The document discusses developing a smart SMS and smart wallet application for Riyad Bank. It outlines limitations of traditional SMS, how the smart SMS application would work with visual and sound notifications as well as account details. It proposes a prototype, development timeline and costs, and forecast for ROI. It also describes how a smart wallet could work directly from a mobile phone for secure payments without needing additional hardware.
4. Why ?
Limitations of SMS
There is no doubt that SMS has been very popular. What is more interesting to observe is that this popularity has been in
spite of many limitations of SMS. Many of these limitations are the driving force behind the developments and initiatives
being taken in the field of short messaging.
Some of the limitations of SMS are:
Messages are plain vanilla in nature, You can only send simple text messages, There is no scope for any graphics or
audio.
The messages are limited by size. An SMS message cant exceed 160 characters.
In case of longer e-mails or information service messages like news, the messages need to broken down into more
than one message. The need to break the messages into several smaller segments could make SMS comparatively
costlier in comparison to other unofficial methods like Whatsapp .
5. Why ?
Problem statement
No scope for any graphics or audio.
SMS message cant exceed 160 characters
Alternative options
WhatsApp Campaigns
Alternative Weakness
Unofficial notification methods and not supported from SIMAH .
Using Internet connection
11. App Backend Content
Visual Notification
Notification
Sound Notification
Bank templates
Smart SMS themes
Bank images library
Bank sound templates
Bank sound tracks library
Mobile App will include all Common Library Assets like Bank Logo , Social network logos , notification
templates , bank website and More
13. Riyad Bank Side
Riyad Bank
System
RB > GateWay
Automatic Routing
Parameters Content *
1. Template No.
2. Theme No.
3. Variable Content
4. Recipient
GateWay Gateway
aAb`BcVCd/eX'DfEYg
FZhi?jGk|HlmI,nJo@TK
pqL.WMrsNt!uvwOx<y
Pz>0QR12~3S4;^567U8
9%$#*()_=+"+'"辿但辰奪巽
棚谷樽狸脱担旦嘆短湛蔵贈促
叩鱈端単捉尊多測遜村臓束
SMS < 160 EN
(encryption )
SMS Content Example *
Parameters Content Example *
Te2Th4{@name;Mohamed,
@amount;1500,@date;10M
arch2015,@time;22:00,@bal
ance;6521}966590003464
14. End User Side
GateWay Gateway
aAb`BcVCd/eX'DfEYg
FZhi?jGk|HlmI,nJo@TK
pqL.WMrsNt!uvwOx<y
Pz>0QR12~3S4;^567U8
9%$#*()_=+"+'"辿但辰奪巽
棚谷樽狸脱担旦嘆短湛蔵贈促
叩鱈端単捉尊多測遜村臓束
(Decryption )
End User
Gateway > SMS App
17. Smart SMS will offer unlimited scope of SMS
S W
O T
Achieve new horizons of SMS utilization
Cost Saving by deliver more than 160
Characters in one SMS message .
Special needs support service .
GateWay Smart SMS will be a
benchmark .
Change the GateWay Board trend.
Need Development activates
SIMAH reject the POC . Increase the market share.
No rooms for competitors
SWOT
23. Next Steps
TeamDeliverablesCost (SAR)DurationMilestones
Team A + 3rd Party
Algorithm
Encryption Function
Simple Smart App
22,000 + 7,000
=29,000
4 WeeksPOC
Team A + 3rd Party
Algorithm Enhancement
Beta Smart App
33,000 + 13,000
=46,000
6 WeeksBeta Version
Team A + 3rd Party
RSD
RB Smart App
22,000 + 5,000
=27,000
4 WeeksRB implementation
Team B
Marketing Plan
Potential Customer list
13,0002 WeeksMarketing Preparation
Customers awareness
Demos
Seminars
Requirement gathering
26,0004 Weeks
Marketing
implementation
141,00020 Weeks
Mohamed Salem (PM) , Ahmed Ayoub , Dev members , Alaa Jalal, Marwa ( UI ) , QC teamTeam A
Mohamed Salem (PM) , Amr Salah , Mohamed Yadak , MahmoudTeam B
Mobile application house3rd Party
26. Smart wallet
Why are these virtual wallets better than a credit card?
A bit quicker and easier than handing over a card, having it swiped, and then
having to print and sign a receipt.
More secure than credit cards. A virtual card number is used for these
transactions, the vendor never gets access directly to your card or bank, there
is no way for someone to copy down your card information to use later, and
people seem to know if their phone is lost faster than if they misplace a card.
No one else can use your phone to make payments. It is either secured with a
PIN or fingerprint. With a card, someone can easily use it for online purchases
and since few merchants even check the signature thieves can also use a card
in stores.
27. Smart Wallet
No Need Special Device
Working with All Markets
In depended on smart phone brand or OS
Fast , Easy , Secure
Cover MENA
No need for any Kind of Integration
29. Smart Wallet Scenario 1
POS SIM number ,code
and amount *
Credit Card Authentication
30. Smart Wallet Scenario 2
POS SIM number ,code
and amount *
Order approval Request Confirmation
31. sa.linkedin.com/in/salemin
(1) "Confidential Information" means any information disclosed by either party to the other party, either directly or indirectly, in writing, orally or by
inspection of tangible objects, including without limitation documents, prototypes, samples, plant and equipment, research, product plans, products,
services, customer lists, software, developments, inventions, processes, designs, drawings, engineering, hardware configuration, marketing materials
or finances, which is designated as "Confidential," "Proprietary" or some similar designation. Information communicated orally shall be considered
Confidential Information if such information is confirmed in writing as being Confidential Information within a reasonable time after the initial
disclosure. Confidential Information may also include information disclosed to a disclosing party by third parties. Confidential Information shall not,
however, include any information which (i) was publicly known and made generally available in the public domain prior to the time of disclosure by the
disclosing party; (ii) becomes publicly known and made generally available after disclosure by the disclosing party to the receiving party through no
action or inaction of the receiving party; (iii) is already in the possession of the receiving party at the time of disclosure by the disclosing party as
shown by the receiving party's files and records immediately prior to the time of disclosure; (iv) is obtained by the receiving party from a third party
without a breach of such third party's obligations of confidentiality; (v) is independently developed by the receiving party without use of or reference to
the disclosing party's Confidential Information, as shown by documents and other competent evidence in the receiving party's possession; or (vi) is
required by law to be disclosed by the receiving party, provided that the receiving party gives the disclosing party prompt written notice of such
requirement prior to such disclosure and assistance in obtaining an order protecting the information from public disclosure.
Non-use and Non-disclosure. Each party shall not use the Confidential Information of the other party for any purpose except to evaluate and engage
in discussions concerning a potential business relationship between the parties. Neither party shall disclose any Confidential Information of the other
party to third parties. If any party makes copies of the Confidential Information of the other party, such copies shall also constitute Confidential
Information and any and all confidential markings on such documents shall be maintained. Neither party shall reverse engineer, disassemble or
decompile any prototypes, software or other tangible objects which embody the other party's Confidential Information .