SlideShare a Scribd company logo
About ProofEasy
https://proofeasy.io
• ProofEasy has developed a new anti-fraud document verification process which utilizes block chain and
QR code technology for document verification.
• The objective of this session is to give a brief overview and demo of what we do and how.
INTRODUCTION
Complex Forgery Detection.
Easy availability of digital editing,
alteration, and manipulation tools have
made forgery very easy.
Variety of digital documents needing
complex and lengthy verification
solutions.
Lengthy procedures, complex analytics
and algorithms are required to ensure
document security.
Differentiating forgery and clarity
modification.
There are thinnest differences in
identifying the forgeries and the
alteration made in digital assets for the
purpose of increasing the clarity of
information representation.
Expensive document verification
solutions.
Traditional document verification
solutions charge variable document
verification fee and document storage
costs separately, which make them
expensive.
CHALLENGES IN DOCUMENT FORGERY DETECTION
PROBLEMS
Very high level of security guaranteed in the form a solution built on patented block-chain and
QR code security technology
Building trust as users can compare the document under inspection with the original
themselves
Efficient process where documents can be secured and
shared in real time
Simple and easy to understand user interface and
authentication process
Highly competitive price and value for money service which offers both document verification
and storage service in one price
ProofEasy removes the bottleneck in fraud prevention by eliminating the need for third party verification and has the
following solution for document forgery problems:
1
2
3
4
5
OUR SOLUTION: ProofEasy
Submit document
Encrypted hashing
Download & share
QR code placement
VeriDoc Global TM block
chain security
SECURE AND SHARE
Scan QR code
ProofEasy validation
Verify on block chain
Note
Inspect visually
VERIFY & VALIDATE
HOW IT WORKS
Banks And Financial
Institutions
Educational
Institutions
Professional Service
Firm (like legal, audit,
taxation firms etc.)
Government
Institutions especially
identity issuing
authorities
Medical & Insurance
Companies
Document originators are the target market for ProofEasy.
Our key target customers/market segments will be:
OUR TARGET CUSTOMERS
The COVID-19 pandemic has impacted virtually all businesses, especially
Educational institutions,
Government Institutions and Professional Services firms.
These organizations are increasingly looking to automate document
verification processes and minimize physical contact. Automating document
verification has also increased digital document manipulation risk.
ProofEasy’s MVP can be used to immediately solve such problems and help to
secure, authenticate and verify all types of documents in real-time while
minimizing the need for face to face interactions as well.
On top of a high level of security and efficiency, it’s a very cheap way of
securing documents.
Blockchain Passports COVID-Free
Certificates
Contact Tracing
LATEST EMERGING SOLUTIONS
Proofeasy MVP
- A SOLUTION TO
COVID-19 CHALLENGES
Stored on
Immutable Blockchain
Generates a document hash
(equivalent to a DNA or
fingerprint of document)
Decentralized Ledger or
Blockchain Technology
Always Unique to a
Particular Document
Cannot be Altered by Even
the Issuer of the Document
Not Possible to Hack Cannot Reverse
Engineer a Document
 Only check fraud costs banks about $900M
per year with 22% of all fraudulent checks
attributed to signature fraud (1).
 Companies in the US have lost USD 500
billion due to fraud (2).
 Data breaches exposed 4.1 billion records
in the first half of 2019 (3).
Why it is Important?
Sources:
(1) https://towardsdatascience.com/signature-
fraud-detection-an-advanced-analytics-
approach-10c810cda26e
(2) https://www.forbes.com/sites/leemathews/201
7/05/05/phishing-scams-cost-american-
businesses-half-a-billion-dollars-a-
year/#5a6d1ee43fa1
(3) https://www.varonis.com/blog/cybersecurity-
statistics/
COMPETITIVE ADVANTAGES
Thanks
support@proofeasy.io
Contact Us

More Related Content

Similar to ProofeasyPPT.pptx

The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...
Techgropse Pvt.Ltd.
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
Ubisecure
 
10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf
CIO Look Magazine
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!Process Fusion Inc
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdf
Drysign By Exela
 
Unknown Facts about Virtual Data Room For Secured File Sharing.pdf
Unknown Facts about Virtual Data Room For Secured File Sharing.pdfUnknown Facts about Virtual Data Room For Secured File Sharing.pdf
Unknown Facts about Virtual Data Room For Secured File Sharing.pdf
Hokme
 
Medi Tool Blockchain Solution for COVID-19
Medi Tool Blockchain Solution for COVID-19 Medi Tool Blockchain Solution for COVID-19
Medi Tool Blockchain Solution for COVID-19
Morne Olivier
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
Entrust Datacard
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
Techdemocracy
 
To Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPTo Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPSachi Sawamura
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdf
Drysign By Exela
 
Why KYC Verification Is the Cornerstone of Trust.docx
Why KYC Verification Is the Cornerstone of Trust.docxWhy KYC Verification Is the Cornerstone of Trust.docx
Why KYC Verification Is the Cornerstone of Trust.docx
rpacpc
 
76 s201923
76 s20192376 s201923
76 s201923
IJRAT
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
PSFK
 
Semlex Group : Introduction
Semlex Group : IntroductionSemlex Group : Introduction
Semlex Group : Introduction
Semlex Europe
 
Whitepaper: Secure By Design
Whitepaper: Secure By DesignWhitepaper: Secure By Design
Whitepaper: Secure By Design
DocuSign
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
indragantiSaiHiranma
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-Security
Oliver Pfaff
 
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 ConferenceSecuring eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Thodoris Bais
 

Similar to ProofeasyPPT.pptx (20)

The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
 
10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdf
 
Unknown Facts about Virtual Data Room For Secured File Sharing.pdf
Unknown Facts about Virtual Data Room For Secured File Sharing.pdfUnknown Facts about Virtual Data Room For Secured File Sharing.pdf
Unknown Facts about Virtual Data Room For Secured File Sharing.pdf
 
Medi Tool Blockchain Solution for COVID-19
Medi Tool Blockchain Solution for COVID-19 Medi Tool Blockchain Solution for COVID-19
Medi Tool Blockchain Solution for COVID-19
 
Gift_of_Time_NSW
Gift_of_Time_NSWGift_of_Time_NSW
Gift_of_Time_NSW
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
To Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPTo Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WP
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdf
 
Why KYC Verification Is the Cornerstone of Trust.docx
Why KYC Verification Is the Cornerstone of Trust.docxWhy KYC Verification Is the Cornerstone of Trust.docx
Why KYC Verification Is the Cornerstone of Trust.docx
 
76 s201923
76 s20192376 s201923
76 s201923
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
 
Semlex Group : Introduction
Semlex Group : IntroductionSemlex Group : Introduction
Semlex Group : Introduction
 
Whitepaper: Secure By Design
Whitepaper: Secure By DesignWhitepaper: Secure By Design
Whitepaper: Secure By Design
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-Security
 
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 ConferenceSecuring eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
 

More from Aliasgar Abbasbhai

Discover 3 easy ways to solve document security concerns.pptx
Discover 3 easy ways to solve document security concerns.pptxDiscover 3 easy ways to solve document security concerns.pptx
Discover 3 easy ways to solve document security concerns.pptx
Aliasgar Abbasbhai
 
ProofEasy Makes Your Insurance Policy Documentation Secure
ProofEasy Makes Your Insurance Policy Documentation SecureProofEasy Makes Your Insurance Policy Documentation Secure
ProofEasy Makes Your Insurance Policy Documentation Secure
Aliasgar Abbasbhai
 
Digitize your document workflows with ProofEasy.pptx
Digitize your document workflows with ProofEasy.pptxDigitize your document workflows with ProofEasy.pptx
Digitize your document workflows with ProofEasy.pptx
Aliasgar Abbasbhai
 
Where can you use ProofEasy?
Where can you use ProofEasy?Where can you use ProofEasy?
Where can you use ProofEasy?
Aliasgar Abbasbhai
 
ProofEasy_DigitalCertificate_Education.pptx
ProofEasy_DigitalCertificate_Education.pptxProofEasy_DigitalCertificate_Education.pptx
ProofEasy_DigitalCertificate_Education.pptx
Aliasgar Abbasbhai
 
Blockchain Based e-Certificate In Education
Blockchain Based e-Certificate In EducationBlockchain Based e-Certificate In Education
Blockchain Based e-Certificate In Education
Aliasgar Abbasbhai
 
Proofeasy
Proofeasy Proofeasy
Proofeasy
Aliasgar Abbasbhai
 

More from Aliasgar Abbasbhai (7)

Discover 3 easy ways to solve document security concerns.pptx
Discover 3 easy ways to solve document security concerns.pptxDiscover 3 easy ways to solve document security concerns.pptx
Discover 3 easy ways to solve document security concerns.pptx
 
ProofEasy Makes Your Insurance Policy Documentation Secure
ProofEasy Makes Your Insurance Policy Documentation SecureProofEasy Makes Your Insurance Policy Documentation Secure
ProofEasy Makes Your Insurance Policy Documentation Secure
 
Digitize your document workflows with ProofEasy.pptx
Digitize your document workflows with ProofEasy.pptxDigitize your document workflows with ProofEasy.pptx
Digitize your document workflows with ProofEasy.pptx
 
Where can you use ProofEasy?
Where can you use ProofEasy?Where can you use ProofEasy?
Where can you use ProofEasy?
 
ProofEasy_DigitalCertificate_Education.pptx
ProofEasy_DigitalCertificate_Education.pptxProofEasy_DigitalCertificate_Education.pptx
ProofEasy_DigitalCertificate_Education.pptx
 
Blockchain Based e-Certificate In Education
Blockchain Based e-Certificate In EducationBlockchain Based e-Certificate In Education
Blockchain Based e-Certificate In Education
 
Proofeasy
Proofeasy Proofeasy
Proofeasy
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

ProofeasyPPT.pptx

  • 2. • ProofEasy has developed a new anti-fraud document verification process which utilizes block chain and QR code technology for document verification. • The objective of this session is to give a brief overview and demo of what we do and how. INTRODUCTION
  • 3. Complex Forgery Detection. Easy availability of digital editing, alteration, and manipulation tools have made forgery very easy. Variety of digital documents needing complex and lengthy verification solutions. Lengthy procedures, complex analytics and algorithms are required to ensure document security. Differentiating forgery and clarity modification. There are thinnest differences in identifying the forgeries and the alteration made in digital assets for the purpose of increasing the clarity of information representation. Expensive document verification solutions. Traditional document verification solutions charge variable document verification fee and document storage costs separately, which make them expensive. CHALLENGES IN DOCUMENT FORGERY DETECTION PROBLEMS
  • 4. Very high level of security guaranteed in the form a solution built on patented block-chain and QR code security technology Building trust as users can compare the document under inspection with the original themselves Efficient process where documents can be secured and shared in real time Simple and easy to understand user interface and authentication process Highly competitive price and value for money service which offers both document verification and storage service in one price ProofEasy removes the bottleneck in fraud prevention by eliminating the need for third party verification and has the following solution for document forgery problems: 1 2 3 4 5 OUR SOLUTION: ProofEasy
  • 5. Submit document Encrypted hashing Download & share QR code placement VeriDoc Global TM block chain security SECURE AND SHARE Scan QR code ProofEasy validation Verify on block chain Note Inspect visually VERIFY & VALIDATE HOW IT WORKS
  • 6. Banks And Financial Institutions Educational Institutions Professional Service Firm (like legal, audit, taxation firms etc.) Government Institutions especially identity issuing authorities Medical & Insurance Companies Document originators are the target market for ProofEasy. Our key target customers/market segments will be: OUR TARGET CUSTOMERS
  • 7. The COVID-19 pandemic has impacted virtually all businesses, especially Educational institutions, Government Institutions and Professional Services firms. These organizations are increasingly looking to automate document verification processes and minimize physical contact. Automating document verification has also increased digital document manipulation risk. ProofEasy’s MVP can be used to immediately solve such problems and help to secure, authenticate and verify all types of documents in real-time while minimizing the need for face to face interactions as well. On top of a high level of security and efficiency, it’s a very cheap way of securing documents. Blockchain Passports COVID-Free Certificates Contact Tracing LATEST EMERGING SOLUTIONS Proofeasy MVP - A SOLUTION TO COVID-19 CHALLENGES
  • 8. Stored on Immutable Blockchain Generates a document hash (equivalent to a DNA or fingerprint of document) Decentralized Ledger or Blockchain Technology Always Unique to a Particular Document Cannot be Altered by Even the Issuer of the Document Not Possible to Hack Cannot Reverse Engineer a Document  Only check fraud costs banks about $900M per year with 22% of all fraudulent checks attributed to signature fraud (1).  Companies in the US have lost USD 500 billion due to fraud (2).  Data breaches exposed 4.1 billion records in the first half of 2019 (3). Why it is Important? Sources: (1) https://towardsdatascience.com/signature- fraud-detection-an-advanced-analytics- approach-10c810cda26e (2) https://www.forbes.com/sites/leemathews/201 7/05/05/phishing-scams-cost-american- businesses-half-a-billion-dollars-a- year/#5a6d1ee43fa1 (3) https://www.varonis.com/blog/cybersecurity- statistics/ COMPETITIVE ADVANTAGES