All use casesUC5 . Long-haul & multi-tier

    Use case 5

    Verifiable subcontractor chain

    A lead logistics provider (Forwarder A) holds a long-term contract for moving auto parts across Europe. Some legs go to Carrier B, occasional spikes go to Carrier C, sometimes Carrier D. The shipper wants assurance that whoever shows up is authorised, but A is reluctant to expose its subcontractor list and commercial relationships.

    Without Trusted Carrier

    How this scenario goes today.

    • The shipper has no way to know whether the truck at the gate is part of an authorised chain. When an unfamiliar livery appears, loading stalls until phone calls confirm legitimacy.

    • Outside business hours, even A may not be reachable. And rogue carriers exploit exactly this gap to walk off with loads.

    • After an incident, no one can prove who actually moved the freight at each link in the chain.

    With Trusted Carrier

    One verification primitive, three steps.

    Prove that a subcontractor chain of any depth is trusted and authorised. Without exposing the carriers in it. Full chain unsealed only on incident audit.

    Step 01

    Trigger

    A authorises the next link inside Trusted Carrier; that link authorises the next, to any depth. Each authorisation is sealed pairwise.

    Step 02

    We verify at source

    At the gate and on the shipper's side, the answer is one signed yes or no: this driver belongs to a carrier inside A's authorised chain. The intermediaries stay sealed.

    Step 03

    Outcome

    Driver-level QR codes resolve back to their employer and the active assignment, so the dock confirms identity without seeing the chain above.

    Signature view

    How the verified record lands for the freight forwarder.

    Shipper sees

    Chain trusted.

    Under the seal

    1. A

      Lead forwarder

      You

    2. B

      Pair A → B

      sealed

    3. C

      Pair B → C

      sealed

    4. N

      Tier N

      any depth

    Audit on incident only

    Tier N · any depth

    Three biggest advantages

    What changes the day this goes live.

    1. 01

      Integrity without exposure

      Shippers get a signed yes or no on chain integrity. Forwarders keep every link in the chain private.

    2. 02

      No more phone-tag at the gate

      Authorisation answers come in seconds, even at night or weekends.

    3. 03

      Automated deep audit on incident

      When something goes wrong, the full chain unseals automatically for the investigator. No manual reconstruction from emails.

    Verified once. Trusted everywhere.

    See how this lands for your role.