Aladin Solution FZ LLC
1
A PLATFORM WITH SELF-TIMED DESTRUCTION
CAPABILITY FOR DOCUMENT PRIVACY &
SHARING
Aladin Solution FZ LLC
2
INTRODUCTION
ALADIN SOLUTION
03
0201
06
04
05
Core SkillsTeam of passionate and motivated professionals who bring to the tablea very niche skillset around Design Thinking, Digital Marketing,Application Development, Process Automation with Blockchain, AI andMachine Learning and Chatbots
Experience
More than 150+ diverse project implementation experience andextensive knowledge about multiple industries across global markets.
Adaptive Strategy
Our Strategic Expertise and theme of Digital Transformation is at the coreof everything we do. We help organizations make the critical,interdependent decisions necessary to succeed in today's complex,connected digital world.
Disruptive Approach
We are entrepreneurial, bold and question the traditional. We focus onyour business challenges and reimagine business solutions to helpcreate new opportunities and disrupt existing ones.
Launch
Inception of our ConsultingJourney.
Our Aim
To be adaptive and dynamic in this journey ofpartnering with our clients, to question theobvious and challenge ourselves. “if there is a
better way to do it, find it”
3
CORE SKILLS
4
DIGITAL MARKETING
APPLICATIONDEVELOPMENT
AI-ML &
CHATBOTS
PEOPLE & SKILL SETS
5
Our Leadership Team includes people who have worked with theWorld’s Biggest Software Product Companies and Tech ConsultingHouses across multiple geographies
Niche Skillset around Design Thinking, Digital Marketing, Mobility,Process Automation with Blockchain, Application Development, AI &ML and Chatbots
Team consists of Experienced Architects and Developers whobring more than 150+ successful implementation experienceacross multiple Verticals
Experienced group of Advisors to back Team with Deep Connects across ANZ/ Middle East/South East Asia/Africa/Canada/India
Aladin Solution FZ LLC
6
BASIS AND SOLUTION OF OUR PLATFORM-
SELF-TIMED DESTRUCTION (STD)
“STD” OF DOCUMENTS
GDPR- Data Protection Is “YOUR” Responsibility
Article 5 of the GDPR sets out seven key principles which lie at the heart of the general data protection regime.
Lawfulness/ fairness and transparency/ Purpose limitation/ Data minimisation/ Accuracy/ Storage limitation/ Integrity and confidentiality (security)/ Accountability
Article 5(1) requires that personal data shall be:
(a) processed lawfully, fairly and in a transparent manner in relation to individuals (‘lawfulness, fairness and transparency’);
(b) collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes; further
processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes shall not be considered to be
incompatible with the initial purposes (‘purpose limitation’);
(c) adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed (‘data minimisation’);
(d) accurate and, where necessary, kept up to date; every reasonable step must be taken to ensure that personal data that are inaccurate, having regard to the purposes for which they are processed, are erased or rectified without delay (‘accuracy’);
(e) kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed;
personal data may be stored for longer periods insofar as the personal data will be processed solely for archiving purposes in the public interest, scientific or
historical research purposes or statistical purposes subject to implementation of the appropriate technical and organisational measures required by the GDPR in
order to safeguard the rights and freedoms of individuals (‘storage limitation’);
(f) processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures (‘integrity and confidentiality’).”
Article 5(2) adds that:
“The controller shall be responsible for, and be able to demonstrate compliance with, paragraph 1 (‘accountability’).”
7
Platform Concept Based Upon US PatentExtract of the Patent –
PATENT US2016/0188892 –AUTHENTICATION SYSTEM OF SYNCHRONIZING INSTANT TIME STAMP AND A METHOD THEREOF The present invention is related to an authentication system of synchronizing instant time stamp issued by a digital timestamp device and a method thereof. The digital timestamp device provides an instant machine time, and the provider end uses the digital timestamp device to stamp an instant digital timestamp on a digital content. Meanwhile, the provider end records the position of the digital content whereon the digital timestamp is stamped as a stamp position, and store the digital content, the instant digital timestamp, the stamp position, and the network location information together as a reliable digital content.The receiver end can retrieve the reliable digital content from a third party end or connect to the provider end to confirm whether -the reliable digital content has the identical instant digital timestamp and stamp position to ensure the authenticity of the received reliable digital content.
PATENT 20150012534- SYSTEM AND METHOD FOR IDENTIFYING INDIVIDUAL USERS ACCESSING A WEB SITE•An improved method and system for identifying individual users accessing a web site. A web site server is able to identify distinct users by using a unique identifier associated with each client computer system requesting access to the web site. •The unique identifier comprises an Internet address, such as an Internet Protocol (IP) address, and a time value associated with each client computer system requesting access to the web site. On starting up a web browser, an application program or browser plug-in may synchronize the internal clock included with the client computer system with a global time standard. •A web site server may determine the uniqueness of the client computer system by comparing unique identifier records of users accessing the web site. A user may be identified as distinct if no matching record exists in the database. Multiple client computer systems having a common Internet address may be identified by using this method. •Users privacy is also protected as the unique identifiers are erased when the client computer system's user exits the web browser or powers down the computer. 8
INTRODUCTION TO “STD”
9
There is an increased threat of impersonation because of the details of personal and financial being leaked by certain members of banks and other financial institutions.
The data privacy and controlled sharing of personal and commercial information is very critical issue often ignored by many institutions including Banks, Insurance, Government B2C sites, Education etc
There are several cases where the breaches have caused severe financial losses to customers.
There is a need for a strong mechanism required to tackle the problem of Data sharing, Data access and Data Breach
OUR APPROACH TO “STD”
10
We are developing a software to share the data on a Public Domain in where
the USER has ALL the Option to Control HIS Data:
1.Provide a safe digital online locker for documents for sharing files. The user
has the option to share the file for a specified duration with any institution ,
Financial or Government after which the access to the files will be strictly barred.
2.The file access will be completely blocked. The files are always in view only
mode and cannot be printed or copied directly from software.
3. Plugin on bank or any financial website: A plugin can be developed which can
be integrated with the Institutes websites where the prospective customers can
upload their documents and the Institutes will have access to these files till the
user has “timestamped” in the system before sharing it.
OUR APPROACH
11
Step 1
Customer Applies for Loan
Customer loan
application
Step 2
Bank requests Documents
Bank requires past financial
documents and income
statements
Step 3
Customer login to our plugin
Customer logs into our
system and uploads his
documents and sets the
expiry option. In case
the application is
accepted then the
customer can release
these documents to be
used by banks for their
proof.
Step 4
Limited access to Banks
If the banks choose to
reject the application,
then their access to these
documents will be
removed automatically
CONCEPT SOLUTION FOR “STD” PLATFORM”
12
FinancialCompany Sites (Banks/ Insurance)
Real Estate Company Sites
Automotive Company Sites
E-Commerce Company Sites
G2C Services Company ( Dewa/ RTA etc.)
Education University Sites
Central Gateway Platform which is a Plug-in to All Types of 3rd
Party Sites
• Plug in Site for Collection of Time-Stamped Documents from Customers for Application to 3rd Party Sites which are self-destroyed .
• This can be upgraded to collect data for Future digital marketing if permitted by customer. This is a Unique Value Proposition in the World today as the first site to bring this capability from trustworthiness standpoint.
• Can Guide Customer Choices for a Service Provider using AI-ML based Chatbots• Backed by Blockchain for complete transparency if needed• Central Customer Lead Mechanism where Leads by Verticals are scored and qualified based on ML based
algorithms and then passed onto 3rd Party Sites (Central Platform acts as a Plug-in to 3rd Party Sites)
KEY FEATURES OF OUR “STD”• Platform is Central Gateway to Collect Documentation from USERS
for application, where USERS have the choice to create a self-timer fordestruction of documents after a stipulated period of time to makePlatform Trustworthy (in accordance with US Patent filed and GDPR).
• USERS are guided on the platform by Chatbots which are supported byArtificial Intelligence based vertical specific knowledge libraries(financial/ automotive/ real estate/ education vertical and GovernmentG2C Website) to ascertain profile of the customer and their exact needs.
• Platform is backed by Blockchain if there is a need for transactions arevalidated and trustworthy due to the complex computations.
• Platform collects customer documentation based on specific USERapproval, qualifies the lead based on Machine Learning algorithms forscoring and passes the lead to relevant 3rd party vertical sites.
• Platform also asks USERS in case they are interested to be contactedlater for permissive Digital Marketing campaigns and safeguards theirdocuments for future mining for cross sell/ upsell. A mechanism couldbe developed for payback to USERS every time they are contactedthrough Digital Marketing Campaigns
• Platform provides Complete Security and Privacy Control forSensitive Data which is controlled by End USERS 13
Core Platform Engine (Supports Self Destruction of Sensitive Data based on Timestamp from
USER)
Chatbots to guide Customers and understand Customer Profiles better
Complete Blockchain enabled to maintain non tamperable aspect of transactions IF Needed
Machine Learning based algorithm to qualify and score Leads to 3rd Party sites and for utilization for future campaigns
Permissive Cross-Cannel Digital Marketing Campaigns based on Intelligent Data Mining (for which customers get paid back)
5
4
1
2 3
TECHNICAL ARCHITECTURE
Web Server
App Server
Database
Storage
Messaging Server
Networking
Content Server
Aladin Solution FZ LLC
15
• Deep Technology Consulting Expertise
• Agile Flexible Start-up• Experienced Bunch of Architects
• Seasoned Developers with multiple Vertical Expertise
• Contact Us:• Subroto Banerji: [email protected]• Tasneem Jetpurwala: [email protected]
• Kaushik Dutta: [email protected]