Our slow and steady growth in New Age Rural Retail Frontiers

In the present times when connectivity and mobility are at their peak we are able to buy, shop and expect product deliveries anytime anywhere. Virtual buying is a larger reality and this is where retail distributors like us come into picture.

Being a leading rural retailer for the past one decade, we believe in transforming the barriers between real and virtual. We are proud to have a large network of existing Loyalists, massive reach in rural India and a solid market report to back us in our rural retail distribution mechanism.

Our smart mix of online payment and offline doorstep delivery system defines our customer relations and integrates the overall shopping experience. As a growing name in O2O (online to offline) commerce, Senrysa’s Next Door Hub model brings millions of unbanked and underserved population into the realm of real world stores.

We are now a pan-Indian retail distribution name that delivers Banking, Insurance, E-commerce, B2C and B2B services. We also have partnerships with topnotch Insurance, Logistics, technology and commercial companies to create an environment of massive social inclusion that includes rural and urban India in accessing cost-effective quality products and services.

We aim to become the topmost ecommerce service providers where ever-growing sales channels reach a nationwide customer base.

Our social inclusion goals and measures are:

  • Education for all.
  • Generating Income potential for the masses.
  • Eradicating deprivation.
  • Housing Solutions.
  • Enriched Health Benefits.
  • Employment Opportunities.

Our game changing approach in retail distribution model brings forward an evolution in rural distribution systems that include barefoot agents, syndicated distribution, corporate linkage, extension counters and privileged relationship between customer and the retailer. We aim to introduce availability of products, competitive advantage, collaborative distribution channels and high penetration in rural areas of India.  Our prime focus will always remain in achieving social inclusion at a national level. This will also fulfill our goal of transforming small scale manufacturers to become dealers.

Senrysa’s Next Door Hub business model establishes promotion, opportunities and co-operative marketing and operation. Societies need to be well-organized and our efforts in extensive social inclusion carries forward a bigger dream of ‘A Growing India’. We utilize potential markets to feed our rural retail distribution and attract change in consumer behavior and demand gratification.

Financial Inclusion for the Unbanked Indian population

The term Financial Inclusion (FI) was first used in India in April 2005, in an annual statement published by the RBI governor Y.Venugopal Reddy. Much later the term got its meaning and started being used widely across the globe. Some strategic banking facilities were provided to numerous households in Mangalam, Puducherry for the time in 2005. There have been numerous efforts put forward since then. In January 26, 2015 Pradhan Mantri Jan Dhan Yojna was announced which made financial mission have a bigger and clearer entry into mainstream India.

We have universally accepted the fact that inclusive growth cannot be attained without Financial Inclusion. “The new rural finance paradigm is premised on the fact that rural people are bankable,” according to Nagarajan and Meyer, 2006. Affordable financial services must be made available to the poor and vulnerable social/economic groups to create economic empowerment. An economically empowered ecosystem builds a socially inclusive system. This provides equal opportunities and affordable financial services available to all, an equal society.

Currently India is considered as a nation with thousands of economic possibilities and we are all responsible to eradicate inequality and poverty. Without an inclusive financial system entrepreneurs, start-ups and small financial organizations would not be in a position to take advantages of growth opportunities. Rural communities largely remain untapped. An empowered rural nation will make the national economy completely empowered. Rural India is financially unserved.

Senrysa Technologies has been providing doorstep delivery services and cash in-cash out transactions to rural population through its BC (business correspondents). Rural citizens in north east and central India have known us for our ICT-based banking through BCs. We have brought banking facilities to the doorstep of millions of unbanked people.

Due to the unavailability of bank branches in many semi-urban and rural regions of north-east India our company has come up with bricks and mortar branches for improved financial inclusion.

Rural communities are highly underserved. They have every right to avail quality financial services. An inclusive growth is all about connecting rural India with modern banking services. The most important characteristic of FI is making cost-efficient banking products available to the poor and unbanked population.  With our 3000 touchpoints we are a proud player

Financial inclusion is not important just for individuals but for economies as well, since it works as a bridge connecting a nation’s social and economic development. As the present times call for an all-pervasive financial inclusion Senrysa is rightly in action presenting the best financial and banking technology solutions to our rural customer base.

Our real-time technology driven BFSI services include AEPS (Aadhaar Enabled Payment System) banking transactions, Tele-Medicine, Advisory services and Logistics. Senrysa is committed to provide low priced quality BFSI products to the rural masses. Our close proximity to the target population (rural India) makes us a suitable partner in fulfilling the national objective.

Multi-factor authentication for ensuring security in online banking

As we know in today’s times there is nothing called ‘a secured device’. MFA is popularly known as Multi-factor authentication. It is a veritable name in the world of security systems. There are various sets of authentication components such as:

  1. Biometric Verification – This is a system that authenticates users by identifying their unique characteristics that is their biological traits such as retina, voice patterns, fingerprint, signatures, iris patterns, DNA, etc. Duplication is minimal in this process as long as no grave fraudulence is involved. This is a realistic form of identification process used in computer science that accentuates surveillance systems.

2. Password Verification – OTP or onetime passwords are generated by computer systems to users in order to process their transactions. This is another form of verification that involves sending messages (passwords/verification codes) to individuals, cutting off security breach. You need to enter these 4/5 digit codes to verify your identity before signing in and accessing your account or making a transaction. This process is discussed in the image below:

Your account needs to remain in safe hands. Avoiding sticky situations will require value-judgements like adding valid information about yourself so that duplicate identification or authentication does not arise out of nowhere.

3. Security Token – Display screens (installed in various workplaces, business organizations and several other types of commercial establishments) ask for PIN (personal identification) or authentication codes. These codes are part of the vast security token design. Advanced security tokens include Bluetooth tokens, access cards, USB token devices, smart cards and mobile phones.

There are three types of security tokens such as:

  1. Contact less Tokens – RFID (radio-frequency identification) are known as contact less tokens that does not require physical contact with the main computer (the one that undertakes permission, data transmission and authentication processes). It is not used regularly by organizations as it is still in its nascent stages. Security concerns have kept RFID development under wraps.

2. Connected Tokens – As the name suggests these tokens require physical contact for real connection. Authentic data gets transferred after a connection is made between the host input device and the security tokens such as smart cards and USBs.

3. Disconnected tokens – These are most commonly used devices that run on two-factor authentication which takes place between the host and itself via PIN. There is no logical or physical connection with the host whatsoever. Data required for authentication is manually (previously injected prior to authentication process is started) inserted in a built-in screen.

Multi-layered checks to protect vulnerable users

With increasing number of cyber threats taking place today, high-end security checks and authentication processes have been included by organizations around the world. Online transactions are at an all-time high which makes it more than necessary to include two-factor and multi-factor authentications.

There is nothing called a ‘strong password’ in the world of hackers. Ecommerce, online transactions and banking actions have led users to take security seriously. Life has become impossible without online actions. Password combinations are not hard to crack for professional hackers.

Protection should be reasonably secure and encrypted computing systems must also be well-managed.

Identity breaches and information thefts have risen enormously.  Individuals remain vulnerable while online transactions are beyond escaping. Single mode of authentication is useless. Two-tier or multi-tier credential verification provides added security.

Multiple layers of authentication curtails possibilities like unauthorised entry and rampant online frauds.

Single Sign On and Multi-Factor Authentication Systems:

  • Mobile/Web Apps
  • OS Logins

Standard Applications:

  • Payment Verification services
  • User Authentication Services
  • PC/Tab/Mobile Login with Single Sign On
  • Attendance
  • App Specific login (also includes single sign on)

Multi-Factor Authentication:

  • Retina
  • Fingerprints
  • Palm
  • Active Directory Services
  • OTP – SMS/Email
  • Face


Interoperability across e-wallets is now a reality.

Interoperability across e-wallets is now a reality

RBI is set to unleash a slew of measures by opening up the UPI platform to allow interoperability among e-wallets as part of its digitisation campaign. The guidelines are likely to be issued shortly by RBI. It shall also finalize the fee structure to be levied for transfer of funds between various e-wallet service providers for accessing the UPI structure.

Presently, e-wallets are using the UPI network for transfer of funds with the help of partner banks. Interoperability between various e-wallet service providers shall allow users of two different e-wallet service providers to directly transfer funds between them without their dependence on banks. This could best be explained by an example – say a customer using Paytm could transfer funds to a merchant who is using a different e-wallet like Mobikwik.

This step taken by RBI further emboldens the digitization drive by expanding the reach of users without the involvement of any bank. However this does not mean that banks shall have no role to play because the service providers of e-wallets shall have to depend on banks for settlement and reconciliation or for that matter, issues related to grievance redressal.

Therefore it can be summed up that the government has been consistent in its policy of digitization and is looking to evolve new strategies from time to time. The day the inoperability among e-wallets begins, one thing is for sure that the user shall be the ultimate gainer as it shall be spoilt with choices for easy, secure and fast medium of fund transfers.


IoT Fast Evolving to meet Today’s Business Demands

IoT (Internet of things) is the most talked about subject both in the personal world as well as in the business world as it has a major influence on today’s lifestyle because it impacts not only the lives of people today only but also how they work?

IoT has gradually developed over the years from the confluence of the internet, wireless technologies, MEMS (micro-electromechanical systems) and micro services.

Some of the integral and vital in the scheme of things pertaining to IoT are as follows-:

Connectivity -: The Internet of Things (IoT) relies heavily on network infrastructure for meeting modern day demands. The three pillars for carrying IoT applications are high-speed connections, integrated security, and low latency response. Therefore it is imperative for every organization to adopt a flexible and scalable wired and wireless network infrastructure. This would help set-up IoT applications anywhere from the cloud to the network edge with fog computing.

Key challenges to keep connectivity intact in IoT

  • Signalling

Bi – directional signaling plays a very significant role in the success of IoT for routing of all data between devices. Senrysa has achieved considerable success in implementation of IoT for uninterrupted streaming of reliable data.

  • Security

“Integrated Security plays an important role in Cyber security because it not helps in keeping a check throughout the network but also helps in increasing visibility. Some important aspects of integrated security are as follows.

a.) Encryption: It is an important aspect as there is a need to build reliable encryption for both servers and connecting devices.

b.) Authorization: It is imperative and critical that as part of IoT technology, every user must be aware that any data streaming out at any time out of server or device should be authorized one.

c.) Open ports: Installation of Bi-directional communication is important as it helps to prevent open ports exposed to the internet.

  • Power consumption

Power consumption is very crucial and a very big challenge since a large number of devices that make up an IoT are connected on 24 X 7 basis. This puts an added pressure on CPU power consumption and in order to prevent the battery of a device from draining out a robust network is required.

  • Detection of presence

Detection of presence is important as it helps to keep an eye on the network. Any breakdown in any IoT device does take time to detect unless and until a proper system is in place to detect when a device goes offline in a network. To sum up, presence detection is very vital and proactive step in the scheme of IoT for monitoring purpose the exact status of all connected device.

  • Bandwidth

It is important to keep a tab on the bandwidth consumption of all devices connected to a network. In today’s business scenario where millions of devices remain connected throughout the day, it is of prime importance to maintain a large tightly knit network which helps in seamless data transfer. It is important to devise ways to maintain strict monitoring as the number of gadgets shall multiply manifold in the years to come.



Aadhaar Payment App – The Next big thing in Indian Payments`

Aadhaar payment app has gained mass importance over a very short period of time. India has surely seen digitization in brighter light in the past few months. With the Minister of State for Finance, Santosh Kumar Gangwar’s statement, “As per reports received from public sector banks, Regional Rural Banks and 13 private sector banks, there are 110.03 crore individual, operative savings bank accounts (including Pradhan Mantri Jan Dhan Yojana accounts) with Aadhaar number seeded in 52.95 crore accounts,” said in a written reply in the Lok Sabha, there seems to be a hopeful intent for a digitally empowered Indian mass. “Banks are committed to seeding savings bank accounts with the account holder’s Aadhaar number, based on his consent,” he added.

With a massive number such as 52.95 crore savings accounts being linked to Aadhaar numbers, the growing need for faster online transactions via mobile applications is on the rise too. Aadhaar linking has taken place in large number of private sector, public sector and regional rural banks giving impetus to mobile app developers in India to find a new source of joy in development. There are currently numerous Aadhaar payment apps available on Google play store. We have also come up with PaySKP, an innovative Aadhaar based payment app that works on mobile as well as web versions.

In a few simple and easy to follow steps you can ensure a hassle free Aadhaar merchant pay.

  1. Download the app on your mobile device.
  2. Whether you are a merchant or a general user login with your Aadhaar number.
  3. Authenticate yourself with your biometric details.
  4. Start accepting/sending payments.

Aadhaar merchant payment apps are faster in operation as they carry out instant bank to bank transactions without any third party enablement.

Now you can simply enjoy as a merchant or a customer if you have a smartphone and the mobile app (Aadhaar based payment mobile application). Having yoru Aadhaar would mean your fingerprints will be authenticated and money paid from your Aadhaar linked account. There are great benefits of an Adhaar Payment app:

  1. No service tax or extra charges (as required in UPI apps, SBI Pay, Paytm, Phonepe, Freecharge, mobile wallets etc).
  2. No need to require remembering of passwords, PINs, etc.
  3. No burden of carrying debit or credit cards.
  4. Easier and Faster payment mode for merchants and users.

Aadhaar payment apps are regarded as the next big (read best!) thing India can look forward to enabling across expanded frontiers. Master cards and Visa charges that amounted to 2 to 3% of the amount can go for a toss with the Aadhaar apps charging nothing extra from its users. March, 2017 has been set as a target by Indian government to link all bank accounts with Aadhaar. Indian seems to be all set to become a powerful cashless economy, positioned for a potential boom in the global threshold.

The battle between Android and iOS

Over the recent years, Smartphone market has been a space for extreme race between Android and iOS. Users, developers and marketers are fighting for the ultimate winning title (as the leader of any two of the platforms). According to 2015 and 2016’s market research Android seems to be on the top spot.

Other related reports have suggested that the two players account for more than 96.7% of the entire mobile industry. This is surely a compelling figure.

Gartner is a very popular market research and analysis firm. It has released the following information on the smartphone market in 2016.

These are two of the most popular platforms (consider calling them giants) that have turned the entire app marketplace into a battle ground. They have reportedly taken over the smartphone industry with data usage being reported as having 99.1% score.

Android is winning the race by defeating iOS with huge market domination in the phase between 2015 – 2016.

The major reasons (as held responsible for the dominant market position) behind Android’s winning score is its easy device compatibility (and availability), familiarity, openness, usability and fast (and user-friendly) software upgrades. However, what makes iOS stand apart from Android is its offering of best features and services.

Do you want to build an Android app? We have recently come up with our brand new merchant payment app – PaySKP. Please visit: www.payskp.com to know more about this mobile app.

We are on play store: https://play.google.com/store/apps/details?id=com.senrysa.payskp

For any mobile app development support services you can reach us. We would be happy to hear from you.