Inspiration

Imagine the heart-stopping moment when a child goes missing in a crowded place. It's a parent's worst nightmare and a scenario that can unfold in an instant, leaving families frantically searching and fearing the worst. Every year, over 20,000 parents face this unimaginable situation, and the toll it takes is immeasurable. But what if there was a solution that could turn moments of panic into moments of reassurance? That's where Nova comes in.

What it does

Nova is a groundbreaking solution designed to transform ordinary jewelry into powerful beacons of safety and reassurance. It's a simple yet ingenious concept that can make all the difference in keeping our loved ones safe, especially in bustling environments

How Does it Work

  1. Instant Information Access: If a child wearing Nova jewelry goes missing, concerned bystanders or authorities can simply scan the QR code with their smartphone.
  2. Critical Details at Your Fingertips: Instantly, up pops the required vital information, including the child's name, emergency contact numbers, and address.
  3. Alert the Guardians: Simultaneously, the Nova app notifies parents or caregivers with the precise location of the scan, ensuring swift action and reunification.
  • In the unfortunate event that a child goes missing in a foreign land, where the native language may not be English, Nova steps in to bridge the communication gap.
  • Leveraging advanced technologies such as the Mixtral model in Perplexity and Pangea IP Geolocate, Nova swiftly locates the scan's precise location.
  • But Nova doesn't stop there. Understanding that effective communication is paramount in such situations, Nova seamlessly translates the essential information from English to the regional language of the scan location. This helps local communities who may not be fluent in English. to take immediate action in assisting the lost child.

Other target Audience:

Nova is designed with two key demographics in mind: children between the ages of 3-10 and older parents over the age of 70. These age groups often struggle to recall vital information like names, contact details, and addresses, especially in moments of stress or confusion. Additionally, individuals with dementia, Alzheimer's, or autism can greatly benefit from this innovative product, providing peace of mind to both them and their caregivers.

How we built it

  • Pangea API
  • Pangea-django for authn
  • Perplexity AI for language conversion
  • Twilio for sending messages -Folium for dynamic map generation
  • Segno for QR code generation

Technical details

Pangea Services used

  • AuthN:

a. Used for registration and login b. Different features like social media auth, twilio otp, magic link, captcha etc has been added in the login page (Couldn't get time to show them in the demo)

  • Vault: a. Used for storing keys for perplexity, twilio etc b. Used for generating symmetric key for encryption of credit card info

  • Redact: Hiding sensitive info the qr code scan

  • Embergo a. Used before logging in a user b. Used before making a payment

  • File intel a. Used before saving the file into the qrcode_info db

  • File scan a. Used before saving the file into the qrcode_info db

  • IP intel a. Used before logging in a user b. Used before making a payment c. Used for getting the IP location of the qr code scan

  • URL Intel a. Used before saving the into the qrcode_info db b. Used before logging in a user

  • User Intel a. Used before logging in a user

  • Audit log: Used for logging all the important logs

Main flow of events where Pangea API and other services are used

A. Checking information before encoding it into the QR Code

  • Get Input like child name, phone, address, URL, file etc from user
  • Check URL Nature:
    • Use the domain URL to assess the nature of the link.
    • If the score is 100, the link is identified as malicious, and display the "malicious_link" page.
    • If not, proceed to the next step.
  • File Hash Check: - Calculate the hash of the file.
    • Check if the hash belongs to the list of known malicious hashes using file scanning.
    • If the score = 0, perform a detailed check using file intel.
    • If the score is not 0, display the "malicious_link" page.
    • If the score = 0 - Add the data into the qrcode_info db - Generate a new qrcode using segno 1

B. Encrypting credit card info

  • Prompt the user to specify whether they want to encrypt their card details for enhanced security.
  • Capture the user's decision.
  • If the user opts for encryption:
    • Present an interface for the user to input a key phrase.
      • Obtain the key phrase provided by the user.
      • Utilize a secure vault service to generate a symmetric key based on the provided key phrase.
      • Encode data into base64
      • Encrypt the card details using the generated symmetric key and encoded data
      • Securely store the encrypted card details in the vault, ensuring protection against unauthorized access. 2

C. Payment handling page

  • Check if encryption is enabled for the checkout process.
  • If encryption is enabled, redirect to the encryption key verification page.
  • If encryption is not enabled, proceed to the payment page.

i. Encryption Key Verification:

  • Retrieve the encryption key inputted by the user.
  • Compare the user-inputted key with the encryption key stored or generated during the encryption process.
  • If the keys match:
    • Decrypt the encrypted card details using the verified key.
    • Decode the Base64 encoding to obtain the original card details.
  • Redirect to the payment page for transaction completion.
  • If the keys do not match:
    • Display a message indicating an incorrect key was provided.

ii. Payment Processing:

  • Before processing payment, gather relevant information:
  • Obtain the IP address of the user's machine.
  • Utilize an embargo service to assess the credibility of the transaction.
  • Use domain intelligence services to evaluate the credibility of the payment domain.
  • Employ IP intelligence services to verify the credibility of the user's IP address.
  • If any of the credibility checks fail, the payment is declined.
  • If all credibility checks pass successfully:
    • Proceed with payment processing and complete the transaction.
      • Provide confirmation of successful payment to the user. 3

D. QR Code scan handling

  • Redaction Option Handling:
    • Check if the redaction option is set to true.
    • If true, invoke the redact function to redact sensitive information on the page.
  • Geolocation and Mapping:
    • Utilize a pange IP geolocate to retrieve the coordinates and region of the scan.
    • Mark the obtained location on a map for visualization using folium
  • Twilio Integration:
    • Check if the Twilio option is set to true.
      • If true, use the Twilio API to send a message to the registered number, providing details about the scanned location.
  • Regional Language Identification:
    • Retrieve the regional language name corresponding to the scanned location.
    • Using perplexity, convert the English text on the page into the identified regional language.
    • Ensure accurate conversion to facilitate comprehension for users who speak the regional language. 4

Code structure

├───backend (starting point)
├───media (stores all images)
│   ├───photo
│   ├───products
│   ├───qrcode
│   └───reports
├───shop (contains the eCommerce related info)
├───qrcode (contains the qr code generation and display info)
├───static 
│   └───css
├───templates
│   ├───payment
│   ├───qrcode
│   └───shop
├───users (contains the user info)
└───utils
    └───calculate_sha256
    └───encrypt_decrypt.py
    └───ip_address.py
    └───location_marker.py
    └───pplx.py
    └───twilio.py

Challenges we ran into

  • Had a lot of trouble integrating the app with pangea-django. Had spend more than 3+ hours troubleshooting the app with the Pangea developers. I have made the required code update in my local version of the library. But the prod one is still WIP. Hence I couldn't deploy the project. I am adding the details to run the app in local in the github readme

  • There was a lack of support during the IST timezones. So a lot days had to past meeting past 1am with the pangea devs

Accomplishments that we're proud of

Very very proud to complete the entire project end to end as a solo hacker

How Nova satisfies the judging criteria

  • Product Thinking: Nova excels in this category by addressing a pressing real-world scenario: the safety of children and vulnerable individuals. The project demonstrates a deep understanding of the need for a solution that provides reassurance and security to families, especially in situations where traditional methods of identification may fail. By leveraging technology , Nova offers a practical and effective way to ensure the safety of loved ones, making it a valuable addition to any community.

  • Project Completeness: Nova showcases a high level of completeness in its features implementation. The solution covers all essential aspects, including user authentication, QR code generation, data encryption, displaying info on scan etc. Each feature is fully fleshed out and seamlessly integrated

  • Functionality: Nova is a fully fleshed-out solution that prioritizes functionality and user experience. It shows various tech stack including AI to implement various features

  • Wow Factor: Nova stands out creatively by leveraging cutting-edge technologie to address a critical safety concern. Moreover, Nova's seamless integration of multiple features and its commitment to user security add to its wow factor, making it a standout entry in the hackathon.

  • Delivery of Presentation: The presentation of Nova showcases a clear and concise explanation of how the project was built and how it solves the problem at hand. The pitch effectively communicates their inspiration for creating Nova, the problem it addresses, and the technologies used to develop it.

  • Completeness of the Article: Nova's submission covers all aspects of the project comprehensively. The article provides insights into the inspiration behind Nova, the problem it addresses, flowcharts etc

  • UI/UX: Nova has an intuitive and visually appealing user interface, with careful attention to detail in layout, color usage, and overall design. The application's interface is designed to be user-friendly and accessible

  • Driving Impact: The solution's focus on real-world usability and its commitment to user security set it apart from other entries in the hackathon. Moreover, Nova's potential to make a meaningful impact on the safety and well-being of families and communities further distinguishes it as a standout solution.

    • Scope of Nova

      • i . Children Ages 3-10:
        • According to the U.S. Census Bureau, there were approximately 41 million children aged 3-10 in the United States alone
        • The global population of children is over 1.8 billion
      • ii. Older Parents Over the Age of 70:
        • In the United States, the number of individuals aged 65 and older is around 10 million by 2060, according to the U.S. Census Bureau.
      • iii. Individuals with Cognitive Decline or Memory-related Issues:
        • Alzheimer's disease, a common form of dementia, affects an estimated 5.8 million Americans aged 65 and older, according to the Alzheimer's Association.
          • Autism spectrum disorder (ASD) affects approximately 1 in 54 children in the United States, according to the Centers for Disease Control and Prevention (CDC).

Pangea App screenshots

Count

Count

Count

Built With

Share this project:

Updates