Use Cases
Privacy-Preserving E-Commerce Fulfillment
Scenario: A user in Sichuan purchases clothing from a U.S.-based e-commerce platform. The platform does not offer direct international shipping. Instead, the delivery process is split across multiple logistics providers:
-
Domestic Delivery (USA): Company A picks up the package and delivers it to a port.
-
International Shipping: Company B handles ocean freight from the U.S. to Tianjin, China.
-
Final Mile (China): Company C completes last-mile delivery to the user in Sichuan.
How Urgent Network Helps:
- Each logistics handoff is recorded immutably on-chain via Urgent Union Chain.
- User information remains fully encrypted via Confidential Transfer Protocol (CTP).
- Only after the user confirms shipment with a second signature, their private info is temporarily decrypted and sent to the final carrier.
Confidential Transfer Protocol (CTP)
- Users enter their name, address, and phone on the DApp. The data is encrypted client-side using their wallet's public key.
- Enterprises never see this data during the pre-shipping or inventory phase.
- At shipping confirmation, the user signs again to authorize short-term decryption by the root node, which sends it securely to the enterprise.
- No data is permanently stored or exposed — building zero-trust logistics infrastructure.
Partial Decryption for Smarter Logistics
Through Urgent Union Chain, businesses can access limited metadata (e.g., postal code, city, item type) to:
- Pre-sort inventory by region
- Predict shipping costs
- Optimize warehouse handling
This partial decryption protects user privacy while enabling logistical efficiency.
Cross-Chain Sync for Global Logistics
- Urgent One Chain handles payment, settlement, and user-side actions.
- Urgent Union Chain handles enterprise-side coordination and sensitive data relay.
- Data moves between chains using IBC-compatible protocols, ensuring global interoperability.
Trust Filtering Between Users & Enterprises
Only when a user signs again is full data decrypted — allowing enterprises to identify loyal, trust-based customers. This dual-consent model enhances:
- Fraud prevention
- Customer reputation scoring
- Long-term user-enterprise relationships