SlideShare a Scribd company logo
TruMe
❖ MoBiCo Comodo
Redefine the way we move
Copyright – Mobico Comodo Pvt.
Ltd.
Copyright 2017 Mobico Comodo Pvt. Ltd.
Global Identity and Access Management
Redefine the way we move
truMe
Security. Privacy.
Convenience.
Integrated Global Identity and Access Management
2
3
OurPurpose
Why does truMe exist
Offer a digital platform for Identity
Management that works and is
accepted across borders, that
allows management of access to
physical and digital locations in
most secure and convenient way
without compromising usier privacy
4
Security Privacy Efficient
Convenience
What problems do we solve
One of the biggest
concerns that is
bothering every
individual and
nation
Most of us feel
insecure when we
have to divulge our
personal
information to
anyone whom we
don’t know
We would rather
spend time with our
family or do
something that we
like rather than
standing in a Queue
just waitingg for our
turn
True Secure Identity on mobile
❖ Create Digital Identity
❖ Build Identity Profile by
verifications
 Mobile No
 Email
 Aadhar Number
 Aadhar Biometric
 PAN Card
 Drivers License
 Vehicle Registration Number
 Crowd sourcing
Use Secure Identity Profile on Mobile Device
Secured Convenient
Access
No Identity Footprint at
access points
Access Point-Key Features
 QR Code Scanner
 NFC Enabled
 Aadhaar Based Bio Scanner
 No data stored on kiosk
 Real Time Communication with
Server
 Rule Based Access
 No Manual Setup Required
 Auto Upgradable
Where and Why Use Digital Identity
=
Integrated
Global
Identity &
Access
Management
Platform
offers a very secure and
reliable way to establish
identity of individuals & allows
the identity to be used for
various use cases major one
being access control
12
How does it work
Process
Digital Footprint
Bind Identity to
verified Mobile
Number & Email
Biometric
Link digital
footprint with
Individual
Biometric
Facial Recognition
Use facial images from validated
source and current use case for
verification
Validation of Identity by humans is neither most reliable nor very efficient
but combination of humans and machine is a much better bet
Identity Redefined
Use Case 1
truMe for Visitors
➔Access can be allowed on the basis of profile scan or invite
only scan in the restricted areas.
➔Easy and quick on the spot registration for users without
mobile app.
➔Real time monitoring of visitors.
➔Emergency response
truMe for Temp workers
➔Monthly/Daily/Custom duration passes can be issued to
temp workers.
➔eKYC of Temp workers.
➔Configurable access control.
➔Passes can be easily renewed and cancelled.
truMe for Employees
➔ Attendance Management.
➔ Physical Access Management.
➔ Configurable access control.
➔ Bio-enabled access.
Deployment Strategy
➔On Premise or Cloud Based implementation.
➔Network Requirement : Internet Connectivity and LAN.
➔Easy integration with existing access gates.
➔Deployment Time : 1-2 working days.
RECEPTION
E
N
T
R
Y
Open
Area
Entering
Management Dept.
TruMe
GATE
Not authorised to
access this Area.
truMe Kiosk
Management Dept.
Server Room
ITDept.
Open
Area
Entering
inside
Office
Building.
Workflow
RECEPTION
E
N
T
R
Y
Open
Area
Entering
Management Dept.
TruMe
GATE
Not authorised to
access this Area.
truMe Kiosk
Management Dept.
Server Room
ITDept.
Open
Area
Verifying pre –
Registered user
Registering User
Registration and
Verification.
RECEPTION
E
N
T
R
Y
Open
Area
Entering
Management Dept.
TruMe
Different access
gates can be
installed based
on security type.
GATE
Not authorised to
access this Area.
truMe Kiosk
Management Dept.
Server Room
ITDept.
Open
Area
truMe
For
e-KYC
Use Case 2
How truMe will help
➔ Easy and Quick e-KYC.
➔ Go ‘Paperless’.
➔ Detailed e-KYC status reports.
➔ Integrate with Access Gates.
➔ Integration with another System to share e-KYC details.
truMe for Temp Staff & Employees
➔Do e-KYC of new Joinees.
➔Onboarding of Temp staff using e-KYC for quick verification.
➔Employee verification using e-KYC.
➔Bulk upload process to do e-KYC of existing staff in one go.
➔Employees and Temp Staff can verify themselves against the
generated e-KYC requests as per their convenience using self
service kiosk.
RECEPTION
TruM
e
G A T E
e-KYC
Process.
Server Room
Management Dept.
e-
KYC
Open
Area
Deployment Strategy
➔On Premise or Cloud Based implementation.
➔Centralised server for multiple locations for effective controlling
and reporting.
➔Network Requirement : Internet Connectivity and LAN.
➔Easy integration with existing access gates.
➔Deployment Time : 1-2 working days.
Airports Access
 Integrate with Airports to get ticket information
 Get Ticket Information from Email/SMS on User
Mobile
 Generate Access Card (QR Code) with Idenity and
Access Information
Use Case 3
Residential Complexes
 Resident Access
 Visitor Management
 Pass based access for
housekeeping
Use Case 4
Events And Exhibitions
 Convenient and secure access.
 Efficient and controlled access for visitors and delegates
 Reliable solution for big events and exhibitions.
 Entry point access control
 Real time information availability of occupants
Use Case 5
Use Case 6
Stadiums
 Convenient and secure access.
 Efficient and controlled access for visitors and
delegates
 Sport events entry point access control
 Real time information availability of occupants
Clubs & Recreation Centres
 Membership based access
 Easy age verification.
 Verify Identity before access.
Use Case 7
41
ContactUs
+91 8130788008, 9811679124, 9815901670
www.mobicomodo.com
lalit@mobicomodo.com

More Related Content

What's hot

Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
Hai Nguyen
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Hai Nguyen
 
Design and Implementation of an IP based authentication mechanism for Open So...
Design and Implementation of an IP based authentication mechanism for Open So...Design and Implementation of an IP based authentication mechanism for Open So...
Design and Implementation of an IP based authentication mechanism for Open So...
WilliamJohn41
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
IBM Security
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
Hai Nguyen
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
Solus
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
Hai Nguyen
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
Jeff Green
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
Hai Nguyen
 
kicking your enterprise security up a notch with adaptive authentication sa...
kicking your enterprise security up a notch with adaptive authentication   sa...kicking your enterprise security up a notch with adaptive authentication   sa...
kicking your enterprise security up a notch with adaptive authentication sa...
Sagara Gunathunga
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
 
Secure Code Warrior - Fail securely
Secure Code Warrior - Fail securelySecure Code Warrior - Fail securely
Secure Code Warrior - Fail securely
Secure Code Warrior
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
onionid12
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
Dilip Kr. Jangir
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
Nick Owen
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
andreeabrodo
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
Ramesh Nagappan
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
Nikhil Shaw
 
ppt
pptppt
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
Will Adams
 

What's hot (20)

Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Design and Implementation of an IP based authentication mechanism for Open So...
Design and Implementation of an IP based authentication mechanism for Open So...Design and Implementation of an IP based authentication mechanism for Open So...
Design and Implementation of an IP based authentication mechanism for Open So...
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
kicking your enterprise security up a notch with adaptive authentication sa...
kicking your enterprise security up a notch with adaptive authentication   sa...kicking your enterprise security up a notch with adaptive authentication   sa...
kicking your enterprise security up a notch with adaptive authentication sa...
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Secure Code Warrior - Fail securely
Secure Code Warrior - Fail securelySecure Code Warrior - Fail securely
Secure Code Warrior - Fail securely
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
 
ppt
pptppt
ppt
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 

Similar to truMe - Global Digital Identity and Access Management

Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
indragantiSaiHiranma
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptx
Archana833240
 
Presentation.pdf
Presentation.pdfPresentation.pdf
Presentation.pdf
ssusere1d124
 
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
FinTech Belgium
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET Journal
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
IRJET Journal
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
IJERA Editor
 
BeyondCorp and Zero Trust
BeyondCorp and Zero TrustBeyondCorp and Zero Trust
BeyondCorp and Zero Trust
Ivan Dwyer
 
POEMS- Participative Online Examination Management Systems
POEMS- Participative Online Examination Management SystemsPOEMS- Participative Online Examination Management Systems
POEMS- Participative Online Examination Management Systems
A. Kumar, ICT Expert Sr. Consultant
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition Overview
Natalie Hewitt
 
Cuckoo Tech - The Seamless Time & Attendance solution
Cuckoo Tech - The Seamless Time & Attendance solutionCuckoo Tech - The Seamless Time & Attendance solution
Cuckoo Tech - The Seamless Time & Attendance solution
HR Fidelity Consulting Services LLP
 
TruNtrance - HRMS & Visitor Access Management Solutions
TruNtrance - HRMS & Visitor Access Management SolutionsTruNtrance - HRMS & Visitor Access Management Solutions
TruNtrance - HRMS & Visitor Access Management Solutions
Biocube Technologies Inc.
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
guestf9788dc7
 
BeyondCorp New York Meetup: Closing the Adherence Gap
BeyondCorp New York Meetup: Closing the Adherence GapBeyondCorp New York Meetup: Closing the Adherence Gap
BeyondCorp New York Meetup: Closing the Adherence Gap
Ivan Dwyer
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!
Process Fusion Inc
 
Visitor manage PPT March2023.pptx
Visitor manage PPT March2023.pptxVisitor manage PPT March2023.pptx
Visitor manage PPT March2023.pptx
ZapiotechDubai
 
DocuSign for NetSuite CRM webinar
DocuSign for NetSuite CRM webinarDocuSign for NetSuite CRM webinar
DocuSign for NetSuite CRM webinar
DocuSign
 
6 simple things to remember about kyc verification
6 simple things to remember about kyc verification6 simple things to remember about kyc verification
6 simple things to remember about kyc verification
Shufti Pro
 
Transaction&process integrity
Transaction&process integrityTransaction&process integrity
Transaction&process integrity
Strategic Business & IT Services
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuirity
Sarath K
 

Similar to truMe - Global Digital Identity and Access Management (20)

Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptx
 
Presentation.pdf
Presentation.pdfPresentation.pdf
Presentation.pdf
 
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 
BeyondCorp and Zero Trust
BeyondCorp and Zero TrustBeyondCorp and Zero Trust
BeyondCorp and Zero Trust
 
POEMS- Participative Online Examination Management Systems
POEMS- Participative Online Examination Management SystemsPOEMS- Participative Online Examination Management Systems
POEMS- Participative Online Examination Management Systems
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition Overview
 
Cuckoo Tech - The Seamless Time & Attendance solution
Cuckoo Tech - The Seamless Time & Attendance solutionCuckoo Tech - The Seamless Time & Attendance solution
Cuckoo Tech - The Seamless Time & Attendance solution
 
TruNtrance - HRMS & Visitor Access Management Solutions
TruNtrance - HRMS & Visitor Access Management SolutionsTruNtrance - HRMS & Visitor Access Management Solutions
TruNtrance - HRMS & Visitor Access Management Solutions
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
BeyondCorp New York Meetup: Closing the Adherence Gap
BeyondCorp New York Meetup: Closing the Adherence GapBeyondCorp New York Meetup: Closing the Adherence Gap
BeyondCorp New York Meetup: Closing the Adherence Gap
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!
 
Visitor manage PPT March2023.pptx
Visitor manage PPT March2023.pptxVisitor manage PPT March2023.pptx
Visitor manage PPT March2023.pptx
 
DocuSign for NetSuite CRM webinar
DocuSign for NetSuite CRM webinarDocuSign for NetSuite CRM webinar
DocuSign for NetSuite CRM webinar
 
6 simple things to remember about kyc verification
6 simple things to remember about kyc verification6 simple things to remember about kyc verification
6 simple things to remember about kyc verification
 
Transaction&process integrity
Transaction&process integrityTransaction&process integrity
Transaction&process integrity
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuirity
 

Recently uploaded

如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
Karya Keeper
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
TaghreedAltamimi
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
mz5nrf0n
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
Massimo Artizzu
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
kalichargn70th171
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
dakas1
 
fiscal year variant fiscal year variant.
fiscal year variant fiscal year variant.fiscal year variant fiscal year variant.
fiscal year variant fiscal year variant.
AnkitaPandya11
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 

Recently uploaded (20)

如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
 
fiscal year variant fiscal year variant.
fiscal year variant fiscal year variant.fiscal year variant fiscal year variant.
fiscal year variant fiscal year variant.
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 

truMe - Global Digital Identity and Access Management

  • 1. TruMe ❖ MoBiCo Comodo Redefine the way we move Copyright – Mobico Comodo Pvt. Ltd. Copyright 2017 Mobico Comodo Pvt. Ltd. Global Identity and Access Management Redefine the way we move
  • 3. 3 OurPurpose Why does truMe exist Offer a digital platform for Identity Management that works and is accepted across borders, that allows management of access to physical and digital locations in most secure and convenient way without compromising usier privacy
  • 4. 4 Security Privacy Efficient Convenience What problems do we solve One of the biggest concerns that is bothering every individual and nation Most of us feel insecure when we have to divulge our personal information to anyone whom we don’t know We would rather spend time with our family or do something that we like rather than standing in a Queue just waitingg for our turn
  • 5. True Secure Identity on mobile ❖ Create Digital Identity ❖ Build Identity Profile by verifications  Mobile No  Email  Aadhar Number  Aadhar Biometric  PAN Card  Drivers License  Vehicle Registration Number  Crowd sourcing
  • 6. Use Secure Identity Profile on Mobile Device Secured Convenient Access No Identity Footprint at access points
  • 7. Access Point-Key Features  QR Code Scanner  NFC Enabled  Aadhaar Based Bio Scanner  No data stored on kiosk  Real Time Communication with Server  Rule Based Access  No Manual Setup Required  Auto Upgradable
  • 8. Where and Why Use Digital Identity =
  • 9.
  • 10. Integrated Global Identity & Access Management Platform offers a very secure and reliable way to establish identity of individuals & allows the identity to be used for various use cases major one being access control
  • 11.
  • 12. 12 How does it work Process Digital Footprint Bind Identity to verified Mobile Number & Email Biometric Link digital footprint with Individual Biometric Facial Recognition Use facial images from validated source and current use case for verification Validation of Identity by humans is neither most reliable nor very efficient but combination of humans and machine is a much better bet Identity Redefined
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 23.
  • 24. truMe for Visitors ➔Access can be allowed on the basis of profile scan or invite only scan in the restricted areas. ➔Easy and quick on the spot registration for users without mobile app. ➔Real time monitoring of visitors. ➔Emergency response
  • 25. truMe for Temp workers ➔Monthly/Daily/Custom duration passes can be issued to temp workers. ➔eKYC of Temp workers. ➔Configurable access control. ➔Passes can be easily renewed and cancelled.
  • 26. truMe for Employees ➔ Attendance Management. ➔ Physical Access Management. ➔ Configurable access control. ➔ Bio-enabled access.
  • 27. Deployment Strategy ➔On Premise or Cloud Based implementation. ➔Network Requirement : Internet Connectivity and LAN. ➔Easy integration with existing access gates. ➔Deployment Time : 1-2 working days.
  • 28. RECEPTION E N T R Y Open Area Entering Management Dept. TruMe GATE Not authorised to access this Area. truMe Kiosk Management Dept. Server Room ITDept. Open Area Entering inside Office Building. Workflow
  • 29. RECEPTION E N T R Y Open Area Entering Management Dept. TruMe GATE Not authorised to access this Area. truMe Kiosk Management Dept. Server Room ITDept. Open Area Verifying pre – Registered user Registering User Registration and Verification.
  • 30. RECEPTION E N T R Y Open Area Entering Management Dept. TruMe Different access gates can be installed based on security type. GATE Not authorised to access this Area. truMe Kiosk Management Dept. Server Room ITDept. Open Area
  • 32. How truMe will help ➔ Easy and Quick e-KYC. ➔ Go ‘Paperless’. ➔ Detailed e-KYC status reports. ➔ Integrate with Access Gates. ➔ Integration with another System to share e-KYC details.
  • 33. truMe for Temp Staff & Employees ➔Do e-KYC of new Joinees. ➔Onboarding of Temp staff using e-KYC for quick verification. ➔Employee verification using e-KYC. ➔Bulk upload process to do e-KYC of existing staff in one go. ➔Employees and Temp Staff can verify themselves against the generated e-KYC requests as per their convenience using self service kiosk.
  • 34. RECEPTION TruM e G A T E e-KYC Process. Server Room Management Dept. e- KYC Open Area
  • 35. Deployment Strategy ➔On Premise or Cloud Based implementation. ➔Centralised server for multiple locations for effective controlling and reporting. ➔Network Requirement : Internet Connectivity and LAN. ➔Easy integration with existing access gates. ➔Deployment Time : 1-2 working days.
  • 36. Airports Access  Integrate with Airports to get ticket information  Get Ticket Information from Email/SMS on User Mobile  Generate Access Card (QR Code) with Idenity and Access Information Use Case 3
  • 37. Residential Complexes  Resident Access  Visitor Management  Pass based access for housekeeping Use Case 4
  • 38. Events And Exhibitions  Convenient and secure access.  Efficient and controlled access for visitors and delegates  Reliable solution for big events and exhibitions.  Entry point access control  Real time information availability of occupants Use Case 5
  • 39. Use Case 6 Stadiums  Convenient and secure access.  Efficient and controlled access for visitors and delegates  Sport events entry point access control  Real time information availability of occupants
  • 40. Clubs & Recreation Centres  Membership based access  Easy age verification.  Verify Identity before access. Use Case 7
  • 41. 41 ContactUs +91 8130788008, 9811679124, 9815901670 www.mobicomodo.com lalit@mobicomodo.com