Introduction.
Internet fraud refers to fraud that is committed with the help of the internet. Online services are used to conduct fraudulent solicitations, fraudulent transactions, and to transmit the proceeds of fraud to financial institutions. Internet fraud can be committed in web sites, chat rooms, e-mail, and message boards.
The most common types of online fraud are called phishing and spoofing. Phishing is the process of collecting your personal information through emails or websites claiming to be legitimate. ... Fraudulent “Pop-up Windows” are a type of online fraud often used to obtain personal information.
- Phishing.
- Identity theft.
- Fake news scam.
- Job offer scams.
- Social media fraud.
- Online Dating Fraud.
- SMS Scamming (Smshing).
- Online gift card fraud.
- Online automotive fraud.
- Overpayment Online Scam.
- Tech Support Online Scams.
- Loyalty points phishing scam.
- Credit Card or Bank Loan Fraud.
- Suspicious Mail or Email Phishing Scams.
What is Verimates ?
Verimates is an email ID verification system created to combat and curb email frauds by establishing and verifying the sender’s identity beforehand as long as registered with us.Verimates is an email verification platform created for eliminating email frauds by establishing and verifying the sender’s identity beforehand.
Roadmap.
Sept 2018 - The concept was discussed, planned and the implementation of the idea began.
Nov 2018 - The product underwent Alpha testing stage.
Dec 2018 - Beta Testing was done and successfully approved.
Jan 2019 - Verimates is now Live.
Executive Summary.
Verimates is a product created by Alpen Design Studio Andorra, SL an ADSL GROUP company. The system was developed because of a scam attempt. A person located in London, England impersonated one of our sister companies and sent an email to a bank trying to commit us to a deal we never approved of. This person’s email appeared so strong with fake credentials and using our name that the receiving bank accepted to close the deal. But, fortunately, they contacted us for some clarifications thus enabling us to find out about the attempted fraud just in time.
As this is not the first time that scammers try things like that, as we are not the only entity or group in the World who has been or will be subjected to such type of perfidy and crime we decided to invent a system that will ensure that people and corporations alike can viably resume to using their emails in total security and transparency!
From now on, when sending an email message, become a client when registering with us, choose the most appropriate plan for you and start communicating without fear of not being recognized by the receiving party. Better yet, ask all people sending important messages to you to use our system and thus be verified before communicating with you!
Imagine being able to accept messages in good faith and not having to fear that a scammer is hiding in the background ready to pounce on you and wreak havoc on your company or life by impersonating you!Our procedure is very simple and takes literally minutes to be completed.
- Create an account with us,
- Upload your ID and proof of address,
- Pass our test.
When sending a mail with one of your registered email addresses, come on our site (www.verimates.com) login with your credentials, choose which email address you are going to use, compose your mail and click on send after entering the recipient’s address. The recipient will receive the mail with a QR Code that he or she can flash with their phone in order to be directed to a verification page on our site or alternatively they can also press on an imbedded link that will achieve the same task. Once on the verification page the following message will be displayed:
- Message validly sent from our system on __date__ at __time__ from __Country__ In order to know full ID of sender please log in.
- Once the receiver logs in, the following message will be displayed: Message validly sent from our system on __date__ at __time__ from __Country__ by __name of sender___
Problem Statement.
On everyday basis lots of cybercrime cases are lodge from which phishing is one of the major techniques used to do such activities through mails especially.Hackers send customer attractive offers links which are mostly viruses or the link redirects to the hacker’s server and through this they enable to catch all your critical data fair enough to exploit your credentials and the hackers gets benefited from it.
The viruses spread through hackers might cause heavy damage to the system (device) which no one wants it to happen as the official system contains all the confidential and important data.Due to phishing activity and advancement of technology day by day the rate of fraudulent activities are increasing rapidly.Receivers think 1000times before opening any kind of such mails or gets threatened by looking at it itself.By all this filthy activities the mailing system is getting completely junky and no trust worthy.Businessmen and busy people don’t have time for all this, as they mostly converse through mails. They get highly frustrated and disturbed going through junks in their inbox.
Solution.
How it Works ?
Verimates verifies the origin of an electronic message such as email in order to ascertain the identity of the sender and to create a legally binding obligation.After registration on our web site (www.Verimates.eu) one can send an email from our site. The e-mail will include a QR Code. When the addressee receives the message, he can flash the QR code with his telephone or press on a link and he will then be directed to our web site. The message will show the time and country of origin the message was sent from. In order for receiver to be able to know the actual ID of the sender, he must become a client. Once he becomes a client he will immediately have access to the name of the sender.
In order to become a verified sender and use our system you must provide the following documents:
- Copy of ID or passport.
- Proof of address.
- A selfie showing your ID or passport near your face.
Key Features.
Verimates verifies the origin of an electronic message such as email in order to ascertain the identity of the sender and to create a legally binding obligation.
For the Implementation of the same, Verimates has following key features:
- Face Verification.
- Document Verification.
- Address Verification.
Underlying Magic.
For the Implementation of the same, Verimates has following key features:
- Verimates verifies the origin of an email in order to ascertain the identity of the sender and to create a legally binding obligation for its users only.
- After registration on our web site (www.verimates.com) one can send a verified email from our site.
- The e-mail will include a QR Code, that can be flashed in order to receive information about the sender.
- The message will show the time and country of origin the message was sent from.
- In order to learn more, user must become a client.
- Once he becomes a client he will immediately have access to the name of the sender.
Go-to-Market Plan.
For the Implementation of the same, Verimates has following key features:
- Verimates verifies the origin of an email as long as sender is a registered and verified user.
- This will create a legally binding obligation.
-
For the Implementation of the same,Verimates has the following key features:
- Face Verification.
- Document Verification.
- Address Verification.
- Consent Verification.
Benefits.
- E-mail fraud elimination.
- Identity assertion.
- Secure communication.
Financial Projections.
- Our aim is to cover US, EU and India in the first year of our operation.
- A corporate potential in three territories combined is above 30 million companies. Each a potential target of Verimates.
- We expect a market penetration of 1% the first year.
Competitive Analysis.
- Verimates is the pilot and the only product in the current market to provide ID validation of sender.
- In near future email service providing companies like Google, Yahoo!, Ms Outlook might be our competitors but we will strive to stay ahead of the game using the Blockchain technology.