Technology
Technology Diagram
Modules
User Mobile Application
User Experiences
Support Mobile OS: Android, iOS
User Authentication
ISO 27001
Product Authentication Module - EZ track System by GS1
Product Authentication Module
Refer to GS1 Standard
Payment Module
Refer to Payment Gateway Standard
Pass PCI-DSS
Payment Gateway Connection Pool
Payment Authentication Witness Module
Refer to Payment Gateway requirements
All refer to Functional Spec
Coupon Mall
Loyalty Point
Coupon / Loyalty Point Exchange for User
Multimedia Content Supplier Connection Pool
Maps
Coupon / Loyalty Point Exchange Core
Integrated Management Platform for Business Owner
Payment Management Platform
Financial modules
Coupon Management
Loyalty Point Management
Marketing content Management
Customer relationship Management
User Mobile Application
User Experiences
Support Mobile OS: Android, iOS
User Authentication
ISO 27001
Product Authentication Module - EZ track System by GS1
Product Authentication Module
Refer to GS1 Standard
Payment Module
Refer to Payment Gateway Standard
Pass PCI-DSS
Payment Gateway Connection Pool
Payment Authentication Witness Module
Refer to Payment Gateway requirements
All refer to Functional Spec
Coupon Mall
Loyalty Point
Coupon / Loyalty Point Exchange for User
Multimedia Content Supplier Connection Pool
Maps
Coupon / Loyalty Point Exchange Core
Integrated Management Platform for Business Owner
Payment Management Platform
Financial modules
Coupon Management
Loyalty Point Management
Marketing content Management
Customer relationship Management
Distributed Database
Data Exchange network will take a Hybrid Cloud format (Cloud <-> On Premise). Balance inquiry, payment and transaction processing requests will be handled by the participating bank agents Data sync events occurred from storing transaction data will be detected by the opposing party (agent), and it will make processing requests through legacy system. 3 Types of POC testing done : Digital money Transfer, Coupon Purchase and Cancellation of purchase.
Data Exchange network will take a Hybrid Cloud format (Cloud <-> On Premise). Balance inquiry, payment and transaction processing requests will be handled by the participating bank agents Data sync events occurred from storing transaction data will be detected by the opposing party (agent), and it will make processing requests through legacy system. 3 Types of POC testing done : Digital money Transfer, Coupon Purchase and Cancellation of purchase.
Participants of Halal Consortium
In building a new platform, each participant organizes and manages local business, while “Halal Consortium” manages as a hub for all participants. Merchants and Payment Company can White Label our Application and Halal Wallet as their own service.
In building a new platform, each participant organizes and manages local business, while “Halal Consortium” manages as a hub for all participants. Merchants and Payment Company can White Label our Application and Halal Wallet as their own service.
Product Authentication-Enhance and protect brand image by adoption of technology
Brand owners always look for every means to enhance its brand image. And the rise of ecommerce seems to have unveiled numerous opportunities for legitimate brands, but at the same time, counterfeiters are also taking huge advantage of the online eco-system to expand their business. Adoption of technology can help the brand in achieving multiple purposes including anti-counterfeit, capturing of customers’ data and product tracking/tracing. The International Chamber of Commerce (ICC) estimates that counterfeiting accounts for an estimated $600 billion a year1 and expects the value of counterfeit goods globally to exceed USD 1.7 trillion by 2015, that’s over 2 % of the world’s total current economic output2: one in six products sold online is identified as counterfeit3. According to the Office of the US Trade Representative, the volume of pirated and counterfeit hard goods sold online will soon surpass that of goods sold by street vendors and in other physical markets. One out of four Facebook advertisements for cut-price luxury goods such as Louis Vuitton handbags and Ray-Ban Aviator sunglasses link to websites selling counterfeit items, according to findings by two independent cyber security researchers. In the EU, nearly 70% of customs interventions focus on packages shipped by express mail or post6 and 30% of all counterfeit seizures are linked to Internet distribution channels.
Brand owners always look for every means to enhance its brand image. And the rise of ecommerce seems to have unveiled numerous opportunities for legitimate brands, but at the same time, counterfeiters are also taking huge advantage of the online eco-system to expand their business. Adoption of technology can help the brand in achieving multiple purposes including anti-counterfeit, capturing of customers’ data and product tracking/tracing. The International Chamber of Commerce (ICC) estimates that counterfeiting accounts for an estimated $600 billion a year1 and expects the value of counterfeit goods globally to exceed USD 1.7 trillion by 2015, that’s over 2 % of the world’s total current economic output2: one in six products sold online is identified as counterfeit3. According to the Office of the US Trade Representative, the volume of pirated and counterfeit hard goods sold online will soon surpass that of goods sold by street vendors and in other physical markets. One out of four Facebook advertisements for cut-price luxury goods such as Louis Vuitton handbags and Ray-Ban Aviator sunglasses link to websites selling counterfeit items, according to findings by two independent cyber security researchers. In the EU, nearly 70% of customs interventions focus on packages shipped by express mail or post6 and 30% of all counterfeit seizures are linked to Internet distribution channels.