How it works

The Security
Protocol.

Every visitor who enters your society goes through a three-step chain. No paper, no guesswork, no unverified entries.

01
Identification

Visitor is identified at the gate

The guard opens the Venditas app and captures a photo of the visitor. No paper, no fake names, every entry is tied to a real face and a server-side timestamp that cannot be backdated.

Mandatory photo captureFace, before entry is even considered.
Server-time timestampSynced to Google Cloud, guards cannot alter or back-date logs.
Visitor purpose loggedDelivery, guest, contractors: categorised at capture.
Visitor Photo
Captured — Uploading to GCP
02
Verification

Resident approves or denies entry

The moment the photo is captured, the resident receives a push notification on their phone — wherever they are. They see the visitor's face and tap Allow or Deny. No phone calls, no shouting across the building.

Instant push notificationDelivered via Firebase Cloud Messaging — under 2 seconds.
One-tap Allow / DenyResident controls access from anywhere, even outside the city.
Auto-deny on no responseIf resident doesn't respond in 2 minutes, guard follows standard protocol.
Resident's Phone

Venditas

Visitor at your gate

Visitor photo
✓ Allow
✕ Deny
Awaiting response...
03
Entry & Logging

Entry is recorded and synced across all gates

Once the resident approves, the guard lets the visitor in. The entry — photo, time, visitor type, resident flat — is instantly encrypted and written to an isolated Google Cloud Firestore instance. Searchable for up to 12 months.

AES-256 encryption at restData encrypted the moment it's written to Firestore.
Isolated per-society storageYour data never touches another society's instance.
12-month searchable logFind any visitor entry in under 2 seconds by name, flat, or date.
Entry Log

Rahul Mehta

Flat B-402 · 10:32 AM

Allowed

Swiggy Delivery

Flat A-201 · 10:28 AM

Allowed

Unknown Visitor

Flat C-105 · 10:15 AM

Denied
Encrypted · Synced to GCP

Under the hood

Google Cloud
Managed Privacy.

Unlike local software, Venditas data never lives on the guard's phone. Even if a device is stolen, your society's data remains encrypted and isolated in the cloud.

GCP Firestore

Each society is a separate encrypted instance. No data-sharing between societies, ever.

IAM Protocols

Identity Access Management means even Venditas engineers have zero manual access to your logs.

AES-256 at Rest

All visitor data encrypted the moment it's written. Decrypted only on authorised device requests.

Zero Data Visibility

We can see that data exists. We cannot see what it says. That's the architecture, not a promise.

Guard accountability

We track the people who track your gate.

Ensure your staff is performing with data, not assumptions.

Real-time Alerts

Chairman gets a notification for overstays or unauthorized entry attempts.

Multi-Gate Sync

Data entered at Gate 1 is instantly visible to the guard at Gate 4.

Blacklist

Instantly ban problematic previous staff or vendors across the entire society.