Está en la página 1de 19

Mobile Apps Based on Natural Language Processing. InCights Mobile Solution Pvt. Ltd.

Corporate Presentation
e g mor in ecom e b Believ s are ss app ticated, We ation s wirele c As sophi thenti d u ter an ll require a smar s pp wi quitou er y A bi Ev i de U e Prov bile Apps W o oice, ing V n to M Us t i c at i o n Authe

Chief Mentor: Mr. Anirudh Prabahakaran ( CEO, 3i Infotech. Member IAN) incubated at:

Tuesday 22 November 11

The Enabling Team- Multiyear Experience with Access to best Practices


Varun Chandra: Previous Association includes TCS, Nokia Siemens Network, IIMA. Has done various independent consulting Projects/Publication with Faculty of IIMA Vinay Modi: Scholar from Edinburg University, He brings vast academic and Professional Experience of working with Voice Based Semantics System. He was also Cofounder of Voice Pitara. Best Business Plan Sreenivas Adiki: He has 23+ years of Experience of managing multimillion projects. His last assignment was Head Products- TCS Mobility

The Company has had Media Coverage in CNBC, HitvadaThe Newspaper, Economic Times,FranchiseIndia, KPMG Telecom Report 2010, Voice and data, Times of India, The Hindu, IIMA Research Reports, TRAI, RBI. Telecom Talk and all leading publications

Class of 2010

Finalist

Kit Sponsor For Mobile Broadband: Igniting the Service Revolution

Tuesday 22 November 11

The Challenges - Authentication


The person, who has my office id card, can... The person, who has my credit cards details can... The person who knows my password, can... The person, who steals my passport, can... The person, who is able to forge my signature, can... The Person, who has access to my mobile, can...

The need for Authentication, Privacy, and Security of Mobile Application is upmost, but the Challenge is access and integration to last mile device connectivity and high cost of Authentication.

Tuesday 22 November 11

The Ubiquitous Authentication- Voice


It becomes obsolete to beware passwords safely or to remember to all of them Abuse of stolen id cards and passwords will be reduced enormously Abuse of stolen id cards and passports will be reduced enormously Taking over foreign identities will be impossible Building access right to people without the right of admittance will be prevented Access to devices/computers will be not possible for persons without the right of admittance. Unnecessary cost of monitoring and managing last mile devices will be drastically reduced

And the biggest advantage is ability to get authenticate from anywhere, anytime
Tuesday 22 November 11

But ....
People do not trust Unknown Voice, though very few know beyond Voice. People are ready to pay only for personalized and useful apps. Voice can enable next generation mobile wallets like Virtual Credit Cards and other mCommerce Apps Both Rural and Urban markets provides for new innovative services and method of Distribution, since telecommunication devices are most pervasive channel to reach to the people

An exponen(al demand for unique services can be created, so that service availability will become a new challenge to be addressed
Tuesday 22 November 11

Biometric Comparison Table The Economics of Voice Biometrics


Sources:

Finger Type Method Equal Error Rate Failure to Enroll Nominal False Accept Rate Nominal False Reject Rate Liveness Aware System Cost Physical Active 23.3% 4% 2.5% 0.1% No High

Voice Behavioral Active 0.1 - 0.86% 2% 0.75% 0.75% Yes Low

Iris Physical Active 4.1-4.6% 7% 6% 0.001% No Very High

Face Physical Passive 4.1% ~0%


Opus Research: Choosing the Right Biometric University of Canberra European Commission Joint Research Centre, An Efficient One-Dimensional Fractal Analysis for Iris Recognition FVC2004: Third Fingerprint Verification Competition Preliminary Report on Development and Evaluation of MultiBiometric Fusion using the NIST BSSR1 517-Subject Dataset

4%

10% Possible High

Revenue According to Biometrics Technology (USSD Mn)

Cost of Last Mile Devices (INR)

00

00

2007 Opus Research, Inc.

AFIS

Voice Biometrics Basics

60000"

Page 15

00

Multimodal Signature Voice Iris Recognition Middleware Hand Geometry Facial Recognition Fingerprint

40000" 20000" 0" Finger" Iris" Face"

00

00

00

Voice"

0 2005 2006 2007 2008 2009 2010

Tuesday 22 November 11

The DNA of InCights


Voice(Prompt( Please(PROVIDE(( Details( 1. Name(( 2. Village(Name( 3. App((name(( 4. District(Name( 5. State(Name( P B( X( N( U( M( Registering( Please(Wait( ..(

Multimedia ( Ok((((((((((((((Back( Ok(((((((((((((Back( App


Sending( Class(2(SMS(

Please(select( Please(select( Write( Language( Service( Voice(Print( 1. Top(Fups( English( 1.Calling( To(SIM(with( 2. Register(( Hindi( 2. 54321( Class(2(SMS( 3. ..( Telugu( ( (

Voice(Print( Incights(Voice(( PlaVorm( Voice(Prompt(


Please(speak( Your( PASSWORD(
(

Voice(Biometric(( +(Voice(Print(( (Server(Applica9on(

Voice Signature
Voice(Prompt( ( You(have(been( Registered(( successfully( ( Pl.(remember( Your(password( ( (

* Patentable With InCights Applica'on*Infrastructure*


Convert(Voice(( Print( To(CLASS(2(( SMS((
Storage( Content(Applica9ons(

Accoun9ng( Iden9ty( Devices(

Tuesday 22 November 11

The DNA of InCights


Voice(Prompt( Please(PROVIDE(( Details( 1. Name(( 2. Village(Name( 3. App((name(( 4. District(Name( 5. State(Name( P B( X( N( U( M( Registering( Please(Wait( ..(

Please(select( Please(select( Write( Language( Service( Voice(Print( 1. Top(Fups( English( 1.Calling( To(SIM(with( 2. Register(( Hindi( 2. 54321( Class(2(SMS( 3. ..( Telugu( ( (
( Ok((((((((((((((Back( Ok(((((((((((((Back(

Voice(Print( Incights(Voice(( PlaVorm( Voice(Prompt(


Please(speak( Your( PASSWORD(
(

Voice(Biometric(( +(Voice(Print(( (Server(Applica9on(

Sending( Class(2(SMS( Convert(Voice(( Print( To(CLASS(2(( SMS((

Voice(Prompt( ( You(have(been( Registered(( successfully( ( Pl.(remember( Your(password( ( (

Applica'on*Infrastructure*

Storage(

Content(Applica9ons(

Accoun9ng( Iden9ty( Devices(

Tuesday 22 November 11

The Future

Voice Signature
Every Users needs Application and Connectivity to Access Services, This Transaction is based on certain Principle and Process which can be interpreted by Processing Natural Language Interaction and Enabling Personalization through Multimedia Widgets
Tuesday 22 November 11

Dynamic App Generation Based on Natural Language Processing, Encrypted by Voice Print InCights Mobile Solution Pvt. Ltd.
Business Cases

Tuesday 22 November 11

Asset Tracking
(By$the$Right$ Person)$
Business'Process'' Ontology'

Map$$ Human$Iden@ty$$

$(At$the$Right$Place)$

MICE$ TRANSACTION$ PLATFORM$$

with$$ Physical$Assets$$

(Through$ the$Right$ Medium)$

Transaction !

Using$$ Interac@ve$and$Engaging$ Mul@media$Applica@on$$$

(Over$the$Right$ Channel)$

GSM$TechnologiesF$ Cheapest$and$Most$Pervasive$ Communica@on$Channel$$

11$

Tuesday 22 November 11

Fraud- Banking and Financial Services

* Annual RBI Report 2010: Based on Cases to RBI Ombudsman

Tuesday 22 November 11

Priority Banking, Credit Card transactions, Healthcare


High-net-worth customers (Comprising of 34% of bank revenue: IBA) are among a nancial institutions most discriminating users of value-added services. They demand personal attention, privacy, convenience and absolute security. Today most of the banks offer them the following services: tailoring services to individual client requirements anticipation of client needs a long-term relationship orientation personal Relationship manager discretion investment performance. But while customers call their representatives, they face the following irritants: Need to provide their personal information again and Again, the process takes around 4-5Minutes. Generally the personal banker does not have all the required information at his/her disposal.

Tuesday 22 November 11

Our Solution

Tuesday 22 November 11

Insurance
Every consumer pay 1.5-2% extra Premium on account of Fraud accounting for more than 8%-KPMG Fraud Survey. Most of the Fraud Happen on two Counts: Delay in reporting of Policy and dominance of Usage of Cash

Each Agent to be given Virtual Credit Card with X amount of Limit. During transaction, both agent and Customer to be authenticated using voice print. The Agent Collects the money from Customer and His credit Limit Fluctuates accordingly. Policy Claims -> Biometric based authentication during underwriting , in case the claimant is not in a position authorized stand by person needs to speak which is also recorded during the registration.

Tuesday 22 November 11

Financial Inclusion
Data%Mining%for%% %Customer%Proling%% %ImplementaLon%of%MICE% Pla+orm%% %Buiild%the%ecosystem%to% enable%eld%OperaLons% Bank% L e v e r a g e% B u i l t% infrastructure% to% reach% out% to% many% people% %Agents%Proling% %Service%Proling%% %What%sells,%where%and% why%% %Data%Mining%%Treasure% Hunt%

State%Level% Oce%

District%Level% Panchayat% Oce% Oce%

Village%1% Village%2% Village%3% Village%4%

Village%8%

%Opens%a%%Float%&% savings%Account%for% Agent%with%<xyz>% balance.%

Bank%
Village%7% Village%6% Village%5%
RVR%% %User%gets% registered% through%the% RVR%on%the% MICE% pla+orm% %Registers%as%an% BCO%%with%the%Bank%

%Agent% conducts% transacLons% &%collects% money%for% each%tx%based% on%guidelines% and%kit%

DWH%Server%

Bank%Server%

RVR%

%TransacLons% get%logged%ON% pla+orm%

%Data%% Analysis%%to% calculate% incenLves%

%Syncs%the%% pla+orm%

MICE%Tx% Pla+orm%

Customers: SubK Basix transaction Pvt. Ltd., Transerv ( Lunching virtual Credit Cards using VS (Voice Signature)
Tuesday 22 November 11

%Collect%the%data%and% sweep%to%Incights%DWH%

%Agents%commission%is% calculated%&%credited%to% Agents%A/c,%LOYALTY% points%are%added%

Competition for S-Commerce


Requirements! Mobile/POS/+/ smart/card/!

Financial Inclusion- Competitors


Mobile/phone/+/ Mobile/POS/ ngerprint/ with/smart/ reader! card! (Several/ providers) / Y ! N ! N ! Solu<ons/using/ phones/! Solu<on/ using/POS/ and/Mobile! OxiCash,/ Prizm / Y ! Y ! Y !

Names/of/providers!

ALiBleWorld,/ Atom / Fino / Technologiesand/ ALW / N ! N ! Y ! N ! Y ! Y !

Obopay,/Mcheck /

Single/device! PerNuser/cost/versus/ inventory/cost/! Ability/to/serve/mul<ple/ services/and! applica<ons! Strong/end/user/ authen<ca<on! Usable/Oine/as/well/as/ Online! Does/not/exclusively/ require/agent/based/ services!

Y ! Y ! N !

N ! Y ! N !

Y ! Y ! N !

N ! N ! N !

N ! N ! Y !

N ! Y ! Y !

Tuesday 22 November 11

FINANCIAL INCLUSION BANKING SERVICES

SUPPLY CHAIN MANAGEMENT INSURANCE SERVICES

HEALTHCARE MANAGEMENT FINANCIAL SERVICES

GOVERNANCE ENTERPRISE SECURITY

VERTICALS

DYNAMIC APP GENERATOR + VOICE BIOMETRICS & SEMANTICS


FRAUDSTER DETECTION SECURE TRANSACTION MOBILE APP SECURITY

AUTHENTICATION

PASSCODE BASED SYSTEM

OFFENDER MONITORING

VOICE MINING

MOBILE DEVICE SECURITY

FREE SPEECH AUTHENTICATION

RESOURCE UTILIZATION

MULTIMEDIA WIDGET

INTERACTIVE & ENGAGING APPS

CHANNELS

Tuesday 22 November 11

Thank You.

Looking forward to Your Feedback

Tuesday 22 November 11

También podría gustarte