Silent Data Supply Chain Management Blueprint Demo
This demo introduces the Silent Data Supply Chain Management Blueprint: a ready-to-use foundation for registering, tracking, and bundling supply-chain assets on-chain — with privacy built in.
In this demo:
- Create supply-chain assets with protected metadata
- Unlock private fields (e.g., pricing) using identity-based access control
- Bundle multiple assets into composite units (e.g., shipments, product sets)
- Enforce ownership rules to prevent invalid asset combinations
- View and compare how Silent Data handles privacy vs. public ERC-721 / ERC-1155 logic
- Explore how authorised vs. unauthorized users experience the same asset differently
Explore the Silent Data Blueprints
Transcript
0:00 — Introduction: Bethany Charles
This is a demo of the Silent Data Supply Chain Management Blueprint.
Silent Data blueprints are ready-built applications that run on top of Silent Data.
They act as templates or starting points—examples you can use, customize, and extend to build your own privacy-enabled applications.
In this demo, we’ll walk through how supply-chain assets can be created, bundled and tracked on-chain, all while keeping sensitive business data private.
Unlike standard blockchains where every detail is visible, Silent Data lets you programme privacy rules directly into smart contracts, controlling what is shared publicly and what remains confidential.
Let’s take a look.
0:41 — Connecting the Wallet: Bethany Charles
I’ll start by connecting my wallet.
When I confirm the wallet connection and sign, I’m authenticating the session and proving my identity.
With that done, I can now manage supply-chain assets directly from the dashboard.
0:56 — Creating an Asset: Bethany Charles
From the Assets section, I can view existing items or register a new one.
Let’s create an asset called Panel 01—for example, a solar panel coming off the production line.
I’ll add its specifications: 45 × 30 × 2 centimetres, and set a unit price of 0.18 ETH.
When I approve the action with my wallet, the system records it permanently on-chain.
After a moment, the dashboard updates and Panel 01 appears in the list.
1:31 — Viewing Asset Details with Privacy: Bethany Charles
Opening the asset details, I can see its metadata.
Notice the price field—it’s protected by the smart contract.
To view it, I need to prove my identity by signing with my wallet.
Once signed, the data is revealed securely, only to me.
For example, a manufacturer might want distributors to see product specifications, but not wholesale pricing.
With Silent Data, that level of control can be built directly into the smart contract.
Only authorized users can unlock hidden fields.
2:09 — Creating Bundles from Multiple Assets: Bethany Charles
With multiple assets in the system, they can be combined into a bundle.
Let’s say I need to ship two solar panels together.
I can join Panel 01 and Panel 02 to create a bundled shipment.
I’ll name it SolarString S1, add a short description, and set the price to 0.36 ETH.
After confirming with my wallet, the bundle appears in my list.
Opening the bundle shows the protected price, the list of components, and the ownership history—again, with sensitive data visible only to authorized users.
2:54 — Ownership Constraints: Bethany Charles
Now let’s switch to a second user—Alice.
She creates Panel 03 and Panel 04, and then tries to bundle them together with Panel 01, which she doesn’t own.
She enters the details—SolarString S2, description, and a price of 0.36 ETH.
The system blocks the attempt.
Users can only bundle assets they actually own, and they cannot include items already part of another bundle.
Once Alice removes Panel 01, the bundle is valid.
She confirms with her wallet, and SolarString S2 is added to her list.
3:35 — Unauthorized Access to Asset Details: Bethany Charles
Finally, let’s see what happens when a user tries to view someone else’s asset.
Here, I open Panel 03, which belongs to Alice.
I can see the basic details, but even after signing with my wallet, the price remains hidden.
That information is protected by privacy controls in the smart contract.
Only authorized users can view sensitive metadata, and Silent Data enforces these rules automatically.
4:04 — Summary: Bethany Charles
The Supply Chain Management Blueprint provides a ready-to-use foundation for registering, tracking and bundling assets on-chain.
It brings transparency to supply chains while keeping commercial data private—a powerful starting point for teams building enterprise-grade blockchain solutions.
You can explore more Silent Data blueprint applications in the Blueprint Library on our website, or talk to our expert team for more information.