[Audio] Welcome to IREZ Private Limited. This presentation explains not just what the IREZ platform does, but why every stage, every verification step, and every control exists in the precise position it occupies within the process. It covers the founding context of who IREZ is, the Vision, Mission and Core Values, the five stage onboarding process, and the complete CONSO-ID trade lifecycle from quotation to settlement..
[Audio] IREZ Private Limited is a FinTech-as-Infrastructure platform. The critical distinction is that IREZ is infrastructure, not a payment processor, not a lender, and not a goods owner. IREZ sits between every actor in a trade transaction and guarantees the integrity of every document, every instruction, and every transfer. The architecture rests on six technology pillars. First, SHA-256 cryptographic hashing, where every document is sealed at creation and any alteration changes the hash instantly. Second, ECDSA digital signatures, where every action is signed with a unique cryptographic key, providing irrefutable proof of who approved what and when. Third, CONSO-ID tokenisation, which is a unique cryptographic identifier binding every document and every party into a single tamper-proof chain. Fourth, Atomic Swap settlement, where payment and title transfer happen in the same microsecond. Fifth, GPS geofencing, which verifies physical delivery to within fifty metres by satellite. Sixth, biometric authentication, where Face ID confirmation ensures the authorised party is physically present. Together, these six pillars replace the broken manual layer with a single cryptographically enforced digital workflow..
[Audio] The IREZ Vision is to be the global standard for secure business-to-business trade, where every transaction is backed by undeniable proof of delivery, instant payment, and zero fraud risk. This vision was chosen deliberately. It does not say a leading platform or an improved process. It says the global standard. That ambition drives the architecture. Every control, every verification step, and every security layer exists because anything less than a standard that can be universally trusted would not achieve this vision. The three pillars of the vision are as follows. Undeniable proof of delivery, which is not a signed paper form but GPS coordinates, biometric identity, and container code match, all independently verified and immutably recorded. Instant payment, where the Atomic Swap mechanism executes payment and title transfer in the same microsecond, eliminating the delay that currently creates the liquidity trap for suppliers. And zero fraud risk, which is not reduced fraud but zero fraud risk, enforced by mathematics rather than by trust..
[Audio] The IREZ Mission has four specific and measurable components. Transparency means the CONSO-ID creates a single shared truth for every transaction. Every party, buyer, supplier, bank, insurer, and financier, sees the same verified information at the same time. This eliminates the information asymmetry that currently allows disputes, misunderstandings, and fraud to occur. Fraud-proofing means IREZ does not rely on participants following rules or deterrence from consequences. The system is designed so that the fraud vectors that commonly affect trade, including ghost companies, Business Email Compromise, forged documents, and double financing, are technically impossible rather than merely discouraged. Automated compliance means ETDA 2023 compliance, anti-money laundering screening, sanctions checking, and document verification all happen automatically as part of the standard transaction workflow. Compliance is not an overhead on top of the process. It is the process. The sixty per cent cost reduction comes from eliminating manual verification processes, reducing dispute timelines from six to eight weeks down to forty-eight hours, removing Business Email Compromise fraud losses entirely, and making small and medium sized enterprises bankable by providing verifiable delivery evidence that banks can accept as collateral..
[Audio] The four Core Values are not marketing language; they describe our company name. They are operational commitments that explain specific design decisions across the platform. Integrity by Design is why you see a biometric check at the purchase order stage, a Five-Way Match at delivery, and Write-Once Read-Many vault storage for every record. Security is the starting point, not a feature added afterwards. Radical Transparency means the CONSO-ID is visible to all authorised parties simultaneously. A supplier can see that the bank lien is active before they ship. A bank can see the GPS verification event the moment it happens. A buyer can see the delivery confirmation before funds are released. This shared, real-time visibility is what radical transparency means in practice. Empowerment is expressed most directly through the Supplier Performance Rating. A supplier who consistently delivers on time, with clean documentation and no disputes, accumulates a verifiable, independently audited track record that they can present to any lender as evidence of creditworthiness. Zero Leakage is expressed through the Atomic Swap. The mechanism is all or nothing by design. There is no intermediate state in which payment has occurred, but title has not transferred, or vice versa. Both commands execute in the same microsecond or neither executes..
[Audio] This presentation exists because understanding the reasoning behind the architecture matters at least as much as understanding the architecture itself. The IREZ Developer Guide is the technical authority on what the platform does and how it is built. This presentation answers the complementary question of why it is built exactly this way, and why every stage occupies the precise position it does in the process. The quality of explanation here is suitable for conversations with banks, regulators, potential partners, internal engineering teams, and compliance professionals. It is for anyone who needs to understand not just what IREZ does, but why it works the way it does, and what would go wrong if any individual control were removed. The structure follows the same sequence as the platform itself, beginning with the five-stage onboarding process and then moving through the CONSO-ID trade lifecycle step by step..
[Audio] Part One of this presentation covers the five-stage onboarding process. Before any buyer or supplier can participate in a trade on the IREZ platform, they must complete all five stages. This is not a formality. Each stage closes a specific and well-documented vulnerability that has historically allowed fraud, payment default, or money laundering to occur in international and regional trade. The five stages together create what the platform calls the Verified Counterparty Standard. By the time a trade begins on IREZ, every party has been independently verified against public records, their documents have been authenticated, their bank account has been confirmed as belonging to them, they have been screened against the world's major sanctions lists, and two separate individuals in two separate roles have confirmed their eligibility to trade on the platform..
[Audio] Stage 1 closes the ghost company vulnerability. In the traditional paper-based trade world, a supplier could receive a purchase order from a company that did not legally exist, ship goods worth tens of thousands of pounds, and then discover that there was nobody to pursue for payment because the buyer was a ghost. The platform calls the national company registry the moment an entity tries to register. The registry call confirms in real time that the company exists, that it is currently active and has not been dissolved, who its registered directors are, and what its registered address is. This information comes directly from the government database. At the same moment, the person completing the registration must perform a biometric liveness selfie. This is not simply taking a photograph. It is a live facial scan processed by a certified vendor that confirms a real human being is present and that their face matches the photograph of the director held on the government registry. The reason there is no manual override at this stage is deliberate. The moment you allow a human to override a biometric failure for a sufficiently persuasive reason; you have created a pathway that fraudsters will exploit..
[Audio] Stage 2 closes the expired certificate vulnerability. In the paper-based world, compliance certificates are submitted as copies that are impossible to verify without contacting the issuing authority, which almost nobody does. Expired certificates are routinely resubmitted as if they were current. Certificates belonging to one company are presented by another. The IREZ artificial intelligence powered document recognition engine reads the certificate data and calls the issuing authority's application programming interface to confirm authenticity in real time. This happens automatically for every document and every supported jurisdiction. The Freeze State mechanism is equally important. The platform is not just checking compliance at the point of registration. It is monitoring compliance continuously for as long as the entity is active. A company that was compliant at onboarding but allows a certificate to lapse cannot trade on IREZ until they renew and re-verify. This removes the ongoing compliance risk that arises when companies are verified once at onboarding but never rechecked..
[Audio] Stage 3 permanently eliminates Business Email Compromise. The reason this fraud works in traditional trade is that bank account details are communicated through documents, emails, and invoices that carry no proof of authenticity. There is no mechanism in the traditional process that verifies whether the bank account on an invoice actually belongs to the company named on that invoice. The Bank Detail Lock Box design is intentional. There is no moment on the IREZ platform at which a human types bank details into a document that another human then reads and acts upon. The payment destination is set by the system from a verified application programming interface call, and the system routes payments exclusively to that destination regardless of what any subsequent document or communication says. This is why the Lock Box works where policies and training do not. It does not require human vigilance. It does not depend on an employee noticing something suspicious in an email. It makes the fraud mechanically impossible..
[Audio] Stage 4 closes the sanctions evasion vulnerability. A trade finance platform that does not screen its participants against international sanctions lists is potentially enabling sanctions evasion and exposing itself, its banking partners, and its users to enormous regulatory and legal risk. The screening covers every director and every Ultimate Beneficial Owner, not just the company name. This matters because the most common evasion technique is to use a nominee director, meaning a person whose name appears on the company registration documents in place of the real beneficial owner who is the subject of sanctions. The thirty-day re-screening cycle is essential. Sanctions lists change continuously. A company that was clean at onboarding may have its director added to a list six months later. Without continuous re-screening, the platform would have no way of knowing this had happened. The thirty-day cycle means the maximum exposure window after a new sanction is imposed on an existing entity is thirty days, at which point they are automatically blocked..
[Audio] Stage 5 applies the Four Eyes principle to the final step of onboarding. A Procurement Officer reviews the complete onboarding record and submits an activation recommendation. A separate Compliance Officer reviews the same record independently and confirms the approval. The system enforces this at the technical level. The same user account cannot appear in both the recommendation and approval fields under any circumstances. Every action taken in Stage 5 is timestamped, attributed to the individual who performed it, and recorded permanently in the immutable audit log. If a decision is ever questioned, there is a clear and irrefutable record of exactly who approved it, when, and based on what information. The Four Eyes principle is effective not just because it catches errors, but because it changes the incentive structure for fraud. A single individual who might be tempted to approve a fraudulent registration for personal gain knows that a second independent reviewer will see the same record. This awareness alone reduces the incidence of intentional misconduct in onboarding decisions..
[Audio] This slide summarises the five stage onboarding process that creates the Verified Counterparty Standard. By the time a trade begins on IREZ, both parties have independently and automatically passed all five stages. The outcome is a Verified Supplier Token and an assigned CONSO-ID prefix that will bind all subsequent trade documents together. The five stages work as a chain. Stage 1 provides the verified identity that Stage 3 uses for the bank account name match. Stage 2 provides the compliance evidence that banks and financiers rely on when assessing trade risk. Stage 4 ensures that none of the verified counterparties are under sanctions at the time of trading or at any point in the thirty days following. Stage 5 ensures that a human review with full accountability has confirmed all of the above before any entity becomes active on the platform. No stage can be skipped. No stage has a manual override. This is the architecture of the Verified Counterparty Standard..
[Audio] Part Two of this presentation covers the CONSO-ID trade lifecycle in full. Before the first step begins, two decisions shape everything that follows. The supplier selects the trade type, either international or regional, and the buyer declares the payment option, which is either Bank Lien with Deferred Settlement, Finance Now, or Net Contract. These early declarations are not administrative conveniences. They determine the legal framework for the entire transaction, which documents are generated, which external systems are engaged, and which settlement mechanism applies. The five phases are as follows. Phase 1 is the Contractual Anchor covering Steps 1 to 4. Phase 2 is the Security Layer covering Steps 5 and 6. Phase 3 is the Transfer of Possession at Step 7. Phase 4 is GPS Verification at Step 8. Phase 5 is Settlement at Step 9. Every step will be explained by asking the same question: what specific vulnerability does this step close, and what would fail if it were removed?.
[Audio] The reason trade type and payment option are selected before a single quotation has been submitted is that both choices shape everything that follows in the transaction. Trade type cannot be changed mid-transaction because it determines the legal instrument. A Bill of Lading is a document of title, meaning the party who holds it holds legal ownership of the goods. A waybill is a proof of delivery document. These are fundamentally different legal instruments. A bank that has committed a lien against one type of transaction cannot be automatically transferred to a different legal framework mid-transaction. Payment option transparency protects both parties. If the buyer intends to use a bank lien with a thirty-day deferred release, the supplier needs to factor in thirty days of working capital exposure when pricing their quotation. If Finance Now is being used, the supplier will receive payment upon delivery regardless of the deferred terms between the buyer and the financier. Making the payment option visible before the quotation is submitted is a deliberate act of transparency that eliminates pricing disputes and late surprises..
[Audio] The CONSO-ID is created at the Request for Quotation stage, not the invoice stage, not the purchase order stage, but at the very first document in the transaction. This design choice is deliberate. Every subsequent document, every payment instruction, every verification event, and every piece of evidence needs to be bound together under one reference from the earliest possible point. If the CONSO-ID were created later, there would be a period during which the quotation and the purchase order existed without a cryptographic binding. That gap is an opportunity for documents to be altered or disputed, and in trade finance, document substitution is a well-documented fraud. The SHA-256 hashing and Write-Once Read-Many vault storage mean the platform can prove, at any point in the future and in a court of law, if necessary, exactly what was in the Request for Quotation at the moment it was submitted. Not what someone claims was in it. What was actually in it, with a mathematical fingerprint that cannot be falsified. The early WaveBL notification matters because electronic Bill of Lading registration processes require coordination with shipping lines. Alerting WaveBL at the quotation stage rather than waiting until the goods are ready to ship eliminates the rushed, last-minute document processing that creates fraud opportunities..
[Audio] Step 2 addresses two distinct fraud and error vectors. First, the read-only price inheritance closes the price manipulation vulnerability. In traditional trade processes, a purchase order is a document that one party creates independently. There is no mechanism preventing a buyer from claiming the price was different from the agreed quotation. On IREZ, the purchase order is generated from the accepted quotation with the price automatically inherited as a read-only field. The system physically prevents a different number from appearing on the purchase order. Second, the biometric authentication closes the unauthorised commitment vulnerability. A purchase order is a legally binding commercial commitment. The combination of Face ID and a hardware security key ensures that the person authorising the commitment is the verified individual from the buyer entity, not an unauthorised employee, not a fraudster with a stolen password, and not a script executing an automated purchase. The bank notification at this step matters because the payment option declared at the Request for Quotation stage now needs to be operationalised. For bank lien transactions, this notification triggers the pre-authorisation process. Delaying this notification until a later step would mean the financial mechanism is set up after the legal commitment has already been made, creating a window in which the supplier has a promise but no financial guarantee..
[Audio] Step 3 contains the final and most decisive protection against Business Email Compromise. In the traditional trade process, the invoice is the document most frequently manipulated in this type of fraud, because it is the last document issued before money moves and it contains the bank account details to which payment should be made. On IREZ, the invoice is generated from the purchase order automatically. The supplier does not create the invoice from scratch. The system creates it. This means the supplier cannot introduce new bank account details on the invoice because the invoice is not typed by a human into a template. It is generated by the system. The invoice hash sent to WaveBL for international trades establishes a pre-shipment link between the commercial document and the title document. When goods are loaded and the shipping line issues the electronic Bill of Lading, the system automatically checks that the electronic Bill of Lading matches the invoice hash. If someone has tried to substitute different goods, or if the invoice was altered after the hash was sent, this check fails immediately, before any goods have left port and before any funds have moved..
[Audio] Step 4 performs the Three-Way Match and creates the formal legal obligation to pay. The Three-Way Match is not a new concept. It has been used in manual accounts payable processes for decades. The difference on IREZ is that it is automated. In manual environments, the Three-Way Match is a clerk reviewing three documents on a screen and visually checking that the numbers match. Clerks make mistakes. They work under pressure to process quickly. An automated match catches every discrepancy, every time, without exception. The categories of fraud this catches are invoice inflation, where a supplier raises the amount between the purchase order and the invoice, invoice substitution, where a supplier presents a completely different invoice to the one the buyer agreed to, and data entry error, which is an innocent mistake that would only be discovered after payment when the accounts do not reconcile. For bank lien transactions, this step triggers the formal earmarking of funds. The bank is waiting for the Three-Way Match confirmation because it is their signal that the amount they are about to commit has been independently verified against three separate documents. A bank would not want to commit a lien against an unverified amount..
[Audio] Step 5 closes the insurance gap vulnerability. In traditional trade, insurance is arranged separately by different parties, often covering different risks, with no mechanism ensuring the combined coverage is complete for the specific transaction. The absence of integrated insurance is one of the most common reasons trade finance applications are declined by banks, because it represents an unquantified risk that the lender cannot price. If a bank does not know what insurance is in place, in what amount, and for what risks, they cannot confidently extend credit against the transaction. By embedding insurance into the IREZ workflow at Step 5, before the bank lien is created at Step 6, the bank receives the lien application alongside confirmed, cryptographically verified insurance coverage specifically for this CONSO-ID transaction. The policy reference numbers are embedded into the electronic Bill of Lading, which means the insurance cannot be applied to a different transaction. The policy and the shipment are cryptographically bound to each other. IREZ earns a commission as the Insurance Marketplace Operator. This is consistent with its role as infrastructure that brings verified, insured trades to banks and financiers rather than unverified, uninsured ones..
[Audio] Step 6 solves the fundamental problem of international trade credit: how does a supplier extend credit to a buyer they may have limited prior relationship with, across a border where payment enforcement can be slow and expensive? In the traditional world, the supplier's only comfort is the buyer's promise to pay, possibly backed by a letter of credit from a bank. The IREZ bank lien is fundamentally different. The funds are reserved and legally encumbered the moment the lien is created. The supplier receives a cryptographically signed confirmation, not a promise, but a bank-attested, immutably recorded guarantee that the money is committed. The separation of lien creation from lien release is the design feature that makes IREZ useful for trade finance. A company that does not have the full purchase amount available at the moment of ordering can apply to their bank for trade credit against the CONSO-ID record, the invoice, and the insurance policy as documented evidence of a real, verified, insured trade obligation. The thirty- or sixty-day deferred release gives the buyer's bank time before the credit facility is drawn down, which is the fundamental structure of deferred payment trade credit. For Finance Now transactions, locking the settlement destination at this step prevents a post-shipment destination change, which is a known fraud vector in factoring and invoice discounting..
[Audio] Step 7A is where legal title to the goods is formally established. The electronic Bill of Lading is the most legally significant document in international trade. The sequencing constraint, meaning insurance and lien must be confirmed before the Shipping Request can be submitted, is the system enforcing the correct order of financial protection. In paper-based trade, goods are regularly shipped before all financial security instruments are in place. Sometimes the insurance lapses and is not renewed. Sometimes the lien is not yet formally created. IREZ makes it technically impossible to ship goods without the full financial security stack being confirmed and recorded. The dual layer Singularity enforcement addresses double financing fraud. In paper-based trade, a supplier with a physical Bill of Lading can photocopy it and present it to two different banks as security for two different financing arrangements. WaveBL blockchain tokenisation makes this technically impossible. The electronic Bill of Lading is a unique digital token, not a file, and blockchain logic automatically rejects any attempt to create a duplicate. The IREZ database level unique constraints provide a second independent layer of the same protection. The supplier's biometric transfer action is the legally recorded moment at which the supplier relinquishes their right to the goods. This creates the clear chain of custody that satisfies the Electronic Trade Documents Act 2023 Conditional Possession requirements..
[Audio] Step 7B explains why the regional trade path uses a waybill rather than a Bill of Lading, and why this is not simply a convenience but a legal necessity. A waybill is a proof of delivery document. A Bill of Lading is a document of title. In jurisdictions without a maritime border, such as a road delivery from one city to another within the same country, there is no shipping line issuing a Bill of Lading and no port of departure creating a legal title transfer event in the traditional sense. Using a Bill of Lading framework for a regional road delivery would impose unnecessary complexity and create legal confusion about what rights the document actually confers. The waybill framework is the correct legal instrument for this type of transaction. The QR code mechanism is the waybill equivalent of the electronic Bill of Lading token. It ties the physical delivery event to the CONSO-ID record in the same way the electronic Bill of Lading token ties the international shipment to the blockchain record. When the buyer scans the QR code at the delivery point using the IREZ mobile application, the system triggers the GPS verification process, creating the same five way match that the international path uses, with the same legal evidential value..
[Audio] Between the moment the electronic Bill of Lading enters the IREZ Vault and the moment the Atomic Swap executes, the document passes through three distinct custody phases. During Bank Possession, covering Days 0 to 24, the bank holds the Digital Key exclusively. The electronic Bill of Lading is watermarked as ORIGINAL. The buyer has read-only access. The bank's legal position is Conditional Possession under the Electronic Trade Documents Act 2023. During Customs Pre-Clearance, covering Days 25 to 29, the buyer requests a Limited Power of Attorney sub-copy watermarked FOR CUSTOMS CLEARANCE ONLY and NOT NEGOTIABLE. It can be presented to customs authorities but cannot be used to claim ownership. The original electronic Bill of Lading remains with the bank. The lien is completely unaffected. During IREZ Neutral Escrow, when the goods arrive, IREZ takes custody as a neutral party. Neither the bank nor the buyer can move the electronic Bill of Lading. Only GPS verification can unlock the Atomic Swap. After GPS verification, Buyer Possession begins. The Atomic Swap executes. The bank's Digital Key is cryptographically revoked and the buyer's Digital Key activates. The bank retains read-only audit access. At every moment, one party and one party only controls the electronic Bill of Lading. The bank's security interest is mathematically intact from Day Zero to the GPS trigger..
[Audio] Step 8 is the Five-Way Match, the most sophisticated proof of delivery mechanism in the trade finance industry. The reason five separate checks are required is that each one, individually, can be defeated. GPS coordinates can be spoofed using software that transmits false coordinates to an application. A biometric check alone can be defeated if someone else registers their Face ID on the buyer's device. A reference code check alone can be defeated if someone obtains the code from a document without being physically present. The Five-Way Match works because to defeat all five simultaneously requires a level of coordinated technical sophistication that is not a realistic attack. A fraudster would need to spoof their GPS coordinates, register their own Face ID on the buyer's registered device, obtain the physical container code, simultaneously appear in the cell tower data at the correct location, and produce accelerometer data consistent with walking around a warehouse, all at the same moment. This combination also satisfies the legal standard in the Electronic Trade Documents Act 2023 for Demonstration of Control, which is the legally recognised proof of confirmed delivery that transfers title and triggers settlement. For international trades, the pre-arrival customs clearance step generates a Limited Power of Attorney sub-copy that customs authorities can accept without requiring the transfer of the original electronic Bill of Lading, solving the customs clearance challenge without compromising the bank's security interest..
[Audio] Settlement Path A covers international trades with a bank lien and deferred payment. The separation of title transfer from payment release is the critical design feature. Without this separation, IREZ cannot serve buyers who are using trade credit facilities to finance their purchases. The entire value proposition for companies that need thirty or sixty days, because they need to receive payment from their own customers before they can settle their supplier invoices, is built on this separation. The Atomic Swap mechanism is the technical guarantee that the two commands, payment release and key transfer, always happen together or not at all. There is no intermediate state where payment has occurred but title has not transferred, or where title has transferred but the bank's lien has not been released. The all or nothing design is what makes the settlement event trustworthy for all parties simultaneously. For the bank, their security interest is released at exactly the moment their funds are released, not before and not after. For the supplier, funds are released at exactly the moment the buyer's key is activated, meaning the transaction cannot be reversed. For the buyer, they receive legal title at exactly the moment the Atomic Swap executes, with no ambiguous period during which they have the goods but do not yet own them..
[Audio] Settlement Path B exists as a distinct mechanism because the legal instruments governing regional and international trade are different, and the settlement engine must accurately reflect those differences. The key difference is that title transfer is not part of the regional settlement path. The waybill is a proof of delivery document. It confirms that goods were received at the specified location by the specified individual. It does not confer or transfer legal ownership of the goods in the same way a Bill of Lading does. This distinction matters for the legal records. If the settlement system used the same mechanism for both trade types, the records would describe a title transfer event that did not legally occur, which could create confusion in any subsequent audit or dispute. The GPS verification and Five-Way Match operate identically in both paths. The difference is solely in what the GPS trigger unlocks. For international trades it unlocks the Atomic Swap with title transfer. For regional trades it unlocks the delivery confirmation and payment release according to the payment option terms..
[Audio] Settlement Path C covers regional trades where the buyer and supplier have agreed net payment terms, meaning a specific due date for payment, typically expressed as a number of days from the delivery confirmation. The reason GPS confirmation does not trigger automatic payment on this path is important. Net contract payment is not a failure of the automatic settlement mechanism. It is a deliberate commercial arrangement that both parties agreed to at the outset. The buyer has the goods. The supplier has confirmed, immutably recorded evidence that the goods were delivered. The obligation is now the buyer's to fulfil on the agreed date. The Net Payment Queue is designed as an analytics tool rather than a simple list because a finance manager's job is not to pay every invoice the moment it arrives. It is to manage liquidity across a portfolio of obligations, ensuring that commitments are met at the right time without unnecessarily drawing down cash that is needed elsewhere. The Finance Now migration notification is critical for accounting integrity. If a supplier migrates from a net contract to Finance Now mid-trade without the buyer knowing, the buyer might make payment to the original supplier while the financier is also expecting to recover from the buyer. The notification prevents this double-payment risk and ensures both sets of accounts reconcile correctly..
[Audio] The Supplier Performance Rating closes the gap between platform participation and credit market access. The six components of the rating are all derived from events that were automatically recorded on the platform as they happened. They are not self-reported metrics. They are not surveys. They are not references from counterparties who may have reasons to be generous. This distinction is what makes the rating usable by banks and financiers as evidence for lending decisions. A bank considering a Finance Now deal for a supplier can see whether that supplier consistently delivers what they promise and whether the trades they are involved in settle cleanly, from an independent, immutable, tamper-proof record. The reason the supplier can see their own score and the breakdown of contributing measures is that the platform's value to suppliers depends on them being able to use the score as evidence of their reliability to third parties. A supplier with a high IREZ rating has a verifiable, independently produced track record that they can present to any bank or financier as evidence that they are a trustworthy counterparty. The performance rating is not a black box verdict. It is a transparent, explainable, and auditable record of commercial behaviour, which is exactly what makes it valuable..
[Audio] The Exception Protocol answers the question every sophisticated investor and banking partner asks: what happens when the technology fails? What happens at a remote port in Mozambique or a border crossing in Zambia where GPS signals are weak and connectivity is intermittent? The answer is that IREZ degrades gracefully to the next most secure verification layer. Trade does not stop because of a connectivity issue. The eight step manual verification process maintains the same evidential standard as the automated Five-Way Match. The buyer still provides GPS coordinates from cell tower triangulation, still provides biometric confirmation, still provides a reference code match, and still records a video of their physical presence. The difference is that a Senior Compliance Officer reviews the bundle and provides human approval before the Atomic Swap executes. The QR Code Fallback extends IREZ's reach to locations with absolutely no internet connectivity, including remote Southern African Development Community border crossings and rural logistics hubs. The CONSO-ID is printed on the paper waybill. At the nearest connectivity point, the receiving officer scans the QR code in batch mode. IREZ was built for the real world, including the parts of Africa where infrastructure is not yet what it needs to be..
[Audio] This closing slide explains the most important thing about the IREZ architecture. It is a chain in which each step creates the condition for the next. The government registry check in Stage 1 feeds the biometric match. The biometric match feeds the bank account verification. The bank account verification creates the Bank Detail Lock Box that makes the invoice stage fraud-proof. The invoice hash links to the Bill of Lading. The electronic Bill of Lading's singularity enforcement makes the lien reliable. The lien's reliability makes GPS verification the correct moment to transfer title. GPS verification's five independent checks make the settlement event a legally sound trigger. The five questions the platform answers collectively are these. Onboarding answers who are you dealing with. The trade lifecycle answers whether this transaction is what it claims to be. The security controls answer what happens if someone tries to manipulate any part of the process. The audit trail answers what actually happened when a dispute arises. The supplier performance rating answers whether this counterparty is worth doing business with again. When someone asks why any individual element of this system exists, the answer is always the same. It exists because removing it would create a gap that is either a known fraud vector, a known dispute risk, or a known compliance failure. The platform is the minimum necessary to make digital trade finance trustworthy enough for every party that depends on it..
[Audio] This slide concludes the IREZ Features presentation. IREZ Private Limited. The Digital Trust Infrastructure for Global Trade. Compliant with the Electronic Trade Documents Act 2023. WaveBL Integrated. AfCFTA Ready. This deck has covered the founding identity, vision, mission, and core values of IREZ, the five-stage onboarding process and the specific fraud vector or compliance gap each stage closes, and the complete nine step CONSO-ID trade lifecycle with all three settlement paths, the electronic Bill of Lading vault custody model, the exception protocol, and the supplier performance rating. For further information, a live demonstration of the Digital Mirror Workflow, or a bank integration meeting, please contact the IREZ team directly..