SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Tolling System Architectures Rupert Brown ETTM, ConnectEast Melbourne, Victoria, Australia
Introduction ,[object Object]
Changing relationships, environment ,[object Object],[object Object],[object Object],[object Object],Charging System for Infrastructure Usage CSIU
Architecture development ,[object Object]
Use a method – Soft Systems Methodology Problem situation unstructured Problem situation expressed Root Definition of relevant systems Conceptual models Other systems thinking Formal systems model Real world/Systems world comparison Feasible/Desirable Changes Actions to Improve Real World Systems World SE Architecture Rich Picture CATWOE
Street parking Car parks Congestion charging Bridges Roads Tunnels Railways Airports Sea Ports Types of Infrastructure Tolling Types of Application Public Transport Ticketing DSRC Tags Phones GNSS Constellation Smart Cards GPS OBU Video Gantries Technical Elements Picture Enforcement Each infrastructure type has its own best way of being funded and generating revenue. Technology has to be appropriate for the application and cost. RFID Tags The nature of the asset, technology and the business case drives the form of the solution. Get the people who use the asset but don’t pay – no arrangement. ? Interoperability Other infrastructure operators Do we have a clearing house? Our customers accessing all our channels Our bank Calculate how much users have to pay. Recover money from bad customers Interoperability agreements. Shareholders want their cut of money Charge that to our customer’s account. Usage event information, Information to identify the user, Evidence of use, Government Authorities who control the concessions and have audit powers. Who is this? Do they have an arrangement with us, or somebody else? We send you – a device, tag maybe, A statement/invoice, on a regular basis, Information we think you’ll want. You send us money. Customers We exchange customer information, Information on our customer’s usage, The money that we owe each other. Manage all our money. Money to/from the bank. Payday for shareholders. Money for the Government Mobile monitoring Recover money owed to us. Use the courts if necessary. Process and confirm pictures HOT LANE Rich Picture of a Charging System for Infrastructure Usage (CSIU) To show, in an unstructured way, most of the significant elements that come into play when thinking about developing a charging system for infrastructure usage. Rupert Brown 2007 Infrared [Stage 2 – “Problem situation expressed” from the SSM]
CSIU Root Definition ,[object Object],[object Object]
Street parking Car parks Congestion charging Bridges Roads Tunnels Railways Airports Sea Ports Types of Infrastructure Tolling Types of Application Public Transport Ticketing DSRC Tags Phones GNSS Constellation Smart Cards GPS OBU Video Gantries Technical Elements Picture Enforcement Each infrastructure type has its own best way of being funded and generating revenue. Technology has to be appropriate for the application and cost. RFID Tags The nature of the asset, technology and the business case drives the form of the solution. Get the people who use the asset but don’t pay – no arrangement. ? Interoperability Other infrastructure operators Do we have a clearing house? Our customers accessing all our channels Our bank Calculate how much users have to pay. Recover money from bad customers Interoperability agreements. Shareholders want their cut of money Charge that to our customer’s account. Usage event information, Information to identify the user, Evidence of use, Government Authorities who control the concessions and have audit powers. Who is this? Do they have an arrangement with us, or somebody else? We send you – a device, tag maybe, A statement/invoice, on a regular basis, Information we think you’ll want. You send us money. Customers We exchange customer information, Information on our customer’s usage, The money that we owe each other. Manage all our money. Money to/from the bank. Payday for shareholders. Money for the Government Mobile monitoring Recover money owed to us. Use the courts if necessary. Process and confirm pictures HOT LANE Rupert Brown 2007 Infrared Detecting usage of the asset Reconstructing how the asset was used Calculating a charge for the asset’s use Identifying who to charge for the asset usage Exchanging data and money with other asset operators Servicing the needs of our customers Getting money from our customers Enforcing the need to pay to use the asset Collecting money owed Managing the money Managing the CSIU systems Using the Rich Picture to draw out the main functional elements of CSIU The start of the process to bring structure to the mass of unstructured elements within the Rich Picture. Gathering evidence of use
Detecting usage of the asset Reconstructing how the asset was used Calculating a charge for the asset’s use Identifying who to charge for the asset usage Exchanging data and money with other asset operators Servicing the needs of our customers Getting money from our customers Enforcing the need to pay to use the asset Collecting money owed Managing the money Managing the CSIU systems Gathering evidence of use Street parking Car parks Congestion charging Bridges Roads Tunnels Railways Airports Sea Ports Types of Infrastructure Tolling Types of Application Public Transport Ticketing DSRC Tags Phones GNSS Constellation Smart Cards GPS OBU Video Gantries Technical Elements Picture Enforcement Each infrastructure type has its own best way of being funded and generating revenue. Technology has to be appropriate for the application and cost. RFID Tags The nature of the asset, technology and the business case drives the form of the solution. Get the people who use the asset but don’t pay – no arrangement. ? Interoperability Other infrastructure operators Do we have a clearing house? Our customers accessing all our channels Our bank Calculate how much users have to pay. Recover money from bad customers Interoperability agreements. Shareholders want their cut of money Charge that to our customer’s account. Usage event information, Information to identify the user, Evidence of use, Government Authorities who control the concessions and have audit powers. Who is this? Do they have an arrangement with us, or somebody else? We send you – a device, tag maybe, A statement/invoice, on a regular basis, Information we think you’ll want. You send us money. Customers We exchange customer information, Information on our customer’s usage, The money that we owe each other. Manage all our money. Money to/from the bank. Payday for shareholders. Money for the Government Mobile monitoring Recover money owed to us. Use the courts if necessary. Process and confirm pictures HOT LANE Rupert Brown 2007 Infrared Using the Rich Picture to draw out the main functional elements of CSIU The start of the process to bring structure to the mass of unstructured elements within the Rich Picture.
Detecting usage of the asset Reconstructing how the asset was used Calculating a charge for the asset’s use Identifying who to charge for the asset usage Exchanging data and money with other asset operators Servicing the needs of our customers Getting money from our customers Enforcing the need to pay to use the asset Collecting money owed Managing the money Managing the CSIU systems Gathering evidence of use Asset Usage Detection FA Function: to detect and gather identifying token data on people using the asset. Tied to the asset. Manage the CSIU System FA Function: to monitor, manage and maintain the CSIU System. Management Commands Status Reports Asset Usage Reconstruction FA Function: to reconstruct, based on the detected usage, a complete usage event. Interoperable Arrangements to Pay FA Function: to manage the exchange of information and money with other asset operators so as to enable people with arrangements to pay to use our asset and vice versa.  Other asset operators. Asset Usage Rating FA Function: to determine how a complete usage event should be rated, i.e. the charge for use. Evidence of use Gathering FA Function: to gather evidence that the asset was used at a determined date and time. Usage & Token Correlation FA Function: to associate rated user events with the tokens that will allow the asset user to be identified. Pay for Usage Enforcement FA Function: to manage the collection of money from people who have used the asset but not made arrangements to pay. Channels to our “ would be” customers. Serving our Customers FA Function: to keep up to date all the information we need on people with arrangements to pay and respond to other queries. Channels to our Customers. Corporate Money Management FA Function: to manage all the money coming in to  and going out from the CSIU. Interface with Banks, Financial Institutions, Government and individuals. Debt Collection FA Function: to manage the collection of money from people who have used the asset and have made arrangements to pay, but for whatever reason haven’t. Our Customers. User Charging FA Function: to manage the collection of money from people who have used the asset and have made arrangements to pay, and to hand off for those that haven’t. Identification of CSIU Functional Areas (FA) their basic Descriptions Using the functional elements drawn out from the analysis of the Rich Picture to create a first pass at a system block diagram for the CSIU, including basic data flows. © Rupert Brown 2008 Usage detections Complete usage events Rated usage events Token identification data Evidence of use Rated usage events with token identifiers Details of people with arrangements to pay. Details of usage and other notifications. Details of people with arrangements to pay with other operators, and data on our customers using other assets.  Details of people with arrangements to pay with us, and data on other customers using our assets.  Request for evidence Œ Œ   Ž Ž     Information identifying our customers who are not paying the money they owe us. Outcome of a debt recovery process. Financial reconciliation information. Financial reconciliation information. [FA – Functional Area] Usage detections
Asset Usage Detection FA Function: to detect and gather identifying token data on people using the asset. Tied to the asset. Manage the CSIU System FA Function: to monitor, manage and maintain the CSIU System. Management Commands Status Reports Asset Usage Reconstruction FA Function: to reconstruct, based on the detected usage, a complete usage event. Interoperable Arrangements to Pay FA Function: to manage the exchange of information and money with other asset operators so as to enable people with arrangements to pay to use our asset and vice versa.  Other asset operators. Asset Usage Rating FA Function: to determine how a complete usage event should be rated, i.e. the charge for use. Evidence of use Gathering FA Function: to gather evidence that the asset was used at a determined date and time. Usage & Token Correlation FA Function: to associate rated user events with the tokens that will allow the asset user to be identified. Pay for Usage Enforcement FA Function: to manage the collection of money from people who have used the asset but not made arrangements to pay. Channels to our “ would be” customers. Serving our Customers FA Function: to keep up to date all the information we need on people with arrangements to pay and respond to other queries. Channels to our Customers. Corporate Money Management FA Function: to manage all the money coming in to  and going out from the CSIU. Interface with Banks, Financial Institutions, Government and individuals. Debt Collection FA Function: to manage the collection of money from people who have used the asset and have made arrangements to pay, but for whatever reason haven’t. Our Customers. User Charging FA Function: to manage the collection of money from people who have used the asset and have made arrangements to pay, and to hand off for those that haven’t. Identification of CSIU Functional Areas (FA) their basic Descriptions Using the functional elements drawn out from the analysis of the Rich Picture to create a first pass at a system block diagram for the CSIU, including basic data flows. © Rupert Brown 2008 Usage detections Complete usage events Rated usage events Token identification data Evidence of use Rated usage events with token identifiers Details of people with arrangements to pay. Details of usage and other notifications. Details of people with arrangements to pay with other operators, and data on our customers using other assets.  Details of people with arrangements to pay with us, and data on other customers using our assets.  Request for evidence Œ Œ   Ž Ž     Information identifying our customers who are not paying the money they owe us. Outcome of a debt recovery process. Financial reconciliation information. Financial reconciliation information. [FA – Functional Area] Usage detections Manage the CSIU System FA Monitor system component health Report system alerts, alarms and failures Maintain service schedules and histories Maintain technical information Maintain warranty, licence and service organisation details Asset Usage Detection FA Manage detection and access systems Manage detection events in time and space Capture detection event record (video, TRX, biometrics) Manage real time authorisation/ access request Evidence of use Gathering FA Convert detection event records into machine readable form Identify tokens from event records Correlate & consolidate multiple records into single compound record Encapsulate and encrypt compound record data in repository Manage the record repository Asset Usage Reconstruction FA Maintain the detection system (asset) topology Maintain the timeliness of usage detections Create usage events based on token identifications Adjust usage events Determine user class or characteristics Asset Usage Rating FA Maintain the timeliness of usage events Maintain the set of charging schemes and rate tables Determine and assign the charge to the usage event  Adjust charges as the usage event changes Usage & Token Correlation FA Assess tokens and create a token pattern for a usage event Determine “best fit” tokens to apply to the usage event Mark usage event with the “best fit” tokens Add token pattern to the patterns repository Adjust tokens assigned to usage events Pay for Usage Enforcement FA Manage the identification of the asset user Manage the “post use” invoice process Manage statutory declarations Produce the “evidence of use” package Manage the relationship with the civil courts Receipt money User Charging FA Maintain accounts and account hierarchies (arrangements to pay) Allocate usage charges to accounts based on token identification Calculate and apply fees, charges and discounts to accounts Manage adjustments to accounts Manage exempt and un-chargeable usage events Prepare statements and invoices and issue across channels Manage real-time access authorisation requests Manage events with users without arrangements to pay Serving our Customers FA Gather intelligence on and profile our customers Develop new infrastructure access and related services products Sell and cross-sell access and service products Maintain customer account details Manage customer queries, issues and complaints Manage payments, refunds and adjustments Manage information and service levels across all channels Manage ordering of physical token devices Corporate Money Management FA Manage automatic payment arrangements across channels Manage all financial channel transactions Manage the General Ledger Undertake accounts and bank reconciliation Undertake financial reporting Manage all financial audit activities Debt Collection FA Identify debts, review and confirm/ reject debt based on evidence Review debt history and existing collection arrangements Manage and operate in-house debt collection processes Manage outsourced debt collection processes Manage legal processes associated with debt collection Interoperable Arrangements to Pay FA Receive and process “Arrangements to pay” lists Create and send “Arrangements to pay” lists Receive and process rated and identified home usage events Create and send rated and identified FO usage events Manage disputed usage events Development of the CSIU’s functional areas (FA) into a functional architecture Using the functional areas (FA) as the basis, this diagram develops the concept to produce a basic functional architecture for the CSIU. © Rupert Brown 2008 Token Logistics FA Order token devices and manage good inwards Manage warehouse inventories Manage dispatch to customers Manage returns for reissue, repair and retirement
Back Office System Usage Detection System Management Usage Evidence Management Usage Reconstruction & Rating Enforcement System Interoperability System Manage the CSIU System FA Monitor system component health Report system alerts, alarms and failures Maintain service schedules and histories Maintain technical information Maintain warranty, licence and service organisation details Asset Usage Detection FA Manage detection and access systems Manage detection events in time and space Capture detection event record (video, TRX, biometrics) Manage real time authorisation/ access request Evidence of use Gathering FA Convert detection event records into machine readable form Identify tokens from event records Correlate & consolidate multiple records into single compound record Encapsulate and encrypt compound record data in repository Manage the record repository Asset Usage Reconstruction FA Maintain the detection system (asset) topology Maintain the timeliness of usage detections Create usage events based on token identifications Adjust usage events Determine user class or characteristics Asset Usage Rating FA Maintain the timeliness of usage events Maintain the set of charging schemes and rate tables Determine and assign the charge to the usage event  Adjust charges as the usage event changes Usage & Token Correlation FA Assess tokens and create a token pattern for a usage event Determine “best fit” tokens to apply to the usage event Mark usage event with the “best fit” tokens Add token pattern to the patterns repository Adjust tokens assigned to usage events Pay for Usage Enforcement FA Manage the identification of the asset user Manage the “post use” invoice process Manage statutory declarations Produce the “evidence of use” package Manage the relationship with the civil courts Receipt money User Charging FA Maintain accounts and account hierarchies (arrangements to pay) Allocate usage charges to accounts based on token identification Calculate and apply fees, charges and discounts to accounts Manage adjustments to accounts Manage exempt and un-chargeable usage events Prepare statements and invoices and issue across channels Manage real-time access authorisation requests Manage events with users without arrangements to pay Serving our Customers FA Gather intelligence on and profile our customers Develop new infrastructure access and related services products Sell and cross-sell access and service products Maintain customer account details Manage customer queries, issues and complaints Manage payments, refunds and adjustments Manage information and service levels across all channels Manage ordering of physical token devices Corporate Money Management FA Manage automatic payment arrangements across channels Manage all financial channel transactions Manage the General Ledger Undertake accounts and bank reconciliation Undertake financial reporting Manage all financial audit activities Debt Collection FA Identify debts, review and confirm/ reject debt based on evidence Review debt history and existing collection arrangements Manage and operate in-house debt collection processes Manage outsourced debt collection processes Manage legal processes associated with debt collection Interoperable Arrangements to Pay FA Receive and process “Arrangements to pay” lists Create and send “Arrangements to pay” lists Receive and process rated and identified home usage events Create and send rated and identified FO usage events Manage disputed usage events Development of the CSIU’s functional areas (FA) into a functional architecture Using the functional areas (FA) as the basis, this diagram develops the concept to produce a basic functional architecture for the CSIU. © Rupert Brown 2008 Token Logistics FA Order token devices and manage good inwards Manage warehouse inventories Manage dispatch to customers Manage returns for reissue, repair and retirement Allocation of the functional architecture to create the system architecture Using the functional architecture as the basis, this diagram applies the COTS vs “purpose build” test to derive system architecture components. © Rupert Brown 2008 COTS Purpose built
Back Office System Usage Detection System Management Usage Evidence Management Usage Reconstruction & Rating Enforcement System Interoperability System System Management Usage Evidence Management Usage Reconstruction & Rating Back Office System Enforcement System Interoperability System Usage Detection Usage Detection Usage Detection Usage Detection Usage Detection Usage Detection Usage detection is linked to the asset. Web IVR SMS Customer Channels Bank POS DCA MH Services Other asset operators Legal system COTS Product “ Purpose Built” Product POS – Point of Sale e.g. Post Office DCA – Debt Collection Agency MH – Mailing House IVR – Interactive Voice Recognition SMS – Short Message Service (phone) CSIU Basic System Architecture © Rupert Brown 2008 External (world) interface TS TS – Token Supplier(s)         Interface numbering
Questions ,[object Object],[object Object],[object Object],[object Object]
Comparisons ,[object Object],[object Object],[object Object]
 
XCH CRM Financials Data Warehouse Toll Operating System TSMC ALC IVR EFTPOS Web Post Office Bank Enforcement Look up DCA Mail House Tag distributor Interoperability Customer Service System SMS/e-mail ALC TSMC ALC ALC TSMC ALC ALC Tolling System Architecture for ConnectEast’s new EastLink Road
Copyright © Queensland Motorways 2008
Usage Detection Usage Detection Usage Detection Usage Detection Usage Detection Usage Detection Usage detection is linked to the asset. Usage Evidence Management System Management Usage Reconstruction & Rating Back Office System Enforcement System Interoperability System Web IVR SMS Customer Channels Bank POS DCA MH Services Other asset operators Legal system COTS Product “ Purpose Built” Product POS – Point of Sale e.g. Post Office DCA – Debt Collection Agency MH – Mailing House IVR – Interactive Voice Recognition SMS – Short Message Service (phone) CSIU Basic System Architecture © Rupert Brown 2008 External (world) interface TS TS – Token Supplier(s)         Interface numbering
Conclusions ,[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Rupert Brown, ETTM, ConnectEast ,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

The Evolution of Mobile Money: Retail, the next frontier
The Evolution of Mobile Money: Retail, the next frontierThe Evolution of Mobile Money: Retail, the next frontier
The Evolution of Mobile Money: Retail, the next frontierIsabelle Berner
 
Payment industry trends and opportunity
Payment industry trends and opportunityPayment industry trends and opportunity
Payment industry trends and opportunityDebasis Chakraborty
 
A proposed cloud-based billers hub using secured e-payments system
A proposed cloud-based billers hub using secured e-payments systemA proposed cloud-based billers hub using secured e-payments system
A proposed cloud-based billers hub using secured e-payments systemTELKOMNIKA JOURNAL
 
Mobile Money: Banks & Telcos, who’s the Boss?
Mobile Money: Banks & Telcos, who’s the Boss?Mobile Money: Banks & Telcos, who’s the Boss?
Mobile Money: Banks & Telcos, who’s the Boss?Isabelle Berner
 
2.2. SMART CITY - wip visa opportunities in government payments _da nang smar...
2.2. SMART CITY - wip visa opportunities in government payments _da nang smar...2.2. SMART CITY - wip visa opportunities in government payments _da nang smar...
2.2. SMART CITY - wip visa opportunities in government payments _da nang smar...Chuong Nguyen
 
Kiosk banking
Kiosk bankingKiosk banking
Kiosk bankingDharmik
 
Mobile Money Transfer (MMT)
Mobile Money Transfer (MMT)Mobile Money Transfer (MMT)
Mobile Money Transfer (MMT)Sadat Faruque
 
Mobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanMobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanGerhard Fasol
 
TNS Trends in the Payments Value Chain
TNS Trends in the Payments Value ChainTNS Trends in the Payments Value Chain
TNS Trends in the Payments Value ChainTNSIMarketing
 
Preparing the Legal Framework for Mobile and Other Emerging Payments
Preparing the Legal Framework for Mobile and Other Emerging Payments Preparing the Legal Framework for Mobile and Other Emerging Payments
Preparing the Legal Framework for Mobile and Other Emerging Payments Now Dentons
 
Cash Less Society- Digital Payments
Cash Less Society- Digital PaymentsCash Less Society- Digital Payments
Cash Less Society- Digital Paymentsmahajanmanu
 
Mobile Financial Services
Mobile Financial ServicesMobile Financial Services
Mobile Financial ServicesChris Skinner
 
IRJET- Smart Toll and Penalty Collection System
IRJET- Smart Toll and Penalty Collection SystemIRJET- Smart Toll and Penalty Collection System
IRJET- Smart Toll and Penalty Collection SystemIRJET Journal
 

Was ist angesagt? (20)

The Evolution of Mobile Money: Retail, the next frontier
The Evolution of Mobile Money: Retail, the next frontierThe Evolution of Mobile Money: Retail, the next frontier
The Evolution of Mobile Money: Retail, the next frontier
 
Payment industry trends and opportunity
Payment industry trends and opportunityPayment industry trends and opportunity
Payment industry trends and opportunity
 
A proposed cloud-based billers hub using secured e-payments system
A proposed cloud-based billers hub using secured e-payments systemA proposed cloud-based billers hub using secured e-payments system
A proposed cloud-based billers hub using secured e-payments system
 
Epay
EpayEpay
Epay
 
Session 2.2 - Integrated Transport
Session 2.2 - Integrated TransportSession 2.2 - Integrated Transport
Session 2.2 - Integrated Transport
 
Mobile POS Case Study
Mobile POS Case Study Mobile POS Case Study
Mobile POS Case Study
 
Mobile Money: Banks & Telcos, who’s the Boss?
Mobile Money: Banks & Telcos, who’s the Boss?Mobile Money: Banks & Telcos, who’s the Boss?
Mobile Money: Banks & Telcos, who’s the Boss?
 
Banking technology
Banking technologyBanking technology
Banking technology
 
2.2. SMART CITY - wip visa opportunities in government payments _da nang smar...
2.2. SMART CITY - wip visa opportunities in government payments _da nang smar...2.2. SMART CITY - wip visa opportunities in government payments _da nang smar...
2.2. SMART CITY - wip visa opportunities in government payments _da nang smar...
 
Kiosk banking
Kiosk bankingKiosk banking
Kiosk banking
 
Digital Payments
Digital PaymentsDigital Payments
Digital Payments
 
Mobile Money Transfer (MMT)
Mobile Money Transfer (MMT)Mobile Money Transfer (MMT)
Mobile Money Transfer (MMT)
 
E-Banking presentation
E-Banking presentationE-Banking presentation
E-Banking presentation
 
Corepdsfinal
CorepdsfinalCorepdsfinal
Corepdsfinal
 
Mobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanMobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in Japan
 
TNS Trends in the Payments Value Chain
TNS Trends in the Payments Value ChainTNS Trends in the Payments Value Chain
TNS Trends in the Payments Value Chain
 
Preparing the Legal Framework for Mobile and Other Emerging Payments
Preparing the Legal Framework for Mobile and Other Emerging Payments Preparing the Legal Framework for Mobile and Other Emerging Payments
Preparing the Legal Framework for Mobile and Other Emerging Payments
 
Cash Less Society- Digital Payments
Cash Less Society- Digital PaymentsCash Less Society- Digital Payments
Cash Less Society- Digital Payments
 
Mobile Financial Services
Mobile Financial ServicesMobile Financial Services
Mobile Financial Services
 
IRJET- Smart Toll and Penalty Collection System
IRJET- Smart Toll and Penalty Collection SystemIRJET- Smart Toll and Penalty Collection System
IRJET- Smart Toll and Penalty Collection System
 

Ähnlich wie Tolling System Architectures Overview

Tradesbay-Online cashless trading system
Tradesbay-Online cashless trading systemTradesbay-Online cashless trading system
Tradesbay-Online cashless trading systemIRJET Journal
 
Expert IT Consultants | Inventia Technology
Expert IT Consultants | Inventia TechnologyExpert IT Consultants | Inventia Technology
Expert IT Consultants | Inventia TechnologyInventiaTechnology1
 
Understanding the East African Aggregator Landscape
Understanding the East African Aggregator LandscapeUnderstanding the East African Aggregator Landscape
Understanding the East African Aggregator LandscapeCGAP
 
Storage space CRM & ERP System - KanhaSoft
Storage space CRM & ERP System - KanhaSoftStorage space CRM & ERP System - KanhaSoft
Storage space CRM & ERP System - KanhaSoftManoj Bhuva
 
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYSUNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYSIRJET Journal
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingKartik Mehta
 
Mr. Paul Chang's presentation at QITCOM 2011
Mr. Paul Chang's presentation at QITCOM 2011Mr. Paul Chang's presentation at QITCOM 2011
Mr. Paul Chang's presentation at QITCOM 2011QITCOM
 
(Paper) An Endorsement Based Mobile Payment System for a Disaster Area
(Paper) An Endorsement Based Mobile Payment System for a Disaster Area(Paper) An Endorsement Based Mobile Payment System for a Disaster Area
(Paper) An Endorsement Based Mobile Payment System for a Disaster AreaNaoki Shibata
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For AmlKartik Mehta
 
Active Insight Overview
Active Insight OverviewActive Insight Overview
Active Insight OverviewMike Telem
 
Enterprise digital workflows
Enterprise digital workflowsEnterprise digital workflows
Enterprise digital workflowsZinnov
 
Paper id 2320146
Paper id 2320146Paper id 2320146
Paper id 2320146IJRAT
 
IRJET - Home Appliance Rental Application
IRJET - Home Appliance Rental ApplicationIRJET - Home Appliance Rental Application
IRJET - Home Appliance Rental ApplicationIRJET Journal
 
Technology Changing The Face Of Microfinance
Technology Changing The Face Of MicrofinanceTechnology Changing The Face Of Microfinance
Technology Changing The Face Of MicrofinanceJohn Owens
 

Ähnlich wie Tolling System Architectures Overview (20)

Tradesbay-Online cashless trading system
Tradesbay-Online cashless trading systemTradesbay-Online cashless trading system
Tradesbay-Online cashless trading system
 
Expert IT Consultants | Inventia Technology
Expert IT Consultants | Inventia TechnologyExpert IT Consultants | Inventia Technology
Expert IT Consultants | Inventia Technology
 
Understanding the East African Aggregator Landscape
Understanding the East African Aggregator LandscapeUnderstanding the East African Aggregator Landscape
Understanding the East African Aggregator Landscape
 
LGU ERP Suite
LGU  ERP SuiteLGU  ERP Suite
LGU ERP Suite
 
A05310105
A05310105A05310105
A05310105
 
Storage space CRM & ERP System - KanhaSoft
Storage space CRM & ERP System - KanhaSoftStorage space CRM & ERP System - KanhaSoft
Storage space CRM & ERP System - KanhaSoft
 
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYSUNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
IT_in_delhi_govt
IT_in_delhi_govtIT_in_delhi_govt
IT_in_delhi_govt
 
Mr. Paul Chang's presentation at QITCOM 2011
Mr. Paul Chang's presentation at QITCOM 2011Mr. Paul Chang's presentation at QITCOM 2011
Mr. Paul Chang's presentation at QITCOM 2011
 
(Paper) An Endorsement Based Mobile Payment System for a Disaster Area
(Paper) An Endorsement Based Mobile Payment System for a Disaster Area(Paper) An Endorsement Based Mobile Payment System for a Disaster Area
(Paper) An Endorsement Based Mobile Payment System for a Disaster Area
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Active Insight Overview
Active Insight OverviewActive Insight Overview
Active Insight Overview
 
7. One state One Challan.pptx
7. One state One Challan.pptx7. One state One Challan.pptx
7. One state One Challan.pptx
 
Payment systems
Payment systemsPayment systems
Payment systems
 
Cork v soft corporate - An Overview
Cork v soft corporate - An OverviewCork v soft corporate - An Overview
Cork v soft corporate - An Overview
 
Enterprise digital workflows
Enterprise digital workflowsEnterprise digital workflows
Enterprise digital workflows
 
Paper id 2320146
Paper id 2320146Paper id 2320146
Paper id 2320146
 
IRJET - Home Appliance Rental Application
IRJET - Home Appliance Rental ApplicationIRJET - Home Appliance Rental Application
IRJET - Home Appliance Rental Application
 
Technology Changing The Face Of Microfinance
Technology Changing The Face Of MicrofinanceTechnology Changing The Face Of Microfinance
Technology Changing The Face Of Microfinance
 

Kürzlich hochgeladen

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Tolling System Architectures Overview

  • 1. Tolling System Architectures Rupert Brown ETTM, ConnectEast Melbourne, Victoria, Australia
  • 2.
  • 3.
  • 4.
  • 5. Use a method – Soft Systems Methodology Problem situation unstructured Problem situation expressed Root Definition of relevant systems Conceptual models Other systems thinking Formal systems model Real world/Systems world comparison Feasible/Desirable Changes Actions to Improve Real World Systems World SE Architecture Rich Picture CATWOE
  • 6. Street parking Car parks Congestion charging Bridges Roads Tunnels Railways Airports Sea Ports Types of Infrastructure Tolling Types of Application Public Transport Ticketing DSRC Tags Phones GNSS Constellation Smart Cards GPS OBU Video Gantries Technical Elements Picture Enforcement Each infrastructure type has its own best way of being funded and generating revenue. Technology has to be appropriate for the application and cost. RFID Tags The nature of the asset, technology and the business case drives the form of the solution. Get the people who use the asset but don’t pay – no arrangement. ? Interoperability Other infrastructure operators Do we have a clearing house? Our customers accessing all our channels Our bank Calculate how much users have to pay. Recover money from bad customers Interoperability agreements. Shareholders want their cut of money Charge that to our customer’s account. Usage event information, Information to identify the user, Evidence of use, Government Authorities who control the concessions and have audit powers. Who is this? Do they have an arrangement with us, or somebody else? We send you – a device, tag maybe, A statement/invoice, on a regular basis, Information we think you’ll want. You send us money. Customers We exchange customer information, Information on our customer’s usage, The money that we owe each other. Manage all our money. Money to/from the bank. Payday for shareholders. Money for the Government Mobile monitoring Recover money owed to us. Use the courts if necessary. Process and confirm pictures HOT LANE Rich Picture of a Charging System for Infrastructure Usage (CSIU) To show, in an unstructured way, most of the significant elements that come into play when thinking about developing a charging system for infrastructure usage. Rupert Brown 2007 Infrared [Stage 2 – “Problem situation expressed” from the SSM]
  • 7.
  • 8. Street parking Car parks Congestion charging Bridges Roads Tunnels Railways Airports Sea Ports Types of Infrastructure Tolling Types of Application Public Transport Ticketing DSRC Tags Phones GNSS Constellation Smart Cards GPS OBU Video Gantries Technical Elements Picture Enforcement Each infrastructure type has its own best way of being funded and generating revenue. Technology has to be appropriate for the application and cost. RFID Tags The nature of the asset, technology and the business case drives the form of the solution. Get the people who use the asset but don’t pay – no arrangement. ? Interoperability Other infrastructure operators Do we have a clearing house? Our customers accessing all our channels Our bank Calculate how much users have to pay. Recover money from bad customers Interoperability agreements. Shareholders want their cut of money Charge that to our customer’s account. Usage event information, Information to identify the user, Evidence of use, Government Authorities who control the concessions and have audit powers. Who is this? Do they have an arrangement with us, or somebody else? We send you – a device, tag maybe, A statement/invoice, on a regular basis, Information we think you’ll want. You send us money. Customers We exchange customer information, Information on our customer’s usage, The money that we owe each other. Manage all our money. Money to/from the bank. Payday for shareholders. Money for the Government Mobile monitoring Recover money owed to us. Use the courts if necessary. Process and confirm pictures HOT LANE Rupert Brown 2007 Infrared Detecting usage of the asset Reconstructing how the asset was used Calculating a charge for the asset’s use Identifying who to charge for the asset usage Exchanging data and money with other asset operators Servicing the needs of our customers Getting money from our customers Enforcing the need to pay to use the asset Collecting money owed Managing the money Managing the CSIU systems Using the Rich Picture to draw out the main functional elements of CSIU The start of the process to bring structure to the mass of unstructured elements within the Rich Picture. Gathering evidence of use
  • 9. Detecting usage of the asset Reconstructing how the asset was used Calculating a charge for the asset’s use Identifying who to charge for the asset usage Exchanging data and money with other asset operators Servicing the needs of our customers Getting money from our customers Enforcing the need to pay to use the asset Collecting money owed Managing the money Managing the CSIU systems Gathering evidence of use Street parking Car parks Congestion charging Bridges Roads Tunnels Railways Airports Sea Ports Types of Infrastructure Tolling Types of Application Public Transport Ticketing DSRC Tags Phones GNSS Constellation Smart Cards GPS OBU Video Gantries Technical Elements Picture Enforcement Each infrastructure type has its own best way of being funded and generating revenue. Technology has to be appropriate for the application and cost. RFID Tags The nature of the asset, technology and the business case drives the form of the solution. Get the people who use the asset but don’t pay – no arrangement. ? Interoperability Other infrastructure operators Do we have a clearing house? Our customers accessing all our channels Our bank Calculate how much users have to pay. Recover money from bad customers Interoperability agreements. Shareholders want their cut of money Charge that to our customer’s account. Usage event information, Information to identify the user, Evidence of use, Government Authorities who control the concessions and have audit powers. Who is this? Do they have an arrangement with us, or somebody else? We send you – a device, tag maybe, A statement/invoice, on a regular basis, Information we think you’ll want. You send us money. Customers We exchange customer information, Information on our customer’s usage, The money that we owe each other. Manage all our money. Money to/from the bank. Payday for shareholders. Money for the Government Mobile monitoring Recover money owed to us. Use the courts if necessary. Process and confirm pictures HOT LANE Rupert Brown 2007 Infrared Using the Rich Picture to draw out the main functional elements of CSIU The start of the process to bring structure to the mass of unstructured elements within the Rich Picture.
  • 10. Detecting usage of the asset Reconstructing how the asset was used Calculating a charge for the asset’s use Identifying who to charge for the asset usage Exchanging data and money with other asset operators Servicing the needs of our customers Getting money from our customers Enforcing the need to pay to use the asset Collecting money owed Managing the money Managing the CSIU systems Gathering evidence of use Asset Usage Detection FA Function: to detect and gather identifying token data on people using the asset. Tied to the asset. Manage the CSIU System FA Function: to monitor, manage and maintain the CSIU System. Management Commands Status Reports Asset Usage Reconstruction FA Function: to reconstruct, based on the detected usage, a complete usage event. Interoperable Arrangements to Pay FA Function: to manage the exchange of information and money with other asset operators so as to enable people with arrangements to pay to use our asset and vice versa. Other asset operators. Asset Usage Rating FA Function: to determine how a complete usage event should be rated, i.e. the charge for use. Evidence of use Gathering FA Function: to gather evidence that the asset was used at a determined date and time. Usage & Token Correlation FA Function: to associate rated user events with the tokens that will allow the asset user to be identified. Pay for Usage Enforcement FA Function: to manage the collection of money from people who have used the asset but not made arrangements to pay. Channels to our “ would be” customers. Serving our Customers FA Function: to keep up to date all the information we need on people with arrangements to pay and respond to other queries. Channels to our Customers. Corporate Money Management FA Function: to manage all the money coming in to and going out from the CSIU. Interface with Banks, Financial Institutions, Government and individuals. Debt Collection FA Function: to manage the collection of money from people who have used the asset and have made arrangements to pay, but for whatever reason haven’t. Our Customers. User Charging FA Function: to manage the collection of money from people who have used the asset and have made arrangements to pay, and to hand off for those that haven’t. Identification of CSIU Functional Areas (FA) their basic Descriptions Using the functional elements drawn out from the analysis of the Rich Picture to create a first pass at a system block diagram for the CSIU, including basic data flows. © Rupert Brown 2008 Usage detections Complete usage events Rated usage events Token identification data Evidence of use Rated usage events with token identifiers Details of people with arrangements to pay. Details of usage and other notifications. Details of people with arrangements to pay with other operators, and data on our customers using other assets. Details of people with arrangements to pay with us, and data on other customers using our assets. Request for evidence Œ Œ   Ž Ž     Information identifying our customers who are not paying the money they owe us. Outcome of a debt recovery process. Financial reconciliation information. Financial reconciliation information. [FA – Functional Area] Usage detections
  • 11. Asset Usage Detection FA Function: to detect and gather identifying token data on people using the asset. Tied to the asset. Manage the CSIU System FA Function: to monitor, manage and maintain the CSIU System. Management Commands Status Reports Asset Usage Reconstruction FA Function: to reconstruct, based on the detected usage, a complete usage event. Interoperable Arrangements to Pay FA Function: to manage the exchange of information and money with other asset operators so as to enable people with arrangements to pay to use our asset and vice versa. Other asset operators. Asset Usage Rating FA Function: to determine how a complete usage event should be rated, i.e. the charge for use. Evidence of use Gathering FA Function: to gather evidence that the asset was used at a determined date and time. Usage & Token Correlation FA Function: to associate rated user events with the tokens that will allow the asset user to be identified. Pay for Usage Enforcement FA Function: to manage the collection of money from people who have used the asset but not made arrangements to pay. Channels to our “ would be” customers. Serving our Customers FA Function: to keep up to date all the information we need on people with arrangements to pay and respond to other queries. Channels to our Customers. Corporate Money Management FA Function: to manage all the money coming in to and going out from the CSIU. Interface with Banks, Financial Institutions, Government and individuals. Debt Collection FA Function: to manage the collection of money from people who have used the asset and have made arrangements to pay, but for whatever reason haven’t. Our Customers. User Charging FA Function: to manage the collection of money from people who have used the asset and have made arrangements to pay, and to hand off for those that haven’t. Identification of CSIU Functional Areas (FA) their basic Descriptions Using the functional elements drawn out from the analysis of the Rich Picture to create a first pass at a system block diagram for the CSIU, including basic data flows. © Rupert Brown 2008 Usage detections Complete usage events Rated usage events Token identification data Evidence of use Rated usage events with token identifiers Details of people with arrangements to pay. Details of usage and other notifications. Details of people with arrangements to pay with other operators, and data on our customers using other assets. Details of people with arrangements to pay with us, and data on other customers using our assets. Request for evidence Œ Œ   Ž Ž     Information identifying our customers who are not paying the money they owe us. Outcome of a debt recovery process. Financial reconciliation information. Financial reconciliation information. [FA – Functional Area] Usage detections Manage the CSIU System FA Monitor system component health Report system alerts, alarms and failures Maintain service schedules and histories Maintain technical information Maintain warranty, licence and service organisation details Asset Usage Detection FA Manage detection and access systems Manage detection events in time and space Capture detection event record (video, TRX, biometrics) Manage real time authorisation/ access request Evidence of use Gathering FA Convert detection event records into machine readable form Identify tokens from event records Correlate & consolidate multiple records into single compound record Encapsulate and encrypt compound record data in repository Manage the record repository Asset Usage Reconstruction FA Maintain the detection system (asset) topology Maintain the timeliness of usage detections Create usage events based on token identifications Adjust usage events Determine user class or characteristics Asset Usage Rating FA Maintain the timeliness of usage events Maintain the set of charging schemes and rate tables Determine and assign the charge to the usage event Adjust charges as the usage event changes Usage & Token Correlation FA Assess tokens and create a token pattern for a usage event Determine “best fit” tokens to apply to the usage event Mark usage event with the “best fit” tokens Add token pattern to the patterns repository Adjust tokens assigned to usage events Pay for Usage Enforcement FA Manage the identification of the asset user Manage the “post use” invoice process Manage statutory declarations Produce the “evidence of use” package Manage the relationship with the civil courts Receipt money User Charging FA Maintain accounts and account hierarchies (arrangements to pay) Allocate usage charges to accounts based on token identification Calculate and apply fees, charges and discounts to accounts Manage adjustments to accounts Manage exempt and un-chargeable usage events Prepare statements and invoices and issue across channels Manage real-time access authorisation requests Manage events with users without arrangements to pay Serving our Customers FA Gather intelligence on and profile our customers Develop new infrastructure access and related services products Sell and cross-sell access and service products Maintain customer account details Manage customer queries, issues and complaints Manage payments, refunds and adjustments Manage information and service levels across all channels Manage ordering of physical token devices Corporate Money Management FA Manage automatic payment arrangements across channels Manage all financial channel transactions Manage the General Ledger Undertake accounts and bank reconciliation Undertake financial reporting Manage all financial audit activities Debt Collection FA Identify debts, review and confirm/ reject debt based on evidence Review debt history and existing collection arrangements Manage and operate in-house debt collection processes Manage outsourced debt collection processes Manage legal processes associated with debt collection Interoperable Arrangements to Pay FA Receive and process “Arrangements to pay” lists Create and send “Arrangements to pay” lists Receive and process rated and identified home usage events Create and send rated and identified FO usage events Manage disputed usage events Development of the CSIU’s functional areas (FA) into a functional architecture Using the functional areas (FA) as the basis, this diagram develops the concept to produce a basic functional architecture for the CSIU. © Rupert Brown 2008 Token Logistics FA Order token devices and manage good inwards Manage warehouse inventories Manage dispatch to customers Manage returns for reissue, repair and retirement
  • 12. Back Office System Usage Detection System Management Usage Evidence Management Usage Reconstruction & Rating Enforcement System Interoperability System Manage the CSIU System FA Monitor system component health Report system alerts, alarms and failures Maintain service schedules and histories Maintain technical information Maintain warranty, licence and service organisation details Asset Usage Detection FA Manage detection and access systems Manage detection events in time and space Capture detection event record (video, TRX, biometrics) Manage real time authorisation/ access request Evidence of use Gathering FA Convert detection event records into machine readable form Identify tokens from event records Correlate & consolidate multiple records into single compound record Encapsulate and encrypt compound record data in repository Manage the record repository Asset Usage Reconstruction FA Maintain the detection system (asset) topology Maintain the timeliness of usage detections Create usage events based on token identifications Adjust usage events Determine user class or characteristics Asset Usage Rating FA Maintain the timeliness of usage events Maintain the set of charging schemes and rate tables Determine and assign the charge to the usage event Adjust charges as the usage event changes Usage & Token Correlation FA Assess tokens and create a token pattern for a usage event Determine “best fit” tokens to apply to the usage event Mark usage event with the “best fit” tokens Add token pattern to the patterns repository Adjust tokens assigned to usage events Pay for Usage Enforcement FA Manage the identification of the asset user Manage the “post use” invoice process Manage statutory declarations Produce the “evidence of use” package Manage the relationship with the civil courts Receipt money User Charging FA Maintain accounts and account hierarchies (arrangements to pay) Allocate usage charges to accounts based on token identification Calculate and apply fees, charges and discounts to accounts Manage adjustments to accounts Manage exempt and un-chargeable usage events Prepare statements and invoices and issue across channels Manage real-time access authorisation requests Manage events with users without arrangements to pay Serving our Customers FA Gather intelligence on and profile our customers Develop new infrastructure access and related services products Sell and cross-sell access and service products Maintain customer account details Manage customer queries, issues and complaints Manage payments, refunds and adjustments Manage information and service levels across all channels Manage ordering of physical token devices Corporate Money Management FA Manage automatic payment arrangements across channels Manage all financial channel transactions Manage the General Ledger Undertake accounts and bank reconciliation Undertake financial reporting Manage all financial audit activities Debt Collection FA Identify debts, review and confirm/ reject debt based on evidence Review debt history and existing collection arrangements Manage and operate in-house debt collection processes Manage outsourced debt collection processes Manage legal processes associated with debt collection Interoperable Arrangements to Pay FA Receive and process “Arrangements to pay” lists Create and send “Arrangements to pay” lists Receive and process rated and identified home usage events Create and send rated and identified FO usage events Manage disputed usage events Development of the CSIU’s functional areas (FA) into a functional architecture Using the functional areas (FA) as the basis, this diagram develops the concept to produce a basic functional architecture for the CSIU. © Rupert Brown 2008 Token Logistics FA Order token devices and manage good inwards Manage warehouse inventories Manage dispatch to customers Manage returns for reissue, repair and retirement Allocation of the functional architecture to create the system architecture Using the functional architecture as the basis, this diagram applies the COTS vs “purpose build” test to derive system architecture components. © Rupert Brown 2008 COTS Purpose built
  • 13. Back Office System Usage Detection System Management Usage Evidence Management Usage Reconstruction & Rating Enforcement System Interoperability System System Management Usage Evidence Management Usage Reconstruction & Rating Back Office System Enforcement System Interoperability System Usage Detection Usage Detection Usage Detection Usage Detection Usage Detection Usage Detection Usage detection is linked to the asset. Web IVR SMS Customer Channels Bank POS DCA MH Services Other asset operators Legal system COTS Product “ Purpose Built” Product POS – Point of Sale e.g. Post Office DCA – Debt Collection Agency MH – Mailing House IVR – Interactive Voice Recognition SMS – Short Message Service (phone) CSIU Basic System Architecture © Rupert Brown 2008 External (world) interface TS TS – Token Supplier(s)         Interface numbering
  • 14.
  • 15.
  • 16.  
  • 17. XCH CRM Financials Data Warehouse Toll Operating System TSMC ALC IVR EFTPOS Web Post Office Bank Enforcement Look up DCA Mail House Tag distributor Interoperability Customer Service System SMS/e-mail ALC TSMC ALC ALC TSMC ALC ALC Tolling System Architecture for ConnectEast’s new EastLink Road
  • 18. Copyright © Queensland Motorways 2008
  • 19. Usage Detection Usage Detection Usage Detection Usage Detection Usage Detection Usage Detection Usage detection is linked to the asset. Usage Evidence Management System Management Usage Reconstruction & Rating Back Office System Enforcement System Interoperability System Web IVR SMS Customer Channels Bank POS DCA MH Services Other asset operators Legal system COTS Product “ Purpose Built” Product POS – Point of Sale e.g. Post Office DCA – Debt Collection Agency MH – Mailing House IVR – Interactive Voice Recognition SMS – Short Message Service (phone) CSIU Basic System Architecture © Rupert Brown 2008 External (world) interface TS TS – Token Supplier(s)         Interface numbering
  • 20.
  • 21.
  • 22.