Skip to main content

Use Cases

Privacy-Preserving E-Commerce Fulfillment

Scenario: A user in Sichuan purchases clothing from a U.S.-based e-commerce platform. The platform does not offer direct international shipping. Instead, the delivery process is split across multiple logistics providers:

  1. Domestic Delivery (USA): Company A picks up the package and delivers it to a port.

  2. International Shipping: Company B handles ocean freight from the U.S. to Tianjin, China.

  3. Final Mile (China): Company C completes last-mile delivery to the user in Sichuan.

How Urgent Network Helps:

  • Each logistics handoff is recorded immutably on-chain via Urgent Union Chain.
  • User information remains fully encrypted via Confidential Transfer Protocol (CTP).
  • Only after the user confirms shipment with a second signature, their private info is temporarily decrypted and sent to the final carrier.

Confidential Transfer Protocol (CTP)

  • Users enter their name, address, and phone on the DApp. The data is encrypted client-side using their wallet's public key.
  • Enterprises never see this data during the pre-shipping or inventory phase.
  • At shipping confirmation, the user signs again to authorize short-term decryption by the root node, which sends it securely to the enterprise.
  • No data is permanently stored or exposed — building zero-trust logistics infrastructure.

Partial Decryption for Smarter Logistics

Through Urgent Union Chain, businesses can access limited metadata (e.g., postal code, city, item type) to:

  • Pre-sort inventory by region
  • Predict shipping costs
  • Optimize warehouse handling

This partial decryption protects user privacy while enabling logistical efficiency.


Cross-Chain Sync for Global Logistics

  • Urgent One Chain handles payment, settlement, and user-side actions.
  • Urgent Union Chain handles enterprise-side coordination and sensitive data relay.
  • Data moves between chains using IBC-compatible protocols, ensuring global interoperability.

Trust Filtering Between Users & Enterprises

Only when a user signs again is full data decrypted — allowing enterprises to identify loyal, trust-based customers. This dual-consent model enhances:

  • Fraud prevention
  • Customer reputation scoring
  • Long-term user-enterprise relationships