SlideShare a Scribd company logo
Tolling System Architectures Rupert Brown ETTM, ConnectEast Melbourne, Victoria, Australia
Introduction ,[object Object]
Changing relationships, environment ,[object Object],[object Object],[object Object],[object Object],Charging System for Infrastructure Usage CSIU
Architecture development ,[object Object]
Use a method – Soft Systems Methodology Problem situation unstructured Problem situation expressed Root Definition of relevant systems Conceptual models Other systems thinking Formal systems model Real world/Systems world comparison Feasible/Desirable Changes Actions to Improve Real World Systems World SE Architecture Rich Picture CATWOE
Street parking Car parks Congestion charging Bridges Roads Tunnels Railways Airports Sea Ports Types of Infrastructure Tolling Types of Application Public Transport Ticketing DSRC Tags Phones GNSS Constellation Smart Cards GPS OBU Video Gantries Technical Elements Picture Enforcement Each infrastructure type has its own best way of being funded and generating revenue. Technology has to be appropriate for the application and cost. RFID Tags The nature of the asset, technology and the business case drives the form of the solution. Get the people who use the asset but don’t pay – no arrangement. ? Interoperability Other infrastructure operators Do we have a clearing house? Our customers accessing all our channels Our bank Calculate how much users have to pay. Recover money from bad customers Interoperability agreements. Shareholders want their cut of money Charge that to our customer’s account. Usage event information, Information to identify the user, Evidence of use, Government Authorities who control the concessions and have audit powers. Who is this? Do they have an arrangement with us, or somebody else? We send you – a device, tag maybe, A statement/invoice, on a regular basis, Information we think you’ll want. You send us money. Customers We exchange customer information, Information on our customer’s usage, The money that we owe each other. Manage all our money. Money to/from the bank. Payday for shareholders. Money for the Government Mobile monitoring Recover money owed to us. Use the courts if necessary. Process and confirm pictures HOT LANE Rich Picture of a Charging System for Infrastructure Usage (CSIU) To show, in an unstructured way, most of the significant elements that come into play when thinking about developing a charging system for infrastructure usage. Rupert Brown 2007 Infrared [Stage 2 – “Problem situation expressed” from the SSM]
CSIU Root Definition ,[object Object],[object Object]
Street parking Car parks Congestion charging Bridges Roads Tunnels Railways Airports Sea Ports Types of Infrastructure Tolling Types of Application Public Transport Ticketing DSRC Tags Phones GNSS Constellation Smart Cards GPS OBU Video Gantries Technical Elements Picture Enforcement Each infrastructure type has its own best way of being funded and generating revenue. Technology has to be appropriate for the application and cost. RFID Tags The nature of the asset, technology and the business case drives the form of the solution. Get the people who use the asset but don’t pay – no arrangement. ? Interoperability Other infrastructure operators Do we have a clearing house? Our customers accessing all our channels Our bank Calculate how much users have to pay. Recover money from bad customers Interoperability agreements. Shareholders want their cut of money Charge that to our customer’s account. Usage event information, Information to identify the user, Evidence of use, Government Authorities who control the concessions and have audit powers. Who is this? Do they have an arrangement with us, or somebody else? We send you – a device, tag maybe, A statement/invoice, on a regular basis, Information we think you’ll want. You send us money. Customers We exchange customer information, Information on our customer’s usage, The money that we owe each other. Manage all our money. Money to/from the bank. Payday for shareholders. Money for the Government Mobile monitoring Recover money owed to us. Use the courts if necessary. Process and confirm pictures HOT LANE Rupert Brown 2007 Infrared Detecting usage of the asset Reconstructing how the asset was used Calculating a charge for the asset’s use Identifying who to charge for the asset usage Exchanging data and money with other asset operators Servicing the needs of our customers Getting money from our customers Enforcing the need to pay to use the asset Collecting money owed Managing the money Managing the CSIU systems Using the Rich Picture to draw out the main functional elements of CSIU The start of the process to bring structure to the mass of unstructured elements within the Rich Picture. Gathering evidence of use
Detecting usage of the asset Reconstructing how the asset was used Calculating a charge for the asset’s use Identifying who to charge for the asset usage Exchanging data and money with other asset operators Servicing the needs of our customers Getting money from our customers Enforcing the need to pay to use the asset Collecting money owed Managing the money Managing the CSIU systems Gathering evidence of use Street parking Car parks Congestion charging Bridges Roads Tunnels Railways Airports Sea Ports Types of Infrastructure Tolling Types of Application Public Transport Ticketing DSRC Tags Phones GNSS Constellation Smart Cards GPS OBU Video Gantries Technical Elements Picture Enforcement Each infrastructure type has its own best way of being funded and generating revenue. Technology has to be appropriate for the application and cost. RFID Tags The nature of the asset, technology and the business case drives the form of the solution. Get the people who use the asset but don’t pay – no arrangement. ? Interoperability Other infrastructure operators Do we have a clearing house? Our customers accessing all our channels Our bank Calculate how much users have to pay. Recover money from bad customers Interoperability agreements. Shareholders want their cut of money Charge that to our customer’s account. Usage event information, Information to identify the user, Evidence of use, Government Authorities who control the concessions and have audit powers. Who is this? Do they have an arrangement with us, or somebody else? We send you – a device, tag maybe, A statement/invoice, on a regular basis, Information we think you’ll want. You send us money. Customers We exchange customer information, Information on our customer’s usage, The money that we owe each other. Manage all our money. Money to/from the bank. Payday for shareholders. Money for the Government Mobile monitoring Recover money owed to us. Use the courts if necessary. Process and confirm pictures HOT LANE Rupert Brown 2007 Infrared Using the Rich Picture to draw out the main functional elements of CSIU The start of the process to bring structure to the mass of unstructured elements within the Rich Picture.
Detecting usage of the asset Reconstructing how the asset was used Calculating a charge for the asset’s use Identifying who to charge for the asset usage Exchanging data and money with other asset operators Servicing the needs of our customers Getting money from our customers Enforcing the need to pay to use the asset Collecting money owed Managing the money Managing the CSIU systems Gathering evidence of use Asset Usage Detection FA Function: to detect and gather identifying token data on people using the asset. Tied to the asset. Manage the CSIU System FA Function: to monitor, manage and maintain the CSIU System. Management Commands Status Reports Asset Usage Reconstruction FA Function: to reconstruct, based on the detected usage, a complete usage event. Interoperable Arrangements to Pay FA Function: to manage the exchange of information and money with other asset operators so as to enable people with arrangements to pay to use our asset and vice versa.  Other asset operators. Asset Usage Rating FA Function: to determine how a complete usage event should be rated, i.e. the charge for use. Evidence of use Gathering FA Function: to gather evidence that the asset was used at a determined date and time. Usage & Token Correlation FA Function: to associate rated user events with the tokens that will allow the asset user to be identified. Pay for Usage Enforcement FA Function: to manage the collection of money from people who have used the asset but not made arrangements to pay. Channels to our “ would be” customers. Serving our Customers FA Function: to keep up to date all the information we need on people with arrangements to pay and respond to other queries. Channels to our Customers. Corporate Money Management FA Function: to manage all the money coming in to  and going out from the CSIU. Interface with Banks, Financial Institutions, Government and individuals. Debt Collection FA Function: to manage the collection of money from people who have used the asset and have made arrangements to pay, but for whatever reason haven’t. Our Customers. User Charging FA Function: to manage the collection of money from people who have used the asset and have made arrangements to pay, and to hand off for those that haven’t. Identification of CSIU Functional Areas (FA) their basic Descriptions Using the functional elements drawn out from the analysis of the Rich Picture to create a first pass at a system block diagram for the CSIU, including basic data flows. © Rupert Brown 2008 Usage detections Complete usage events Rated usage events Token identification data Evidence of use Rated usage events with token identifiers Details of people with arrangements to pay. Details of usage and other notifications. Details of people with arrangements to pay with other operators, and data on our customers using other assets.  Details of people with arrangements to pay with us, and data on other customers using our assets.  Request for evidence Œ Œ   Ž Ž     Information identifying our customers who are not paying the money they owe us. Outcome of a debt recovery process. Financial reconciliation information. Financial reconciliation information. [FA – Functional Area] Usage detections
Asset Usage Detection FA Function: to detect and gather identifying token data on people using the asset. Tied to the asset. Manage the CSIU System FA Function: to monitor, manage and maintain the CSIU System. Management Commands Status Reports Asset Usage Reconstruction FA Function: to reconstruct, based on the detected usage, a complete usage event. Interoperable Arrangements to Pay FA Function: to manage the exchange of information and money with other asset operators so as to enable people with arrangements to pay to use our asset and vice versa.  Other asset operators. Asset Usage Rating FA Function: to determine how a complete usage event should be rated, i.e. the charge for use. Evidence of use Gathering FA Function: to gather evidence that the asset was used at a determined date and time. Usage & Token Correlation FA Function: to associate rated user events with the tokens that will allow the asset user to be identified. Pay for Usage Enforcement FA Function: to manage the collection of money from people who have used the asset but not made arrangements to pay. Channels to our “ would be” customers. Serving our Customers FA Function: to keep up to date all the information we need on people with arrangements to pay and respond to other queries. Channels to our Customers. Corporate Money Management FA Function: to manage all the money coming in to  and going out from the CSIU. Interface with Banks, Financial Institutions, Government and individuals. Debt Collection FA Function: to manage the collection of money from people who have used the asset and have made arrangements to pay, but for whatever reason haven’t. Our Customers. User Charging FA Function: to manage the collection of money from people who have used the asset and have made arrangements to pay, and to hand off for those that haven’t. Identification of CSIU Functional Areas (FA) their basic Descriptions Using the functional elements drawn out from the analysis of the Rich Picture to create a first pass at a system block diagram for the CSIU, including basic data flows. © Rupert Brown 2008 Usage detections Complete usage events Rated usage events Token identification data Evidence of use Rated usage events with token identifiers Details of people with arrangements to pay. Details of usage and other notifications. Details of people with arrangements to pay with other operators, and data on our customers using other assets.  Details of people with arrangements to pay with us, and data on other customers using our assets.  Request for evidence Œ Œ   Ž Ž     Information identifying our customers who are not paying the money they owe us. Outcome of a debt recovery process. Financial reconciliation information. Financial reconciliation information. [FA – Functional Area] Usage detections Manage the CSIU System FA Monitor system component health Report system alerts, alarms and failures Maintain service schedules and histories Maintain technical information Maintain warranty, licence and service organisation details Asset Usage Detection FA Manage detection and access systems Manage detection events in time and space Capture detection event record (video, TRX, biometrics) Manage real time authorisation/ access request Evidence of use Gathering FA Convert detection event records into machine readable form Identify tokens from event records Correlate & consolidate multiple records into single compound record Encapsulate and encrypt compound record data in repository Manage the record repository Asset Usage Reconstruction FA Maintain the detection system (asset) topology Maintain the timeliness of usage detections Create usage events based on token identifications Adjust usage events Determine user class or characteristics Asset Usage Rating FA Maintain the timeliness of usage events Maintain the set of charging schemes and rate tables Determine and assign the charge to the usage event  Adjust charges as the usage event changes Usage & Token Correlation FA Assess tokens and create a token pattern for a usage event Determine “best fit” tokens to apply to the usage event Mark usage event with the “best fit” tokens Add token pattern to the patterns repository Adjust tokens assigned to usage events Pay for Usage Enforcement FA Manage the identification of the asset user Manage the “post use” invoice process Manage statutory declarations Produce the “evidence of use” package Manage the relationship with the civil courts Receipt money User Charging FA Maintain accounts and account hierarchies (arrangements to pay) Allocate usage charges to accounts based on token identification Calculate and apply fees, charges and discounts to accounts Manage adjustments to accounts Manage exempt and un-chargeable usage events Prepare statements and invoices and issue across channels Manage real-time access authorisation requests Manage events with users without arrangements to pay Serving our Customers FA Gather intelligence on and profile our customers Develop new infrastructure access and related services products Sell and cross-sell access and service products Maintain customer account details Manage customer queries, issues and complaints Manage payments, refunds and adjustments Manage information and service levels across all channels Manage ordering of physical token devices Corporate Money Management FA Manage automatic payment arrangements across channels Manage all financial channel transactions Manage the General Ledger Undertake accounts and bank reconciliation Undertake financial reporting Manage all financial audit activities Debt Collection FA Identify debts, review and confirm/ reject debt based on evidence Review debt history and existing collection arrangements Manage and operate in-house debt collection processes Manage outsourced debt collection processes Manage legal processes associated with debt collection Interoperable Arrangements to Pay FA Receive and process “Arrangements to pay” lists Create and send “Arrangements to pay” lists Receive and process rated and identified home usage events Create and send rated and identified FO usage events Manage disputed usage events Development of the CSIU’s functional areas (FA) into a functional architecture Using the functional areas (FA) as the basis, this diagram develops the concept to produce a basic functional architecture for the CSIU. © Rupert Brown 2008 Token Logistics FA Order token devices and manage good inwards Manage warehouse inventories Manage dispatch to customers Manage returns for reissue, repair and retirement
Back Office System Usage Detection System Management Usage Evidence Management Usage Reconstruction & Rating Enforcement System Interoperability System Manage the CSIU System FA Monitor system component health Report system alerts, alarms and failures Maintain service schedules and histories Maintain technical information Maintain warranty, licence and service organisation details Asset Usage Detection FA Manage detection and access systems Manage detection events in time and space Capture detection event record (video, TRX, biometrics) Manage real time authorisation/ access request Evidence of use Gathering FA Convert detection event records into machine readable form Identify tokens from event records Correlate & consolidate multiple records into single compound record Encapsulate and encrypt compound record data in repository Manage the record repository Asset Usage Reconstruction FA Maintain the detection system (asset) topology Maintain the timeliness of usage detections Create usage events based on token identifications Adjust usage events Determine user class or characteristics Asset Usage Rating FA Maintain the timeliness of usage events Maintain the set of charging schemes and rate tables Determine and assign the charge to the usage event  Adjust charges as the usage event changes Usage & Token Correlation FA Assess tokens and create a token pattern for a usage event Determine “best fit” tokens to apply to the usage event Mark usage event with the “best fit” tokens Add token pattern to the patterns repository Adjust tokens assigned to usage events Pay for Usage Enforcement FA Manage the identification of the asset user Manage the “post use” invoice process Manage statutory declarations Produce the “evidence of use” package Manage the relationship with the civil courts Receipt money User Charging FA Maintain accounts and account hierarchies (arrangements to pay) Allocate usage charges to accounts based on token identification Calculate and apply fees, charges and discounts to accounts Manage adjustments to accounts Manage exempt and un-chargeable usage events Prepare statements and invoices and issue across channels Manage real-time access authorisation requests Manage events with users without arrangements to pay Serving our Customers FA Gather intelligence on and profile our customers Develop new infrastructure access and related services products Sell and cross-sell access and service products Maintain customer account details Manage customer queries, issues and complaints Manage payments, refunds and adjustments Manage information and service levels across all channels Manage ordering of physical token devices Corporate Money Management FA Manage automatic payment arrangements across channels Manage all financial channel transactions Manage the General Ledger Undertake accounts and bank reconciliation Undertake financial reporting Manage all financial audit activities Debt Collection FA Identify debts, review and confirm/ reject debt based on evidence Review debt history and existing collection arrangements Manage and operate in-house debt collection processes Manage outsourced debt collection processes Manage legal processes associated with debt collection Interoperable Arrangements to Pay FA Receive and process “Arrangements to pay” lists Create and send “Arrangements to pay” lists Receive and process rated and identified home usage events Create and send rated and identified FO usage events Manage disputed usage events Development of the CSIU’s functional areas (FA) into a functional architecture Using the functional areas (FA) as the basis, this diagram develops the concept to produce a basic functional architecture for the CSIU. © Rupert Brown 2008 Token Logistics FA Order token devices and manage good inwards Manage warehouse inventories Manage dispatch to customers Manage returns for reissue, repair and retirement Allocation of the functional architecture to create the system architecture Using the functional architecture as the basis, this diagram applies the COTS vs “purpose build” test to derive system architecture components. © Rupert Brown 2008 COTS Purpose built
Back Office System Usage Detection System Management Usage Evidence Management Usage Reconstruction & Rating Enforcement System Interoperability System System Management Usage Evidence Management Usage Reconstruction & Rating Back Office System Enforcement System Interoperability System Usage Detection Usage Detection Usage Detection Usage Detection Usage Detection Usage Detection Usage detection is linked to the asset. Web IVR SMS Customer Channels Bank POS DCA MH Services Other asset operators Legal system COTS Product “ Purpose Built” Product POS – Point of Sale e.g. Post Office DCA – Debt Collection Agency MH – Mailing House IVR – Interactive Voice Recognition SMS – Short Message Service (phone) CSIU Basic System Architecture © Rupert Brown 2008 External (world) interface TS TS – Token Supplier(s)         Interface numbering
Questions ,[object Object],[object Object],[object Object],[object Object]
Comparisons ,[object Object],[object Object],[object Object]
 
XCH CRM Financials Data Warehouse Toll Operating System TSMC ALC IVR EFTPOS Web Post Office Bank Enforcement Look up DCA Mail House Tag distributor Interoperability Customer Service System SMS/e-mail ALC TSMC ALC ALC TSMC ALC ALC Tolling System Architecture for ConnectEast’s new EastLink Road
Copyright © Queensland Motorways 2008
Usage Detection Usage Detection Usage Detection Usage Detection Usage Detection Usage Detection Usage detection is linked to the asset. Usage Evidence Management System Management Usage Reconstruction & Rating Back Office System Enforcement System Interoperability System Web IVR SMS Customer Channels Bank POS DCA MH Services Other asset operators Legal system COTS Product “ Purpose Built” Product POS – Point of Sale e.g. Post Office DCA – Debt Collection Agency MH – Mailing House IVR – Interactive Voice Recognition SMS – Short Message Service (phone) CSIU Basic System Architecture © Rupert Brown 2008 External (world) interface TS TS – Token Supplier(s)         Interface numbering
Conclusions ,[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Rupert Brown, ETTM, ConnectEast ,[object Object]

More Related Content

What's hot

The Evolution of Mobile Money: Retail, the next frontier
The Evolution of Mobile Money: Retail, the next frontierThe Evolution of Mobile Money: Retail, the next frontier
The Evolution of Mobile Money: Retail, the next frontier
Isabelle Berner
 
Payment industry trends and opportunity
Payment industry trends and opportunityPayment industry trends and opportunity
Payment industry trends and opportunity
Debasis Chakraborty
 
A proposed cloud-based billers hub using secured e-payments system
A proposed cloud-based billers hub using secured e-payments systemA proposed cloud-based billers hub using secured e-payments system
A proposed cloud-based billers hub using secured e-payments system
TELKOMNIKA JOURNAL
 
Epay
EpayEpay
Session 2.2 - Integrated Transport
Session 2.2 - Integrated TransportSession 2.2 - Integrated Transport
Session 2.2 - Integrated Transport
WRI Ross Center for Sustainable Cities
 
Mobile POS Case Study
Mobile POS Case Study Mobile POS Case Study
Mobile POS Case Study
Handpoint mobile POS
 
Mobile Money: Banks & Telcos, who’s the Boss?
Mobile Money: Banks & Telcos, who’s the Boss?Mobile Money: Banks & Telcos, who’s the Boss?
Mobile Money: Banks & Telcos, who’s the Boss?
Isabelle Berner
 
Banking technology
Banking technologyBanking technology
Banking technology
Vinay Chaithanya
 
2.2. SMART CITY - wip visa opportunities in government payments _da nang smar...
2.2. SMART CITY - wip visa opportunities in government payments _da nang smar...2.2. SMART CITY - wip visa opportunities in government payments _da nang smar...
2.2. SMART CITY - wip visa opportunities in government payments _da nang smar...
Chuong Nguyen
 
Kiosk banking
Kiosk bankingKiosk banking
Kiosk banking
Dharmik
 
Digital Payments
Digital PaymentsDigital Payments
Digital Payments
Shivam Saxena
 
Mobile Money Transfer (MMT)
Mobile Money Transfer (MMT)Mobile Money Transfer (MMT)
Mobile Money Transfer (MMT)
Sadat Faruque
 
E-Banking presentation
E-Banking presentationE-Banking presentation
E-Banking presentation
venkatesanrajalakshm
 
Corepdsfinal
CorepdsfinalCorepdsfinal
Corepdsfinal
Manish Kochar
 
Mobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanMobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in Japan
Gerhard Fasol
 
TNS Trends in the Payments Value Chain
TNS Trends in the Payments Value ChainTNS Trends in the Payments Value Chain
TNS Trends in the Payments Value Chain
TNSIMarketing
 
Preparing the Legal Framework for Mobile and Other Emerging Payments
Preparing the Legal Framework for Mobile and Other Emerging Payments Preparing the Legal Framework for Mobile and Other Emerging Payments
Preparing the Legal Framework for Mobile and Other Emerging Payments
Now Dentons
 
Cash Less Society- Digital Payments
Cash Less Society- Digital PaymentsCash Less Society- Digital Payments
Cash Less Society- Digital Payments
mahajanmanu
 
Mobile Financial Services
Mobile Financial ServicesMobile Financial Services
Mobile Financial Services
Chris Skinner
 
IRJET- Smart Toll and Penalty Collection System
IRJET- Smart Toll and Penalty Collection SystemIRJET- Smart Toll and Penalty Collection System
IRJET- Smart Toll and Penalty Collection System
IRJET Journal
 

What's hot (20)

The Evolution of Mobile Money: Retail, the next frontier
The Evolution of Mobile Money: Retail, the next frontierThe Evolution of Mobile Money: Retail, the next frontier
The Evolution of Mobile Money: Retail, the next frontier
 
Payment industry trends and opportunity
Payment industry trends and opportunityPayment industry trends and opportunity
Payment industry trends and opportunity
 
A proposed cloud-based billers hub using secured e-payments system
A proposed cloud-based billers hub using secured e-payments systemA proposed cloud-based billers hub using secured e-payments system
A proposed cloud-based billers hub using secured e-payments system
 
Epay
EpayEpay
Epay
 
Session 2.2 - Integrated Transport
Session 2.2 - Integrated TransportSession 2.2 - Integrated Transport
Session 2.2 - Integrated Transport
 
Mobile POS Case Study
Mobile POS Case Study Mobile POS Case Study
Mobile POS Case Study
 
Mobile Money: Banks & Telcos, who’s the Boss?
Mobile Money: Banks & Telcos, who’s the Boss?Mobile Money: Banks & Telcos, who’s the Boss?
Mobile Money: Banks & Telcos, who’s the Boss?
 
Banking technology
Banking technologyBanking technology
Banking technology
 
2.2. SMART CITY - wip visa opportunities in government payments _da nang smar...
2.2. SMART CITY - wip visa opportunities in government payments _da nang smar...2.2. SMART CITY - wip visa opportunities in government payments _da nang smar...
2.2. SMART CITY - wip visa opportunities in government payments _da nang smar...
 
Kiosk banking
Kiosk bankingKiosk banking
Kiosk banking
 
Digital Payments
Digital PaymentsDigital Payments
Digital Payments
 
Mobile Money Transfer (MMT)
Mobile Money Transfer (MMT)Mobile Money Transfer (MMT)
Mobile Money Transfer (MMT)
 
E-Banking presentation
E-Banking presentationE-Banking presentation
E-Banking presentation
 
Corepdsfinal
CorepdsfinalCorepdsfinal
Corepdsfinal
 
Mobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanMobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in Japan
 
TNS Trends in the Payments Value Chain
TNS Trends in the Payments Value ChainTNS Trends in the Payments Value Chain
TNS Trends in the Payments Value Chain
 
Preparing the Legal Framework for Mobile and Other Emerging Payments
Preparing the Legal Framework for Mobile and Other Emerging Payments Preparing the Legal Framework for Mobile and Other Emerging Payments
Preparing the Legal Framework for Mobile and Other Emerging Payments
 
Cash Less Society- Digital Payments
Cash Less Society- Digital PaymentsCash Less Society- Digital Payments
Cash Less Society- Digital Payments
 
Mobile Financial Services
Mobile Financial ServicesMobile Financial Services
Mobile Financial Services
 
IRJET- Smart Toll and Penalty Collection System
IRJET- Smart Toll and Penalty Collection SystemIRJET- Smart Toll and Penalty Collection System
IRJET- Smart Toll and Penalty Collection System
 

Similar to Tolling System Architecures RTIC Conference 2008

Tradesbay-Online cashless trading system
Tradesbay-Online cashless trading systemTradesbay-Online cashless trading system
Tradesbay-Online cashless trading system
IRJET Journal
 
Expert IT Consultants | Inventia Technology
Expert IT Consultants | Inventia TechnologyExpert IT Consultants | Inventia Technology
Expert IT Consultants | Inventia Technology
InventiaTechnology1
 
Understanding the East African Aggregator Landscape
Understanding the East African Aggregator LandscapeUnderstanding the East African Aggregator Landscape
Understanding the East African Aggregator Landscape
CGAP
 
LGU ERP Suite
LGU  ERP SuiteLGU  ERP Suite
LGU ERP Suite
ACCENT Trading
 
A05310105
A05310105A05310105
A05310105
IOSR-JEN
 
Storage space CRM & ERP System - KanhaSoft
Storage space CRM & ERP System - KanhaSoftStorage space CRM & ERP System - KanhaSoft
Storage space CRM & ERP System - KanhaSoft
Manoj Bhuva
 
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYSUNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
IRJET Journal
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
Kartik Mehta
 
IT_in_delhi_govt
IT_in_delhi_govtIT_in_delhi_govt
IT_in_delhi_govt
Raavi Agarwal
 
Mr. Paul Chang's presentation at QITCOM 2011
Mr. Paul Chang's presentation at QITCOM 2011Mr. Paul Chang's presentation at QITCOM 2011
Mr. Paul Chang's presentation at QITCOM 2011
QITCOM
 
(Paper) An Endorsement Based Mobile Payment System for a Disaster Area
(Paper) An Endorsement Based Mobile Payment System for a Disaster Area(Paper) An Endorsement Based Mobile Payment System for a Disaster Area
(Paper) An Endorsement Based Mobile Payment System for a Disaster Area
Naoki Shibata
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
Kartik Mehta
 
Active Insight Overview
Active Insight OverviewActive Insight Overview
Active Insight Overview
Mike Telem
 
7. One state One Challan.pptx
7. One state One Challan.pptx7. One state One Challan.pptx
7. One state One Challan.pptx
ashutoshagarwal675385
 
Payment systems
Payment systemsPayment systems
Payment systems
mohitkumar1232001
 
Cork v soft corporate - An Overview
Cork v soft corporate - An OverviewCork v soft corporate - An Overview
Cork v soft corporate - An Overview
Mathangi Vydhianathan
 
Enterprise digital workflows
Enterprise digital workflowsEnterprise digital workflows
Enterprise digital workflows
Zinnov
 
Paper id 2320146
Paper id 2320146Paper id 2320146
Paper id 2320146
IJRAT
 
IRJET - Home Appliance Rental Application
IRJET - Home Appliance Rental ApplicationIRJET - Home Appliance Rental Application
IRJET - Home Appliance Rental Application
IRJET Journal
 
Technology Changing The Face Of Microfinance
Technology Changing The Face Of MicrofinanceTechnology Changing The Face Of Microfinance
Technology Changing The Face Of Microfinance
John Owens
 

Similar to Tolling System Architecures RTIC Conference 2008 (20)

Tradesbay-Online cashless trading system
Tradesbay-Online cashless trading systemTradesbay-Online cashless trading system
Tradesbay-Online cashless trading system
 
Expert IT Consultants | Inventia Technology
Expert IT Consultants | Inventia TechnologyExpert IT Consultants | Inventia Technology
Expert IT Consultants | Inventia Technology
 
Understanding the East African Aggregator Landscape
Understanding the East African Aggregator LandscapeUnderstanding the East African Aggregator Landscape
Understanding the East African Aggregator Landscape
 
LGU ERP Suite
LGU  ERP SuiteLGU  ERP Suite
LGU ERP Suite
 
A05310105
A05310105A05310105
A05310105
 
Storage space CRM & ERP System - KanhaSoft
Storage space CRM & ERP System - KanhaSoftStorage space CRM & ERP System - KanhaSoft
Storage space CRM & ERP System - KanhaSoft
 
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYSUNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
IT_in_delhi_govt
IT_in_delhi_govtIT_in_delhi_govt
IT_in_delhi_govt
 
Mr. Paul Chang's presentation at QITCOM 2011
Mr. Paul Chang's presentation at QITCOM 2011Mr. Paul Chang's presentation at QITCOM 2011
Mr. Paul Chang's presentation at QITCOM 2011
 
(Paper) An Endorsement Based Mobile Payment System for a Disaster Area
(Paper) An Endorsement Based Mobile Payment System for a Disaster Area(Paper) An Endorsement Based Mobile Payment System for a Disaster Area
(Paper) An Endorsement Based Mobile Payment System for a Disaster Area
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Active Insight Overview
Active Insight OverviewActive Insight Overview
Active Insight Overview
 
7. One state One Challan.pptx
7. One state One Challan.pptx7. One state One Challan.pptx
7. One state One Challan.pptx
 
Payment systems
Payment systemsPayment systems
Payment systems
 
Cork v soft corporate - An Overview
Cork v soft corporate - An OverviewCork v soft corporate - An Overview
Cork v soft corporate - An Overview
 
Enterprise digital workflows
Enterprise digital workflowsEnterprise digital workflows
Enterprise digital workflows
 
Paper id 2320146
Paper id 2320146Paper id 2320146
Paper id 2320146
 
IRJET - Home Appliance Rental Application
IRJET - Home Appliance Rental ApplicationIRJET - Home Appliance Rental Application
IRJET - Home Appliance Rental Application
 
Technology Changing The Face Of Microfinance
Technology Changing The Face Of MicrofinanceTechnology Changing The Face Of Microfinance
Technology Changing The Face Of Microfinance
 

Recently uploaded

AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 

Recently uploaded (20)

AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 

Tolling System Architecures RTIC Conference 2008

  • 1. Tolling System Architectures Rupert Brown ETTM, ConnectEast Melbourne, Victoria, Australia
  • 2.
  • 3.
  • 4.
  • 5. Use a method – Soft Systems Methodology Problem situation unstructured Problem situation expressed Root Definition of relevant systems Conceptual models Other systems thinking Formal systems model Real world/Systems world comparison Feasible/Desirable Changes Actions to Improve Real World Systems World SE Architecture Rich Picture CATWOE
  • 6. Street parking Car parks Congestion charging Bridges Roads Tunnels Railways Airports Sea Ports Types of Infrastructure Tolling Types of Application Public Transport Ticketing DSRC Tags Phones GNSS Constellation Smart Cards GPS OBU Video Gantries Technical Elements Picture Enforcement Each infrastructure type has its own best way of being funded and generating revenue. Technology has to be appropriate for the application and cost. RFID Tags The nature of the asset, technology and the business case drives the form of the solution. Get the people who use the asset but don’t pay – no arrangement. ? Interoperability Other infrastructure operators Do we have a clearing house? Our customers accessing all our channels Our bank Calculate how much users have to pay. Recover money from bad customers Interoperability agreements. Shareholders want their cut of money Charge that to our customer’s account. Usage event information, Information to identify the user, Evidence of use, Government Authorities who control the concessions and have audit powers. Who is this? Do they have an arrangement with us, or somebody else? We send you – a device, tag maybe, A statement/invoice, on a regular basis, Information we think you’ll want. You send us money. Customers We exchange customer information, Information on our customer’s usage, The money that we owe each other. Manage all our money. Money to/from the bank. Payday for shareholders. Money for the Government Mobile monitoring Recover money owed to us. Use the courts if necessary. Process and confirm pictures HOT LANE Rich Picture of a Charging System for Infrastructure Usage (CSIU) To show, in an unstructured way, most of the significant elements that come into play when thinking about developing a charging system for infrastructure usage. Rupert Brown 2007 Infrared [Stage 2 – “Problem situation expressed” from the SSM]
  • 7.
  • 8. Street parking Car parks Congestion charging Bridges Roads Tunnels Railways Airports Sea Ports Types of Infrastructure Tolling Types of Application Public Transport Ticketing DSRC Tags Phones GNSS Constellation Smart Cards GPS OBU Video Gantries Technical Elements Picture Enforcement Each infrastructure type has its own best way of being funded and generating revenue. Technology has to be appropriate for the application and cost. RFID Tags The nature of the asset, technology and the business case drives the form of the solution. Get the people who use the asset but don’t pay – no arrangement. ? Interoperability Other infrastructure operators Do we have a clearing house? Our customers accessing all our channels Our bank Calculate how much users have to pay. Recover money from bad customers Interoperability agreements. Shareholders want their cut of money Charge that to our customer’s account. Usage event information, Information to identify the user, Evidence of use, Government Authorities who control the concessions and have audit powers. Who is this? Do they have an arrangement with us, or somebody else? We send you – a device, tag maybe, A statement/invoice, on a regular basis, Information we think you’ll want. You send us money. Customers We exchange customer information, Information on our customer’s usage, The money that we owe each other. Manage all our money. Money to/from the bank. Payday for shareholders. Money for the Government Mobile monitoring Recover money owed to us. Use the courts if necessary. Process and confirm pictures HOT LANE Rupert Brown 2007 Infrared Detecting usage of the asset Reconstructing how the asset was used Calculating a charge for the asset’s use Identifying who to charge for the asset usage Exchanging data and money with other asset operators Servicing the needs of our customers Getting money from our customers Enforcing the need to pay to use the asset Collecting money owed Managing the money Managing the CSIU systems Using the Rich Picture to draw out the main functional elements of CSIU The start of the process to bring structure to the mass of unstructured elements within the Rich Picture. Gathering evidence of use
  • 9. Detecting usage of the asset Reconstructing how the asset was used Calculating a charge for the asset’s use Identifying who to charge for the asset usage Exchanging data and money with other asset operators Servicing the needs of our customers Getting money from our customers Enforcing the need to pay to use the asset Collecting money owed Managing the money Managing the CSIU systems Gathering evidence of use Street parking Car parks Congestion charging Bridges Roads Tunnels Railways Airports Sea Ports Types of Infrastructure Tolling Types of Application Public Transport Ticketing DSRC Tags Phones GNSS Constellation Smart Cards GPS OBU Video Gantries Technical Elements Picture Enforcement Each infrastructure type has its own best way of being funded and generating revenue. Technology has to be appropriate for the application and cost. RFID Tags The nature of the asset, technology and the business case drives the form of the solution. Get the people who use the asset but don’t pay – no arrangement. ? Interoperability Other infrastructure operators Do we have a clearing house? Our customers accessing all our channels Our bank Calculate how much users have to pay. Recover money from bad customers Interoperability agreements. Shareholders want their cut of money Charge that to our customer’s account. Usage event information, Information to identify the user, Evidence of use, Government Authorities who control the concessions and have audit powers. Who is this? Do they have an arrangement with us, or somebody else? We send you – a device, tag maybe, A statement/invoice, on a regular basis, Information we think you’ll want. You send us money. Customers We exchange customer information, Information on our customer’s usage, The money that we owe each other. Manage all our money. Money to/from the bank. Payday for shareholders. Money for the Government Mobile monitoring Recover money owed to us. Use the courts if necessary. Process and confirm pictures HOT LANE Rupert Brown 2007 Infrared Using the Rich Picture to draw out the main functional elements of CSIU The start of the process to bring structure to the mass of unstructured elements within the Rich Picture.
  • 10. Detecting usage of the asset Reconstructing how the asset was used Calculating a charge for the asset’s use Identifying who to charge for the asset usage Exchanging data and money with other asset operators Servicing the needs of our customers Getting money from our customers Enforcing the need to pay to use the asset Collecting money owed Managing the money Managing the CSIU systems Gathering evidence of use Asset Usage Detection FA Function: to detect and gather identifying token data on people using the asset. Tied to the asset. Manage the CSIU System FA Function: to monitor, manage and maintain the CSIU System. Management Commands Status Reports Asset Usage Reconstruction FA Function: to reconstruct, based on the detected usage, a complete usage event. Interoperable Arrangements to Pay FA Function: to manage the exchange of information and money with other asset operators so as to enable people with arrangements to pay to use our asset and vice versa. Other asset operators. Asset Usage Rating FA Function: to determine how a complete usage event should be rated, i.e. the charge for use. Evidence of use Gathering FA Function: to gather evidence that the asset was used at a determined date and time. Usage & Token Correlation FA Function: to associate rated user events with the tokens that will allow the asset user to be identified. Pay for Usage Enforcement FA Function: to manage the collection of money from people who have used the asset but not made arrangements to pay. Channels to our “ would be” customers. Serving our Customers FA Function: to keep up to date all the information we need on people with arrangements to pay and respond to other queries. Channels to our Customers. Corporate Money Management FA Function: to manage all the money coming in to and going out from the CSIU. Interface with Banks, Financial Institutions, Government and individuals. Debt Collection FA Function: to manage the collection of money from people who have used the asset and have made arrangements to pay, but for whatever reason haven’t. Our Customers. User Charging FA Function: to manage the collection of money from people who have used the asset and have made arrangements to pay, and to hand off for those that haven’t. Identification of CSIU Functional Areas (FA) their basic Descriptions Using the functional elements drawn out from the analysis of the Rich Picture to create a first pass at a system block diagram for the CSIU, including basic data flows. © Rupert Brown 2008 Usage detections Complete usage events Rated usage events Token identification data Evidence of use Rated usage events with token identifiers Details of people with arrangements to pay. Details of usage and other notifications. Details of people with arrangements to pay with other operators, and data on our customers using other assets. Details of people with arrangements to pay with us, and data on other customers using our assets. Request for evidence Œ Œ   Ž Ž     Information identifying our customers who are not paying the money they owe us. Outcome of a debt recovery process. Financial reconciliation information. Financial reconciliation information. [FA – Functional Area] Usage detections
  • 11. Asset Usage Detection FA Function: to detect and gather identifying token data on people using the asset. Tied to the asset. Manage the CSIU System FA Function: to monitor, manage and maintain the CSIU System. Management Commands Status Reports Asset Usage Reconstruction FA Function: to reconstruct, based on the detected usage, a complete usage event. Interoperable Arrangements to Pay FA Function: to manage the exchange of information and money with other asset operators so as to enable people with arrangements to pay to use our asset and vice versa. Other asset operators. Asset Usage Rating FA Function: to determine how a complete usage event should be rated, i.e. the charge for use. Evidence of use Gathering FA Function: to gather evidence that the asset was used at a determined date and time. Usage & Token Correlation FA Function: to associate rated user events with the tokens that will allow the asset user to be identified. Pay for Usage Enforcement FA Function: to manage the collection of money from people who have used the asset but not made arrangements to pay. Channels to our “ would be” customers. Serving our Customers FA Function: to keep up to date all the information we need on people with arrangements to pay and respond to other queries. Channels to our Customers. Corporate Money Management FA Function: to manage all the money coming in to and going out from the CSIU. Interface with Banks, Financial Institutions, Government and individuals. Debt Collection FA Function: to manage the collection of money from people who have used the asset and have made arrangements to pay, but for whatever reason haven’t. Our Customers. User Charging FA Function: to manage the collection of money from people who have used the asset and have made arrangements to pay, and to hand off for those that haven’t. Identification of CSIU Functional Areas (FA) their basic Descriptions Using the functional elements drawn out from the analysis of the Rich Picture to create a first pass at a system block diagram for the CSIU, including basic data flows. © Rupert Brown 2008 Usage detections Complete usage events Rated usage events Token identification data Evidence of use Rated usage events with token identifiers Details of people with arrangements to pay. Details of usage and other notifications. Details of people with arrangements to pay with other operators, and data on our customers using other assets. Details of people with arrangements to pay with us, and data on other customers using our assets. Request for evidence Œ Œ   Ž Ž     Information identifying our customers who are not paying the money they owe us. Outcome of a debt recovery process. Financial reconciliation information. Financial reconciliation information. [FA – Functional Area] Usage detections Manage the CSIU System FA Monitor system component health Report system alerts, alarms and failures Maintain service schedules and histories Maintain technical information Maintain warranty, licence and service organisation details Asset Usage Detection FA Manage detection and access systems Manage detection events in time and space Capture detection event record (video, TRX, biometrics) Manage real time authorisation/ access request Evidence of use Gathering FA Convert detection event records into machine readable form Identify tokens from event records Correlate & consolidate multiple records into single compound record Encapsulate and encrypt compound record data in repository Manage the record repository Asset Usage Reconstruction FA Maintain the detection system (asset) topology Maintain the timeliness of usage detections Create usage events based on token identifications Adjust usage events Determine user class or characteristics Asset Usage Rating FA Maintain the timeliness of usage events Maintain the set of charging schemes and rate tables Determine and assign the charge to the usage event Adjust charges as the usage event changes Usage & Token Correlation FA Assess tokens and create a token pattern for a usage event Determine “best fit” tokens to apply to the usage event Mark usage event with the “best fit” tokens Add token pattern to the patterns repository Adjust tokens assigned to usage events Pay for Usage Enforcement FA Manage the identification of the asset user Manage the “post use” invoice process Manage statutory declarations Produce the “evidence of use” package Manage the relationship with the civil courts Receipt money User Charging FA Maintain accounts and account hierarchies (arrangements to pay) Allocate usage charges to accounts based on token identification Calculate and apply fees, charges and discounts to accounts Manage adjustments to accounts Manage exempt and un-chargeable usage events Prepare statements and invoices and issue across channels Manage real-time access authorisation requests Manage events with users without arrangements to pay Serving our Customers FA Gather intelligence on and profile our customers Develop new infrastructure access and related services products Sell and cross-sell access and service products Maintain customer account details Manage customer queries, issues and complaints Manage payments, refunds and adjustments Manage information and service levels across all channels Manage ordering of physical token devices Corporate Money Management FA Manage automatic payment arrangements across channels Manage all financial channel transactions Manage the General Ledger Undertake accounts and bank reconciliation Undertake financial reporting Manage all financial audit activities Debt Collection FA Identify debts, review and confirm/ reject debt based on evidence Review debt history and existing collection arrangements Manage and operate in-house debt collection processes Manage outsourced debt collection processes Manage legal processes associated with debt collection Interoperable Arrangements to Pay FA Receive and process “Arrangements to pay” lists Create and send “Arrangements to pay” lists Receive and process rated and identified home usage events Create and send rated and identified FO usage events Manage disputed usage events Development of the CSIU’s functional areas (FA) into a functional architecture Using the functional areas (FA) as the basis, this diagram develops the concept to produce a basic functional architecture for the CSIU. © Rupert Brown 2008 Token Logistics FA Order token devices and manage good inwards Manage warehouse inventories Manage dispatch to customers Manage returns for reissue, repair and retirement
  • 12. Back Office System Usage Detection System Management Usage Evidence Management Usage Reconstruction & Rating Enforcement System Interoperability System Manage the CSIU System FA Monitor system component health Report system alerts, alarms and failures Maintain service schedules and histories Maintain technical information Maintain warranty, licence and service organisation details Asset Usage Detection FA Manage detection and access systems Manage detection events in time and space Capture detection event record (video, TRX, biometrics) Manage real time authorisation/ access request Evidence of use Gathering FA Convert detection event records into machine readable form Identify tokens from event records Correlate & consolidate multiple records into single compound record Encapsulate and encrypt compound record data in repository Manage the record repository Asset Usage Reconstruction FA Maintain the detection system (asset) topology Maintain the timeliness of usage detections Create usage events based on token identifications Adjust usage events Determine user class or characteristics Asset Usage Rating FA Maintain the timeliness of usage events Maintain the set of charging schemes and rate tables Determine and assign the charge to the usage event Adjust charges as the usage event changes Usage & Token Correlation FA Assess tokens and create a token pattern for a usage event Determine “best fit” tokens to apply to the usage event Mark usage event with the “best fit” tokens Add token pattern to the patterns repository Adjust tokens assigned to usage events Pay for Usage Enforcement FA Manage the identification of the asset user Manage the “post use” invoice process Manage statutory declarations Produce the “evidence of use” package Manage the relationship with the civil courts Receipt money User Charging FA Maintain accounts and account hierarchies (arrangements to pay) Allocate usage charges to accounts based on token identification Calculate and apply fees, charges and discounts to accounts Manage adjustments to accounts Manage exempt and un-chargeable usage events Prepare statements and invoices and issue across channels Manage real-time access authorisation requests Manage events with users without arrangements to pay Serving our Customers FA Gather intelligence on and profile our customers Develop new infrastructure access and related services products Sell and cross-sell access and service products Maintain customer account details Manage customer queries, issues and complaints Manage payments, refunds and adjustments Manage information and service levels across all channels Manage ordering of physical token devices Corporate Money Management FA Manage automatic payment arrangements across channels Manage all financial channel transactions Manage the General Ledger Undertake accounts and bank reconciliation Undertake financial reporting Manage all financial audit activities Debt Collection FA Identify debts, review and confirm/ reject debt based on evidence Review debt history and existing collection arrangements Manage and operate in-house debt collection processes Manage outsourced debt collection processes Manage legal processes associated with debt collection Interoperable Arrangements to Pay FA Receive and process “Arrangements to pay” lists Create and send “Arrangements to pay” lists Receive and process rated and identified home usage events Create and send rated and identified FO usage events Manage disputed usage events Development of the CSIU’s functional areas (FA) into a functional architecture Using the functional areas (FA) as the basis, this diagram develops the concept to produce a basic functional architecture for the CSIU. © Rupert Brown 2008 Token Logistics FA Order token devices and manage good inwards Manage warehouse inventories Manage dispatch to customers Manage returns for reissue, repair and retirement Allocation of the functional architecture to create the system architecture Using the functional architecture as the basis, this diagram applies the COTS vs “purpose build” test to derive system architecture components. © Rupert Brown 2008 COTS Purpose built
  • 13. Back Office System Usage Detection System Management Usage Evidence Management Usage Reconstruction & Rating Enforcement System Interoperability System System Management Usage Evidence Management Usage Reconstruction & Rating Back Office System Enforcement System Interoperability System Usage Detection Usage Detection Usage Detection Usage Detection Usage Detection Usage Detection Usage detection is linked to the asset. Web IVR SMS Customer Channels Bank POS DCA MH Services Other asset operators Legal system COTS Product “ Purpose Built” Product POS – Point of Sale e.g. Post Office DCA – Debt Collection Agency MH – Mailing House IVR – Interactive Voice Recognition SMS – Short Message Service (phone) CSIU Basic System Architecture © Rupert Brown 2008 External (world) interface TS TS – Token Supplier(s)         Interface numbering
  • 14.
  • 15.
  • 16.  
  • 17. XCH CRM Financials Data Warehouse Toll Operating System TSMC ALC IVR EFTPOS Web Post Office Bank Enforcement Look up DCA Mail House Tag distributor Interoperability Customer Service System SMS/e-mail ALC TSMC ALC ALC TSMC ALC ALC Tolling System Architecture for ConnectEast’s new EastLink Road
  • 18. Copyright © Queensland Motorways 2008
  • 19. Usage Detection Usage Detection Usage Detection Usage Detection Usage Detection Usage Detection Usage detection is linked to the asset. Usage Evidence Management System Management Usage Reconstruction & Rating Back Office System Enforcement System Interoperability System Web IVR SMS Customer Channels Bank POS DCA MH Services Other asset operators Legal system COTS Product “ Purpose Built” Product POS – Point of Sale e.g. Post Office DCA – Debt Collection Agency MH – Mailing House IVR – Interactive Voice Recognition SMS – Short Message Service (phone) CSIU Basic System Architecture © Rupert Brown 2008 External (world) interface TS TS – Token Supplier(s)         Interface numbering
  • 20.
  • 21.
  • 22.