SlideShare a Scribd company logo
1 of 10
© Mobico Comodo Private Limited
Global Identity and Access Management System
truMe: Value Proposition
• Employees, students and visitors, all can be on same platform
• Real-time visibility on employees’ & visitors’ movement
• Differential access & duration-based passes to students/ temp staff
• Unlimited users on one platform
• Great flexibility to write and modify access rules real-time –
centrally or at location level
• Multiple options to register a visitor away from location,
decluttering the reception desk
• Auto-generated customized reports to central/ local admin
• 1,2 or 3 level authentication available
• In-built parking access management for employees
• In-built ERS helps in case of emergency and disaster management
Compelling Cost-
efficiency
• Very low staff/ security guard requirement
• No expense on printing slips for visitors
• Reduction in hardware cost
• No NFC cards required for employees and temp staff
• Low maintenance
State-of-the-art
Solution
Access Gate Controller
(AGC)
Registration Mode of Access for
User
truMe App
and/or
Reception Module
and/ or
Self Registration
Module
truMe App
and/ or
QR Scanner
and/ or
NFC Card
QR Code – Print
or Screen
NFC Reader
Finger
Biometrics
Face Biometrics
Real-time Dynamic Access Rules Visibility Reports & Analytics
truMe Platform
Installation
Operation
• Invited visitors with truMe app on their phone enter by scanning a QR
• Invited visitors, without truMe app on phone get access basis truMe
digital pass sent to them in advance
• Uninvited visitors with truMe app on their phone can be issued a digital
pass instantly on the app itself
• Uninvited visitors without truMe app are registered at reception and
issued a digital pass
• Students are authorized access within the designated hours, from the
designated turnstiles
• Resident students can be issued limited duration passes
• Employees enter by scanning a location QR code from truMe App
• Temp staff is issued duration based, day/time specific digital passes for
controlled access
• Institution installs truMe - Admin Module, Reception Module and/ or
Self-Registration Module, Location QR Codes and Controllers
• truMe codes in the access rules as framed by the administration
• Employees and students create digital identity on truMe app; can also be
issued NFC cards
• Receptionists/ Admin are trained to register visitors/ generate reports
truMe at Work
Registration
QR code
on
Paper
QR Code
on
Tablet
truMe at Work …
Name:
Phone No.:
At Self-registration Tab
truMe Scanner or QR
code on
User’s phone
At Reception
on truMe App
Registration Access
QR
Scanner
on
Tablet
The truMe Advantage
Security
• Controlled & secure access on the basis of pre-verified identity
• Tamper proof QR code, QR Scanner and NFC tags
• Flexibility to configure gates as per desired security levels
• Complete real time visibility of a visitor from entry to exit
• In-built emergency Response system for all the inmates in the complex
Efficiency
• Employees & students – Seamless access management, with flexibility
to configure differential access
• Temp Staff - Custom duration passes; easy renewal/ cancellation of
access passes; Integrated attendance system
• Configurable dynamic access control to cater for diversity
• Power of analytics available in real time; detailed access reports
Convenience
• No queues – No paperwork – No wait time – No friction
• Invite for meeting from App itself
• Employees and visitors enter in seamless manner
• Complete privacy for the invitees/ visitors
Security
Features
Versatility
• Entire manual process automated, resulting in enhanced security for
the building & the people and privacy and convenience for the visitors
• Complete flexibility to devise access rules, including varying levels of
security
• Access rules can be changed by the complex with zero TAT
• Real time visibility on visitor movement & throughput, enabling quick
and informed decision making
• Emergency Response System could address various real-time
communication needs
• Real-time availability of the access data for business analytics
truMe: Robust, Secure, Versatile
• AES 256 bit encryption and data on cloud behind a firewall
• End to end encryption ensures that data between truMe app, AGCs
and server always travels in encrypted form and can be read only by
the truMe application
• truMe identity and doc, if any on user’s phone are also encrypted
and cannot be transferred to any other application/ device
• truMe identity and the supporting doc, if any on truMe platform are
stored on separate servers on the cloud
• The data remains with the organization; Mobico has no access to it
Limited
Personal Data
truMe Identity
• truMe flags a user’s organization based identity as specific to only that
organization and does not recognize it for access to any other organization
unless the user specifically allows that
• truMe treats a particular identity as global only when the user specifically
opts to create one to access multiple establishments
• If an organization is using truMe to deal with its customers, all such
identities are deleted automatically after the relevant event
• Mobico is open to and encourages third party audit of truMe servers/
platform
truMe: Rock-solid Privacy Protection
• Unlike many applications, truMe neither has, nor asks for access to data
on user’s phone
• truMe does not track or record user’s access history. User’s access
details are available only to the organization at their location server
• truMe identity consists of user’s name, phone number, photograph and
email ID; Each of these identity attributes are already in public domain
• truMe identity and the supporting doc/s, if any are stored on different
servers on the cloud, fully protected by a firewall
• truMe identity and doc/s, if any on user’s phone are also encrypted and
cannot be transferred to any other application/ device
The People
The Team
The
Company
• Pramod N Uniyal – Background in internal security, 23 years of
experience of creating and leading organizations, IIMA alumnus
• Babu Dayal - Serial entrepreneur, 24 years of experience in technology
space in US, Japan & India
• Lalit Mehta – Serial entrepreneur, 23 years of experience in technology
and finance, IIMA alumnus
Mobico Comodo Pvt. Ltd. is a technology product company. We are an ISO
27001:2013 and ISO 9001:2015 certified company. Mobico owns the patent
on truMe platform under section 11 A (3) of the Patents (Amendment) Act
2005. Mobico’s truMe platform is already under deployment with customers
like Kotak Mahindra Bank, Bharti, XL Labs, Decimal Tech, Advant Navis etc.
Thank You
www.trume.in

More Related Content

What's hot

truMe for wellness centres
truMe for wellness centrestruMe for wellness centres
truMe for wellness centresAthulJojo1
 
Mobile payments and PCI DSS
Mobile payments and PCI DSSMobile payments and PCI DSS
Mobile payments and PCI DSSManish Mahapatra
 
Exfiltration slides-v1-release
Exfiltration slides-v1-releaseExfiltration slides-v1-release
Exfiltration slides-v1-releaseEric Koeppen
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data ProtectionGeekTek IT Services
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & SecurityForgeRock
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationHafiza Abas
 
The mobile evolution of the employee and student pass
The mobile evolution of the employee and student passThe mobile evolution of the employee and student pass
The mobile evolution of the employee and student passSURFnet
 
IV Sem MTA HK Unit 2
IV Sem MTA HK Unit 2IV Sem MTA HK Unit 2
IV Sem MTA HK Unit 2S Joseph
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityPrecisely
 
Mobilination Ntymoshyk Personal Mobile Security Final Public
Mobilination Ntymoshyk Personal Mobile Security  Final PublicMobilination Ntymoshyk Personal Mobile Security  Final Public
Mobilination Ntymoshyk Personal Mobile Security Final PublicTjylen Veselyj
 

What's hot (17)

truMe for wellness centres
truMe for wellness centrestruMe for wellness centres
truMe for wellness centres
 
Mobile payments and PCI DSS
Mobile payments and PCI DSSMobile payments and PCI DSS
Mobile payments and PCI DSS
 
Security login
Security loginSecurity login
Security login
 
Exfiltration slides-v1-release
Exfiltration slides-v1-releaseExfiltration slides-v1-release
Exfiltration slides-v1-release
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & Security
 
Layers of control
Layers of controlLayers of control
Layers of control
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and Operation
 
AAA of security
AAA of securityAAA of security
AAA of security
 
Physical security
Physical securityPhysical security
Physical security
 
Simple yet powerful ways to prevent workplace theft
Simple yet powerful ways to prevent workplace theftSimple yet powerful ways to prevent workplace theft
Simple yet powerful ways to prevent workplace theft
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
The mobile evolution of the employee and student pass
The mobile evolution of the employee and student passThe mobile evolution of the employee and student pass
The mobile evolution of the employee and student pass
 
IV Sem MTA HK Unit 2
IV Sem MTA HK Unit 2IV Sem MTA HK Unit 2
IV Sem MTA HK Unit 2
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network Security
 
Mobilination Ntymoshyk Personal Mobile Security Final Public
Mobilination Ntymoshyk Personal Mobile Security  Final PublicMobilination Ntymoshyk Personal Mobile Security  Final Public
Mobilination Ntymoshyk Personal Mobile Security Final Public
 

Similar to Visitor Management System for educational institutions

truMe for visitor access management
truMe for visitor access managementtruMe for visitor access management
truMe for visitor access managementAthulJojo1
 
truMe visitor management system
truMe visitor management systemtruMe visitor management system
truMe visitor management systemAthulJojo1
 
Visitor management system in government buildings
Visitor management system in government buildingsVisitor management system in government buildings
Visitor management system in government buildingsAthulJojo1
 
Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...
Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...
Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...Tensor Plc .
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
Powerpoint Marketing Template
Powerpoint Marketing TemplatePowerpoint Marketing Template
Powerpoint Marketing TemplateMike Lee
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
 
Traka airport solutions flyer
Traka airport solutions flyerTraka airport solutions flyer
Traka airport solutions flyerTara Wally
 
truMe - Global Digital Identity and Access Management
truMe - Global Digital Identity and Access ManagementtruMe - Global Digital Identity and Access Management
truMe - Global Digital Identity and Access ManagementNeeraj Taneja
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policyssuser06c4a6
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01Walter Sinchak,
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoUn enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoCristian Garcia G.
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
It security
It securityIt security
It securityavi2607
 
Smart attendance system
Smart attendance systemSmart attendance system
Smart attendance systempraful borad
 

Similar to Visitor Management System for educational institutions (20)

truMe for visitor access management
truMe for visitor access managementtruMe for visitor access management
truMe for visitor access management
 
truMe visitor management system
truMe visitor management systemtruMe visitor management system
truMe visitor management system
 
Visitor management system in government buildings
Visitor management system in government buildingsVisitor management system in government buildings
Visitor management system in government buildings
 
Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...
Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...
Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Access-control-system
Access-control-systemAccess-control-system
Access-control-system
 
OT Solution Overview.pptx
OT Solution Overview.pptxOT Solution Overview.pptx
OT Solution Overview.pptx
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
Powerpoint Marketing Template
Powerpoint Marketing TemplatePowerpoint Marketing Template
Powerpoint Marketing Template
 
Presentation.pdf
Presentation.pdfPresentation.pdf
Presentation.pdf
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
Traka airport solutions flyer
Traka airport solutions flyerTraka airport solutions flyer
Traka airport solutions flyer
 
truMe - Global Digital Identity and Access Management
truMe - Global Digital Identity and Access ManagementtruMe - Global Digital Identity and Access Management
truMe - Global Digital Identity and Access Management
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoUn enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
It security
It securityIt security
It security
 
Smart attendance system
Smart attendance systemSmart attendance system
Smart attendance system
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Visitor Management System for educational institutions

  • 1. © Mobico Comodo Private Limited Global Identity and Access Management System
  • 2. truMe: Value Proposition • Employees, students and visitors, all can be on same platform • Real-time visibility on employees’ & visitors’ movement • Differential access & duration-based passes to students/ temp staff • Unlimited users on one platform • Great flexibility to write and modify access rules real-time – centrally or at location level • Multiple options to register a visitor away from location, decluttering the reception desk • Auto-generated customized reports to central/ local admin • 1,2 or 3 level authentication available • In-built parking access management for employees • In-built ERS helps in case of emergency and disaster management Compelling Cost- efficiency • Very low staff/ security guard requirement • No expense on printing slips for visitors • Reduction in hardware cost • No NFC cards required for employees and temp staff • Low maintenance State-of-the-art Solution
  • 3. Access Gate Controller (AGC) Registration Mode of Access for User truMe App and/or Reception Module and/ or Self Registration Module truMe App and/ or QR Scanner and/ or NFC Card QR Code – Print or Screen NFC Reader Finger Biometrics Face Biometrics Real-time Dynamic Access Rules Visibility Reports & Analytics truMe Platform
  • 4. Installation Operation • Invited visitors with truMe app on their phone enter by scanning a QR • Invited visitors, without truMe app on phone get access basis truMe digital pass sent to them in advance • Uninvited visitors with truMe app on their phone can be issued a digital pass instantly on the app itself • Uninvited visitors without truMe app are registered at reception and issued a digital pass • Students are authorized access within the designated hours, from the designated turnstiles • Resident students can be issued limited duration passes • Employees enter by scanning a location QR code from truMe App • Temp staff is issued duration based, day/time specific digital passes for controlled access • Institution installs truMe - Admin Module, Reception Module and/ or Self-Registration Module, Location QR Codes and Controllers • truMe codes in the access rules as framed by the administration • Employees and students create digital identity on truMe app; can also be issued NFC cards • Receptionists/ Admin are trained to register visitors/ generate reports truMe at Work
  • 5. Registration QR code on Paper QR Code on Tablet truMe at Work … Name: Phone No.: At Self-registration Tab truMe Scanner or QR code on User’s phone At Reception on truMe App Registration Access QR Scanner on Tablet
  • 6. The truMe Advantage Security • Controlled & secure access on the basis of pre-verified identity • Tamper proof QR code, QR Scanner and NFC tags • Flexibility to configure gates as per desired security levels • Complete real time visibility of a visitor from entry to exit • In-built emergency Response system for all the inmates in the complex Efficiency • Employees & students – Seamless access management, with flexibility to configure differential access • Temp Staff - Custom duration passes; easy renewal/ cancellation of access passes; Integrated attendance system • Configurable dynamic access control to cater for diversity • Power of analytics available in real time; detailed access reports Convenience • No queues – No paperwork – No wait time – No friction • Invite for meeting from App itself • Employees and visitors enter in seamless manner • Complete privacy for the invitees/ visitors
  • 7. Security Features Versatility • Entire manual process automated, resulting in enhanced security for the building & the people and privacy and convenience for the visitors • Complete flexibility to devise access rules, including varying levels of security • Access rules can be changed by the complex with zero TAT • Real time visibility on visitor movement & throughput, enabling quick and informed decision making • Emergency Response System could address various real-time communication needs • Real-time availability of the access data for business analytics truMe: Robust, Secure, Versatile • AES 256 bit encryption and data on cloud behind a firewall • End to end encryption ensures that data between truMe app, AGCs and server always travels in encrypted form and can be read only by the truMe application • truMe identity and doc, if any on user’s phone are also encrypted and cannot be transferred to any other application/ device • truMe identity and the supporting doc, if any on truMe platform are stored on separate servers on the cloud • The data remains with the organization; Mobico has no access to it
  • 8. Limited Personal Data truMe Identity • truMe flags a user’s organization based identity as specific to only that organization and does not recognize it for access to any other organization unless the user specifically allows that • truMe treats a particular identity as global only when the user specifically opts to create one to access multiple establishments • If an organization is using truMe to deal with its customers, all such identities are deleted automatically after the relevant event • Mobico is open to and encourages third party audit of truMe servers/ platform truMe: Rock-solid Privacy Protection • Unlike many applications, truMe neither has, nor asks for access to data on user’s phone • truMe does not track or record user’s access history. User’s access details are available only to the organization at their location server • truMe identity consists of user’s name, phone number, photograph and email ID; Each of these identity attributes are already in public domain • truMe identity and the supporting doc/s, if any are stored on different servers on the cloud, fully protected by a firewall • truMe identity and doc/s, if any on user’s phone are also encrypted and cannot be transferred to any other application/ device
  • 9. The People The Team The Company • Pramod N Uniyal – Background in internal security, 23 years of experience of creating and leading organizations, IIMA alumnus • Babu Dayal - Serial entrepreneur, 24 years of experience in technology space in US, Japan & India • Lalit Mehta – Serial entrepreneur, 23 years of experience in technology and finance, IIMA alumnus Mobico Comodo Pvt. Ltd. is a technology product company. We are an ISO 27001:2013 and ISO 9001:2015 certified company. Mobico owns the patent on truMe platform under section 11 A (3) of the Patents (Amendment) Act 2005. Mobico’s truMe platform is already under deployment with customers like Kotak Mahindra Bank, Bharti, XL Labs, Decimal Tech, Advant Navis etc.