際際滷

際際滷Share a Scribd company logo
Smart sms
Differentiate or Die0
Why1
How2
Value3
Next Steps4
What Else5
Why ?1
Why ?
Limitations of SMS
There is no doubt that SMS has been very popular. What is more interesting to observe is that this popularity has been in
spite of many limitations of SMS. Many of these limitations are the driving force behind the developments and initiatives
being taken in the field of short messaging.
Some of the limitations of SMS are:
 Messages are plain vanilla in nature, You can only send simple text messages, There is no scope for any graphics or
audio.
 The messages are limited by size. An SMS message cant exceed 160 characters.
 In case of longer e-mails or information service messages like news, the messages need to broken down into more
than one message. The need to break the messages into several smaller segments could make SMS comparatively
costlier in comparison to other unofficial methods like Whatsapp .
Why ?
Problem statement
 No scope for any graphics or audio.
 SMS message cant exceed 160 characters
Alternative options
 WhatsApp Campaigns
Alternative Weakness
 Unofficial notification methods and not supported from SIMAH .
 Using Internet connection
How?2
How ?
Power of 160 !
Its simple ,160 characters will give us through SMART App the ability to do Actions3,93596479270713E+184
Scenario Actors
+
Smart Phone Smart App
Riyad Bank GateWay End User
End User Side
Required Steps
Smart Phone* Download Smart App
1 2
Smart Phones in KSA*
Smart App
App Features
Visual NotificationNotification Sound Notification
Statistic Account Statement Transaction Log
Interactivity 2 Ways SMS
Marketing Campaign Announcement
App Backend Content
Visual Notification
Notification
Sound Notification
 Bank templates
 Smart SMS themes
 Bank images library
 Bank sound templates
 Bank sound tracks library
Mobile App will include all Common Library Assets like Bank Logo , Social network logos , notification
templates , bank website and More
Building the Library
Riyad Bank
System
Smart SMS Server App Store
Sync
End User
Riyad Bank Side
Riyad Bank
System
RB > GateWay
Automatic Routing
Parameters Content *
1. Template No.
2. Theme No.
3. Variable Content
4. Recipient
GateWay Gateway
aAb`BcVCd/eX'DfEYg
FZhi?jGk|HlmI,nJo@TK
pqL.WMrsNt!uvwOx<y
Pz>0QR12~3S4;^567U8
9%$#*()_=+"+'"辿但辰奪巽
棚谷樽狸脱担旦嘆短湛蔵贈促
叩鱈端単捉尊多測遜村臓束
SMS < 160 EN
(encryption )
SMS Content Example *
Parameters Content Example *
Te2Th4{@name;Mohamed,
@amount;1500,@date;10M
arch2015,@time;22:00,@bal
ance;6521}966590003464
End User Side
GateWay Gateway
aAb`BcVCd/eX'DfEYg
FZhi?jGk|HlmI,nJo@TK
pqL.WMrsNt!uvwOx<y
Pz>0QR12~3S4;^567U8
9%$#*()_=+"+'"辿但辰奪巽
棚谷樽狸脱担旦嘆短湛蔵贈促
叩鱈端単捉尊多測遜村臓束
(Decryption )
End User
Gateway > SMS App
Comparison
SMS Smart SMS
Visual Notification Sound Notification
Value ?3
Smart SMS will offer unlimited scope of SMS
S W
O T
 Achieve new horizons of SMS utilization
 Cost Saving by deliver more than 160
Characters in one SMS message .
 Special needs support service .
 GateWay  Smart SMS will be a
benchmark .
 Change the GateWay Board trend.
 Need Development activates
 SIMAH reject the POC . Increase the market share.
 No rooms for competitors
SWOT
Customers Needs
Visual Notification
Notification
Sound Notification
Statistic
Account Statement
Transaction Log
Interactivity
2 Ways SMS
Marketing
Campaign
Announcement
Potential Customers
App Prototype
App Prototype
Next Steps ?4
Next Steps
TeamDeliverablesCost (SAR)DurationMilestones
Team A + 3rd Party
 Algorithm
 Encryption Function
 Simple Smart App
22,000 + 7,000
=29,000
4 WeeksPOC
Team A + 3rd Party
 Algorithm Enhancement
 Beta Smart App
33,000 + 13,000
=46,000
6 WeeksBeta Version
Team A + 3rd Party
 RSD
 RB Smart App
22,000 + 5,000
=27,000
4 WeeksRB implementation
Team B
 Marketing Plan
 Potential Customer list
13,0002 WeeksMarketing Preparation
 Customers awareness
 Demos
 Seminars
 Requirement gathering
26,0004 Weeks
Marketing
implementation
141,00020 Weeks
Mohamed Salem (PM) , Ahmed Ayoub , Dev members , Alaa Jalal, Marwa ( UI ) , QC teamTeam A
Mohamed Salem (PM) , Amr Salah , Mohamed Yadak , MahmoudTeam B
Mobile application house3rd Party
Forecast
Q1 Q2 Q3 Q4
Development Marketing Sales
2015
1.52
1.7
2
0
0.5
1
1.5
2
2.5
2014 2015 2016
Forecast SMS Traffic
2014 2015 2016
ROI (2015) = ---------------------------
7200000 - 141000
141000
= 5006%
What Else ?5
Smart wallet
Why are these virtual wallets better than a credit card?
 A bit quicker and easier than handing over a card, having it swiped, and then
having to print and sign a receipt.
 More secure than credit cards. A virtual card number is used for these
transactions, the vendor never gets access directly to your card or bank, there
is no way for someone to copy down your card information to use later, and
people seem to know if their phone is lost faster than if they misplace a card.
 No one else can use your phone to make payments. It is either secured with a
PIN or fingerprint. With a card, someone can easily use it for online purchases
and since few merchants even check the signature thieves can also use a card
in stores.
Smart Wallet
 No Need Special Device
 Working with All Markets
 In depended on smart phone brand or OS
 Fast , Easy , Secure
 Cover MENA
 No need for any Kind of Integration
Smart Wallet Steps
Smart Wallet Scenario 1
POS SIM number ,code
and amount *
Credit Card Authentication
Smart Wallet Scenario 2
POS SIM number ,code
and amount *
Order approval Request Confirmation
sa.linkedin.com/in/salemin
(1) "Confidential Information" means any information disclosed by either party to the other party, either directly or indirectly, in writing, orally or by
inspection of tangible objects, including without limitation documents, prototypes, samples, plant and equipment, research, product plans, products,
services, customer lists, software, developments, inventions, processes, designs, drawings, engineering, hardware configuration, marketing materials
or finances, which is designated as "Confidential," "Proprietary" or some similar designation. Information communicated orally shall be considered
Confidential Information if such information is confirmed in writing as being Confidential Information within a reasonable time after the initial
disclosure. Confidential Information may also include information disclosed to a disclosing party by third parties. Confidential Information shall not,
however, include any information which (i) was publicly known and made generally available in the public domain prior to the time of disclosure by the
disclosing party; (ii) becomes publicly known and made generally available after disclosure by the disclosing party to the receiving party through no
action or inaction of the receiving party; (iii) is already in the possession of the receiving party at the time of disclosure by the disclosing party as
shown by the receiving party's files and records immediately prior to the time of disclosure; (iv) is obtained by the receiving party from a third party
without a breach of such third party's obligations of confidentiality; (v) is independently developed by the receiving party without use of or reference to
the disclosing party's Confidential Information, as shown by documents and other competent evidence in the receiving party's possession; or (vi) is
required by law to be disclosed by the receiving party, provided that the receiving party gives the disclosing party prompt written notice of such
requirement prior to such disclosure and assistance in obtaining an order protecting the information from public disclosure.
Non-use and Non-disclosure. Each party shall not use the Confidential Information of the other party for any purpose except to evaluate and engage
in discussions concerning a potential business relationship between the parties. Neither party shall disclose any Confidential Information of the other
party to third parties. If any party makes copies of the Confidential Information of the other party, such copies shall also constitute Confidential
Information and any and all confidential markings on such documents shall be maintained. Neither party shall reverse engineer, disassemble or
decompile any prototypes, software or other tangible objects which embody the other party's Confidential Information .

More Related Content

Smart sms

  • 4. Why ? Limitations of SMS There is no doubt that SMS has been very popular. What is more interesting to observe is that this popularity has been in spite of many limitations of SMS. Many of these limitations are the driving force behind the developments and initiatives being taken in the field of short messaging. Some of the limitations of SMS are: Messages are plain vanilla in nature, You can only send simple text messages, There is no scope for any graphics or audio. The messages are limited by size. An SMS message cant exceed 160 characters. In case of longer e-mails or information service messages like news, the messages need to broken down into more than one message. The need to break the messages into several smaller segments could make SMS comparatively costlier in comparison to other unofficial methods like Whatsapp .
  • 5. Why ? Problem statement No scope for any graphics or audio. SMS message cant exceed 160 characters Alternative options WhatsApp Campaigns Alternative Weakness Unofficial notification methods and not supported from SIMAH . Using Internet connection
  • 7. How ? Power of 160 ! Its simple ,160 characters will give us through SMART App the ability to do Actions3,93596479270713E+184
  • 8. Scenario Actors + Smart Phone Smart App Riyad Bank GateWay End User
  • 9. End User Side Required Steps Smart Phone* Download Smart App 1 2 Smart Phones in KSA*
  • 10. Smart App App Features Visual NotificationNotification Sound Notification Statistic Account Statement Transaction Log Interactivity 2 Ways SMS Marketing Campaign Announcement
  • 11. App Backend Content Visual Notification Notification Sound Notification Bank templates Smart SMS themes Bank images library Bank sound templates Bank sound tracks library Mobile App will include all Common Library Assets like Bank Logo , Social network logos , notification templates , bank website and More
  • 12. Building the Library Riyad Bank System Smart SMS Server App Store Sync End User
  • 13. Riyad Bank Side Riyad Bank System RB > GateWay Automatic Routing Parameters Content * 1. Template No. 2. Theme No. 3. Variable Content 4. Recipient GateWay Gateway aAb`BcVCd/eX'DfEYg FZhi?jGk|HlmI,nJo@TK pqL.WMrsNt!uvwOx<y Pz>0QR12~3S4;^567U8 9%$#*()_=+"+'"辿但辰奪巽 棚谷樽狸脱担旦嘆短湛蔵贈促 叩鱈端単捉尊多測遜村臓束 SMS < 160 EN (encryption ) SMS Content Example * Parameters Content Example * Te2Th4{@name;Mohamed, @amount;1500,@date;10M arch2015,@time;22:00,@bal ance;6521}966590003464
  • 14. End User Side GateWay Gateway aAb`BcVCd/eX'DfEYg FZhi?jGk|HlmI,nJo@TK pqL.WMrsNt!uvwOx<y Pz>0QR12~3S4;^567U8 9%$#*()_=+"+'"辿但辰奪巽 棚谷樽狸脱担旦嘆短湛蔵贈促 叩鱈端単捉尊多測遜村臓束 (Decryption ) End User Gateway > SMS App
  • 15. Comparison SMS Smart SMS Visual Notification Sound Notification
  • 17. Smart SMS will offer unlimited scope of SMS S W O T Achieve new horizons of SMS utilization Cost Saving by deliver more than 160 Characters in one SMS message . Special needs support service . GateWay Smart SMS will be a benchmark . Change the GateWay Board trend. Need Development activates SIMAH reject the POC . Increase the market share. No rooms for competitors SWOT
  • 18. Customers Needs Visual Notification Notification Sound Notification Statistic Account Statement Transaction Log Interactivity 2 Ways SMS Marketing Campaign Announcement
  • 23. Next Steps TeamDeliverablesCost (SAR)DurationMilestones Team A + 3rd Party Algorithm Encryption Function Simple Smart App 22,000 + 7,000 =29,000 4 WeeksPOC Team A + 3rd Party Algorithm Enhancement Beta Smart App 33,000 + 13,000 =46,000 6 WeeksBeta Version Team A + 3rd Party RSD RB Smart App 22,000 + 5,000 =27,000 4 WeeksRB implementation Team B Marketing Plan Potential Customer list 13,0002 WeeksMarketing Preparation Customers awareness Demos Seminars Requirement gathering 26,0004 Weeks Marketing implementation 141,00020 Weeks Mohamed Salem (PM) , Ahmed Ayoub , Dev members , Alaa Jalal, Marwa ( UI ) , QC teamTeam A Mohamed Salem (PM) , Amr Salah , Mohamed Yadak , MahmoudTeam B Mobile application house3rd Party
  • 24. Forecast Q1 Q2 Q3 Q4 Development Marketing Sales 2015 1.52 1.7 2 0 0.5 1 1.5 2 2.5 2014 2015 2016 Forecast SMS Traffic 2014 2015 2016 ROI (2015) = --------------------------- 7200000 - 141000 141000 = 5006%
  • 26. Smart wallet Why are these virtual wallets better than a credit card? A bit quicker and easier than handing over a card, having it swiped, and then having to print and sign a receipt. More secure than credit cards. A virtual card number is used for these transactions, the vendor never gets access directly to your card or bank, there is no way for someone to copy down your card information to use later, and people seem to know if their phone is lost faster than if they misplace a card. No one else can use your phone to make payments. It is either secured with a PIN or fingerprint. With a card, someone can easily use it for online purchases and since few merchants even check the signature thieves can also use a card in stores.
  • 27. Smart Wallet No Need Special Device Working with All Markets In depended on smart phone brand or OS Fast , Easy , Secure Cover MENA No need for any Kind of Integration
  • 29. Smart Wallet Scenario 1 POS SIM number ,code and amount * Credit Card Authentication
  • 30. Smart Wallet Scenario 2 POS SIM number ,code and amount * Order approval Request Confirmation
  • 31. sa.linkedin.com/in/salemin (1) "Confidential Information" means any information disclosed by either party to the other party, either directly or indirectly, in writing, orally or by inspection of tangible objects, including without limitation documents, prototypes, samples, plant and equipment, research, product plans, products, services, customer lists, software, developments, inventions, processes, designs, drawings, engineering, hardware configuration, marketing materials or finances, which is designated as "Confidential," "Proprietary" or some similar designation. Information communicated orally shall be considered Confidential Information if such information is confirmed in writing as being Confidential Information within a reasonable time after the initial disclosure. Confidential Information may also include information disclosed to a disclosing party by third parties. Confidential Information shall not, however, include any information which (i) was publicly known and made generally available in the public domain prior to the time of disclosure by the disclosing party; (ii) becomes publicly known and made generally available after disclosure by the disclosing party to the receiving party through no action or inaction of the receiving party; (iii) is already in the possession of the receiving party at the time of disclosure by the disclosing party as shown by the receiving party's files and records immediately prior to the time of disclosure; (iv) is obtained by the receiving party from a third party without a breach of such third party's obligations of confidentiality; (v) is independently developed by the receiving party without use of or reference to the disclosing party's Confidential Information, as shown by documents and other competent evidence in the receiving party's possession; or (vi) is required by law to be disclosed by the receiving party, provided that the receiving party gives the disclosing party prompt written notice of such requirement prior to such disclosure and assistance in obtaining an order protecting the information from public disclosure. Non-use and Non-disclosure. Each party shall not use the Confidential Information of the other party for any purpose except to evaluate and engage in discussions concerning a potential business relationship between the parties. Neither party shall disclose any Confidential Information of the other party to third parties. If any party makes copies of the Confidential Information of the other party, such copies shall also constitute Confidential Information and any and all confidential markings on such documents shall be maintained. Neither party shall reverse engineer, disassemble or decompile any prototypes, software or other tangible objects which embody the other party's Confidential Information .