Technology transformation is all about solving a real-life problem.

erp, e-commerce, blockchain, peer-to-peer streaming, ai, image recognition, search, big data.

The mobile app is becoming the difference-maker in business productivity and customer satisfaction. It does not matter how tech-savvy you think you are or not, there is something very intuitive…

In order to improve security of online services, many companies have steered away from username-password authorization due to security concerns.

In theory username-password strategy can provide sufficient protection given the password is robust and the password is changed frequently. However in reality, this is hard to achieve as users tend…

Introduction

I have been both a software developer and a casual musician playing worship songs at church. Often I come across church members who want to play music without knowing the chords, or notes for a certain piece of music. As for myself, because of many trials and errors, I have…

Highlights

  • Present a mutually accessible user authentication system by the end-user and administrator to increase maintainability and relevance.
  • Extensible to other services and help facilitate user transaction and record keeping.
  • Centralized User management system for record consistency.

Six Components

  1. Security & Privacy
  2. Technology
  3. Extendibility
  4. Application
  5. Onboarding and Maintenance

1. Security & Privacy

The proposed member authentication system…

Rex Fong

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store