"Every other team built a tool for today's businesses. We built the infrastructure tomorrow's law requires."
| The Vision | The Process |
|---|---|
![]() |
![]() |
| Landing β Every Product. Provably Real. | Scan Any Product. Know It's Real. |
| The Problem | The Verification |
|---|---|
![]() |
![]() |
| Counterfeits are destroying trust globally. | Verified Authentic Certificate. |
| The Dashboard | The Detection |
|---|---|
![]() |
![]() |
| Generate Encrypted QR Batches. | Not Registered / Fraud Result. |
| Future Vision | Architecture Overview |
|---|---|
![]() |
![]() |
| The Future of Commerce is Provably Authentic. | Scalable Infrastructure for Global Supply Chains. |
Fake products are not a minor inconvenience β they are an existential threat to businesses that depend on quality and trust.
- Global Economic Impact: $4.5 trillion lost to counterfeit goods annually.
- Regional Devastation: 70% of "Kashmiri saffron" sold online is fake. Real farmers lose income while fraudsters profit.
- Artisanal Theft: A carpet weaver in Budgam has no way to prove his handwoven carpet is authentic, while mass-produced fakes make the same claim.
- Lethal Consequences: Pharmaceutical counterfeits kill over 1 million people annually due to lack of verification at the point of sale.
A business selling premium products β saffron, Pashmina, medicine β with no way to prove authenticity is one viral scandal away from collapse. The businesses that survive the next decade will be the ones that can prove what they sell is real.
The EU DPP regulation mandates that every physical product sold in Europe must carry a verifiable digital identity by 2026.
VerifyChain is compliance infrastructure. We don't help businesses adapt to the future β we are the infrastructure they are legally required to adopt.
VerifyChain gives every physical product a cryptographically signed digital identity β a unique, encrypted QR code that allows anyone to instantly verify:
- β Authenticity: Is this product real or a replica?
- β Provenance: Where did it originate?
- β Chain of Custody: Who handled it, and when?
- β Integrity: Has this QR been tampered with or duplicated?
No app required. Works on any phone. Verification in under 2 seconds.
Cryptographically signed QR codes using HMAC-SHA256. The signature is mathematically bound to the product data.
- Unique per unit or batch.
- Impossible to duplicate without the private key.
- Scannable with any smartphone camera.
Real-time pattern analysis on every scan event. The system flags:
- Geographic Anomaly: Same QR scanned in two distant locations simultaneously.
- Velocity Anomaly: Abnormal scan counts (e.g., 100 scans/min).
- Retail Inconsistency: Patterns inconsistent with legitimate consumer behavior.
End-to-end recording: Farm β Processor β Distributor β Seller β Buyer. Complete chain of custody with timestamps and verified locations.
- Register batches and generate printable PDF QR tag sheets.
- Real-time global scan map.
- Fraud alerts and batch-level performance analytics.
Generate regulatory-compliant data exports for EU systems β essential for any exporter targeting the European market.
- Registration: Seller registers a batch in the dashboard.
- Secret Generation: System creates a batch ID and HMAC secret.
- Payload Construction: Payload contains
bid,uid,pid, andts. - Signing: Payload is signed using HMAC-SHA256.
- Encoding: Signed payload is encoded into a secure token.
- QR Rendering: Token is embedded in a URL and rendered as a QR code.
- Scan: User scans the QR code.
- Routing: URL routes to the verification engine.
- Validation: Supabase Edge Function validates the signature server-side.
- Check: Product, seller, and scan data are cross-referenced.
- Result: User receives a cryptographic proof of authenticity or a fraud warning.
- Frontend: HTML5, Vanilla CSS, Modular ES6+ JavaScript
- Backend: Node.js + Express
- Database/Auth: Supabase (PostgreSQL, Realtime)
- Serverless Logic: Supabase Edge Functions (Deno)
- AI Engine: Gemini API (Fraud Enrichment) + Rule-based Fallback
- Deployment: Render Blueprint
[ Physical Product ] -> [ Encrypted QR ] -> [ Smartphone Scan ]
|
v
[ Supabase Edge Function ] <-> [ PostgreSQL DB ] <-> [ AI Fraud Engine ]
| | |
v v v
[ Cryptographic Proof ] [ Chain of Custody ] [ Risk Assessment ]
- Node.js (v18+)
- Supabase Account
- Gemini API Key (Optional, for AI fraud features)
- Clone the repository
- Install dependencies:
npm install
- Configure Environment:
Copy
.env.exampleto.envand fill in your Supabase and API credentials. - Launch Development Server:
npm start
- Access the App:
Open
http://127.0.0.1:4173
- Execute the SQL schema found in
supabase/schema.sqlwithin your Supabase SQL Editor. - Deploy the edge function:
supabase functions deploy verify-qr --no-verify-jwt
VerifyChain is not just anti-counterfeit tooling. It is authenticity and compliance infrastructure for future-proof businesses.
"Future-proof businesses won't just sell products. They'll prove them."
Created for Buildify Kashmir 2026 β NIT Srinagar







