SlideShare a Scribd company logo
1 of 41
Download to read offline
TruMe
❖ MoBiCo Comodo
Redefine the way we move
Copyright – Mobico Comodo Pvt.
Ltd.
Copyright 2017 Mobico Comodo Pvt. Ltd.
Global Identity and Access Management
Redefine the way we move
truMe
Security. Privacy.
Convenience.
Integrated Global Identity and Access Management
2
3
OurPurpose
Why does truMe exist
Offer a digital platform for Identity
Management that works and is
accepted across borders, that
allows management of access to
physical and digital locations in
most secure and convenient way
without compromising usier privacy
4
Security Privacy Efficient
Convenience
What problems do we solve
One of the biggest
concerns that is
bothering every
individual and
nation
Most of us feel
insecure when we
have to divulge our
personal
information to
anyone whom we
don’t know
We would rather
spend time with our
family or do
something that we
like rather than
standing in a Queue
just waitingg for our
turn
True Secure Identity on mobile
❖ Create Digital Identity
❖ Build Identity Profile by
verifications
 Mobile No
 Email
 Aadhar Number
 Aadhar Biometric
 PAN Card
 Drivers License
 Vehicle Registration Number
 Crowd sourcing
Use Secure Identity Profile on Mobile Device
Secured Convenient
Access
No Identity Footprint at
access points
Access Point-Key Features
 QR Code Scanner
 NFC Enabled
 Aadhaar Based Bio Scanner
 No data stored on kiosk
 Real Time Communication with
Server
 Rule Based Access
 No Manual Setup Required
 Auto Upgradable
Where and Why Use Digital Identity
=
Integrated
Global
Identity &
Access
Management
Platform
offers a very secure and
reliable way to establish
identity of individuals & allows
the identity to be used for
various use cases major one
being access control
12
How does it work
Process
Digital Footprint
Bind Identity to
verified Mobile
Number & Email
Biometric
Link digital
footprint with
Individual
Biometric
Facial Recognition
Use facial images from validated
source and current use case for
verification
Validation of Identity by humans is neither most reliable nor very efficient
but combination of humans and machine is a much better bet
Identity Redefined
Use Case 1
truMe for Visitors
➔Access can be allowed on the basis of profile scan or invite
only scan in the restricted areas.
➔Easy and quick on the spot registration for users without
mobile app.
➔Real time monitoring of visitors.
➔Emergency response
truMe for Temp workers
➔Monthly/Daily/Custom duration passes can be issued to
temp workers.
➔eKYC of Temp workers.
➔Configurable access control.
➔Passes can be easily renewed and cancelled.
truMe for Employees
➔ Attendance Management.
➔ Physical Access Management.
➔ Configurable access control.
➔ Bio-enabled access.
Deployment Strategy
➔On Premise or Cloud Based implementation.
➔Network Requirement : Internet Connectivity and LAN.
➔Easy integration with existing access gates.
➔Deployment Time : 1-2 working days.
RECEPTION
E
N
T
R
Y
Open
Area
Entering
Management Dept.
TruMe
GATE
Not authorised to
access this Area.
truMe Kiosk
Management Dept.
Server Room
ITDept.
Open
Area
Entering
inside
Office
Building.
Workflow
RECEPTION
E
N
T
R
Y
Open
Area
Entering
Management Dept.
TruMe
GATE
Not authorised to
access this Area.
truMe Kiosk
Management Dept.
Server Room
ITDept.
Open
Area
Verifying pre –
Registered user
Registering User
Registration and
Verification.
RECEPTION
E
N
T
R
Y
Open
Area
Entering
Management Dept.
TruMe
Different access
gates can be
installed based
on security type.
GATE
Not authorised to
access this Area.
truMe Kiosk
Management Dept.
Server Room
ITDept.
Open
Area
truMe
For
e-KYC
Use Case 2
How truMe will help
➔ Easy and Quick e-KYC.
➔ Go ‘Paperless’.
➔ Detailed e-KYC status reports.
➔ Integrate with Access Gates.
➔ Integration with another System to share e-KYC details.
truMe for Temp Staff & Employees
➔Do e-KYC of new Joinees.
➔Onboarding of Temp staff using e-KYC for quick verification.
➔Employee verification using e-KYC.
➔Bulk upload process to do e-KYC of existing staff in one go.
➔Employees and Temp Staff can verify themselves against the
generated e-KYC requests as per their convenience using self
service kiosk.
RECEPTION
TruM
e
G A T E
e-KYC
Process.
Server Room
Management Dept.
e-
KYC
Open
Area
Deployment Strategy
➔On Premise or Cloud Based implementation.
➔Centralised server for multiple locations for effective controlling
and reporting.
➔Network Requirement : Internet Connectivity and LAN.
➔Easy integration with existing access gates.
➔Deployment Time : 1-2 working days.
Airports Access
 Integrate with Airports to get ticket information
 Get Ticket Information from Email/SMS on User
Mobile
 Generate Access Card (QR Code) with Idenity and
Access Information
Use Case 3
Residential Complexes
 Resident Access
 Visitor Management
 Pass based access for
housekeeping
Use Case 4
Events And Exhibitions
 Convenient and secure access.
 Efficient and controlled access for visitors and delegates
 Reliable solution for big events and exhibitions.
 Entry point access control
 Real time information availability of occupants
Use Case 5
Use Case 6
Stadiums
 Convenient and secure access.
 Efficient and controlled access for visitors and
delegates
 Sport events entry point access control
 Real time information availability of occupants
Clubs & Recreation Centres
 Membership based access
 Easy age verification.
 Verify Identity before access.
Use Case 7
41
ContactUs
+91 8130788008, 9811679124, 9815901670
www.mobicomodo.com
lalit@mobicomodo.com

More Related Content

What's hot

Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
Design and Implementation of an IP based authentication mechanism for Open So...
Design and Implementation of an IP based authentication mechanism for Open So...Design and Implementation of an IP based authentication mechanism for Open So...
Design and Implementation of an IP based authentication mechanism for Open So...WilliamJohn41
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesIBM Security
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]Hai Nguyen
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to SolusSolus
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)Jeff Green
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
kicking your enterprise security up a notch with adaptive authentication sa...
kicking your enterprise security up a notch with adaptive authentication   sa...kicking your enterprise security up a notch with adaptive authentication   sa...
kicking your enterprise security up a notch with adaptive authentication sa...Sagara Gunathunga
 
Secure Code Warrior - Fail securely
Secure Code Warrior - Fail securelySecure Code Warrior - Fail securely
Secure Code Warrior - Fail securelySecure Code Warrior
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSonionid12
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor AuthenticationDilip Kr. Jangir
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideNick Owen
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor AuthenticationNikhil Shaw
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 

What's hot (20)

Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Design and Implementation of an IP based authentication mechanism for Open So...
Design and Implementation of an IP based authentication mechanism for Open So...Design and Implementation of an IP based authentication mechanism for Open So...
Design and Implementation of an IP based authentication mechanism for Open So...
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
kicking your enterprise security up a notch with adaptive authentication sa...
kicking your enterprise security up a notch with adaptive authentication   sa...kicking your enterprise security up a notch with adaptive authentication   sa...
kicking your enterprise security up a notch with adaptive authentication sa...
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Secure Code Warrior - Fail securely
Secure Code Warrior - Fail securelySecure Code Warrior - Fail securely
Secure Code Warrior - Fail securely
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
 
ppt
pptppt
ppt
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 

Similar to truMe - Global Digital Identity and Access Management

Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxArchana833240
 
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 FinTech Belgium
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET Journal
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodIRJET Journal
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...IJERA Editor
 
BeyondCorp and Zero Trust
BeyondCorp and Zero TrustBeyondCorp and Zero Trust
BeyondCorp and Zero TrustIvan Dwyer
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition OverviewNatalie Hewitt
 
TruNtrance - HRMS & Visitor Access Management Solutions
TruNtrance - HRMS & Visitor Access Management SolutionsTruNtrance - HRMS & Visitor Access Management Solutions
TruNtrance - HRMS & Visitor Access Management SolutionsBiocube Technologies Inc.
 
BeyondCorp New York Meetup: Closing the Adherence Gap
BeyondCorp New York Meetup: Closing the Adherence GapBeyondCorp New York Meetup: Closing the Adherence Gap
BeyondCorp New York Meetup: Closing the Adherence GapIvan Dwyer
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!Process Fusion Inc
 
Visitor manage PPT March2023.pptx
Visitor manage PPT March2023.pptxVisitor manage PPT March2023.pptx
Visitor manage PPT March2023.pptxZapiotechDubai
 
DocuSign for NetSuite CRM webinar
DocuSign for NetSuite CRM webinarDocuSign for NetSuite CRM webinar
DocuSign for NetSuite CRM webinarDocuSign
 
6 simple things to remember about kyc verification
6 simple things to remember about kyc verification6 simple things to remember about kyc verification
6 simple things to remember about kyc verificationShufti Pro
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuiritySarath K
 

Similar to truMe - Global Digital Identity and Access Management (20)

Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptx
 
Presentation.pdf
Presentation.pdfPresentation.pdf
Presentation.pdf
 
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 
BeyondCorp and Zero Trust
BeyondCorp and Zero TrustBeyondCorp and Zero Trust
BeyondCorp and Zero Trust
 
POEMS- Participative Online Examination Management Systems
POEMS- Participative Online Examination Management SystemsPOEMS- Participative Online Examination Management Systems
POEMS- Participative Online Examination Management Systems
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition Overview
 
Cuckoo Tech - The Seamless Time & Attendance solution
Cuckoo Tech - The Seamless Time & Attendance solutionCuckoo Tech - The Seamless Time & Attendance solution
Cuckoo Tech - The Seamless Time & Attendance solution
 
TruNtrance - HRMS & Visitor Access Management Solutions
TruNtrance - HRMS & Visitor Access Management SolutionsTruNtrance - HRMS & Visitor Access Management Solutions
TruNtrance - HRMS & Visitor Access Management Solutions
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
BeyondCorp New York Meetup: Closing the Adherence Gap
BeyondCorp New York Meetup: Closing the Adherence GapBeyondCorp New York Meetup: Closing the Adherence Gap
BeyondCorp New York Meetup: Closing the Adherence Gap
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!
 
Visitor manage PPT March2023.pptx
Visitor manage PPT March2023.pptxVisitor manage PPT March2023.pptx
Visitor manage PPT March2023.pptx
 
DocuSign for NetSuite CRM webinar
DocuSign for NetSuite CRM webinarDocuSign for NetSuite CRM webinar
DocuSign for NetSuite CRM webinar
 
6 simple things to remember about kyc verification
6 simple things to remember about kyc verification6 simple things to remember about kyc verification
6 simple things to remember about kyc verification
 
Transaction&process integrity
Transaction&process integrityTransaction&process integrity
Transaction&process integrity
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuirity
 

Recently uploaded

Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 

Recently uploaded (20)

Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 

truMe - Global Digital Identity and Access Management

  • 1. TruMe ❖ MoBiCo Comodo Redefine the way we move Copyright – Mobico Comodo Pvt. Ltd. Copyright 2017 Mobico Comodo Pvt. Ltd. Global Identity and Access Management Redefine the way we move
  • 3. 3 OurPurpose Why does truMe exist Offer a digital platform for Identity Management that works and is accepted across borders, that allows management of access to physical and digital locations in most secure and convenient way without compromising usier privacy
  • 4. 4 Security Privacy Efficient Convenience What problems do we solve One of the biggest concerns that is bothering every individual and nation Most of us feel insecure when we have to divulge our personal information to anyone whom we don’t know We would rather spend time with our family or do something that we like rather than standing in a Queue just waitingg for our turn
  • 5. True Secure Identity on mobile ❖ Create Digital Identity ❖ Build Identity Profile by verifications  Mobile No  Email  Aadhar Number  Aadhar Biometric  PAN Card  Drivers License  Vehicle Registration Number  Crowd sourcing
  • 6. Use Secure Identity Profile on Mobile Device Secured Convenient Access No Identity Footprint at access points
  • 7. Access Point-Key Features  QR Code Scanner  NFC Enabled  Aadhaar Based Bio Scanner  No data stored on kiosk  Real Time Communication with Server  Rule Based Access  No Manual Setup Required  Auto Upgradable
  • 8. Where and Why Use Digital Identity =
  • 9.
  • 10. Integrated Global Identity & Access Management Platform offers a very secure and reliable way to establish identity of individuals & allows the identity to be used for various use cases major one being access control
  • 11.
  • 12. 12 How does it work Process Digital Footprint Bind Identity to verified Mobile Number & Email Biometric Link digital footprint with Individual Biometric Facial Recognition Use facial images from validated source and current use case for verification Validation of Identity by humans is neither most reliable nor very efficient but combination of humans and machine is a much better bet Identity Redefined
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 23.
  • 24. truMe for Visitors ➔Access can be allowed on the basis of profile scan or invite only scan in the restricted areas. ➔Easy and quick on the spot registration for users without mobile app. ➔Real time monitoring of visitors. ➔Emergency response
  • 25. truMe for Temp workers ➔Monthly/Daily/Custom duration passes can be issued to temp workers. ➔eKYC of Temp workers. ➔Configurable access control. ➔Passes can be easily renewed and cancelled.
  • 26. truMe for Employees ➔ Attendance Management. ➔ Physical Access Management. ➔ Configurable access control. ➔ Bio-enabled access.
  • 27. Deployment Strategy ➔On Premise or Cloud Based implementation. ➔Network Requirement : Internet Connectivity and LAN. ➔Easy integration with existing access gates. ➔Deployment Time : 1-2 working days.
  • 28. RECEPTION E N T R Y Open Area Entering Management Dept. TruMe GATE Not authorised to access this Area. truMe Kiosk Management Dept. Server Room ITDept. Open Area Entering inside Office Building. Workflow
  • 29. RECEPTION E N T R Y Open Area Entering Management Dept. TruMe GATE Not authorised to access this Area. truMe Kiosk Management Dept. Server Room ITDept. Open Area Verifying pre – Registered user Registering User Registration and Verification.
  • 30. RECEPTION E N T R Y Open Area Entering Management Dept. TruMe Different access gates can be installed based on security type. GATE Not authorised to access this Area. truMe Kiosk Management Dept. Server Room ITDept. Open Area
  • 32. How truMe will help ➔ Easy and Quick e-KYC. ➔ Go ‘Paperless’. ➔ Detailed e-KYC status reports. ➔ Integrate with Access Gates. ➔ Integration with another System to share e-KYC details.
  • 33. truMe for Temp Staff & Employees ➔Do e-KYC of new Joinees. ➔Onboarding of Temp staff using e-KYC for quick verification. ➔Employee verification using e-KYC. ➔Bulk upload process to do e-KYC of existing staff in one go. ➔Employees and Temp Staff can verify themselves against the generated e-KYC requests as per their convenience using self service kiosk.
  • 34. RECEPTION TruM e G A T E e-KYC Process. Server Room Management Dept. e- KYC Open Area
  • 35. Deployment Strategy ➔On Premise or Cloud Based implementation. ➔Centralised server for multiple locations for effective controlling and reporting. ➔Network Requirement : Internet Connectivity and LAN. ➔Easy integration with existing access gates. ➔Deployment Time : 1-2 working days.
  • 36. Airports Access  Integrate with Airports to get ticket information  Get Ticket Information from Email/SMS on User Mobile  Generate Access Card (QR Code) with Idenity and Access Information Use Case 3
  • 37. Residential Complexes  Resident Access  Visitor Management  Pass based access for housekeeping Use Case 4
  • 38. Events And Exhibitions  Convenient and secure access.  Efficient and controlled access for visitors and delegates  Reliable solution for big events and exhibitions.  Entry point access control  Real time information availability of occupants Use Case 5
  • 39. Use Case 6 Stadiums  Convenient and secure access.  Efficient and controlled access for visitors and delegates  Sport events entry point access control  Real time information availability of occupants
  • 40. Clubs & Recreation Centres  Membership based access  Easy age verification.  Verify Identity before access. Use Case 7
  • 41. 41 ContactUs +91 8130788008, 9811679124, 9815901670 www.mobicomodo.com lalit@mobicomodo.com