How SAWIS-verified vineyard GPS coordinates, cultivar data, and vintage year are locked into a SHA-256 origin hash for EU Geographical Indication (GI) compliance. The provenance architecture for South African wine exports.
South Africa exports approximately 400 million litres of wine annually, with the EU (particularly the UK, Germany, Netherlands, and Sweden) as the primary market. South African wine is protected under the EU-South Africa Trade, Development and Cooperation Agreement (TDCA), which recognises South African wine Geographical Indications (GIs) including Stellenbosch, Franschhoek, Paarl, and Constantia. The EU Wine Regulation 2019/787 requires that wine DPPs include verified origin data — vineyard GPS coordinates, cultivar, vintage year, and the SAWIS Wine of Origin certification — to protect the integrity of GI designations.
The South African Wine Information System (SAWIS) administers the Wine of Origin (WO) scheme, which certifies the origin, vintage, and cultivar of South African wines. SAWIS certification is a prerequisite for any South African wine making a GI claim on the EU market. The National DPP Registry integrates directly with the SAWIS API to pull verified WO certification data and embed it in the wine DPP. The SAWIS certificate number is embedded in the DPP JSON-LD payload, and the certificate is SHA-256 hashed and stored in the D1 ledger. EU customs agents can verify SAWIS certification status via the registry's public API in under 50 milliseconds.
Wine counterfeiting is a significant problem in the EU premium wine market. Fraudulent wines claiming to be from prestigious South African appellations (Stellenbosch, Constantia) are sold at premium prices without the quality or origin credentials to justify them. The National DPP Registry's vineyard GPS hash creates an unforgeable origin claim: the GPS coordinates of the specific vineyard blocks used to produce the wine are hashed and embedded in the DPP. Any wine claiming a specific appellation must have a DPP with GPS coordinates that fall within the registered boundaries of that appellation — a claim that cannot be faked without invalidating the hash.
Upload your appellation proof document to the Minting Station. The SHA-256 hash is computed client-side in your browser — the raw file never leaves your device unprotected. The hash is your forensic fingerprint: tamper-evident and legally non-repudiable under ECTA 2002.
Go to Minting StationWe use essential cookies to keep you logged in and functional cookies to personalise your DPP experience. No advertising or tracking cookies. Ever. Cookie Policy · Privacy Policy