2 Sybrin Identity Veri cation Solution Sybrin's Signature Veri cation System (IVS) is an advanced signature and mandate management product which allows a nancial institution to digitise signatures and mandates for use whenever signatories need to be veri ed against a known reference. Signatures can be matched to client photos or other forms of identi cation, and mandate rules can be applied for each client. Using this system, the customer signatures will be displayed to the user, coupled with the mandate information, for identi cation. It is also a comprehensive tool used to capture, store, verify, and compare signatures and account mandates. In addition to rd its own viewer, the module provides for 3 party interfaces and access to the signatures and mandates through a comprehensive Application Programming Interface (API) and/or web service. IVS also offers an automatic signature veri cation option which can automate the signature comparison process when presenting cheques or other signed vouchers through a transport machine. The adjustable con dence factor will determine if a signature is identi ed as a positive match to the existing stored signature(s). The variety of identi cation methods incorporated into IVS includes biometric signature recognition supporting ngerprints, photographs, as well as iris and voice matching technologies. IVS also supports different classes of services, offering methods of ltering mandate rules to apply to certain types of signature requirements, based on the transactions involved. The advantages of using a centralised signature veri cation and storage module are endless. A signi cant percentage of all items which are sent to the Bank's Central Processing Centre require signature veri cation either due to a technical fault on the cheque or the amount on the cheque exceeding the customer's account limit. This often requires that the item be sent back to the branch for veri cation because the account mandates are held at the branch. This process can be costly and time consuming. An online veri cation system eliminates this. Despite the constant changes in the banking technology sector, signatures are still the most universally accepted means by which to verify transactions. The vast size of nancial and banking institutions, the growing number of transactions, and the increasing complexity of these transactions dictated a move towards more effective technology options. 1
3 Key Features Different Methods of Veri cation Sybrin's IVS supports a wide variety of identi cation methods. Currently, IVS supports written and digitised signatures, barcoded ID documents, as well as biometric veri cation methods. These include thumbprints, photographs, iris scans and voice recognition; with support for future identi cation methods. These techniques can be combined to create a rigid set of veri cation rules to ensure the authenticity of the person they represent. 1 Intuitive Flexible Authorisation System IVS allows banks to create exible and extensible mandate authorisation rules for manual and automatic veri cation. These rules can be simple and only de ne the single signatory required on the cheque for authorisation. Simultaneously, more complex rules can be created, where signature mandate groups can be de ned and categorised, featuring full control over the amount of signatures required, the grouping of signatories, the value of vouchers, and the categorisation of persons. 2 Full Auditing Function IVS supports a full audit trail which allows for the tracking of signed vouchers which in turn facilitates both risk management and fraud prevention. Signature veri cations are tracked, at multiple points during the authorisation process, which gives the bank a comprehensive overview of daily transactional activities. 3 2
4 The Sybrin Product Platform Sybrin CORE is the backbone of a large variety of distinct yet tightly integrated modules, creating a solution that is practically limitless in customisation, meeting each and every customer requirement in the industry. Sybrin conforms to accepted interface standards and is platform independent, providing one uni ed information repository for full-function imaging, advanced routing, Enterprise Report Management, and document management in client/server and web environments. Our innovative system is versatile enough to function as a standalone solution for document management, but could also be integrated as a front-end or back-end rd to a 3 party application, such as an E.R.P. or accounts receivable solution. Security is paramount to Sybrin, and audit trail functionality, to keep track of each and every activity performed on business processes, is included. ACH ATS Branch Cheque Corporate-to-Bank Day 2 EFT Document & Records Statement Solutions Imaging & Work ow Payment Solutions Information Mgmt. CORE: Value Added Services Notification Gateway Commissions & Charges Multi-Currency Clearing Sybrin CORE 3
5 Branch In this example the client submits a mandate from which her instructions and signature are digitised and matched to her identity on IVS. One, Ms. Austen deposits a cheque, her identity is veri ed with the known specimen and her transaction is authorised based on the outcome. C O R E 4 5
6 Primary Processes & Value Added Services Signature Capture Engine Customer signatures can be obtained from a number of sources, such as account opening forms, mandates, electronic copies from legacy systems, and signature capture forms. The Sybrin Signature Module has three modules which cater for capturing signatures, the Sybrin Scan Module, the Sybrin Transport Module and the Sybrin Import Module. Know Your Customer (KYC) KYC is an international convention implemented by banks to validate the identities of people and companies with whom they do business. The ef cient management of customer information is a challenge; but Sybrin FrontOf ce enables banks to effectively manage this task resulting in the provision of fast and ef cient service. It also plays an integral part in the prevention of identity theft fraud, money laundering and the nancing of undesirable/illegal activities. Signature Cleanup/Assurance IVS has a facility for improving captured signatures. This involves enhancing the signature/mandate for more accurate veri cation. As the mandates and signature forms are captured, Sybrin will automatically crop the signature from the forms based on prede ned parameters, or the operator can manually perform these duties. Multiple signatures can be captured on one mandate or signature capture form, and stored within the system. Commissions & Charges The Commissions and Charges module makes the task of applying commissions and charges to any transaction simple and intuitive. Using this module a bank can set up and maintain billing plans per a customer or customer group. Billing plans can be set up according to various transaction types and transaction volumes. Transaction charges can be either xed or commission-based. Signature Storage Repository & Access IVS can store any document format within one electronic repository. The physical images of the signatures and mandates, which are stored in this repository, are encrypted and compressed using Sybrin's built in encryption tools. This ensures that the images can only be viewed using the Sybrin Client application, the Sybrin Application Programming Interface (API) or Sybrin's web services. Noti cation Gateway The Sybrin Noti cation gateway works in close conjunction with Sybrin's FrontOf ce, Sybrin ACH Payment Processor, and the Sybrin Identi cation Veri cation Solution to send out customisable SMS or noti cations once key account activities occur. This helps your customers manage their accounts and improves customer satisfaction. These account activities may include deposits, withdrawals, and the tracking of all other transactions. Signature Veri cation Signature veri cation is either a manual or automatic process. The manual process involves displaying the cheque, captured signature, and mandate information to the operator to make the authorisation decision. Automatic signature veri cation uses Optical Character Recognition (OCR) to compare the signature in the repository and the signature on the physical cheque. This eliminates the need to verify all the items captured and allows the fraud specialists to focus on questionable items only. Multi-Currency Clearing (MCC) Multi-Currency Clearing allows for the clearance of any currency between local and foreign units and automatically settles the cleared effect charges for these transactions. Sybrin's MCC product reduces the nancial costs and infrastructure maintenance connected with international payments, providing you with a single entry point for all your payment needs. 6 7
7 About Sybrin Sybrin has grown considerably over the past 21 years to become a global leading technology company in providing payment solutions with particular emphasis in Voucher Processing solutions, Automated Clearing House solutions, Mobile Commerce solutions, Host banking enhancement solutions, KYC solutions, Day 2 solutions and EFT solutions amongst leading corporations, banks and clearing houses. Today, Sybrin has provided solutions across Africa, the United Kingdom and into the Middle East, servicing these solutions from its of ces in South Africa, Kenya, Zambia, Tanzania and Zimbabwe. Sybrin remains united in its mission and focused on its commitment to customers. Corporate governance is well-rounded and balanced through breadth of international perspective and executive experience. As a result, the company is clear in its vision of the future, but equally well grounded in the reality of the present. 8
Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control Protect Your Business and Your Customers with Visa s Layers of Security Millions of Visa cardholders worldwide make one or more purchases
A multi-layered approach to payment card security. CARD-NOT-PRESENT 1 A recent research study revealed that Visa cards are the most widely used payment method at Canadian websites, on the phone, or through
Strategies for Improving the U.S. Payment System Federal Reserve System January 26, 2015 TOC Strategies for Improving the U.S. Payment System Table of Contents Preface... 1 Executive Summary... 1 Introduction...
Card-Not-Present Fraud Working Committee White Paper: Near-Term Solutions to Address the Growing Threat of Card-Not-Present Fraud Version 1.0 Date: April 2015 About the EMV Migration Forum The EMV Migration
J A N U A R Y 2 0 1 4 ECM for Supplier and Contract Management Maximize the value of your procurement partnerships This paper looks at current challenges and trends in supplier and contract management;
Managing digital records without an electronic record management system Crown copyright 2012 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of
White Paper May 2006 Applying Electronic Records Management in the Document Management Environment: An Integrated Approach Written by: Bud Porter-Roth Porter-Roth Associates Table of Contents Introduction
Standards for Internal Control in New York State Government October 2007 Thomas P. DiNapoli State Comptroller A MESSAGE FROM STATE COMPTROLLER THOMAS P. DINAPOLI My Fellow Public Servants: For over twenty
United States Government Accountability Office Report to the Subcommittee on the Legislative Branch, Committee on Appropriations, U. S. Senate March 2015 INFORMATION TECHNOLOGY Copyright Office Needs to
TRADE POINT GUIDE http://www.gtpnet-e.com CUSTOMIZED, SECURE GATEWAY FOR SMEs TO THE GLOBAL ELECTRONIC MARKETPLACE UNCTAD/SDTE/Misc.33 October 2000 E-mail: email@example.com Fax: (41 22) 907-0050 Telephone:
Combined Conditions of Use and Credit Guide Effective as at 9 November 2014 Introduction Your Credit Card Contract includes this Conditions of Use brochure, the letter which advises both your credit limit
+ MAINSTREAMING MICRO-PAYMENT SYSTEMS AND THEIR APPLICATION TO MOBILE NETWORKS MICRO-PAYMENT SYSTEMS AND THEIR APPLICATION TO MOBILE NETWORKS Examples of Mobile-Enabled Financial Services in the Philippines
Summary of Responses to an Industry RFI Regarding a Role for CMS with Personal Health Records Table of Contents EXECUTIVE SUMMARY... 4 1. INTRODUCTON... 7 2. CMS ROLE WITH PHRs... 9 What PHR functionalities
Standard: Version: 2.0 Date: June 2011 Author: PCI Data Security Standard (PCI DSS) Virtualization Special Interest Group PCI Security Standards Council Information Supplement: PCI DSS Virtualization Guidelines
An introduction to Service Integration and Management and ITIL Kevin Holland AXELOS.com White Paper January 2015 Contents Foreword 3 Introduction 4 Models for SIAM 7 Principles and considerations 9 The
POLICIES ON DIRECT ELECTRONIC ACCESS Consultation Report TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2009 This paper is for public consultation purposes only.
The Information Society, 16:5 21, 2000 Copyright c 2000 Taylor & Francis 0197-2243/00 $12.00 +.00 Re ning and Extending the Business Model With Information Technology: Dell Computer Corporation Kenneth
Records Management Best Practices Guide A Practical Approach to Building a Comprehensive and Compliant Records Management Program Protecting and Managing the World s Information. Since 1951, Iron Mountain
MANAGEMENT INFORMATION SYSTEMS Stephen B. Harsh Department of Agricultural Economics Michigan State University firstname.lastname@example.org INTRODUCTION Management information systems encompass a broad and complex topic.
HANDBOOK FOR ACQUIRING A RECORDS MANAGEMENT SYSTEM (RMS) THAT IS COMPATIBLE WITH THE NATIONAL INCIDENT-BASED REPORTING SYSTEM (NIBRS) May 2002 TABLE OF CONTENTS INTRODUCTION 1 1 MAKE THE NIBRS RMS DECISION
SIMATIC IT Production Suite V6.6 www.siemens.com Functional Overview April 2013 Functional Overview SIMATIC IT Production Suite V6.6 April 2013 2 Contents Introduction... 6 MES and Production Modelling...
SAP Brief SAP s for Small Businesses and Midsize Companies SAP Business One Objectives Business Management Made Simpler Successfully manage and grow your small business Successfully manage and grow your
The Way We Pay Transforming the Canadian Payments System Table of contents Message from the Chair... 2 Introduction... 3 Chapter 1: Engaging dialogue... 4 Chapter 2: Falling behind... 8 Chapter 3: Fundamental
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
VISUAL PRODUCT MODELING SYSTEM (VP/MS) CRACK THE CODE FOR ADMINISTERING CALCULATIONS AND BUSINESS RULES CRACK THE CODE FOR ADMINISTERING CALCULATIONS AND BUSINESS RULES INCREASE SPEED WHILE REDUCING COSTS
White Paper The Past, Present and Future of Information Management Report From a physical to digital information world how the data revolution is driving competitive advantage Business Information Solutions