer can add support, and the LEAF Community's Product Committee governs the credential's evolution.

Are LEAF Verified and Aliro competing standards?

Plus icon

No. They solve different problems for different form factors. LEAF Verified is a physical credential product for passive media like cards and fobs. Aliro is a protocol for connected digital devices like smartphones and smartwatches. They share the same cryptographic foundation (ECC P-256) and are designed to complement each other.

Can I just buy blank MIFARE DUOX chips and encode them myself? 

Plus icon

While you can buy raw chips, a blank DUOX chip is just a component with no identity, no certificate, and no ecosystem. LEAF Verified delivers a turnkey, ready-to-deploy product with wafer-level provisioning, PKI infrastructure, enrollment tooling, and ecosystem support. Building this from scratch would require developing your own PKI, encoding pipelines, API integrations, and ongoing lifecycle management.

Request Samples

Ready to experience LEAF Verified firsthand? Complete the form below to request a sample and take the next step toward advancing security, interoperability, and user experience.

Join the Community

No matter where you sit in the access control ecosystem — enterprise security, software, hardware, or integration — we’re ready to collaborate.

Next-Generation Access Credentials Built on Public Key Cryptography

Leveraging public-key cryptography, LEAF Verified addresses the fundamental security and operational challenges that have plagued traditional access control for decades.

Request a Demo

The Credential That Transforms

LEAF Verified is a breakthrough access credential built on NXP's MIFARE DUOX® technology that delivers enterprise-grade security while removing operational complexity. Using public-key cryptography, LEAF Verified eliminates the burden of managing encryption keys—simplifying interoperability and enabling seamless deployment across any compatible LEAF Community device.

Request a Demo

Transforming Security, Interoperability, and Experiences

Elevated Security
Security built into the wafer ensures authenticity from inception.
Unique Credentials
LEAF Certificate Authority makes every credential unique.
Credential Manifest
A credential manifest takes badge enrollment from 12 minutes to under 1 minute.
Public Key Cryptography
Public key cryptography enables a single credential across any device - without sharing private keys.
NDEF Technology
NDEF technology turns physical credentials into service platforms for self-enrollment and custom applications.
90% Reduction in Key Management Operational Costs
Public key cryptography means you never distribute secret keys to readers—no SAM (secure access module) cards, no key ceremonies. Installing a reader becomes as simple as installing a light switch. Each credential holds its own private key, so compromising one card doesn't expose your entire system.
Designed for Longevity
Built on cryptographic algorithms, easily migrate to stronger algorithms as standards evolve without replacing infrastructure. Your investment is protected as security requirements advance.
Zero Single Source Dependencies
Standards-based PK cryptography works with LEAF Verified compatible devices. Single credential to work across multiple applications and vendors throughout your facility. 
Limitless Experiences Available with NDEF
NDEF capabilities transform credentials from simple access tokens into intelligent service platforms. Enable payment, loyalty programs, building services, and emergency response—all from the same credential.