SlideShare a Scribd company logo
AUTHENTICITY
CONTROL SYSTEM

            © Copyright Messaging365, 2011
“Estimates for the size of the counterfeit drug
market range from $75 billion to $200 billion a year.
The market is likely much bigger because many cases
are hard to detect. And the problem is expected to
get worse.” (USA Today, Sep 2010)




                                     © Copyright Messaging365, 2011
One of these drugs is fake.
  Can you tell which?




                        © Copyright Messaging365, 2011
Are you worried what drugs your potential
customers would buy?

Are you constantly losing your revenue
because of counterfeit drugs?

There are up to 15% of deadly drugs on the
market that kill people every day!
                              © Copyright Messaging365, 2011
Messaging365 has a solution…
Messaging365 Authenticity Control is a mobile service designed for
                   verification of product authenticity.

                   The service is ideal to be used in the pharmaceutical industry to
Congratulations!   check authenticity of various medical products, and also in retail
 Your product is   trade, especially for luxury and branded items.
   authentic.

                   A customer can easily and free of charge verify authenticity of a
                   product by dialing an advertised free phone number or by sending
                   an SMS and entering the code printed on the packaging.

                   A wholesale customer can also benefit from knowing the origin of
                   supplies.




                                                          © Copyright Messaging365, 2011
How it works using Call2Service:
1. The user places a call from mobile phone (it can be a toll-free number or a number in
   international format like +353 1 526 29 28)
2. The call will drop in order to avoid charges
3. In response to the call the user receives a USSD Menu
4. The user scratches a label printed on a package and inputs its authenticity code
5. Receives a verification response via USSD Flash
6. Receives a duplicate verification response via SMS




  1                2                3                4                 5                   6

                                                                © Copyright Messaging365, 2011
How it works using Text2Service:
1. The user sends SMS with the keyword CHECK to a service number (eg. +353 87 142 3333)
2. In response to the SMS the user receives a USSD Menu and selects a Check Option (eg. 1)
3. The user scratches a label printed on a package and inputs its authenticity code
4. Receives a verification response via USSD Flash
5. Receives a duplicate verification response via SMS




          1                2                3                4                   5



                                                                 © Copyright Messaging365, 2011
The above examples are both available for live demo purposes:

- For Call2Service please dial +353 1 526 29 28 and select option 4
- For Text2Service please send the word CHECK to +353 87 142 3333




                                                    © Copyright Messaging365, 2011
The system opens up a channel for supplier to start direct marketing
communication with the customer.
The supplier gets a mobile phone number of the customer that later can be used in
mobile marketing.

The customer gets information about the product, the manufacturer or supplier, and
the current promotions (coupons, special offers, etc.).

For example, the marketing channel can be used:
- To deliver information about new arrivals, current and planned special promotions;
- To deliver invitations, coupons, discounts, bonuses;
- To sign up the customer for future special offers;
- To host lotto, contests, quizzes, and other interactive events.


                                                           © Copyright Messaging365, 2011
Requirements and costs.
Integration of Messaging365 Authenticity Control System is very simple and
can be determined in a very short period of time.

You only pay for:
1. System integration (Once off payment)
2. Code generator (Once off payment)
3. Messages costs and USSD interaction (Ongoing payments)
4. Technical maintenance and support (Ongoing payments)




                                                      © Copyright Messaging365, 2011
Messaging365 is a developer and service provider of direct mobile marketing and mobile self-service
solutions that enable businesses to connect with customers globally irrespective of country, network or
handset in order to boost sales.

Messaging365 uniquely offers 3rd parties the capacity to benefit from the value proposition of the standard
mobile text technologies known as Unstructured Supplementary Service Data (USSD) and Short Message
Service (SMS).

We develop mobile service applications based on USSD and SMS technologies that give businesses
interaction with end-users at the speed of Instant Messaging (IM), integration with all mobile phones,
functionality of any Call Centre, and the simplicity of an Automated Teller Machine (ATM).

What's most important the service is FREE to use for end-users.

The business was established in 2008 and located in the beautiful West of Ireland. Messaging365 is part of
Teqnoco Group headquartered in Warsaw, Poland.




                                                                        © Copyright Messaging365, 2011
For more details please contact
Stan Kuznetsov

email:   stan@teqnoco.com
skype:   belarusy




          © Copyright Messaging365, 2011

More Related Content

Viewers also liked

presentation 1
presentation 1presentation 1
presentation 1
rtregoni
 
Oxford Industries Oxm
Oxford Industries   OxmOxford Industries   Oxm
Oxford Industries Oxm
Marianna Malaspina
 
Statistical-Process-Control-Analysis-Unraveled_updated210
Statistical-Process-Control-Analysis-Unraveled_updated210Statistical-Process-Control-Analysis-Unraveled_updated210
Statistical-Process-Control-Analysis-Unraveled_updated210
pbaxter
 
Operational Efficiency Through Coding & Marking Technology
Operational Efficiency Through Coding & Marking TechnologyOperational Efficiency Through Coding & Marking Technology
Operational Efficiency Through Coding & Marking Technology
Linx Printing Technology
 
Case question of roche
Case question of rocheCase question of roche
Case question of roche
Bimo Radityo
 
ERJ DIVE
ERJ DIVEERJ DIVE
ERJ DIVE
George Bowman
 
ACA Industrial Tool Capabilities & Client Presentation
ACA Industrial Tool Capabilities & Client PresentationACA Industrial Tool Capabilities & Client Presentation
ACA Industrial Tool Capabilities & Client Presentation
acaindustrialtool
 
Network of Networks - Slide Deck
Network of Networks - Slide DeckNetwork of Networks - Slide Deck
Network of Networks - Slide Deck
Lora Cecere
 
Video Jet
Video JetVideo Jet
Video Jet
Omar Tapia Reyes
 
S&OP and Demand Management 2016 Summary Charts - 16 AUG 2016
S&OP and Demand Management 2016 Summary Charts - 16 AUG 2016S&OP and Demand Management 2016 Summary Charts - 16 AUG 2016
S&OP and Demand Management 2016 Summary Charts - 16 AUG 2016
Lora Cecere
 
Big Data Infographic - Supply Chain Insights - 2015
Big Data Infographic - Supply Chain Insights - 2015Big Data Infographic - Supply Chain Insights - 2015
Big Data Infographic - Supply Chain Insights - 2015
Lora Cecere
 
The Shifting Role of Lean Six Sigma in The Age of Turbulence
The Shifting Role of Lean Six Sigma in The Age of TurbulenceThe Shifting Role of Lean Six Sigma in The Age of Turbulence
The Shifting Role of Lean Six Sigma in The Age of Turbulence
Guidon Performance Solutions
 

Viewers also liked (12)

presentation 1
presentation 1presentation 1
presentation 1
 
Oxford Industries Oxm
Oxford Industries   OxmOxford Industries   Oxm
Oxford Industries Oxm
 
Statistical-Process-Control-Analysis-Unraveled_updated210
Statistical-Process-Control-Analysis-Unraveled_updated210Statistical-Process-Control-Analysis-Unraveled_updated210
Statistical-Process-Control-Analysis-Unraveled_updated210
 
Operational Efficiency Through Coding & Marking Technology
Operational Efficiency Through Coding & Marking TechnologyOperational Efficiency Through Coding & Marking Technology
Operational Efficiency Through Coding & Marking Technology
 
Case question of roche
Case question of rocheCase question of roche
Case question of roche
 
ERJ DIVE
ERJ DIVEERJ DIVE
ERJ DIVE
 
ACA Industrial Tool Capabilities & Client Presentation
ACA Industrial Tool Capabilities & Client PresentationACA Industrial Tool Capabilities & Client Presentation
ACA Industrial Tool Capabilities & Client Presentation
 
Network of Networks - Slide Deck
Network of Networks - Slide DeckNetwork of Networks - Slide Deck
Network of Networks - Slide Deck
 
Video Jet
Video JetVideo Jet
Video Jet
 
S&OP and Demand Management 2016 Summary Charts - 16 AUG 2016
S&OP and Demand Management 2016 Summary Charts - 16 AUG 2016S&OP and Demand Management 2016 Summary Charts - 16 AUG 2016
S&OP and Demand Management 2016 Summary Charts - 16 AUG 2016
 
Big Data Infographic - Supply Chain Insights - 2015
Big Data Infographic - Supply Chain Insights - 2015Big Data Infographic - Supply Chain Insights - 2015
Big Data Infographic - Supply Chain Insights - 2015
 
The Shifting Role of Lean Six Sigma in The Age of Turbulence
The Shifting Role of Lean Six Sigma in The Age of TurbulenceThe Shifting Role of Lean Six Sigma in The Age of Turbulence
The Shifting Role of Lean Six Sigma in The Age of Turbulence
 

Similar to Messaging365 Product Authenticity Control Feb 2011 Eng Li S

Yuboto Autodialer & Corporate profile (en)
Yuboto Autodialer & Corporate profile (en)Yuboto Autodialer & Corporate profile (en)
Yuboto Autodialer & Corporate profile (en)
yuboto
 
Inbound SMS Services
Inbound SMS ServicesInbound SMS Services
Inbound SMS Services
guest9cc9d1
 
Presentation for Insurance Company
Presentation for Insurance CompanyPresentation for Insurance Company
Presentation for Insurance Company
razibnnl
 
Whitepaper: Unified Communications Solution on Communication Enabled Business...
Whitepaper: Unified Communications Solution on Communication Enabled Business...Whitepaper: Unified Communications Solution on Communication Enabled Business...
Whitepaper: Unified Communications Solution on Communication Enabled Business...
Happiest Minds Technologies
 
Multi Channel Mobile Marketing
Multi Channel Mobile MarketingMulti Channel Mobile Marketing
Multi Channel Mobile Marketing
andrew.cardoza
 
SMS Solutions for Dating and Matchmaking companies
SMS Solutions for Dating and Matchmaking companiesSMS Solutions for Dating and Matchmaking companies
SMS Solutions for Dating and Matchmaking companies
guestb17c97
 
Presentation for Educational Institute
Presentation for Educational InstitutePresentation for Educational Institute
Presentation for Educational Institute
razibnnl
 
Vietguys Mobile Credentials 2015
Vietguys Mobile Credentials 2015Vietguys Mobile Credentials 2015
Vietguys Mobile Credentials 2015
Vietguys - Mobile Marketing Solutions
 
Top 7 Phone Verification Challenges
Top 7 Phone Verification ChallengesTop 7 Phone Verification Challenges
Top 7 Phone Verification Challenges
Srivatsan Srinivasan
 
Whitepaper: Top 7 Phone Number Verification Challenges
Whitepaper: Top 7 Phone Number Verification ChallengesWhitepaper: Top 7 Phone Number Verification Challenges
Whitepaper: Top 7 Phone Number Verification Challenges
Nexmo
 
bolttech – Insurtech Innovation Award 2023
bolttech – Insurtech Innovation Award 2023bolttech – Insurtech Innovation Award 2023
bolttech – Insurtech Innovation Award 2023
The Digital Insurer
 
Company Presentation Li
Company Presentation  LiCompany Presentation  Li
Company Presentation Li
webmastergetcustomerz
 
Mobile Marketing Strategies
Mobile Marketing StrategiesMobile Marketing Strategies
Mobile Marketing Strategies
Nelle Tatum
 
Whitepaper newfies-dialer Autodialer
Whitepaper newfies-dialer AutodialerWhitepaper newfies-dialer Autodialer
Whitepaper newfies-dialer Autodialer
Areski Belaid
 
Automated Lifecycle Marketing for Wireless Retail
Automated Lifecycle Marketing for Wireless RetailAutomated Lifecycle Marketing for Wireless Retail
Automated Lifecycle Marketing for Wireless Retail
chatterspot
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?
Fortytwo
 
Key Response Info
Key Response InfoKey Response Info
Key Response Info
DeniMari
 
From Acquisition to Monetization—Chat Apps Connect the Next
From Acquisition to Monetization—Chat Apps Connect the NextFrom Acquisition to Monetization—Chat Apps Connect the Next
From Acquisition to Monetization—Chat Apps Connect the Next
tyntec
 
Data sheet Securepay
Data sheet  SecurepayData sheet  Securepay
Data sheet Securepay
gensoftpro
 
What is two factor or multi-factor authentication
What is two factor or multi-factor authenticationWhat is two factor or multi-factor authentication
What is two factor or multi-factor authentication
Jack Forbes
 

Similar to Messaging365 Product Authenticity Control Feb 2011 Eng Li S (20)

Yuboto Autodialer & Corporate profile (en)
Yuboto Autodialer & Corporate profile (en)Yuboto Autodialer & Corporate profile (en)
Yuboto Autodialer & Corporate profile (en)
 
Inbound SMS Services
Inbound SMS ServicesInbound SMS Services
Inbound SMS Services
 
Presentation for Insurance Company
Presentation for Insurance CompanyPresentation for Insurance Company
Presentation for Insurance Company
 
Whitepaper: Unified Communications Solution on Communication Enabled Business...
Whitepaper: Unified Communications Solution on Communication Enabled Business...Whitepaper: Unified Communications Solution on Communication Enabled Business...
Whitepaper: Unified Communications Solution on Communication Enabled Business...
 
Multi Channel Mobile Marketing
Multi Channel Mobile MarketingMulti Channel Mobile Marketing
Multi Channel Mobile Marketing
 
SMS Solutions for Dating and Matchmaking companies
SMS Solutions for Dating and Matchmaking companiesSMS Solutions for Dating and Matchmaking companies
SMS Solutions for Dating and Matchmaking companies
 
Presentation for Educational Institute
Presentation for Educational InstitutePresentation for Educational Institute
Presentation for Educational Institute
 
Vietguys Mobile Credentials 2015
Vietguys Mobile Credentials 2015Vietguys Mobile Credentials 2015
Vietguys Mobile Credentials 2015
 
Top 7 Phone Verification Challenges
Top 7 Phone Verification ChallengesTop 7 Phone Verification Challenges
Top 7 Phone Verification Challenges
 
Whitepaper: Top 7 Phone Number Verification Challenges
Whitepaper: Top 7 Phone Number Verification ChallengesWhitepaper: Top 7 Phone Number Verification Challenges
Whitepaper: Top 7 Phone Number Verification Challenges
 
bolttech – Insurtech Innovation Award 2023
bolttech – Insurtech Innovation Award 2023bolttech – Insurtech Innovation Award 2023
bolttech – Insurtech Innovation Award 2023
 
Company Presentation Li
Company Presentation  LiCompany Presentation  Li
Company Presentation Li
 
Mobile Marketing Strategies
Mobile Marketing StrategiesMobile Marketing Strategies
Mobile Marketing Strategies
 
Whitepaper newfies-dialer Autodialer
Whitepaper newfies-dialer AutodialerWhitepaper newfies-dialer Autodialer
Whitepaper newfies-dialer Autodialer
 
Automated Lifecycle Marketing for Wireless Retail
Automated Lifecycle Marketing for Wireless RetailAutomated Lifecycle Marketing for Wireless Retail
Automated Lifecycle Marketing for Wireless Retail
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?
 
Key Response Info
Key Response InfoKey Response Info
Key Response Info
 
From Acquisition to Monetization—Chat Apps Connect the Next
From Acquisition to Monetization—Chat Apps Connect the NextFrom Acquisition to Monetization—Chat Apps Connect the Next
From Acquisition to Monetization—Chat Apps Connect the Next
 
Data sheet Securepay
Data sheet  SecurepayData sheet  Securepay
Data sheet Securepay
 
What is two factor or multi-factor authentication
What is two factor or multi-factor authenticationWhat is two factor or multi-factor authentication
What is two factor or multi-factor authentication
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

Messaging365 Product Authenticity Control Feb 2011 Eng Li S

  • 1. AUTHENTICITY CONTROL SYSTEM © Copyright Messaging365, 2011
  • 2. “Estimates for the size of the counterfeit drug market range from $75 billion to $200 billion a year. The market is likely much bigger because many cases are hard to detect. And the problem is expected to get worse.” (USA Today, Sep 2010) © Copyright Messaging365, 2011
  • 3. One of these drugs is fake. Can you tell which? © Copyright Messaging365, 2011
  • 4. Are you worried what drugs your potential customers would buy? Are you constantly losing your revenue because of counterfeit drugs? There are up to 15% of deadly drugs on the market that kill people every day! © Copyright Messaging365, 2011
  • 5. Messaging365 has a solution…
  • 6. Messaging365 Authenticity Control is a mobile service designed for verification of product authenticity. The service is ideal to be used in the pharmaceutical industry to Congratulations! check authenticity of various medical products, and also in retail Your product is trade, especially for luxury and branded items. authentic. A customer can easily and free of charge verify authenticity of a product by dialing an advertised free phone number or by sending an SMS and entering the code printed on the packaging. A wholesale customer can also benefit from knowing the origin of supplies. © Copyright Messaging365, 2011
  • 7. How it works using Call2Service: 1. The user places a call from mobile phone (it can be a toll-free number or a number in international format like +353 1 526 29 28) 2. The call will drop in order to avoid charges 3. In response to the call the user receives a USSD Menu 4. The user scratches a label printed on a package and inputs its authenticity code 5. Receives a verification response via USSD Flash 6. Receives a duplicate verification response via SMS 1 2 3 4 5 6 © Copyright Messaging365, 2011
  • 8. How it works using Text2Service: 1. The user sends SMS with the keyword CHECK to a service number (eg. +353 87 142 3333) 2. In response to the SMS the user receives a USSD Menu and selects a Check Option (eg. 1) 3. The user scratches a label printed on a package and inputs its authenticity code 4. Receives a verification response via USSD Flash 5. Receives a duplicate verification response via SMS 1 2 3 4 5 © Copyright Messaging365, 2011
  • 9. The above examples are both available for live demo purposes: - For Call2Service please dial +353 1 526 29 28 and select option 4 - For Text2Service please send the word CHECK to +353 87 142 3333 © Copyright Messaging365, 2011
  • 10. The system opens up a channel for supplier to start direct marketing communication with the customer. The supplier gets a mobile phone number of the customer that later can be used in mobile marketing. The customer gets information about the product, the manufacturer or supplier, and the current promotions (coupons, special offers, etc.). For example, the marketing channel can be used: - To deliver information about new arrivals, current and planned special promotions; - To deliver invitations, coupons, discounts, bonuses; - To sign up the customer for future special offers; - To host lotto, contests, quizzes, and other interactive events. © Copyright Messaging365, 2011
  • 11. Requirements and costs. Integration of Messaging365 Authenticity Control System is very simple and can be determined in a very short period of time. You only pay for: 1. System integration (Once off payment) 2. Code generator (Once off payment) 3. Messages costs and USSD interaction (Ongoing payments) 4. Technical maintenance and support (Ongoing payments) © Copyright Messaging365, 2011
  • 12. Messaging365 is a developer and service provider of direct mobile marketing and mobile self-service solutions that enable businesses to connect with customers globally irrespective of country, network or handset in order to boost sales. Messaging365 uniquely offers 3rd parties the capacity to benefit from the value proposition of the standard mobile text technologies known as Unstructured Supplementary Service Data (USSD) and Short Message Service (SMS). We develop mobile service applications based on USSD and SMS technologies that give businesses interaction with end-users at the speed of Instant Messaging (IM), integration with all mobile phones, functionality of any Call Centre, and the simplicity of an Automated Teller Machine (ATM). What's most important the service is FREE to use for end-users. The business was established in 2008 and located in the beautiful West of Ireland. Messaging365 is part of Teqnoco Group headquartered in Warsaw, Poland. © Copyright Messaging365, 2011
  • 13. For more details please contact Stan Kuznetsov email: stan@teqnoco.com skype: belarusy © Copyright Messaging365, 2011