top of page

Our Work

Welcome to AceAbhishek's Deep Tech Product, where we are pioneering AI-driven digital trust for the post-quantum era. Our innovative "Trust Operating System" features interconnected applications designed to address critical fractures in digital trust. By leveraging Google's Genkit and Gemini frameworks, each product is tailored to enhance security and reliability in an evolving technological landscape. Explore how we are shaping the future of digital trust.

01

AceAbhishek IAM (Identity & Access Management)

Introducing a revolutionary fintech solution designed to tackle the pervasive issue of fake users in both fintech and government technology. Acting as the universal "Master Key" to the entire ecosystem, it ensures zero-trust compliance by employing AI-driven KYC/KYB processes to verify every user prior to platform access. Built a Next.js framework with a robust Role-Based Access Control (RBAC), it leverages Google Genkit’s multimodal capabilities for ID processing and liveness verification. Key features include document analysis for accurate data extraction, a mandatory live selfie flow to spoofing, and secure portal connections national API gateways for real-time business validation.

02

Blockchain-Based Verifiable Credentials

Introducing the Digital Diploma: a revolutionary solution that replaces easily forged PDF certificates with secure, on-chain cryptographic proof. For investors, significantly reduces fraud by ensuring credentials, such as "Verified Employee" or "Audited Code," are signed on-chain and remain unalterable. Our integrated non-custodial wallet system empowers tech teams to facilitate ownership verification of Ethereum addresses without compromising private keys. Key features include a user-friendly visual designer for branding digital credentials and privacy-preserving Zero-Knowledge principles, enabling users to prove verification status without disclosing sensitive ID documents.

03

Sovereign Analyzer

The Forensic Lab is an advanced security application that provides industrial-grade scrutiny on identity documents and financial records. Leveraging the capabilities of 3 Pro, this world-class forensic tool utilizes specialized computer vision to uncovergeries that are often undetectable to the naked eye. It conducts a thorough pixel-level audit, identifying metadata tampering, visual anomalies, and ensuring the integrity of holographic security features on government IDs. With its cutting-edge, The Forensic Lab sets a new standard in document verification.

04

AceAbhishek Portal (Startup Hub)

Introducing our Central Operating System, designed to be the core for your enterprise. For investors, it offers real-time insights into a portfolio company's performance,ating data from HR, Engineering, Finance into a comprehensive "Truth Dashboard." For the tech team, it functions as an advanced Next.js application, replic real-world enterprise infrastructure with features like mock CI/CD pipelines and blockchain nodes for effective training and simulationKey features include dedicated Department Hubs, which provide distinct, permissioned workspaces for Engineering,, and HR. Our Genkit AI Assistants are embedded agents that automatically project descriptions, compliance reports, and summaries. Plus, the Visual Workflow Designer employs to transform user-defined processes into structured flowcharts and permission settings effortlessly.

5. Smart Contract Auditor

Introducing the "Checker" for blockchain assets, a vital risk-mit tool for investors designed to prevent hacks that could drain millions, effectively tackling "Innovation Risk" in the Web3 space. For tech teams, it utilizes Google Genkit’s Tool Calling capabilities, functioning as an autonomous "Tool Selection Agent" that intelligently analyzes code languages like Solidity and Vyper to select the most effective static analysis tools, such as Slither or Mythril. Key features include deep analysis that transforms raw logs into structured, human-readable reports categorized by severity—high, medium, or low. Additionally, it ensures an immutable history by saving all audit reports to MongoDB/Firebase, establishing a permanent compliance trail for future due diligence.

6. Smart Contract Creator (ContractForge)

Introducing the "Maker" for blockchain assets – your ultimate solution for accelerating time-to-market by 10x. Designed for investors and-technical founders, it empowers you to launch secure Web3 products the need for costly blockchain developers. Our tech team leverages Next Server Actions to ensure user prompts are securely passed to the Gemini backend, keeping your API keys safe. Key features include structured output with Genkit’s Zod schema validation for precise, compilable JSON code, and efficient state management that tracks your contract's journey from "Draft" to "Final Deployment" the mainnet.

7. PhishwatchAI

Introducing "Watchtower" – your ultimate guardian against external threats. For investors, it safeguards your brand reputation and user funds from copycat attacks and phishing scams that lead to billions in losses each year. For tech teams, client-side tool harnesses browser-based AI models to analyze visual changes in real, ensuring user privacy by keeping data local. Key features include Content Mimicry Detection, which instantly identifies by comparing suspicious sites to legitimate brand visuals, and Deep Sitemap Sc, proactively crawling for malicious pages hidden deep within compromised domains.

8. VulnGuardAI

Introducing the "Quality Control" role for traditional software. For investors, this role guarantees that platform—be it a website or an app—remains secure, safeguarding intellectual property and customer from potential leaks. For the tech team, it features a dual-engine scanner that evaluates both source code logic and dependency manifests (package.json) to identify vulnerabilities early in the CI/CD pipeline. Key features include a Dependency Check that automatically compares installed libraries against a live CVE (Common Vulnerabilities and Exposures) database, and AI Refactoring, which functions as a senior developer agent by not only flagging bugs but also generating rewritten, secure code snippets for seamless integration.

9. Terralens

Introducing the "Physical Auditor," a pivotal role designed to bridge the gap between digital funding and tangible real-world advancements for investors. This role ensures that financial support translates into actual progress, as confirming the construction of factories before the next round of funding is released. For the tech team, this involves developing a sophisticated computer pipeline that analyzes satellite imagery to identify changes over time. Key features include Change Detection, which highlights new structures and construction progress, and Location Locking, which verifies that these changes correspond to specific GPS coordinates.

10. The AceAbhishek Trust OS

Introducing our strategic "Risk-as-a-Service" platform, designed to transform traditional security vendor relationships into dynamic Cyber-Insurance Partnerships By integrating live technical telemetry with financial underwriting, we ensure comprehensive approach to risk management. The application features a robust functional flow. First, users initiate a mandatory AI Handshake, establishing a secure session with a paid Gemini API key. guarantees that our high-reasoning models, powered by Gemini 3 Pro, are supported by enterprise-grade infrastructure. Next, in the Telemetry Integration phase, we foster a "Partner" relationship by connecting various data sources in the Connection Center. This includes Google Cloud for project-level shielding status, GitHub for secret scanning and code integrity, AceAbhishekIAM for liveness checks and MFA enforcement. These integrations a Risk Heartbeat, delivering a real-time simulation of your organization's security posture

High Level System Architecture

f7a3cf07.png

How Our Deeptech 9 Applications portfolio fits inside above System Architecture

Our products align as building blocks, generating the "gradients" (e.g., risk scores, proofs) that feed into aggregation. Here's a layer-by-layer mapping:
  • Edge Layer (SSI, Local DB, On-Device Processing, User Devices): Core strength here—our products emphasize local/on-device AI for privacy.​
    • PhishwatchAI and VulnGuardAI perform local anomaly detection (visual threats, CVEs) on user devices, generating encrypted gradients like fraud scores.
    • Terralens processes satellite data locally for gradient vectors (change deltas), tying physical audits to digital trust.
    • Portal acts as a local DB aggregator, storing encrypted states (e.g., compliance logs) for on-device access.
  • IAM, Sovereign Analyzer, and Verifiable Credentials handle ID/SSI and ZK privacy proofs (e.g., liveness/biometrics without data exposure).
  • Trust Layer (PolyBKTv2/HashBKT Consensus, ZK Prover/Verifier, Anomaly Detection): Excellent fit for verification and consensus.​
    • PhishwatchAI, VulnGuardAI, and Sovereign Analyzer achieve 99.9% anomaly success via neural scrutiny, feeding into ZK verifiers for consensus-verified risk states.
    • Verifiable Credentials and IAM's compliance ledger serve as a precursor to zk-rollup consensus, ensuring non-repudiable proofs.
  • Smart Contract Auditor and ContractForge use Zod schemas for structured determinism, mimicking ZK proofs (100% compilable outputs) and enabling batch ZK aggregation.
  • Aggregation Layer (XP Aggregator with TEE/MPC, Trade-Off Indicators): Partial fit, as our Portal aggregates telemetry (Google Cloud, GitHub, IAM) for risk scoring.
    • Portal and Trust OS (overarching) bridge data for risk thresholds (e.g., high/low dynamic levels), but need TEE/MPC for privacy-preserving multi-party aggregation.
    • Auditor/ContractForge's agentic workflows dynamically select tools, aligning with XP Aggregator for experience aggregation.
  • Orchestration & Governance (DAO, Policy Enforcement, Post-Quantum Security): Emerging alignment.
    • ContractForge's smart contracts and Verifiable Credentials support DAO rules and policy enforcement.
    • All products target post-quantum migration (NIST 2024).
bottom of page