Introduction

The Coupons core provides our clients with a powerful set of tools to manage deals and offer attractive discounts to their customers. Upon completing the security process, clients can interact with the Coupons core, which offers three main functionalities:

Get Deals

Clients can retrieve a comprehensive list of available deals offered by the system. These deals are curated to entice customers and drive engagement.

Subscribe to Offer

Customers can subscribe to a specific offer by providing their unique customer ID. Upon subscription, the system generates a coupon number associated with the offer.

Verify Coupon Number

To ensure the validity of the coupon, clients can use the verify coupon number function. If the coupon is legitimate, it will be automatically redeemed.

The Loyalty core is geared towards rewarding customers for their loyalty and encouraging repeat business. This core includes three essential functionalities:

Reward Points

When customers make purchases, the system allows clients to reward them with loyalty points, converting their spent money into points stored in the customer's wallet.

Redeem Points

Customers have the flexibility to use their accumulated loyalty points by utilizing the Redeem User function. Before redeeming, the system initiates a verification process by sending an OTP (One-Time Password) to ensure the authenticity of the customer. Additionally, a threshold value is checked to ensure the customer has a sufficient point balance to proceed with the redemption.

Refund Points:

The Refund allows customers to initiate a refund for a specific transaction that previously converted money into loyalty points. This feature is subject to certain conditions and constraints to maintain the integrity of the loyalty program. Here's how it works:

Security

the system's core functionalities, we prioritize security to ensure the confidentiality and integrity of our clients' data. We employ a three-tiered authentication mechanism to authenticate users and secure their interactions with the system. The first tier utilizes Token-based JSON Web Tokens (JWT) to grant secure access to resources, coupled with a refresh token mechanism to maintain seamless user experiences. The second layer involves embedding sensitive data within the token, reducing API calls and enhancing performance without compromising security. Lastly, we implement the HMAC hashing algorithm with a customized script to fortify data integrity during transmission. This combination of security measures guarantees a robust and trustworthy system.

Last updated