Architecture

Eight layers.
One protocol.

Every layer is independently deployable and verifiable without trusting Transit.

L0

Core Enforcement

The eligibility gate runs on every operation — synchronously, without exception. A multi-state enforcement engine determines whether a claim is accepted or rejected before any data is written.

  • Cryptographic attestations
  • Strict transaction isolation
  • Multi-sig governance overrides
  • Append-only audit log
L1

Licensing & PKI

Every partner operates under a licensed vertical. Royalty calculations are automatic — threshold-based, no manual invoicing. Certificate hierarchy from root authority down to factory-level issuance.

  • Per-vertical transaction licensing
  • Automated royalty engine
  • Certificate hierarchy
  • Exclusivity zone enforcement
L2

Partner Self-Service

Partners manage their own usage, invoices, and support without involving your ops team. Dashboard, usage breakdown, formatted billing history, and ticket creation — all behind authenticated API endpoints.

  • Usage dashboard
  • Monthly per-vertical breakdown
  • Formatted royalty ledger
  • Support ticket creation
L3

Licensee Frontend

A full Next.js dashboard covering all eight layers. Partners see their supply chain state, scan events, anomalies, certificates, and compliance reports — in one place, in real time.

  • Full dashboard coverage
  • Real-time event feed
  • Dark mode
  • Mobile responsive
L4

Analytics Engine

Entity health scoring runs automatically. Multiple anomaly detectors flag suspicious patterns — duplicate scans, geo-impossible movements, velocity spikes, chain breaks. Daily snapshots track trends over time.

  • Entity health scoring
  • Multiple anomaly detectors
  • Daily snapshot trending
  • Divergence evaluation
L5

Enterprise API

Every enterprise requirement is built in. Idempotent operations for safe retries. Bulk operations for high-volume ingestion. Webhook subscriptions for event-driven integrations. Tiered rate limits per tenant.

  • POST idempotency
  • Bulk claims / evidence / eligibility
  • Webhook subscriptions + retry
  • API key rotation with grace period
L6

Regulatory Observability

Multiple compliance report types, each cryptographically sealed and immutable after generation. Chain-of-custody verification, data retention with legal hold, and jurisdiction-scoped regulatory portals.

  • Multiple compliance report types
  • Chain-of-custody verification
  • Data retention + legal hold
  • CDSCO regulatory portal
T

Transparency Log

A cryptographic transparency log independent of the main database. Every event is ingested, indexed into batch trees, and anchored with a Signed Tree Head — independently verifiable by any party.

  • Cryptographic proofs
  • Signed tree heads
  • Inclusion + consistency proofs
  • Fault-tolerant ingestion

The protocol runs on standard cloud infrastructure. The security guarantees come from the cryptographic design — not proprietary hardware, not vendor trust, not blockchain consensus.

Transit is not a product.
It is a protocol.

Every layer runs on standard cloud infrastructure. The security guarantees come from the cryptographic design, not proprietary hardware or vendor trust.