1. Functional Definition and System Architecture
The Zelencio Code system is a proprietary, high-security internal transfer protocol that utilizes encrypted voucher logic to move digital assets between verified accounts within the Zelencio ecosystem. This feature allows for the "decoupling" of asset movement from personal metadata, enabling users to facilitate transactions without the direct exchange of wallet addresses, emails, or phone numbers.
Technically, a Zelencio Code is a unique, one-time-use cryptographic string (20-to-25 alpha-numeric characters) that represents a specific value of a digital asset held on the Zelencio Internal Ledger.
2. Generation and Encryption Protocol
2.1. The Creation Cycle:
A verified user (the "Creator") initiates the process by selecting a supported digital asset and entering an amount within the platform’s established limits. Upon authorization via multi-factor authentication, the Zelencio matching engine "locks" the principal amount from the Creator's available balance and generates the encrypted code.
2.2. The Zelencio Voucher Card:
The output of this process is the "Zelencio Card"—a high-resolution, branded digital image containing a machine-readable QR code and the raw alphanumeric string. This card is designed for secure peer-to-peer sharing and includes a timestamp and the Zelencio corporate watermark to ensure authenticity.
3. Redemption and Settlement Logic
3.1. Instant Settlement:
Redemption is near-instant. When a recipient (the "Claimer") scans the QR code or enters the string into the "Redeem" interface, the platform verifies the code's validity against the internal ledger. If the code is active, the assets are moved immediately from the platform's escrow-holding account to the Claimer’s Zelencio Crypto Account.
3.2. One-Time Validity:
Every Zelencio Code is a "Single-Use" instrument. Once a code has been successfully redeemed by a verified UID, the string is invalidated across the global ledger and cannot be reused or reactivated under any circumstances.
4. Anti-Money Laundering (AML) and "Travel Rule" Compliance
4.1. The Traceability Mandate:
While Zelencio Codes provide privacy at the User Interface (UI) level (meaning the Creator and Claimer do not see each other's personal data), the protocol is not anonymous at the Platform Level.
Logging: Every generated code is permanently linked to the Creator’s Unique Identifier (UID) and KYC profile.
Redemption Logging: Upon redemption, the system logs the Claimer’s UID and IP address.
Audit Trail: This creates a 100% transparent audit trail that complies with the FATF Travel Rule, allowing Zelencio to provide full transaction maps to authorized financial regulators (e.g., Nigerian SEC or EFCC) if illegal activity is suspected.
4.2. Mandatory KYC Gating:
The use of the Zelencio Code system is strictly restricted to users who have completed Tier 1 Identity Verification or higher. Unverified users are technically barred from both generating and redeeming codes.
5. Fee Structure and Economic Finality
5.1. Non-Refundable Service Fee:
The generation of an encrypted Zelencio Code is a premium technical service. A service fee (typically 3.6% or as displayed on the confirmation screen) is applied at the moment of creation.
Deduction Policy: The fee is deducted from the Creator's balance in addition to the principal amount.
No Refunding of Fees: You acknowledge and agree that service fees are final and non-refundable upon the generation of the code. Even if a code is cancelled by the Creator before redemption, the technical fee for the generation and encryption service remains the property of the Platform.
5.2. Cancellation and Principal Recovery:
Creators may cancel an unredeemed code via the "Voucher History" tab. In the event of a cancellation, the principal asset amount will be returned to the Creator's balance, but the technical service fee will not be credited back.
6. Operational Limits and Anti-Abuse Policies
To prevent the system from being utilized for high-frequency unlicensed currency exchange or "Structuring" of funds, Zelencio enforces the following limits:
Daily Frequency: Users are limited to generating a maximum of five (5) codes per 24-hour period.
Value Thresholds: Codes must be created for a minimum value of
15USD∗∗andamaximumvalueof∗∗
20,000 USD equivalent.Automatic Expiration: Codes that remain unredeemed for a period exceeding 180 days may be automatically cancelled by the system, with the principal amount returned to the Creator's wallet.
7. Security Protocols: PIN and G2FA
To ensure that codes are not generated by unauthorized third parties, Zelencio implements a "Triple-Lock" security verification for every generation:
Session Authorization: The user must be logged in on an "Authorized Device."
Internal App PIN: The user must input their unique 5-digit security PIN.
Google Authenticator (2FA): The user must provide a time-sensitive 6-digit 2FA code.
Note: If a user loses their phone or provides their code to a scammer, Zelencio is not responsible for the resulting loss of funds.
8. Prohibited Use Cases and Sanctions
Zelencio monitors all code-related activity 24/7. Any user found utilizing the voucher system for the following will face an immediate permanent ban:
Commercial Reselling: Operating a "Voucher Exchange" or reselling codes for profit without a Bureau de Change license.
Illicit Payments: Using codes to pay for illegal goods or services on third-party platforms (Darknet, etc.).
Mixer Activity: Rapidly generating and redeeming codes between secondary accounts to obscure the source of funds (Smurfing).
9. Risk Disclosure and Limitation of Liability
9.1. Sharing Risk:
You are solely responsible for the safe distribution of your Zelencio Code. Anyone who possesses the code or the QR image can redeem the funds. Zelencio will never ask for your code via Support or Email.
9.2. No Intermediation:
Zelencio acts only as the technology provider. We do not participate in, or guarantee the outcome of, any "Off-Platform" deal where a code is used as payment.
9.3. Market Volatility:
The fiat-equivalent value of the assets locked in a code may fluctuate between the time of generation and redemption. Zelencio is not liable for changes in the purchasing power of the assets while they are held in voucher format.